Discussion

  While you are in the infancy of thinking about your dissertation topic, it helps to begin with the end in mind.  During your literature review, you will uncover a gap in the scholarship on your proposed topic.  While this gap may be content or methodological-specific, it is critical to think about the type of methodology your study will employ as you begin your search.  Therefore, you will review the University of the Cumberland’s doctoral research handbook for approved research designs. You will not be “locked in” to your choice until your IRB is approved in DSRT 839, but you should have a general idea of how you will collect data on your proposed topic.  Directions:  1. Review the appendices of the doctoral research handbook to determine a possible research design for your study. 2. Start a new thread in this discussion board whereby you include the following:

  1. One brief paragraph overview of your proposed dissertation topic. Topic is Cyber Security
  2. One brief paragraph overview of the theories related to your topic. This should include at least one in-text citation. 
  3. One brief paragraph about how your topic relates to the goals of your academic program. 
  4. One brief paragraph about the methodology and study design you believe you will use with the topic after reviewing the approved designs in the appendix of the doctoral research handbook. This paragraph should also include how you plan to collect data on this topic. 
  5. Reference list for any in-text citations included.  

3. Reply to one other classmate providing support and coaching for their topic and proposed methodology.   

Building a desktop

 

  • List the steps that you will take in assembling all of the components that you identified in the first 3 phases of this project. These steps should be detailed enough to explain what you are doing. For example, what care would you take in mounting the motherboard to the case (consider the standoffs, proper grounding, ESD, and the like)? Determine at what points you would do quality check during the assembly. Indicate whether you will be partitioning your hard drive(s) and rationale related to that.
  • Finalize a reference list for all references used in all 4 phases of this project. Please used the reference that is attached. 
  • Be sure your paper is appropriately formatted as indicated below:
    • APA formatted cover page as well as the entirety of the document.
    • Paragraphs are coherently organized including the use of proper grammar and correct spelling.
    • Includes clearly organized using graphics and tables (where appropriate).

Acronyms are spelled out on first use.

Project Part 1: Network Design

  

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

§ Project Part 1: Network Design

§ Project Part 2: Firewall Selection and Placement

§ Project Part 3: Remote Access and VPNs

§ Project Part 4: Final Network Design Report

discussion

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM.

write a paper

 

Write a 5-7 pp. (1250-1750 word) paper in which you formulate an analysis/argument that responds to the question prompts tied to the chosen case and includes additional research on the topic of focus at stake. 

Some Grading Criteria:

Has compelling introduction and subject heading title –makes you want to read it!

Well-developed thesis statement (that argues and explains view point – underline it!).

Uses clear examples from at least five other primary sources (like interviews, news or other testimonials) as well as secondary sources (like scholarly articles, books, commentary).  

Clearly ties sources to ideas from class and readings.

Offers insights on the case and ethical issues at stake. 

Persuasively argues a stance while engaging differing view points.

Persuasively argues for solutions to address aspects of the ethical issue or problem taken as focus.

All ideas are clearly presented, leading to a strong concluding paragraph.

Includes Work Cited (in either APA or MLA format) for given and chosen sources (not part of overall word count).

Final brief reflection on process: what was learned, what difficulties or questions, if any (also not part of overall word count). 

virtualization

 

Proposal

For this project, you will submit a new virtualized environment proposal and an updated network diagram.

Complete the following: 

Project 2 Worksheet template.docx

In this new proposal, you will describe which servers and services should be moved to the cloud and which should remain in the local (on-premises) network. Research, explain, and justify your decision for each of the following servers or services.

1. Email server

2. Navision ERP Database Server

3. Active Directory (Domain Controllers and related DNS servers)

4. Terminal Server

5. Application Server

6. Data Backup Server

7. Firewall

You should consider factors, such as the cost of cloud deployment and long-term support, functionality difference between local vs. cloud, availability, fault tolerance, security, etc…

Reflection Paper for Database Management

In a short paper (1-2pages), please address each of the topics below with a 1-2 paragraph narrative for each section.

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.

permutation

 

Suppose we count a word as having 3 letters. How many “words” can be made from the 26 letters in the English alphabet? 

We know that this is permutation (order matters)  since “its” and “tis” are different words. Note the formula for permutations is n!(n−r)!n!(n−r)! using ‘n’ different things taken ‘r’ at a time

Discussion Assignment- Legal Reg, Compliance, Invest

Pick a TM, any TM – 400-500 words, APA format

Research and discuss a company’s trademark that has been awarded protection by the U.S. Patent and Trademark Office. You may select the company that you work for or a company you aspire to work for. You’re welcome to select one simply from a company you admire or that intrigues you in any way. Have fun making choices. 

Describe the trademark, its application (e.g., does it cover merchandise, a service, a website … what does the mark relate to?). Was there any objections or litigation surround the trademark application or award? If so write about that. Do you believe there is a risk of infringement? Are there international IP implications? What other interesting information surrounded its application or award? In [too?] many cases, it’s not so simple as designing a mark and completing governmental documents, so help your classmates learn about the complicated, challenging process of filing for and attaining IP protection from the U.S. government.