Organ Leader & Decision Making

 Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shutdown all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused ecommerce site” and a new business strategy for its retail stores12 . In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Create a PowerPoint presentation containing the IT strategic plan that will address Circuit City ecommerce initiatives. 

The following information should be covered in the Document. 

1. History of Circuit City 

2. What were the issues and challenges that caused the collapse of Circuit City in 2009? 

3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?  

4. Discuss the major competitors in global e-commerce. 

5. How would IT deliver value to the business? 

6. Proposed the IT infrastructure required to support global e-commerce 

7. Proposed the IT budget for the e-commerce initiative 

8. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage. 

8 Page Document exclude contents and reference page

APA format

virtual

 

Research paper:

 • Describe the organization’s environment and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

•  Your paper should include an introduction, a body with fully developed content, and a conclusion.

Follow APA6 guidelines. 

Digital Forensics Tools and Tech – New England

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

300 Words

You have three attempts.

3-5 Page in APA 6th standard Organ Leadership and Decision Making

3-5 Page in APA 6th standard, NO PLAGIARISM, a minimum of five peer-reviewed journal articles.

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Windows Server Deployment Proposal

  

Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course. 

Scenario
“We Make Windows”, Inc. (referred to as “WMW”) has hired you as an IT consultant for implementing their Windows network infrastructure. WMW is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WMW with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WMW wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.

There are several details about WMW which will have an impact on your choices:

· WMW will start with 90 employees, in the following departments:

o Executives (9 employees) – manage and run the company

o Accounts and Sales Department (15 employees) – perform market research and maintain accounts

o Creative, Media and Production Department (49 employees) – advertising

o Human Resources and Finances (12 employees) – perform HR and financial duties

o IT (5 employees) – manage IT for the company

o WMW will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.

· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity. Please be sure to state these assumptions.

· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.

· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). You may make assumptions about how data should be shared or kept private, but they must be stated in your paper.

· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2016 operating system should be used for all aspects of the solution.

Discussion question – 350 words, 2 references

 Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology. 

Assignment

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

Physical security 7

 

Search the Internet for an article where physical security failed:

  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 5 full pages double spaced (not including your required cover page, reference pages, abstract, or table of contents)
  • No photos or graphs
  • Reference all sources used
  • Your paper must be APA formatted (including a separate cover page and reference page) 
  • Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section

Security Portfolio Assignment(Min 600 words)

Question for Week7:

 

In week #4, your midterm project was to provide a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

1. Cover Page (i.e. APA title page)

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Week #4’s Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.

This assignment should be about the security needs only.  Do NOT discuss how the client can achieve more business (That is not your job). Please use  APA format and include at least two references.

Other references:

Below is the question for week4 assignment

 

Vestige, Inc. is an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time.  Since you have spent the past several weeks in training to be a System Architect, perform your assessment:

Hint: Review your assignments from week 1-3

This assignment should be in APA format and have to include at least two references.

Week4 Assignment Attached:

Hearsay Rule

 Do a bit of research on the hearsay rule in legal proceedings. In your own 250 words, explain the hearsay rule and describe how it relates to the concept of an expert witness.