Discussion and replies

Organizations globally use collaborative technologies (intranets/portals) to manage their corporate data. Many are also using social tools such as Teams and Slack for knowledge share, capture, and dissemination. They claim it saves time and produces work efficiency. Here are a few questions you must address:

  • Do you believe such tools in the enterprise offer work productivity and efficiency?
  • Do such tools challenge organizations on their knowledge sharing and retention strategy?
  • How can one prevent knowledge from walking away when a person leaves an organization – especially in a world where social media exposes corporate knowledge easily. 
  • What security methodologies, including blockchain can an organization apply to protect the corporate enterprise?

Block Chain Technologies and Business

The theme of this research paper is Block Chain technologies. For this assignment, you must

research the theme with a focus on potential business applications of it (including yet beyond

Fintech). You must research current trends and summarize your research as a report. The

general structure of the report is as follows:

1. An introductory section about the current hype surrounding block chain technologies,

providing context for your report;

2. A description of select applications of Blockchain to business (minimum 3). Choose 1

particularly business areas (of your interest) in mind (e.g., HR, Marketing and Sales,

or  Operations) and provide three applications of Block Chain int those business areas. You must also describe and analyze these technologies based on

their potential to be game changers;

3. The challenges for such applications to become widespread and beneficial to

companies;

4. A conclusion section (with your takeaway from the discussion).

requirements

Your report must adhere to APA formatting;

2. You must research at least 5 recent (i.e., less than 5 years) peer-reviewed articles.

Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,

Accenture, Deloitte, Capgemini) will be accepted;

3. Other than APA formatting, the structure for the paper is not fixed, as long as there is

a logical flow of ideas. The length of the paper is 5-6 pages

(Emerging Technologies; Research Project

 Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture? 

*******

 You will develop your research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting your final project (paper) for evaluation.  You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook. Your project (paper) will comprise 3000 words (not including title and reference pages).  Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins. 

Text book: Technology Ventures : from idea to enterprise 5th edition by Thomas Byers ISBN: 9781260048490

IT PROJECT (NO WRITTING NEEDED) TECHNICAL Cisco Packet Tracer PKT file only

 ***I require only the Packet Tracer file for the working redesign listed below in the requirements***

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS 

All labs must be submitted using the version of Packet Tracer in the online course/learning management system. Please do NOT use other versions of Packet Tracer to assure licensing compliance and proper assessment/credit. In addition, please do NOT add users or passwords to any device, leave all credentials blank for assessment purposes. 

Project Background 

Please reference Figure 1. Friendly Care Hospital is one of the biggest hospitals in DC. You have recently bought the hospital, naming it [Your Firstname Lastname] Hospital. For example, Jane Doe Hospital. Jane Doe Hospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated local area network (LAN). The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services. 

Their original design, depicted in Figure 1, was categorized as a small network, providing services for up to 200-500 devices. They have well surpassed this. You, as their senior network administrator, are tasked with the job of a complete re-design. This design must support a medium to large sized network for over 1,000 devices. Thus, it should surpass the current capabilities. 

Figure 1. Current Friendly Care Hospital Network Design 

 

Project Overview  

In this project, you will study performance improvements in a congested, wired LAN/WAN environment that can be solved to varying degrees by a new IT infrastructure design and fully functional implementation in Packet Tracer.  To learn more about Packet Tracer please read the Cisco Packet Tracer DS PDF. Later, in Phase II of the project, you will scale this design to a larger enterprise IT infrastructure. 

To begin the projects, you will complete a review of related literature to identify what is appropriate to improve system feasibility, RAS (reliability, availability, serviceability), security, and disaster recovery of the existing IT infrastructure and model of your hospital. Once this review of literature is complete, you will use the outcomes and research results to advance and improve the IT infrastructure. Proper data analysis, comparison, and contrast will be summarized within in-text tables and figures as well as appendixes to explain the results of the IT infrastructure re-design and improvement. 

Packet Tracer is limited given it is a simulator. Be creative! For instance, if Packet Tracer does not have a file sharing service for a file sharing server, turn on any other related and relevant services that are available. As another example, use LAN and WAN protocols that are optimal given what the version of Packet Tracer allows. You will be assessed based upon optimal configurations in the version of Packet Tracer used. Thus, assure this is well studied. Research will outline new opportunities for future IT infrastructure designs, and this should be discussed accordingly in the written paper even if not configured in Packet Tracer. Often, new technologies are not implemented in industry immediately due to limitations such as hardware architecture. 

Please verify all requirements are met by reviewing the grading rubric. Below is an outline of minimum requirements with examples and ideas. 

Minimum Project Requirements 

• Submit a working Packet Tracer lab, typically this file has a .pkt file extension. 

o This will include the fully operational new IT infrastructure design o All devices in the lab must be named with your first name and last name 

▪ Example: Jane_Doe_Router_1 o All hardware and software should be configured properly and should be able to communicate using optimized networking designs, configurations, and protocols 

o No devices should have passwords for assessment purposes 

• Minimum IT Infrastructure Design and Packet Tracer Requirements o You must start with a blank/new Packet Tracer file, existing labs or modified labs of existing solutions will receive a zero without exception 

o Design a medium-size hospital IT infrastructure for well over 1,000 devices, and scalable beyond the Figure 1 example 

▪ For example, a design that goes beyond traditional N-Tier designs 

▪ Design proper addressing via IPv4 and/or IPv6 that scales 

▪ Add appropriate routers and switches to support this new design 

▪ Configure at least one appropriate networking protocol, operational across the entire infrastructure 

