Discussion Need in 5 Hours

 his is a required assignment worth 20 points (20-points/1000-points). The assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. 
The discussion questions this week are from Chapters 12-13  (Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for a SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59 pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation. 

The key focus of the article was how technology-based leadership has driven the digital age. the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

wirless

 bridges and repeaters can expand functionality of WLANs? how wireless controllers can simplify the management of WLANs.

DECODING DATA

QUESTIONS

Instructions

Based on the given block data below, answer the following questions.

Hint: First do Google search for ‘packet dump decode’. Then cut and paste the block of data below into the input data section. Then press decode. You will be able to find the answer from the decoding result.

For the payload of the application layer, take the last few bytes in ASCII. It’s not in the packet dump, because it is not a part of header. You can use the ASCII character table to manually convert them. If you understanding the layer 4 destination port #, you understand what it is asking for. There is only one kind of information for the port #.

Data block to be decoded:

00 11 bc b5 49 40 b8 8d  12 00 0d fa 08 00 45 00

00 37 99 09 00 00 ff 11  ea 9f 0a 07 03 1a 42 aa

e8 41 c7 19 00 35 00 23  a3 9e 02 90 01 00 00 01

00 00 00 00 00 00 05 6d  69 74 72 65 03 6f 72 67

00 00 01 00 01           

Please answer the following questions after decoded the above data block:

Q1: (Layer 4) Protocol is:

Q2: Source MAC address: 

Q3: Destination MAC address:

Q4: Source IP address:

Q5: Destination IP address: 

Q6: Source (Layer 4) Port #:

Q7: Destination (Layer 4) Port # :

Q8: (Application Layer) Payload description:

Cloud Computing

APA format with headings

2 pages

Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.

Attached the textbook, (pick few concepts mentioned till 7th chapter)

how to work on amazon FBA

 Search for Investment Platforms And Compare The Top Results. Explore Results For Your Question. Discover More. Highlights: International Network Of Blogs 

Wk#6 Discussion And Research paper

 1. Discussion:

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?  (Write 350-400 words).

2. Research Paper:

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Game Design

For this, you will need to create a detailed Game Design Document using the provided Game Design Document Template as a guideline .