Linux Implementation Proposal

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 

NETWORK SEC

  

Instructions: Answer all questions in a single document. Each response to a single essay question should be 150 words. 

1. Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. This complexity also makes implementing security more challenging. Given this environment, what suggestions for secure software development best practices would you suggest to improve software security? 

2. In addition to application development, databases are another area that needs to have a focus on security within their design. Describe the database concepts of View-based access control, Polyinstantiation, Data warehousing and data mining, and Online Transaction Processing (OLTP)? 

3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability. 

Disaster recovery plan

Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided

Datawarehousing

To assist with this question you will need to have experience with the following:

Required Tools and Skills: SQL, OLTP , ETL in SSIS, Adventureworks, SSAS, Tableau Packaged Workbook (TWBX)

All answers need to be submitted in the correct file format. 

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

TAM and its components-Organ Leader Assignment

 This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:· 3-5 pages in length (not including title page or references)· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.· A minimum of five peer-reviewed journal articles.The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated. 

Order # 9177

Title: Data Flow Diagrams

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area IT Management

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 2

Paper Details

Data Flow Diagramming

DFDs are process diagrams that emphasize the data consumed, produced, and stored by processes under discussion. Complex processes are decomposed into their constituent elements to reveal the most elemental sub-processes and their use of data atoms. In a 2- to 3-page paper, describe process decomposition and flow balancing so that non-technical participating stakeholders can understand the notation of the DFD and the requirements specification value it contains. Your goal is to ensure that your stakeholders can help you validate your DFD.

Include a title page and reference page. Make sure your paper follows APA style according to APA Requirements. Use two credible academic sources other than the textbook, course materials, or other information provided as part of the course materials. You may not use Wikipedia for any assignment. For this assignment, a credible source is defined as:

A scholarly or peer-reviewed journal article

A newspaper article

A trade or industry journal article, publication, or website, including those from trade organizations

Week 10 Assignment

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • 1. Who is likely to attack your site?
  • 2. When are attacks likely to occur?
  • 3. What sort of attacks might take place?
  • 4. How can you best minimize attacks and protect the integrity of your site?

Write you answer using a WORD DOCUMENT in about 300-350 words. Use your own words. Note your safe assign score. Score must be less than 15 to get full grade.

Health Informatics & Inform System – Assignment 4

1.       Discuss at least 3 reasons for using CPOE (computerized patient order entry) (Refer to Article 1 and 2 of the resources. Consider both when building your arguments. feel free to use your own or researched examples if needed).

2.       There are many different EMRs available in the marketplace. What attributes of an EMR make it more suitable than the others for each of the following sizes of practice (a set of attributes for each size practice below):

  • small practices,
  • large multi-specialty groups or community hospitals, and
  • multi-hospital systems?

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

wanted someone to complete the discussion along with two separate replies for the discussion

Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected.

Discuss the weaknesses in these systems and how to improve them.

Discussion Question requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional during the week (Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.