week 10 discussion

An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities.

Chapter 8 discusses the concept of collection. Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Voronoi diagram–Computer Geographics

1.     

Theorem 7.3 For n _x000e_ 3, the number of vertices in the Voronoi diagram of a set of n point sites in the plane is at most 2n − 5 and the number of edges is at most 3n−6.     

Show that Theorem 7.3 implies that the average number of vertices of a Voronoi cell is less than six. 

2.

Suppose you are given a set, S, of n > 3 points in the plane such that no three lie on the same line. Show that a point, p, in S, is on the convex hull of S if and only if p has an unbounded cell in the Voronoi diagram of S.

Word Project

You will write a letter using the same format provided in Chapter 3 including:

  • creating a letterhead – use shape with shape effects and image
  • Add your contact information
  • Use 4″ Tab stop for date and closing
  • 2 – 3 paragraphs (3 sentences each minimum)
  • bullet list of at least 3 bullets
  • Table with title row and column or row headings
  • Use proper closing and signature line
  • Letter will fit on one page

Need ASAP

Operational Excellence Week -3

 In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found above (attached)Provide a detailed analysis of what is working and what is not working. 

— 500 Words 

Discussion

 

You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.

Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.

Tasks

Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:

  1. Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
  2. Identify vulnerabilities and clear-text information transfer.
  3. Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
  4. Identify any opportunities for reduced ISP costs through port redirection or address translation.
  5. Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
  6. Create a professional report detailing the information above as supportive documentation for the network security plan.
  7. Create a report that includes a basic network diagram and research results.