Java

 

Website enrollment form

A blogging website wants users to enroll to get access to the blogs.  The figure above shows the form layout for enrollment.

Develop a Java WindowBuilder Application to implement this form.

Add a Button called “Enroll” at the bottom.

When the user clicks this button, the information entered by the user should be displayed in the box called Enrollment information.

All the information user entered should be displayed along with their selections indicated by the  Checkboxes and Radio Buttons under their proper headings (Interests, Communication Preference, How referred)

Example Output: 

Name: xxxxxxxxxxxx 

Email:  [email protected] 

Phone: 123-456-7890 

City: zzzzzzzzzzz 

State: TX

Interests                             Communication 

Preference                         How Referred 

Electronics                         email                                        

Website 

Technology 

Travel 

Shopping

Research Paper

 There are fewer better ways to help understand these complex guidelines, from a practical perspective, than to learn about how “real world” stakeholders have dealt with them. Research and discuss an actual scenario in which a PCI stakeholder has dealt with, or failed to comply with, PCI DSS. Tell us some stories. Your subjects is: (2) a small, local business (such as a barbershop, bookstore, or restaurant). 

PRJ656 Project Management Integration Framework

 

Project Management Integration Framework – Week 7 Assignment

Closing/Change Control

Create a 2-3 page Word document and include the following. Be sure to label each section. You can embed your change control log and close out document or attach them separately.

·  Often times a project will have a contract with a third party. Explain the importance of conducting procurement management when working with sellers and awarding contracts

·  Review one of the case studies from the previous week(s). Identify at least two unexpected changes that were encountered and will impact your project schedule by making your schedule 2-4 weeks late. Create a change control log. How will you handle this change? 

·  Create a close out document that describes the steps for finalizing and implementing a project

cloud computing

  

Project overview

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.

This project will be completed in a series of steps, in which you will explore cloud technologies and cloud architecture and how they can be used in the organization.

Your presentation with audio narration will educate the executives on cloud computing and its benefits (and drawbacks) to the company. To complete your analysis, you will need to cover the following:

  • description      of cloud computing
  • basic      capabilities of the cloud
  • advantages      and disadvantages of cloud computing
  • analysis      of economic implications
  • IT      business needs
  • SWOT      analysis

There are six steps in this project. In your final narrated PowerPoint presentation, you will be assessed on your ability to convey your understanding of cloud computing and how it can be used to benefit your organization, explaining the advantages and disadvantages of cloud computing and providing a detailed business analysis covering financial considerations, business requirements, and an analysis of threats and opportunities.

Step 1: Describe Cloud Computing

Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.

Step 2: Research Advantages and Disadvantages of Cloud Computing

Now that you have defined important terms and summarized the basic capabilities of the cloud, it is time to explore the advantages and disadvantages of cloud computing.

Currently, BallotOnline is running at full capacity and needs to expand its IT infrastructure to accommodate its growing needs. Instead of expanding current on-premise IT infrastructure by building or acquiring a new data center, Sophia has suggested that the cloud may be more efficient and cost-effective than adding more traditional physical data center space.

This information that you research will be useful in your final presentation in the last step.

When you have completed the research, move to the next step, where you will consider the budgetary aspects of a move to the cloud and the implications for the organization.

Step 3: Analyze Economic Implications

Now that you have weighed the benefits and drawbacks of cloud computing, it’s time to take a close look at the economic implications of a move to the cloud. All organizations (for-profit, nonprofit, or government) have finite budgets. Management must allocate these financial assets appropriately so that the leaders can make sound business decisions and meet the objectives of the organization.

Information technology (IT) is a key strategic function to help support the objectives of an organization. Businesses first used information systems to replace paper-based methods of helping management perform these functions, and that use continues today. Managers must be able to understand different IT models to make the best financial investment decisions for the organization.

The financial requirements for the cloud computing model are different than the financial requirements for an on-premise model. Cloud computing shifts budgets to a pure operating expense model, whereas the traditional on-premise computing model requires both capital and operating expense allocations.

