Discussion 3- Legal

Assigned Readings:Chapter 3. The Judicial System.Chapter 4. Managing Disputes: Alternative Dispute Resolution and Litigation Strategies.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain the pros and cons of utilizing litigation to resolve a dispute as opposed to alternatives to dispute resolution.
  2. Peter Plaintiff is citizen of Kentucky.   He drives to Tennessee and purchases a lawn mover from Lousy Lawn Mowers, Inc.  Peter Plaintiff returns to Kentucky and is seriously injured when the lawnmower explodes during normal use.  Lousy Lawn Mowers, Inc. does not do business in Kentucky and is incorporated in Delaware.  May Peter Plaintiff bring a lawsuit against Lousy Lawn Mowers, Inc. in a state or federal court, and why? 
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Report on cloud computing

 Students will individually review one recent peer-reviewed published paper/article and also thoughtfully discuss the research papers content on the developments and technologies in Cloud Computing. Choose one topic that you are interested in, or discuss with the instructor if you have any questions.The assessment is based on the presentation and report rubrics. 

  • 30 points for report paper assessed
  • 20 points for the slides and presentation

I. Report paper (30 points): The main body of the paper should not exceed 5 pages.

  • Submit a 5-page report (double spaced, font size 10, single column, excluding cover and references) in a single PDF file.
  • Also submit a PDF file of the reference reviewed. 
  • The cover page includes assignment title on the particular reference, author info. For example,
    • Title: Review on (reference title here)
    • Author: student information
  • Introduce the topic/problem and related background knowledge, review the solution/approach/algorithm/example, and discuss your learning, analyses and conclusions.
  • May use additional references while discuss the topic
  • Use appropriate references and citations. Refer to the following links: https://pitt.libguides.com/citationhelp/ieee or https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf
  • This will not only review the reference, but also be a thoughtful discussion of the research paper content pertaining to cloud computing. 
  • Paper and article from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 
  • Avoid review/survey paper/article.

One example of reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.

 This article covers many subjects and expands more. II. Presentation (20 points)

  • The presentation will be scheduled at the class time in October.
  • The presentation content should align with the report.
  • Prepare a 8 minutes presentation, which will be followed by 4 minutes in class Q/A.
  • Make sure to rehearse presentation and prepare well so you can clearly communicate the topic and answer questions.

fault Injection Attack on Deep Neural Network – powerpoint

 You need to go through every detail of the paper and introduce the background, problem solved, methodology, and simulation result. Extract the detailed answers regard to these questions and put them in slides. make notes on the slides to read for recording. around an 8 minute presentation

Essentials Of Software Engineering

 

The design constraints imposed in the sorting system are:

A. programming language and algorithms.

B. security and other systems interaction.

C. platform and schedule.

D. usability and performance. 

Introduction to computer

Answer the following three questions in paragraph format: 75- 150-word count .

  1. What did you learn about excel that you didn’t know before?
  2. Explain what it means to be on the cell compared to being in a cell?
  1. What would you still like to learn about Microsoft Office? 

Cloud Technology

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.   Question: you will prepare your presentation for the Ballot Online executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.  Your presentation will include an executive summary along with the following steps: 

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

ethical hacking

 

You must choose one specific subject area to write your paper.  For example, ‘USB’ is not specific. ‘RFID’ is not specific. 3com USB vulnerabilities IS specific. RFID vulnerabilities in Credit Cards IS specific.

Once you have made your selection, using a minimum of 3 current sources (the textbooks cannot be a source) write a double spaced 3-5 page research APA format paper (a paper, not just a bullet list of response answers).  Note, your cover page, and your reference page, are not included in the 3-5 page requirement. You should have 3-5 pages of written text in addition to your cover page and reference pages. Use in-text citations when paraphrasing and quoting sources to avoid plagiarism. 
GoalIn your paper:1. At minimum, discuss three different vulnerabilities you found in your specific subject area research.2. Discuss how those vulnerabilities can be exploited3. Discuss available countermeasures for each vulnerability you mentioned.Your paper should start with an introduction or problem statement that clearly defines your specific subject and end with a conclusion regarding what your research found.
All sources used must be cited on the last page in a bibliography.  Proper grammar and sentence structure must be used for this formal paper. The cover page for your paper must contain your name, date, course, and instructor. The paper must be double-spaced, left-aligned.  Font should be a 10 or 12 point common font.  Do not misuse white-space as a filler; points will be deducted for not meeting the minimum requirements. Remember – APA format is required!