IaaS cloud migration

Research IaaS then address the following scenario in essay format. Your essay should be 2-3 pages in length (not including cover and reference page) and should include at least two scholarly references and no less than four references total. Your paper must be in APA format.

XYZ corporation is a large hospital considering moving services to the cloud to reduce some data center expenses. The hospital must comply with HIPAA regulations while moving resources to the cloud. You are considering an IaaS solution for the hospital, but leadership is skeptical about the move.

Your job is to provide assurances through research as to why there is no need for concern. In this essay, you need to provide assurances that should address risks, legal compliance, downtime, and other key areas of IaaS migrations.

Case Study: Transforming the Organization

Case Study: Transforming the Organization 

Use the Week 5 Case Study Template to complete this assignment. 

Congratulations! The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works.

The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running. Please also review the five case studies in The Leader’s Role in Managing Change so you can recommend a change management pattern for your company to follow. 

Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics:

  1. How much of the implementation work can you handle? What additional resources (people, information, time, money, etc.) will expedite the process so you don’t end up like Susie Jeffer?
  2. What is your change management strategy? Provide an outline. Consider:      
    • What new equipment and software are necessary?
    • What training and support will the staff need?
    • How will the staff complete their work during the transition period?
    • Do you anticipate other areas of resistance?

The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations!

Your memo should be 3–5 pages long.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Develop an information systems solution to address an organizational problem.
References

Brett Connelly. 2016. Too Much of a Good Thing: User Leadership at TPAC. https://files.eric.ed.gov/fulltext/EJ1136256.pdf

Kallol Kumar Basu. 2015. The Leader’s Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, vol. 34, no. 3, pp. 28–42. 

Development Status-Security Design and Architecture/ 600 words/ 2 pages/ APA format

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures. 
  • The SANS Institute hosted three “What Works in Security Architecture” Summits. 
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet. 
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book. 
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development. 

Analyzing and Visualizing Data

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work. Checkout Chapter 3 “Formulating Your Brief” from the attachment. 

Answer Needed in APA 7 format with in-text citations and References with 500 + Words.

Question to Answer is:
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

IT 206 Design and analysis of algorithm

Read chapter 10 sections 10.1-10.5.

Solve this problem:

Write an algorithm for the situation below for 1 soldier. Then rewrite it for 2 soldiers.

Ferrying soldiers
A detachment of n soldiers must cross a wide and deep river with no bridge in sight. They notice two 12-year-old boys playing in a rowboat by the shore. The boat is so tiny, however, that it can only hold two boys or one soldier. How can the soldiers get across the river and leave the boys in joint possession of the boat? How many times need the boat pass from shore to shore?

book details 

Title: Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles

Author: Narasimha Karumanchi

Publication info: Career Monk Publications, 5THEdition, 2016

ISBNs: 819324527X. 978-8193245279

Computer Science Final Presentation. Ciss 302.

This assignment will be submitted to Turnitin®.Instructions

Pick any Network you may find in your home, work or on the internet as an example for your case study.

Prepare a presentation and paper report around 10 pages that shows:

  • Introduction – that includes background and history
  • Network model presentation
  • What types of standard protocols and technologies has been used
  • Provide an example for 3 different protocols that are applied in different 3 network layers
  • Show your work citations

No grade if No presentation.