Several free calculators to help estimate the cost of cloud services exist on the web, including the AWS Total Cost of Ownership (TCO) Calculator and Azure TCO Calculator. Alternatively, you may find other calculators to estimate your cloud cost. Most cloud providers have their own cloud cost estimator tools. If the calculator that you selected does not show on-premise data, then you can recalculate using one of the other calculators that do provide this data.

For your economic analysis, enter the information from BallotOnline’s IT Budget and Infrastructure Summary into your chosen calculator to estimate TCO for the current physical IT infrastructure configuration. Then estimate TCO for a comparable configuration in the cloud to estimate the potential cost savings.

Write the summary of the economic implications, showing the savings and how you arrived at them, and upload it to the dropbox below.

Step 4: Define the IT Business Requirements

After considering the economic aspects of the cloud, the next logical step is to narrow the particular requirements of cloud computing for the organization. It is important that your presentation works toward building a business case for cloud computing.

Your presentation must address BallotOnline’s business requirements and critical IT requirements related to data storage. Make sure you classify the requirements into functional (behavior) and nonfunctional, as per the requirements definition link.

Step 5: Prepare a SWOT Analysis

In this step, you will apply the information gathered in the business analysis to assess the benefits and possible drawbacks of adopting cloud infrastructure for BallotOnline.

Take Note

What Is a SWOT Analysis?

Description: SWOT analysis acronym stands for Strength, Weaknesses, Opportunities, and Threats.

Your supervisor, Sophia, recommends that you include a SWOT analysis in your presentation, since the BallotOnline company executives will want you to go over both the advantages and disadvantages of cloud adoption and any important internal and external factors that may influence the success of the project.

Prepare a Presentation on Benefits and Possible Drawbacks of Adopting Cloud Infrastructure

In this step, you will prepare your presentation for the BallotOnline executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.

COPPA, CIPA or FERPA cover this situation with photography

 

I’d like to take a little different tack here.  There are several laws designed to protect the rights of children and students, COPPA, CIPA and FERPA.  With those laws in place to protect children, is it legal to take pictures of children in a public place without the parent’s consent?  The situation has come up several times where individuals were taking pictures of children at playgrounds.  The parents objected but did the courts uphold the parents or the photographers?  I understand that different local jurisdictions will have different laws but let’s keep our discussion to general laws in the US.  

Let me ask this, would COPPA, CIPA or FERPA cover this situation with photography in a public or private location?  Why or why not?

Clinical Significance

 How does a nurse know what (if any) knowledge in a research study is usable for clinical practice? What would a critical thinker look for in the evidence before deciding to change? What influence do credibility and clinical significance have on your decisions to integrate research-based evidence into your practice 

DForsnisc-we-6

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

350 words

Information Governance discussion 4

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.  Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

Literature Review

Please use the attached rubric to guide your writing. Please review the example Literature Review for guidance. 

Requirements:

Times New Roman font, 12 point, double spaced

7-10 pages

10-15 sources (Peer-reviewed articles )

Correct APA7 Citations

Benchmark – Framework Findings and Recommendations

 

Benchmark – Framework Findings and Recommendations

This assignment serves to benchmark competency 2.1: Establish a risk management framework using industry standards for compliance.

Based on an executive level report, deliver the findings of the Topic 4 “Demonstrating the Gap” assignment.

Include the following in your report (add sections to the template as needed):

  1. An overview of why the report is being written
  2. A paragraph description of the system
  3. A paragraph outlining the framework governing the enterprise
  4. Major gaps that were found
  5. Remediation that is recommended
  6. A high-level diagram that represents the current state of the system
  7. An equal diagram depicting the proper end state

Refer to the “Security Assessment Report (SAR),” within the required readings. This resource provides detailed explanations of each section that should be included within the assessment report. 

APA style is not required, but solid academic writing is expected.

Refer to the “System Security Assessment Report Template” and the “Framework Findings and Recommendations Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.