Executive Summary

 You are a member of the IT team at Don & Associates, a financial  consulting company that provides services to small- and medium-sized  companies. Because the company is looking to expand into neighboring  states within the Northeast region, its leaders have tasked you  with determining if cloud computing is a viable solution to the need for  infrastructure.

 

you will be submitting a one- to two-page executive summary to the  owner of Don & Associates. It should briefly explain the major cloud  service providers, cloud computing service models, and the potential  benefits and risks of migrating Don & Associates’ technical  infrastructure to the cloud.

Use this executive summary template. In  the template, you will see specific instructions in the document.  Delete the instruction text before you submit your project.

Your summary should include: 

  • the types of cloud computing (private, public, hybrid)
     
  • three major cloud service providers
     
  • three cloud computing service models 
     
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud
     

Be sure to cite any sources you use.

Template

  

Project Description

Include the name of the project here.

Statement of Need 

Explain what the company is struggling with and how the company could benefit from moving to the cloud.

Cloud Service Providers

Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.

Recommended Plan

Provide your recommendation for a cloud service provider and justify your selection.

Impact of Recommended Plan 

Describe how your recommended plan will address the needs of the stakeholders. Briefly describe the potential risks of migration/potential drawbacks for the company.

References

Information Governance discussion 3

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.   Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.  

Q1: When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases.  Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

chapter Nine (9): Information Governance (IG) and Records and Information Management Functions.  From the Chapter, we have learned from that Records Management (RM) is a key impact area of IG – so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM.  From that perspective, the International Organization for Standardization (ISO) defined business records as “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of records.” 

Q1: To further enhance our knowledge and understanding of RM, ISO provided a more refined definition of RM to a granular level as “[the] field of management responsible for the efficient and systematic control of what…? Identify and complete the missing phrase to directly complete the granular definition? 

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

discussion help minimum 300 words

Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Read Chapter 1 of the assigned textbook.

Book reference:

Computer Security: Principles and Practice

Fourth Edition By:  William Stallings and Lawrie Brown

Data collection technique

Background: As noted by Kirk (2016), working with data is one of the four stages of the visualization workflow.  According to Kirk (2016), “A dataset is a collection of data values upon which a visualization is based.” In this course, we will be using datasets that have already been collected for us. Data can be collected by various collection techniques.

Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Assignment: Summarize 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why?

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Health Informatics & Inform System – Assignment 6

Questions:

1.      Discuss the changes in home health devices over the past 10 years

2.       Research a mobile health app of your choice and discuss its potential impact on healthcare

3.       Discuss the pros and cons of using electronic communications between providers and patients

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

Practical Connection Assignment

 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).