Tailored vs. Ready-made Software

  

Overview:

In your position as the IT manager at your local hospital, the medical staff of the cardiac ward would like to build an expert system for diagnosis. Your preliminary review shows that the financial investment would be considerable. Your IT Director asked you to write a 2-3 page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• Explain the differences among the alternatives to tailored system development,

which include:

o outsourcing

o licensing ready-made software

o using SaaS

o encouraging users to develop their applications.

• List the business trade-offs inherent in the various methods of acquiring systems.

• Describe which systems acquisition approach is appropriate for the medical staff

of the cardiac ward at your hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

Quantitative Methodology vs Qualitative Methodology

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains the following:

  • Discuss Quantitative Methodology
  • Discuss Qualitative Methodology
  • Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). 

cybersecurity governance

Why do you think cybersecurity governance is important?

Think about the crisis in 2008; if banks did not have any regulation do you think that would have been a problem from a cybersecurity perspective? Would there have been further loss?

Cloud computing_31_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.

Please include the reference and citation. Need by 11/01 11:00 am.

2 Discussion questions and 1 weekly Summary 1 Page

At least 200 Words Each Discussion 

Discussion 1.1

What is the difference between “reactionary mentality” and “proactive mentality”?

How are both useful in Network Defense?

Provide an example of each in your initial statement.  

Discussion 1.2

What are the meanings of the following terms?

1) Advanced Persistent Threat

2) Remote Access Trojan

Provide an example of each in your initial statement.  

Weekly Summary 1.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Chapter 1 and PPT attached Please take this as reference for Weekly summary 1.1

Bash Scripting – Three easy tasks

Please find the attachments for three tasks listed. Use bash scripting template attached (.sh file) to complete the three tasks. Please add comments wherever appropriate. 

Ask if you have questions, and need anything. 

Thank you!