▪ Use proper network address translation (NAT) 

▪ Implement private and public IP address spaces correctly 

▪ Assure network traffic is organized, efficient, and secured properly (e.g. limit broadcast domains, do not allow marketing employees to access accounting systems, etc) 

o Add an Internet Service Provider (ISP) into the design o Add enough modularity, resiliency, and flexibility into the design o Design and implement the following new services and servers 

▪ A Dynamic Host Configuration Protocol (DHCP) server that automatically assigns working IP addresses to new workstations 

▪ A name server that manages the Domain Name System (DNS) for all servers in the hospital 

▪ A web server hosted on the Internet 

▪ Two new user workstations located at each level of the building that can use the new services properly 

• Show these services working on each workstation in your project (e.g. a website from the web server, DHCP, etc) 

Provide a few hospital departments as examples beyond radiology 

Business Intelligence

 

 Decision modeling with spreadsheets is regarded as clearly the most popular end-user modeling tool. Explain vividly why this is so, i.e., why a spreadsheet is so conducive to the development of Decision Support Systems (DSS). In your discussion, please include what a spreadsheet is, what a spreadsheet add-in means, and how can a spreadsheet add-ins help in DSS creation and use?

Additionally, post some examples or find a related topic on the Internet and comment on it in the discussion post.

Reference: Sharda, R., Delen, Dursun, and Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support. 11th Edition. By PEARSON Education. Inc. ISBN-13: 978-0-13-519201-6

Discussions and research paper: InfoTech In A Global Economy (ITS-832-51) and Enterprise Risk Management – ITS835

Discussion 1:

subject name: InfoTech In A Global Economy (ITS-832-51)

Chapter 7 – A Comparative Analysis of Tools  and Technologies for Policy Making

word count: 300+

Text book: Janssen, M., Wimmer, M. A., & Deljoo, A. (Eds.). (2015). Policy practice and digital science:  Integrating complex systems, social simulation and public administration in policy research (Vol. 10). Springer. (Included through library subscription) 

Things to be included in the discussion:

Address the four sections below. Your contributions should be in your own words; quote very sparingly.

1. CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.

2. SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 

3. EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.

4. SOURCES: Include citations with your sources. Use APA style citations and references. 

————————-

Discussion2: 

subject name: Enterprise Risk Management – ITS835

word count:300+

Chapters 26 through 29 presented four mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Starting with chapter 29, assume that you have been asked to advise the Akawini management team on how they should promote and monitor the transformation of risk management in their business.

To complete this assignment, you must do the following:

As indicated above, assume that you have been asked to advise the Akawini (chapter 29) management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that the organization should implement as well to monitor risks outlined in that chapter. 

Textbook(s) Required:

Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons

———————————

Assignment 3: Individual research paper: Annotated Bibliography – ERM

subject name: Enterprise Risk Management – ITS835

No.of pages: 4

Your paper will be an annotated bibliography, explicitly focusing on implementing Enterprise Risk

Management (ERM). Choose a “theme” (i.e., ERM in Healthcare, Financial sector, Technology, higher

education, manufacturing., etc.) and make sure that all your resource relates to your theme.

Your paper must be in correct APA format, and will need to include at least seven (7) resources, ALL of

which must:

1) Be current. Published within the last five years.

2) Be peer-reviewed.

I expect you to use your own words and follow the APA and use citations and references.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations

are to be evaluative and critical. Give enough information for the reader to decide if the selection is

interesting enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these

annotations, but DO NOT write too much here. Quality is far more valuable than quantity. This exercise is

for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer-reviewed. That means the paper must have undergone a formal

peer review before being published in a journal or presented at a conference. You must ensure that your

resources have undergone rigorous reviews. In most cases, you can find out the review process for a

conference or journal by visiting the appropriate web site. Do not merely assume that a resource is peerreviewed – check it out. I expect about three pages (Around half page for each article)

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://owl.english.purdue.edu/owl/resource/614/03/ (Please see the Sample APA Annotation)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedbib/apa <<<< Check out the "Rules! rules! rules!"

section

http://guides.library.cornell.edu/annotatedbibliography

Textbook(s) Required:

Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons

———————–

Additional details for all the above discussions & assignments:

Student should complete all required portions of the discussion assignment. Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct. Proper use of APA formatting. Properly and explicitly cited outside resources. Reference list matches citations and Plagiarism check required. 

===================================================

please provide the 3 assignments in separate documents

Leadership and Management

Based on Week-3’s journal articles that focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

1) How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 

2) When thinking about data analytics, how does transformational leadership assist with building good data structures?

The submission should meet the following requirements:

  •  Minimum of 2 pages in length (not including title page or references)
  • 1 inch margin throughout
  • Single spaced
  • Maximum of 3 to 4 bullet points
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A referenced to a minimum of 3 peer-reviewed journal articles (not blogs and Wikipedia)
  • The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points.  You are   required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date.  If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment.  Your work will be compared to other’s work for plagiarism, so please note that copying other people’s responses will not be tolerated.

Group project work

Please can someone help me to write my own part of these project. I highlighted my names with red color to identify my own part of the question.

Week 6

 

In this assignment, you will learn more about management methodology by interviewing a CIO or other IT leader and writing an article. Be sure to arrange for the interview and prepare your questions in advance so you are able to write your article. 

Interview a CIO or IT leader.

Write 8 to 10 questions to ask about improving organizational culture; organizational maturity; the IT team; and relationship development between the IT team and other areas of the organization, including finance, marketing, and operations.

Write a 1.5-page article that could be published in a trade magazine summarizing your interview and what you learned.