Architecture

Please view the 2020 documentary “The Soul of a New Machine” (Cantrill) and write an at least 1,200 

word response to content of the film. Please address as many of the technological issues as related to 

computer architecture and WSC issues addressed in this class. Pleas dropin the drop box by 

November 26th, 2021. 

Please be sure to include a “Works Cited” section which includes at least an entry for the film. 

Works Cited 

Cantrill, Bryan. Soul of a New Machine. 4 Mar 2020. Stanford Online. 

<https://www.youtube.com/watch?v=vvZA9n3e5pc>.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

top 5 details that should be included in your cloud SLA.

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

databases

A small enterprise has decided to implement a Customer Relationship Management (CRM) system. Your task is to introduce a system to the enterprise. Research and prepare a presentation that describes the main features of the system and how that enterprise will benefit from it.

Your presentation should:

Be 9-10 slides in length (not including title and reference slides); each slide should have four to six bullet points.

Include presenter’s notes for each slide to further detail the key text that is included on each slide.

The “Best Databases for Information Technology” (Links to an external site.) is another resource that will assist you in developing your presentation.

Requirements: 9-10 slides   |   .ppt file

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PowerPoint Presentation (12-14 SLIDES)

Essentials of MIS (14th Edition) Kenneth C. Laudon and Jane P. Laudon

POWERPOINT PRESENTATION OF CHAPTER 12 OF ABOVE MENTIONED BOOK.

SHOULD BE 12 TO 15 SLIDES TOTAL.

CHAPTER 12- MAKING THE BUSINESS CASE FOR INFORMATION SYSTEMS AND MANAGING PROJECTS

 12-1 How should managers build a business case for the acquisition and development of a new information system?  The business case for an IT investment describes the problem facing the organization that can be solved by investing in a proposed system solution. It provides an analysis of whether an information system project is a good investment by calculating its costs and benefits. Tangible benefits are quantifiable, and intangible benefits cannot be immediately quantified but may provide quantifiable benefits in the future. Benefits that exceed costs should then be analyzed using capital budgeting methods to make sure they represent a good return on the firm’s invested capital. Organizations should develop an information systems plan that describes how information technology supports the company’s overall business plan and strategy. Portfolio analysis and scoring models can be used to evaluate alternative information systems projects.  

12-2 What are the core problem-solving steps for developing a new information system?  The core problem-solving steps for developing new information systems are: (1) define and understand the problem, (2) develop alternative solutions, (3) evaluate and choose the solution, and (4) implement the solution. The third step includes an assessment of the technical, financial, and organizational feasibility of each alternative. The fourth step entails finalizing design specifications, acquiring hardware and software, testing, providing training and documentation, conversion, and evaluating the system solution once it is in production. 

 12-3 What are the alternative methods for building information systems?  The systems life cycle requires information systems to be developed in formal stages. The stages must proceed sequentially and have defined outputs; each requires formal approval before the next stage can commence. The system life cycle is rigid and costly but useful for large projects.  Prototyping consists of building an experimental system rapidly and inexpensively for end-users to interact with and evaluate. The prototype is refined and enhanced until users are satisfied that it includes all their requirements and can be used as a template to create the final system. End-user-developed systems can be created rapidly and informally using user-friendly software tools. End-user development can improve requirements determination and reduce application backlog.  Application software packages and SaaS eliminate the need for writing software programs when developing an information system. Application software packages and SaaS are helpful if a firm does not have the internal information systems staff or financial resources to custom-develop a system.  Outsourcing consists of using an external vendor to build (or operate) a firm’s information systems. If it is properly managed, outsourcing can save application development costs or enable firms to develop applications without an internal information systems staff.  Rapid application design, agile development, joint application design (JAD), cloud-based platforms, and reusable software components (including web services) can be used to speed up the system’s development process. Mobile application development must address multiple platforms, small screen sizes, and the need to conserve resources. 

 12-4 How should information systems projects be managed?  Information systems projects and the entire implementation process should be managed as a planned organizational change using organizational impact analysis. Management support and control of the implementation process are essential, as are mechanisms for dealing with the level of risk in each new systems project. Project risks are influenced by project size, project structure, and the level of technical expertise of the information systems staff and project team. Formal planning and control tools (including Gantt and PERT charts) track resource allocations and specific project activities. Users can be encouraged to take active roles in systems development and become involved in installation and training. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Project: Design with Focus on Business Continuity Assignment

  

Overview

This phase of the project completes the design phase and develops a business continuity and disaster recovery plan for the final solution. This phase of the project must include the secured design diagrams that minimize risk and appropriately address the threats identified in Project 1: Problem Identification Assignment. Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Any single points of failure must be addressed with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.

