Cloud Computing and Digital Forensics

1.)  

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library  as your first choice. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.)   Using Chapter 10 as a reference (refer to uploaded file), Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. 

Differences & Similarities Between Windows, Linux and Mac (infographic, table, or chart listing)

Create an infographic, table, or chart listing the similarities and differences between Windows, Linux, and the MAC OS X.  Include the following areas: Functionality, Graphical User Interface, Security, User Access, Encryption, etc. Include an introductory paragraph describing your graphic, table, or chart. 

Feel free to be creative in how you develop this assignment. You can complete this using any application you have available, such as Word, PowerPoint, Visio, etc. Your submission should have proper attention to formatting, spelling, grammar, and punctuation. It should be in a format easily viewed on a standard Windows PC.

Discussion forum on chapter readings

  Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

Chapter-10: Overcoming Showstoppers: Ten Implementation Challenges

 Chapter 10 introduced ten blockchain implementation obstacles. 

Discussion:

1.choose two obstacles from those discussed in chapter 10, then describe them and how they could disrupt blockchain acceptance. 

2.Also, describe how you would overcome each of these obstacles. 

3.Then think of three questions you’d like to ask other students. The questions should be taken from material you read in Chapter 10 . You’re not trying to test each other, but you are trying to start a discussion. 

Write 500 words paper

200-250 words discussion

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.

Intel Monopoly

After reading the section titled “Dominant Microprocessor Company Intel Adapts to Next Trend” and the article titled “2018-2019 Intel Corporate Responsibility Report: Creating Value through Transparency,” complete a list of reasons how a single firm like Intel comes to dominate some markets. Although this assignment allows you to create a list, you must follow the APA style of writing and include research to support your list and place this information in your reference section.

Why do you think Intel is a Monopoly ?

Apply: Configuring and Deploying a Private Cloud with System Center

 

Assignment Content

  1. The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

    Using the links provided, research at least 2 of the following codes of ethics:

Discussion 5 Cryptography

 

Question: Analyze the structure of advanced encryption standards and why it makes it so strong.  

  -You must use at least one scholarly resource.

  -Every discussion posting must be properly APA formatted.

– No Plagiarism

– 400 Words

-References 

EH week13 DB

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?

350 words needed

https://www.youtube.com/watch?v=H_X6IP1-NDc

https://www.youtube.com/watch?v=D3yrk4TaIQQ

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Enterprise Risk Management

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Big Data Visualization tools

Several Big Data Visualization tools have been evaluated in this week’s paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Explain, define, or analyze the topic in detail

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)