cloud dev

 explaining how an organization can develop its own cloud. Include how tools such as  OpenStack, VMware, HyperV, etc. can be used in the implementation.  Detailed explanation of how to develop an organization’s cloud including the use of related tools.  APA formatted including title  reference page in-text citations.  Length of 2-3 pages, excuding the title and reference .  Minimum of 2 scholarly resources. 

Discussion – Information Governance

 

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Textbook: Chapter 12 – Information Governance for E-Mail and Instant Messaging

TOWER, 2004. E-Mail Management: Avoiding the 6 Common Mistakes. Best Practices in Records Management and Regulatory Compliance. Pages 6 – 8.

Clara, A. M. C., Canedo, E. D., & De Sousa, R. T. (2017). Actions to verify compliance of a public company with IT Governance. 2017 12th Iberian Conference on Information Systems and Technologies (CISTI), Information Systems and Technologies (CISTI), 2017 12th Iberian Conference On, 1–6. https://doi.org/10.23919/CISTI.2017.7975834

van den Broek, T., & van Veenstra, A. F. (2018). Governance of big data collaborations: How to balance regulatory compliance and disruptive innovation. Technological Forecasting & Social Change, 129, 330–338.

Discussion week 2

Question-  Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan.

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

– 400 words 

– References 

– Please follow the above instructions and write accordingly.

– NO PLAGIRSAM 

Security Policies

Unit 4 DB: Security Policies

Unit 4 DB: Security PoliciesAs the CISO, you are responsible for development and implementation of various security policies to ensure the protection of company sensitive information and systems. There are different levels of policy from executive level to issue specific and system level policies.Discuss how the program policy leads to the other types of policies. Provide at least two examples of issue specific policies and two system specific (codified) policies. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discussing the examples given and how they can reduce risk to the corporate network.

week-6

 Explain in your own words what some of the challenges are with the Change Management Process for IT security. 

research paper review in own words

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

security rules

You are the web master  of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Excel_5G_Sports_Programs

Excel_5G_Sports_Programs

  

Project Description:

In this project, you will create a worksheet for Sandy Chase, Assistant Director of Athletics, with data that has been sorted, filtered, and grouped and that analyzes sports programs at Laurel College.

     

Open   the Excel workbook Student_Excel_5G_Sports_Programs.xlsx   downloaded with   this project.

 

Display the Valley-Park-West   worksheet. Select the range A1:J40, insert a table, and then display the   Table Styles gallery. In the third row, apply the fourth style or choose   another style.

 

 

Sort the table on the Campus   column using a Custom List in the following order: Valley, Park, West. (Mac   users, create the custom list in the Excel, Preferences, Custom Lists dialog   box.) Add a second level sort by Sport Group and a third level sort by   Program Name both in ascending order.

 

Display the Sports Season   Comparison worksheet. Copy the range A6:G7, paste it in cell A1, and then   change the title in cell A1 to Criteria. Select the range A2:G3, and then name this range Criteria.

 

Copy the range A1:G2, and then   Paste the copied range in cell A36. Change the title in cell A36 to Fall-Summer   Sports Season.   Name the range A37:G37 Extract and then name the range A7:G34 Database.

 

Create an advanced filter that   will place in the Extract area the records from the Database range in which Fall is the primary season and Summer is the secondary season.

 

Display the Stipends by Group   worksheet. Sort the data in ascending order first by Group and then by Coach   Stipend.

 

Apply subtotals to the Coach   Stipend column at each change in Group. AutoFit columns C:D and then collapse   the outline so that the Level 2 summary information is displayed.

 

On the Valley-Park-West   worksheet, in cell J1, insert a Hyperlink to the file you downloaded with   this project, e05G_Coach_Information.   Display the ScreenTip, type Click here for contact information and then test your hyperlink.   Close the e05G_Coach_Information   file.

 

Select all three worksheets.   Insert a footer in the left section that includes the file name, and in the   right section, insert the Sheet Name. Set the Width and Height to 1 page, and   Center the worksheets horizontally. Change the Theme to Slice, and then change   the Fonts theme to Corbel.