Instructions

Each design must be justified by the textbook and peer-reviewed research. You will be evaluated based upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities. For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.

Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.

At the minimum, this phase of the project must include:

I. Executive summary and introduction

II. Systems Design

a. Detail the final systems design, supporting the results given the original review of the literature and the analysis performed in Project 2: Methodology Development Analysis Assignment

b. Design the final solution

i. Target of the attack

ii. Vulnerability

iii. Control

c. Create the appropriate design diagrams for the secured solution

d. NOTE: Required minimum length (8 peer-reviewed sources and at least 10 double-spaced, current APA-formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements

III. Business continuity and disaster recovery plan (must be supported by relevant and current research from scholarly, peer-reviewed journals)

a. Basic BCP Policy

b. Basic business impact analysis (BIA)

c. Preventative measures

d. Recovery and restoration

IV. Project conclusion

a. Summary of the solution

b. Future recommendations and implications for business

c. Final project conclusion

V. Diagram examples in this phase could include but are not limited to:

a. Secured and hardened advanced system and/or network architecture diagrams

b. Secured package, design class, system security, and system control diagrams

c. Secured CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings

d. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram, add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Project 1: Problem Identification Assignment

Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Project 2: Methodology Development Analysis Assignment – Communication and interoperability with existing networks must be protected by the NGN’s security architecture NEXT GENERATION NETWORK (NGN)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 6 DB: Planning Loyalty and a Mobile App

Your friends John and Pam discussed with you their need to implement a loyalty program and a mobile application for their restaurant.  As you were debating with them which initiative you would implement first, the customer loyalty system and the mobile app along with limited resources, they have asked you to explain the following:

  • The steps in IT planning and importance.
  • The advantages and disadvantages of different system conversion strategies.

In response to your peers, explain the challenges involved in systems development.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Stage3

For this assignment you will prepare the third part of your report in which you will identify key stakeholder expectations for the new technology solution and develop a set of requirements.

This section should not exceed four double-spaced pages and must include at least two references. Prior to beginning this assignment, be sure you have read all of the materials, completed the quizzes, participated in the discussions provided in Weeks 5 and 6, and completed the Stage 1 and Stage 2 Assignments. They will prepare you to be successful in writing your paper. Be sure to read and follow the assignment instructions carefully, and refer to the Week 5 reading, Developing Requirements for an IT System.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussions and Research paper

Discussion:

  We  develop good DR plans and some of those plans will include a remote  recovery site (hot or cold). How do we ensure that the remote site is  protected like we would the main location? Discuss the challenges of  maintaining information security at a remote recovery location.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Portfolio assignment:

  Review  over the DR template and pick an industry such as (airlines, ecommerce,  banking, etc.).  Within that industry, pick a specific organization for  the development of the Disaster Recovery Plan such as Healthcare –  Physical Therapy Clinics – ATI.   Pick  an industry/company to focus on for this assignment.  Based upon the  given information you can find on the company and any past  issues/breaches the company has gone through, create a Disaster Recovery  plan using the template provided.   Project selection is submitted for approval.    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

Assignment:

Using the attached document, research and describe a selected automated IT security policy compliance system

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

blockchain development

 

This final project gives you the opportunity to review what you’ve learned throughout the semester and present a range of topics in the form of a policy that describes how participants can join your business network, and the benefits of doing so. The overall purpose of your policy should be to create interest in your business network and its applications, along with a description of the onboarding process and ongoing benefits to members.

Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network. Your policy should be no less than 1000 words and no more than 1500 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

research

 

You are in a very exciting time of your life! You have decided to start a new business that you have located in a small storefront in the neighborhood strip mall. This business will service small businesses in your community by providing computer system setup and configuration services along with network implementation and troubleshooting services. You have hired two individuals to serve as your consultants. One is a computer administrator and the other is a network administrator.

It is now time to go on a shopping spree to purchase your office equipment. Since you have received a generous donation from a sponsor, money is no object. Use your favorite browser (Internet Explorer, Google Chrome, Mozilla Firefox) and research computer systems and other equipment that you feel would be necessary to start your business. Essentially, you need to identify any equipment that you will need to set up your new office.

You can visit the Web site of your favorite electronics store or review one or more of the following sites by using your browser and searching for your desired equipment.

Prepare 2-3 pages of content in a Word document describing the equipment that you have selected. How much will it cost to purchase three computers? Describe each from the perspective of computer platform (desktop, laptop, tablet, notebook, or other), the amount of memory, the processor, storage, etc. Would you want SATA devices? How about a RAID array? Explain the reasons that you chose those systems.

Prepare your work in a Word document using Times New Roman 12 point font, with valid scholarly resources and in-text citations and references in APA style.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now