Discuss your desired technology infrastructure. Identify communication technologies needed in the workplace or when working remote .

You have just been hired to work in the HIM department at a local employer. Your boss has requested your input on the type of computer system you would like to have.

Using the Internet, search for the best laptop or PC to meet your work needs.
Justify why this is the best choice to meet your work needs. In your justification, describe the components of the computer that make it an ideal purchase i.e., processor speed, keyboard, memory, RAM, internal and external hard drives, Graphics Card, mouse, headset, monitor type, screen size, etc. It may be helpful to organize this information in a table for easier viewing.
Discuss your desired technology infrastructure. Identify communication technologies needed in the workplace or when working remote i.e., Internet, Intranet, Extranet, LANs, WANs, WLANs, and VPNs.

Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better.

Choose a company to base this paper on. You may use a current or former employer, but do not disclose anything confidential. You may pick another organization if you are familiar with their internal information systems. You can disguise the organization and populate it with famous names. Made-up companies are problematic because of the amount of detail and realism they require.
Write your proposal as a memo that the entire C-suite will review. Include at least these points, in your own words, to be persuasive:
1. Identify the main functions of your proposed information system and why they are important to the business.
2. Describe what types of data your information system will hold and how data quality will be ensured.
3. Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better.
4. Offer evidence of feasibility: Show that similar information systems have been built successfully and that they save more money than they cost.
The executives are busy, so keep your memo to 1–4 pages and avoid any extraneous content.
If you use sources to support your writing for this assignment, choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

The paper is written in SWS standard. Strayer Writing Style

What are the environmental impacts of mining? Include explanations for: land subsidence; erosion; soil degradation; air and noise pollution; water pollution wildlife destruction and displacement; mine fires; human health issues .

Mining Fact Book
What are the environmental impacts of mining? Include explanations for: land subsidence; erosion; soil degradation; air and noise pollution; water pollution wildlife destruction and displacement; mine fires; human health issues .
Reclamation and its law
State regulations for mining
Make a table with the following “Acts” include a column explaining how the “Acts” relate to mining: Clean Water Act; Safe Drinking Water Act; Endangered Species Act; Comprehensive
Response Compensation and Liability Act; Surface Mining Control and Reclamation Act

What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network?

When completing the case study you must have a minimum of 3-5 outside sources cited and referenced in the paper. Your full 3 page term paper is due at the end of week 8. In addition to the 3 pages of the paper itself, you must include a title page and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name. Your references page must be written in APA citation style

You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion: What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network? What type of attack was conducted? Howl long did the attacker have access to the network? Is there any persistence on the network for future attacks?

You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.

Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.

Executive Summary

Project Description
Include the name of the project here.

Statement of Need
Explain what the company is struggling with and how the company could benefit from moving to the cloud.

Cloud Service Providers
Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.

Recommended Plan
Provide your recommendation for a cloud service provider and justify your selection.

Impact of Recommended Plan
Describe how your recommended plan will address the needs of the stakeholders. Briefly describe the potential risks of migration/potential drawbacks for the company.

Assess the stakeholder management challenges, and create a plan for dealing with them.

Stakeholder management in IT projects: Stakeholders are people or groups who can influence, or be impacted by, an IT project. One of the most important tasks of any modern project manager is managing relationships with the key stakeholders.

In this research you will study stakeholder management in a real IT project from your own experience. For example, you could evaluate stakeholder management in a project that has recently completed.

Or you could study a future project, assess the stakeholder management challenges, and create a plan for dealing with them.
Management in this context includes stakeholder communications, and the biggest part of successful stakeholder management is good communications.

What consumer trend or trends has Signal’s management been able to tap into since 2017?

Signal’s Trend Identification

After reading this week’s two readings, posted on Canvas, write a two-page paper addressing the following:

What consumer trend or trends has Signal’s management been able to tap into since 2017?
What are the key technological challenges Signal’s management has to overcome in the future.
What is your opinion of the Signal app?
Discussion of consumer trend(s) that Signal’s management has tapped into into since 2017?

 

Describe each option and how it differs from other alternatives. Explain how different options might affect a business’ ability to expand and grow naturally.

For a business to expand and grow, the IT infrastructure must be able to support changing demand for services. Businesses may grow by expanding the existing business, or they may grow through mergers and acquisitions. When companies merge, the newly combined company needs systems to support it.

Research multiple options for computer virtualization and the “cloud” environment. Describe each option and how it differs from other alternatives. Explain how different options might affect a business’ ability to expand and grow naturally.

Would any of the options enhance or inhibit the business’ ability to enter into mergers with other companies and combine business systems? Clarify any risks or constraints associated with a particular option. From a cybersecurity perspective, is cloud computing safer or riskier? Provide examples to support your answer. Based on the business Snack Magic, would some virtualization and cloud computing options be a better fit than others to enable your business to grow? Please explain.

 

 

Identify eight (8) sources/articles related to your narrow topic.Summarise the articles; but rather provide a body/discussion section that critically evaluates the articles.

Applications of Cloud Computing to Drive Innovation in Higher Education.

The guidelines for completing the Literature Review are to:
1. Using the narrow topic focus on specific aspect(s) of the area to be discussed.

2. Identify eight (8) sources/articles related to your narrow topic. a. These sources/articles should have substantial relevance to your topic.

3. Produce a review of these sources/articles in the form of a Literature Review, by summarizing the findings and conclusions, and synthesizing the implications of this research with respect to the narrow topic.
Include a body/discussion section that does NOT merely summarise the articles; but rather provide a body/discussion section that critically evaluates the articles, integrates the findings of several papers and synthesizes the findings to the extent possible, and determines where there is agreement among papers versus where there are contrasting findings, etc.
• It is not possible to prescribe how you should structure/arrange your sources. You should first organise your sources in themes/sub-titles and then group them where they relate. Note that a source, for example, may span one or more themes/sub-titles; each component within your body/discussion will therefore vary.