practical connection paper on cloud computing

Develop a paper describing how the knowledge, skills or theories of this course (cloud computing) have been applied or could be applied, in a practical manner to your current work environment as an IT consultant working for an organization of your choice.

(topics eg: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a 500-word (2 pages). 

APA format.

Windows Network Proposal – Networking

  

You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

Current Implementation/Concerns:

· The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices.

· Data security is priority since patent and trademarks are at stake.

· Los Angeles sales personnel will need secure remote access to Houston office.

· The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.

· Feel free to make other assumptions but they need to be noted in the paper.

Topics to Cover:

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2016 operating system should be used for all aspects of the solution.

The topics include:

DNS and DHCP

· How had DHCP installation and authorization been implemented?

· DHCP scope design (e.g., lease times, number of scopes, address range)

· Will a form of DHCP fault tolerance be implemented?

· Will DHCP reservations be used for servers?

· How can IPAM be utilized?

· How will IPv6 be utilized?

· How will DNS be implemented?

· DNS Security

· How will DNS be handled for the second and third site?

· What namespace should Fixing Windows LLC implement?

· What types of zones needed?

File Services, DISTRIBUTED FILE SYSTEM (DFS) AND BRANCHCACHE:

· How will the shares be secured?

· Will quotas be used? FSRM be configured?

· Will DFS be implemented?

Remote Services and NETWORK POLICY SERVER (NPS):

· What technology will be implemented to provide secure remote access for users?

· Who should have remote access?

Discuss these other server 2016 Networking concepts:

· HIGH PERFORMANCE NETWORK SOLUTIONS 

· SOFTWARE-DEFINED NETWORKING (SDN)

Submission Requirements:

There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

· At least one diagram must be included (not counted towards the minimum length described above). You can have more.

· The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed.

· The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

· At least one non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

· Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMGC’s “Policy on Academic Dishonesty and Plagiarism.” It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Twitter data breach 2020

Introduction (About company,establishments,features,any previous data breach or attacks, popularity chart,market position) 

What attack happend in 2020?

Computation

 

Using a PowerPoint template, create a professional looking presentation of a subject of your linking (about Bulling). The presentation should contain 5 – 7 slides including the cover and aa conclusion page.  The presentation should use animations, transitions, images, bullets and formatted text (make it look nice ).

Also, add an audio narration to each slide as if you were presenting to the class. You might be presenting during our class but if you don’t at least we will have your audio.

Instructions on how to add audio narration to a presentation can be found in this article; How to do a voiceover on a PowerPoint presentation and add pre-recorded audio to your slides and this GCFLearnFree lesson; PowerPoint – Inserting Audio.

EH Week2 P2

Hello,

i need this paper by 09/02 afternoon.

Strictly No plagiarism please use your own words.

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Strictly No plagiarism

Discussion

  Write a discussion of 250 words with APA formatted edition 7 and APA references with citation.

● Discuss the evolution of data storage. 

● Where is this technology today and comment on data storage for big data, mobile devices, and the cloud?

Information Governance discussion 7

Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Cyber Law – assignment 2

 Using a Microsoft Word document, please define:

1. Constitutions

2. Statutes

3. Case Law

4. Administrative Regulations

5. Stare Decisis

6. Precedent

add one reference at least.