Course reflection discussion

My course is cloud computing and I work as a software engineer.

Write a brief reflection on this course and on how it will aid your professional career and development.

  • How will this course impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this course prepare you for further studies related to your chosen professional career?

Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Wk 3 – Apply: Core Solutions of SharePoint Server 2013 and Policy

 

The director of Information Technology (IT) has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for you to provide an example of a policy statement that reflects work you do in IT administration.

Research the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective.

Consider the following:

  • How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs
  • Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week

Write a 1- to 2-page example of a policy statement using Microsoft Word. Complete the following in your document:

  • A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least 2 types.
  • At least 2 cultural or global political considerations for sharing services (e.g., privacy rights)
  • Your opinion regarding any IT choices that seem to transcend culture
  • At least 1 example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance
  • A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”)

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Submit your assignment.

security architecture 13.1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 450 words minimum

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

Finance & Blockchain

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with all submissions (even initial discussion posts)

Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write more than the minimum requirement of the word count assigned

As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Discussion

 

Create a discussion thread to answer the following question:

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device? 

Cyber Foundations

 

Application Assignment 2 – Krebs on Security

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  
 

Operative Paradigm

  1. Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
  2. The body of your paper should be 7–10 pages long, written in good APA, and with at least 10 references.