My topic:-
High Performance Computing (HPC) architectures
Requirements (Rubric) are attached as pdf here.
My topic:-
High Performance Computing (HPC) architectures
Requirements (Rubric) are attached as pdf here.
What protection does Section 230 of the Communications Decency Act provide? How does this act impact major tech companies such as Google and Facebook?
In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.
You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.
This resource can help you prepare and record your presentation: Presentation Resources.
Presentation Guidelines
Your presentation should be comprised of the following:
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
§ Internet access
§ Course textbook
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 pages
§ I created a policy that addressed all issues.
§ I followed the submission guidelines.
Prototyping is an integral part of design thinking and user experience design in general because it allows us to test our ideas quickly and improve on them in an equally timely fashion. A prototype is a simple experimental model of a proposed solution used to test or validate ideas, design assumptions and other aspects of its conceptualization quickly and cheaply, so that the designer/s involved can make appropriate refinements or possible changes in direction.
For Project 3, you will create a high-fidelity digital prototype of the user interface. The prototype will be used in the final project to design and test.
For the past several years employers have started to give a lot of weight to applicants who not only have a degree, but who also possess one or more IT certifications. Engage in research on the Internet and discuss whether you feel having both a degree and certification(s), or just one but not both, can affect your career in technology. Examine some online job boards such as Dice.com, Monster.com, and your local newspaper/want ads to determine the nature of IT certification needs for IT positions in the want ads. Report your findings. Based on your research, what are some examples of IT certifications that you might wish to pursue?
You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:
Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.
Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build the future business, regardless of whether they are retained to help with the investigation of this case.
To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses to the following questions:
Grading Rubric for the Assignment #1:
You belong to a student organization on campus that has asked you to put together a presentation on time management. You created a presentation with some basic content for a school project you will use as starting point. You want to modify the presentation to make it more appealing and better portray the message.
Start PowerPoint. Download and open the file named Exp19_PPT_Ch01_ML1_TimeManagement.pptx. Grader has automatically added your last name to the beginning of the filename.
Apply the Gallery theme and change the variant to the second variant.
Change the theme colors to Aspect and the theme fonts to Corbel.
Add the title Time Management in the title placeholder. Type Use Your Time Wisely in the subtitle placeholder.
If you want to use slides from another presentation, the Reuse Slides features saves considerable time, as you do not have to copy and paste slides from another presentation.
Use the Reuse Slides feature to add all slides from Time.pptx into the open presentation. Preserve the order of the slides. Ensure the Use source formatting or Keep source formatting check box is not selected so that the inserted slides take on the design and formatting of the open presentation.
Delete Slide 2. Move Slide 3 so that it becomes Slide 2.
Click Slide 5 and add a new slide. Change the slide layout to Content with Caption on the newly inserted slide. In the top left placeholder, type What’s Stealing Your Time? (including the ? mark). Increase the font size of the text to 44 pt and apply Bold.
Click the bottom placeholder and type Identify aspects of your personal management that need to improve! Increase the font size of the text to 24 pt.
Images can be used to enhance a presentation and better portray your message.
On the newly created slide (slide 6), insert the Steal.jpg image in the content placeholder on the right. Change the width of the image to 6.3″.
Apply the Bevel Perspective Left, White picture style. Change the Picture Border to Tan, Background 2. Set the horizontal position of the image to 4.8″ and the vertical position to 1.5 “.
Change the layout of Slide 4 to Title and Content. Insert the TimeMarches.jpg image in the content placeholder. Crop the top and bottom of the image so that most of the white area is removed. Change the width of the image to 7.9″.
Apply the Moderate Frame, White picture style. Change the Picture Border to Tan, Background 2. Set the Horizontal position of the image to 2.7″ and the Vertical position to 2.5″.
SmartArt allows you to communicate information visually with graphics instead of just using text.
On Slide 5, convert the list to a Vertical Box List SmartArt graphic.
On Slide 3, convert the list to a Basic Block List SmartArt graphic.
Check the presentation for spelling errors. Make corrections as needed on the slides and notes.
To help you prepare and deliver your presentation you will add speaker notes.
Type the following speaker note on Slide 6: To better manage your time it will be important to identify aspects of your personal management that may need to improve.
Save and close Exp19_PPT_Ch01_ML1_TimeManagement.pptx. Submit the file as directed.
Think about the last time you utilized a mobile application or attempted to build your own mobile website. What planning process did you go through before you began your project? You may have considered the steps or tasks you needed to perform. You may also have considered the resources and platforms needed for your outcome. For example, which model fits your business domain needs? Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time? You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.
Use in-text citation and list the reference of your supporting source following APA’s style and formatting
Strictly plagiarism free
2 complete pages
What do you believe is the most effective way to avoid usability study bias when conducting a controlled or natural setting usability study?