Data center in cloud

Why most business corporations are reluctant to migrate their data centers to the cloud? How would you convince your CEO to migrate the company’s  data center into the Cloud?   Would you recommend full or partial migration to the cloud? Why?

Homework assignment

All the instructions on the file that has been uploaded. You have to use swift programming language to complete the assignment please

Research Current Legal Rulings

 

Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.

In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action. 

For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.

  • Go to:  the Federal Register. https://www.federalregister.gov/.
  • Use the Search bar to find rulings related to your topic.
  • Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
  • Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization. 
  • Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).

Possible topics for your search:

  • Anti-malware
  • compliance/auditing
  • forensics
  • ID management
  • Intellectual property
  • Managed security service providers (MSSPs)
  • Messaging safeguards
  • Patch management
  • Perimeter defenses
  • Security information management (SIM)
  • Security event management (SEM)
  • Incident response
  • Transaction security
  • Wireless security

Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the attached chart format for your summary. 

Discussion 2

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Reference articles:

Textbook, Chapter 1 & 11: Bashir, I. (2017). Mastering Blockchain. Birmingham, UK: Packt Publishing. 

Norberg, H. (2019). Unblocking the Bottlenecks and Making the Global Supply Chain Transparent: How Blockchain Technology Can Update Global Trade. The School of Public Policy Publications, (9), 1.

Kshetri, N. (2017). Will blockchain emerge as a tool to break the poverty chain in the Global South? Third World Quarterly, 38(8), 1710–1732. https://doi.org/10.1080/01436597.2017.1298438

Varghese, J. J., Sharma, D., & Singh, N. K. (2019). Analysing the Impact of Blockchain Technology in India’s Digital Economy. Global Journal of Enterprise Information System, 10(3), 94–99. https://doi.org/10.18311/gjeis/2019

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (01/14/21).

3. Atleast 3 references in APA format

4. Min of 250 words (2-3 paragraphs)

EH2DB

in 300 words.  

Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice.

Python Homework

After running the code I upload, write a code using numpy and panda to sort the stock data by date(month) in recent five years.

Emerging Threats

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Case Study 5 – Dianrong

 

Please read the Dianrong case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the trade offs that Dianrong is facing? How should the company prioritize its objectives? What should Soul Htite do?

2. As detailed in Exhibit 1 of the case, there are different collaboration models that Dianrong has adopted in working with various parties on technological development. How should the company decide on the nature of collaboration for technological developments in the future (via organic and in-house developments, partnerships, joint ventures, or acquisitions)?

3. Assuming that the company manages to raise an additional US$100 million, how should Dianrong allocate the capital across its many business units to maximize value in the long run? Should the company spend the money on internal R&D initiatives or M&A pursuits? Or both?

4. How should the company work with the local regulations in China? Should the company focus on reviving the P2 industry in China in the process? If so, how?

5. Are there other technologies that Dianrong should consider adding to its already expansive portfolio of technologies? In contrast, are there technologies that may seem redundant at the firm at the moment? How should Dianrong manage this to improve its competitive edge with its “technology DNA?”

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

week 6 group

  

This assignment should be in APA format and have to include at least two references.

1. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.?