Contracting & Service Level Agreements

 

Discuss in 400 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

ETCM Practical-Connection-1

Assume you are a software engineer and write how the Emerging Threats & Counter measures subject will help in your job duties.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.  

No need of references for this assignment. Just write everything assuming you are software engineer in a company and write how Emerging Threats & Counter measures subject will help in your job duties.

PFA., for the text book for this course and look at the chapters and write how those chapters will help in your job.

Due Date: Thursday US time 10/01/2020

biw1

Find information about IBM Watson’s activities in the healthcare field. Write a report.

PowerPoint presentation

 

Using the information from the URLs provided create a Power Point Presentation of the Technical Report you are writing.

File name:  LastName_First Name_PPP.pptx

General guidelines for Power Point Presentation

Do not copy sentences and/or a paragraph from your report and insert it into a slide.

Each slide should have a limited number of lines of text and these should be a main point or points from the report.  The size of the text should be readable from the back of a large classroom

You can use images on a slide.  The image should be viewable from the back of a large classroom

You can use the same template or background on every slide

Do not have a white background on any slide

Use a simple transition from one slide to the next

Limit the number of (or use no) transitions to display successive lines on a slide

 

ITM- Graded assignment 2

 You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Research paper subject data mining

 

discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

EH week11 DB

 

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided. Words 350.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Discussion Need in 5 Hours

 his is a required assignment worth 20 points (20-points/1000-points). The assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. 
The discussion questions this week are from Chapters 12-13  (Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for a SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59 pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation. 

E-commerce Security Policy Audit Report

 Write a Audit report for E-commerce (Amazon ) Backup policy, 

Thinks should cover in backup policy like homogeneous operating system environment like Windows, Linus, or Mac OS.

How it is useful, and Importance of the backup policy with two operating systems like Windows and MacOS

Audit Report should in Passive voice, APA format, Number of pages(4-5) without reference