Research paper – server virtualization

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

• Be  2 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

cryptography15

Explain the rationale for post-quantum cryptography and describe its relevance with different types of cryptographic algorithms. 

Note: Answer should be 300-400 words with 2 APA references and plagiarism should be less than 20%

Linux Users, Groups, and Permissions Lab

Linux Users, Groups, and Permissions Lab

Objective:

Understand how to create user accounts
Understand how to create group accounts
Creating good password policies
Understanding permissions and file sharing

Setup:

You will need a Ubuntu Server VM

Walk Through:

You are a system administrator who has been tasked to create user accounts for new users on your system. You can pick whatever theme you like as long as there are protagonist and antagonist users:  i.e. Super Hero’s and Villains, Harry Potter Characters, or other interests of yours.

Create 2 groups:
One for the Protagonists
One for the Antagonists

Create 5 users:
2 Protagonists
2 Antagonists
1 Neutral – Can access both group’s files

User Configuration:
Each user will have their own home directory that only they can access.
Users must change their password when they first log in.
Users are required to change their password after 6 months.

Required Directories in /home:
1. Share – Anyone can access this directory to add or remove
2. Protagonists – Only the protagonists group can add or remove
3. Antagonists – Only the antagonists group can add or remove
***Directory names can be named based on your current theme***

Ensure that you test that each account is working by either switching users, or logging in as different users.

What to Submit:
Submit a lab report documenting your process.

Make sure to include:

  • A screenshot of the listing of the /home directory of the system showing the users home directories and the additional group directories.
  • A screenshot showing the listing of the file /etc/groups.
  • Screenshots that shows the permissions of the protagonists and antagonists directories.
  • Output from the chage -l for each of the five users.

Upon Completion You Should:

  • Be able to use user management commands to create and modify users
  • Be able to use group management commands to create and modify groups
  • Be able to modify permission to allow individuals access based on group or permissions level

HomeWork

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discuss the impact of the GLBA on the financial services industry

 

Instructions

In order to complete assignment #4, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of the 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

1. Chapter 6 noted that Friendster has obtained a number of social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these two companies and you expect that you may eventually be sued by Friendster. In addition to contesting the validity or enforceability of the Friendster patents, what are some of your other options? 

2. The CEO of a small but promising start-up company is in need of an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?

3. Read about the Gramm–Leach–Bliley Act (GLBA). Discuss the impact of the GLBA on the financial services industry

Linux Implementation Proposal: Migration Proposal Presentation

 

Faster Computing has contacted Go2Linux and requested a brief  proposal presentation for migrating its systems from Windows to Linux.  The company is specifically interested in seeing the following  information:

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
     
  • The company is aware that many different Linux derivatives exist. Which would Go2Linux recommend, and why?
     
  • Are there graphical interfaces available for the Linux workstations  that would provide similar functionality to Windows? Some users are  concerned about working with a command-line interface.
     
  • What steps will be required to migrate the systems from Windows to Linux?
     
  • What tools are available on Linux for the servers to provide file sharing, web servers, and email servers?
     

The deliverable for this phase of the project is a three- to  five-slide PowerPoint narrated presentation. For each slide, you will  embed your own audio recording as if you were presenting the content to  the Faster Computing team. Faster Computing has not yet committed to the  project, so this should be presented as a proposal. 

The presentation should be visually appealing; inclusion of at least  one image that supports the content and adds value to the proposal is  required. You must cite at least two quality sources.

Fun Run 3 – Multiplayer Games

Run 3, is the third game in the Run trilogy. 

Run 3 takes place in a series of tunnels in space. 

To play the amazing run 3 game, the players have to run and jump to pass different levels of obstacles. 

Run 3 introduces a number of new mechanics not seen in the previous games, including crumbling tiles, ramps, darkness, and the ability to re-enter a tunnel after jumping out.

People remember this game as a game everyone plays at school. 

Good luck and have fun guys! 

How To Play:

Use the left and right arrow keys to move.

Use Space to jump.

Review: Run 3 online. 

When running into another lane, that lane will turn into the floor.

You can pause/resume/restart, switch aliens and turn the music, sound on/off in the pause menu.

CIA Triad

In 80 words or more review and discuss the tutorial on the following link

https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA

700 words – Question – After reading through the Chapter1 to Chapter3, In consideration with the constructionist’s views about quality of social simulation

Chalmers et al. (1995, p. 173) stated that, validation of a simulation against empirical data is not about comparing “the real world” and the simulation output; but it is a comparison of what is observed as the real world with what is observed as the output.  In this scenario, both are constructions of observers and their views concerning relevant agents and their attributes (Chalmers et al., 1995). Constructing reality and simulation are just two-way of an observer seeing the world. The issue of objective, formation is not normally considered by computer scientists relying on the standard view: data is “organized” by a human programmer who appropriately fits them into the chosen representational structure. In most cases, researchers apply their prior knowledge of the nature of the problem to hand-code a representation of the data into a near-optimal form.

700 words – Question – After reading through the Chapter1 to Chapter3, In consideration with the constructionist’s views about quality of social simulation: 

what happens when the possibility of validating a simulation with empirical data from the “real world” is questioned? 

provide a clear narrative with an explanation of what happens

mad research paper

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.