HEALTH CARE SYSTEM

 1. Visit the NetMotion Web site (www.netmotionwireless.com) and access and read other Mobility XE success stories. Discuss the patterns that can be observed in the benefits that Mobility XE users have realized via its deployment and use.

 2. Do some Internet research on the security implications of HIPPA requirements for hospital networks. Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements.

 3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify examples of how St. Luke’s could further enhance its wireless network by implementing VLANs. 

Sources [CONR03] Conery-Murray, A. “Hospital Cures Wireless LAN of Dropped Connections.” Network Magazine, January 2003.

 [NETM03] Netmotion Wireless, Inc. “NetMotion Mobility: Curing the Wireless LAN at St. Luke’s Episcopal Hospital. Case Study, 2003. Netmotionwireless.com/resources/case_studies.aspx.

 [NETM07] Netmotion Wireless, Inc. “St. Luke’s Episcopal Health System: A Case Study in Healthcare Productivity.” 2007. Retrieved online at: http://www.netmotionwireless.com/st-lukes-case-study.aspx 

VBA Coding Challenge

  • Create a script that will loop through all the stocks for one year and output the following information.
    • The ticker symbol.
    • Yearly change from opening price at the beginning of a given year to the closing price at the end of that year.
    • The percent change from opening price at the beginning of a given year to the closing price at the end of that year.
    • The total stock volume of the stock.
  • You should also have conditional formatting that will highlight positive change in green and negative change in red.
  • The result should look as follows(attachment 2).

CHALLENGES

  1. Your solution will also be able to return the stock with the “Greatest % increase”, “Greatest % decrease” and “Greatest total volume”. The solution will look as follows(attachment 3). 

  1. Make the appropriate adjustments to your VBA script that will allow it to run on every worksheet, i.e., every year, just by running the VBA script once.

Other Considerations

  • Use the sheet alphabetical_testing.xlsx (attachment 4) while developing your code. This data set is smaller and will allow you to test faster. Your code should run on this file in less than 3-5 minutes.
  • Make sure that the script acts the same on each sheet. The joy of VBA is to take the tediousness out of repetitive task and run over and over again with a click of the button.

Submission

  • To submit please upload the following to Github:
    • A screen shot for each year of your results on the Multi Year Stock Data.
    • VBA Scripts as separate files.

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Data science and Big data discussion 11

 

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

Please make your post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

DIscussion1

 

using the Erl et al. (2013) book as your ONLY source, respond to the following:

  1.  IN YOUR OWN WORDS, define Identity and Access Management (IAM) and explain its importance to organizations.
  2. Erl et al. noted that “IAM  mechanisms exist as systems of four components.” List three of  these components and ways each is vital to organizational success.

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Week-14 discussion cpm

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.

Access control discussion 7

Discuss how human nature affects Access Control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.

Assignment

Instructions

  • Add two separate HTML pages that contain: One Page includes details about your Contact Information (home vs work) and best way to contact
    Second Page includes your favorite Links with a brief information about each link
     
  • Using  headings , paragraphs, lists and images in your pages.
  • Using ONE External CSS file to format your pages
  • Your Style file should include at least TEN different rules  that applied on your HTML files.

Make sure that all your site has a valid HTML code