 

Display the workbook Properties,   and then as the Tags, type sports programs As the Subject, type your course name and section   number. Be sure your name displays as the Author.

 

Save and close the file, and   then submit for grading.

Parallel Computing Homework

  

1. For each of the following code segments, use OpenMP pragmas to make the loop parallel, or

explain why the code segment is not suitable for parallel execution.

a. for (i = 0; i < (int) sqrt(x); i++) {

a[i] = i + 12;

if (i < 10) b[i] = a[i];

}

b. flag = 0;

for (i = 0; (i < n) & (!flag); i++) {

a[i] = 2.8 * i;

if (a[i] < b[i]) flag = 1;

}

c. for (i = 0; i < n; i++) {

a[i] = fun(i);

}

d. for (i = 0; i < n; i++) {

a[i] = fun(i);

if (a[i] < b[i]) b[i] = a[i];

}

e. for (i = 0; i < n; i++) {

a[i] = fun(i);

if (a[i] < b[i]) break;

}

f. product = 0;

for (i = 0; i < n; i++) {

product += a[i] * b[i];

}

g. for (i = j; i < 3 * j; i++) {

a[i] = a[i] + a[i-j];

}

h. for (i = j; i < n; i++) {

a[i] = c * a[i-j];

}

2. Suppose a parallel program completes execution on 32 processors in 348 seconds, and it has

been found that this program spends 21 seconds in initialization and cleanup on one processor, and for

the remaining time all 32 processors are active. What is the scaled speedup of this parallel program?

3. Suppose a parallel program executing on 20 processors spends 98% of its time inside parallel

code. What is the scaled speedup of this parallel program?

4. The table below shows the speedups observed for six different parallel programs A, B, C, D,

E, F as the number of processors is increased from 1 through 8.

  

Processors

Speedup

 

A

B

C

D

E

F

 

1

1.00

1.00

1.00

1.00

1.00

1.00

 

2

1.60

1.92

1.92

1.96

1.74

1.94

 

3

2.00

2.73

2.78

2.88

2.30

2.82

 

4

2.29

3.39

3.57

3.67

2.74

3.65

 

5

2.50

3.91

4.31

4.46

3.09

4.42

 

6

2.67

4.29

5.00

5.22

3.38

5.15

 

7

2.80

4.55

5.65

5.93

3.62

5.84

 

8

2.91

4.71

6.25

6.25

3.81

6.50

Using the Karp-Flatt metric as the basis, choose the statement that best describes the expected speedup

for each program with 16 processors.

I. The speedup achieved on 16 processors will probably be at least 40% higher than the speedup

achieved on eight processors.

II. The speedup achieved on 16 processors will probably be less than 40% higher than the speedup

achieved on eight processors, due to the increase in overhead as processors are added.

III. The speedup achieved on 16 processors will probably be less than 40% higher than the speedup

achieved on eight processors, due to the large serial component of the computation.

5. Let n ≥ f(p) denote the isoefficiency relation of a parallel system and let M(n) denote the

amount of memory required to store a problem of size n. Use the scalability function to rank the

parallel systems shown below from the most scalable to the least scalable:

a. f(p) = Cp, M(n) = n2.

b. f(p) = C√p, M(n) = n2.

c. f(p) = C√plog p, M(n) = n2.

d. f(p) = Cplog p, M(n) = n2.

e. f(p) = Cp, M(n) = n.

f. f(p) = Cp√p, M(n) = n.

g. f(p) = Cp2√p, M(n) = n.

6. Suppose a problem of size 100,000 can be solved in 15 hours on a computer today. Assuming

that the execution time is solely determined by the CPU speed, determine how large a problem can be

solved in 15 hours time by a computer that is 100 times as fast as today’s computer, if the algorithm

used to solve the problem has a time complexity given by (for a problem size of n):

a. Θ(n2)

b. Θ(nlog2n)

c. Θ(n3)