refer to the attached document
MIS
Artificial Intelligence or AI has been in the news quite a bit lately. Research AI and provide the following:
1. Advantages and disadvantages
2. Products and usage
3. Opinion/reflection on the use of AI
Minimum page length for this task is four (2) double spaced pages using APA citation
International business management
Each year, Alibaba handles more than 80% of China’s e-commerce business. The company now operates in 190 countries (only 196 countries and 61 territories exist in the world). Moving forward, the vision for Alibaba sounds simple: Bring in non-Chinese brands to the Chinese market and expand products to customers outside of China’s borders. Do you think this global strategy is viable?
The large-scale product selection that can be found on the Alibaba platforms has resulted in some 15 billion products being sold annually and 15 million packages being shipped daily (compared with 5 billion items on Amazon and 3 million packages per day). This puts tremendous pressure on global supply chains. Can the supply chains continuously facilitate the increased demand that we as customers place on the global supply chain systems?
Golang
I need a Golang expert
Network Defense and Countermeasures on Property Management Systems (PMS)
Final Paper Class of Network Defense and Countermeasures
Read this article: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/hosp-pms-project-description-draft.pdf
Answer these questions:
1. What is a Property Management Systems (PMS) system?
2. Use a case study about a hotel chain?
3. What components of a Property Management Systems (PMS) system should be patched first? Why?
Paper formatting:
No cover page or running header is needed (in fact, the running header requirement is eliminated in APA V7). Watch out plagiarism on content.
5 pages double spaced. You should be able to easily fill these pages with a well-written findings document. Use double spacing, Times New Roman 12 pitch font.
You will include an introduction and/or conclusion but do not inflate your word count by padding those sections excessively.
You need (5) references included website URL example (www.tech.com/networkdefense ), sources from a journal or case study or white paper no more than 3 years old and at the end of the paper and cited appropriately in the body of the paper. You may include more if you want.
Need this by 3:00pm EST on December 16, 2021
Discussion board
Do you think that it’s important for digital crimes units to be careful when taking down DNS domains that are supporting cybercrime groups in order to minimize collateral damage? Do you think the extra cost to use passive DNS is worth it?
PPT- Group- Project Process
Strategic Planning:
Case Study Overview:
In conventional business and government megaprojects–such as hydroelectric dams, chemical-processing plants, or big-bang enterprise-resource-planning systems–the standard approach is to build something monolithic and customized. Such projects must be 100% complete before they can deliver benefits: Even when it’s 95% complete, a nuclear reactor is of no use. On the basis of 30 years of research and consulting on megaprojects, the author has found two factors that play a critical role in determining success or failure: replicable modularity in design and speed in iteration. The article examines those factors by looking at well-known megaprojects, both successful ones, and cautionary tales.
Case Study Link
Better Project Management | Harvard Business Publishing Education
Question
- Describe how you will track scope and scope changes
- Describe deliverables that will be created to track progress
Make 4 power point slides for above mentioned questions.
Application security – Malware Protection Procedure Guide
Project Part 3: Malware Protection Procedure Guide
Scenario
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 pages
Self-Assessment Checklist
§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.
§ I followed the submission guidelines.
Christian Worldview Research Paper
Read Article attached then conduct a research paper
Christian Worldview Research Paper Instructions
I. Christian Worldview Integration
You will be able to evaluate ethical business management information systems practices within the context of your Christian Worldview.
In your review of the article in the Reading & Study folder, the authors discuss the impact of how modernism shapes our beliefs and approaches to ethics in business management information systems and academia. After reviewing the article, you will conduct additional research to:
· Discuss the major points that underlie the author’s conclusion that modernism provides limitations in both business management information systems and academia in addressing moral issues and religion.
· Discuss how the introduction of the Christian worldview as an alternative approach provides a better approach for examining ethical issues in business management information systems.
· Share your experiences as they relate to the authors’ main points, with respect to your experiences in business management information systems/academia.
II. Paper Requirements
· Current APA Formatting
· At least 2 pages double-spaced
· Title page, Reference page, and Figures/Diagrams/Tables will not be included in the page count.
kyits531wk12dis
Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.
