IT Project Management Topic

 

Instructions

For this assignment, your group will write an issue paper on a project management topic. The paper has to be APA style, 4-6 pages long, including references.

The paper will provide an intellectual treatment of a Project Management-relevant topic. Specific paper topics will be decided in consultation. Therefore, check with me early to discuss your ideas.

I will provide feedback on one intermediate version of the group project if the group so desires. My assessment and feedback of these versions do not count towards your grade.

My topic is the issues with the Project Management Triad of Scope, Cost, and Time and how it is no longer adequate. Explain what the PM triad is and how it is used in 3 pages. Use one page to briefly explain the issues including issues with the quality of deliverables, issues with customer service, and how it ignores end-user adoption.

Algorithm analysis

 

We  have n stations along a river, numbered 1 to n in the direction of the  current. You can rent a boat at any station i, go down the river to a  station k> i, return the boat and pay a fee c (i, k) for the tour. It  is possible that c (i, k) is greater than c (i, j) + c (j, k), with j  being an intermediate station between i and k. In this case, it is  cheaper to rent a boat from i to j and then another from j to k. Give an  efficient algorithm that calculates the minimum cost of a trip from 1  to n. Depending on n, how long does your algorithm consume?

Discussion

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

Subject: Business Continuity Plan & Disaster Recovery Plan

Linux Ubuntu assignment

 Problem Statement DOMAIN: Linux Fundamentals Focus: Development Tom needs to create user accounts for new joiners Jane and Jack in his system and give them permission to view and edit common repositories. He needs to create a cron job to delete empty files and directory every day at 00:00 am and need to upgrade the system every week on Tuesday 6:00 am. As part of his role he also needs to monitor system usage (CPU load, Memory usage, disk usage, network usage, active logged in users). He needs to install Git as SCM in a remote system and put system usage data there. He would need to fetch the data on remote server and needs to maintain the remote server from his desktop as well. He also needs to restrict users to access youtube from this machine. Approach to Solve: 1. Tom creates user accounts for Jane and Jack in his system. 2. Separate home directories are created for each of the three users. 3. They have a common repository script where every user has access to view and edit files. 4. Tom installed git as the SCM in a remote system. 5. He set a chron job to delete empty files and directory from /tmp folder at 00:00 am. 6. He set a chron job to upgrade the system every week on Tuesday 6:00 am. 7. Tom creates a script which has functionalities to display CPU load, Memory usage, disk usage, network usage, active logged in users. 8. He puts them in git repository. 9. He runs the scripts to get data for remote server to check and maintain the remote server from his desktop. 10. He restricts users to access youtube from this machine. 

Week 2 discussion 1

The Department of Defense Directive (DoDD) 8140 (formerly 8570) provides guidance and procedures for training, certification, and management of all government employees who conduct information assurance functions in assigned duty positions. In some career positions, DoDD 8140 impacts those with access to DoD information system performing assurance (security) functions.

As an independent contractor considering a move into the DoD contract arena, discuss additional considerations you would add to your compliance plan to meet DoD requirements. Assess the pros and cons of adding DoD contracts to your portfolio. 

Reflection Assignment

Provide a reflection of at least 600 words (or 2-4 pages double spaced) of how the knowledge, skills, or theories of this course (Enterprise Risk Management) have been applied or could be applied, in a practical manner to your current work environment (Hadoop Environment). If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide at least 600 words (or 2-4 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. The paper should NOT resemble your official resume!

This assignment asks that you reflect on how the knowledge and skills obtained by meeting course objectives were applied or could be applied in the workplace.

Discussion

 

A typical DMZ is a network virtualization schema when a particular network connects to at least two different networks with different security levels. 

What would be the Cloud Based DMZ Architectures’  Challenges? Support your answer with Examples

Cyber security Assignment

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?