Cloud Vendor Presentation

 In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Find a peer-reviewed scholarly journal article discussing blockchain technology.

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

 This is a required assignment, worth 45 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment. Research 2 or 3 scholarly paper  on “Executive Dashboards”  and reflect on one of the following:

  • “Components”: What are the components of an executive dashboard? 
  • “Drill-down”: What is an example of a drill-down dashboard?
  • “Analytics”: What type of analytics is most often shown on an executive dashboard?

NOTE:
You must copy and paste the topic (“Components” or “Drill-down” or “Analytics”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.You must provide an APA reference for your resource, provide the appropriate URL and provide in-text citations.
Do not use the Textbook as a resource. 

os

Consult current literature to further explore the status of WiMAX technology. Describe any barriers to commercial use and the applications that show the most promise. Explain which countries expect to benefit the most and why

week15assignment

 

Read the Project Management Technology at Genex Fuels Case Study on pages 333-335 in the textbook.

Answer the Discussion Questions at the end of the Case Study.

 

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Planning

 Do research on one-or-two large software systems that were implemented successfully and on one-or-two large software systems that failed in their implementation. Write at least a 3-page Word document, double-spaced, detailing each system.

 Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of the system, a section to discuss the D.-Development of the system, a section to discuss the I.- Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of the system (successful or failed). Provide the following: 

1. An Introduction paragraph describing the assignment and a short description of the systems selected. 2. A section that describes the first Software System (with an appropriate section Heading) and a description of that Software System to include: 

a. What is its purpose? 

b. What operations it performs? 

c. What are its inputs (resources, interfaces, when used)? 

d. What are its outputs (interfaces, data)? 

e. The system’s complexity/cost/feasibility. 

f. Any constraints or risks found during the research. 

3. Sections with details for each component of A.D.D.I.E. (with an appropriate section Heading) to include: 

a. Success or failures identified. 

b. Issues or findings identified. 

c. Recommendations or lessons learned. 

Your paper should then conclude with a Findings section the compares the two systems. Provide the following: 

1. What made one system successful but make the other system fail. 

2. What could have been done to make the failed system more successful. 

3. What could have been done to make the successful system even more successful. 

You must include at least 3 scholarly references with citations.  

Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

Exp19 PowerPoint Ch01 HOEAssessment Dinosaurs

PowerPoint Chapter 1 Hands-On Exercise Assessment – Dinosaurs

  

Project Description:

You are a student teacher in a second-grade classroom. Your cooperating teacher has asked you to create an introductory presentation for the students on dinosaurs.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location you are saving your files.

 

Apply the Facet theme and change   the variant to the last one (green with black background). 

 

Change the theme font to Arial   Black – Arial. 

 

On Slide 1, in the title   placeholder type Dinosaurs. In the subtitle placeholder type Ms. Wagner’s   Second Grade

 

You have slides that you created   in the past on dinosaurs that you want to use in this presentation. The Reuse   Slides feature is an easy way to import these slides.
 

  Use the Reuse Slides option to insert all of the slides from Dinosaurs.pptx.

 

When you imported the slides,   you realized that you do not need a duplicate of the title slide so you   delete Slide 2.
 

  Delete Slide 2. Move Slide 5 (Pterosaur) so that it becomes Slide 7.

 

On Slide 1 change the layout to   Picture with Caption. Increase the font size of the title text to 28 pt and the subtitle text to 18 pt.  

 

Insert the Dino1.jpg image into the picture placeholder. Apply the Reflected   Rounded Rectangle picture style. 

 

On Slide 2, type Dinosaur   means “Terrible Lizard” (including the quotes) as the fifth bullet point.

 

Type the following in the Notes   pane for Slide 1: Today we are going to start our study of dinosaurs. (including the period).

 

Converting a bulleted list to a   SmartArt graphic is a good way to add interest to the presentation.
 

  On Slide 2 convert the bulleted list in the content placeholder to a Vertical   Curved List SmartArt graphic.

 

On Slide 8, insert the Dino2.jpg image. Change the height of   the image to 3.9″ and the width to 3.9″.

 

Apply the Beveled Oval, Black   picture style to the image. Position the image horizontally at 3.9” and vertically at 0.3”.

 

Select the text Questions? and apply the Fill: Green,   Accent color 1; Shadow WordArt style. Change the text effect to Tight   Reflection:Touching.

 

It is important to always check   your presentation for possible spelling errors.
 

  Check the presentation for spelling errors. Make corrections as needed on the   slides. NOTE: Do not change the title on Slide 3; while both spellings of Ankylosaurs (and Ankylosaurus) are correct, the preferred spelling in this case is   Ankylosaurs.

 

Create a Notes and Handouts   footer with the following: Dinosaur Facts. Apply to all.

 

 

Save and close Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Submit the file as directed.

2/1 Devotional

We see sinful behavior all around us, including in the virtual world. The Scriptures warn us about evil practices. When one thinks of information systems security, a biblical verse that encourages us to prepare for a hacker or attacker is not usually considered, but consider Proverbs 2:11, “Discretion will protect you, and understanding will guard you” (NIV). In addition, Psalm 34:19 states, “The righteous person may have troubles, but the Lord delivers him from them all” (NIV). When we are vigilant, God promises to bless our efforts.

  1. Be sure to address the following prompts in your paper:
    1. Considering your religious/cultural background, what do you see as God’s role in our security efforts?
    2. What does the Bible say we need to do for God’s blessing?
    3. How would you apply the principles of these verses in your workplace?
  2. Your paper should be at least 350 words in length.

Data Breach

When looking at the threat landscape, there are different types adversaries and they pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, nation states might target research companies or military websites trying to steal confidential and proprietary data. In addition, companies react to the loss of assets differently. The level and types of mitigation strategies will vary among organizations depending on whether there is a loss of one asset or of an entire category of assets.

For your initial post, identify a recent cybersecurity incident (within the last two years). Briefly summarize the incident, and post a link to an article on the incident if possible. Try to identify the threat actor(s) and the goal or intent of the attack. If there is no “why” put on your adversarial thinking cap and hypothesize what you think is the “why”.