Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environments that violate your vision for security. After discussing the situation with various parties, they all admit they do not fully know or understand what is expected from them as they set up and configure the environment. To solve this situation, your group has been asked to create a network security policy for the organization.
Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department wit
I don't know how many pages it will take I put 6 as one page per task.
A. Create an email or memorandum providing product information and benefits of implementation, including how it solves a business problem, for executive leadership of the organization, such as the CIO, CFO, etc.
B. Create a fact sheet communicating essential product and implementation information, including how it solves a business problem, for the cross-functional team, including members from IT who will be implementing the product. Include each of the following points in the fact sheet:
description of product
rationale for implementation
summary of implementation phases
graphic aids that supplement product information or implementation plans
C. Describe the writing process used to develop the artifact for each audience.
D. Explain how analysis of the following audience attributes i
In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers' infrastructure, and architecture model.
You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.
DD4HW3
Re-read
-"Primary Research" section of the Project #1 Assignment Prompt.
Read
Technical Communication, Chapter 6, Researching Your Subject (pay specific attention to Conducting Primary Research>Questionnaires)
Driscoll's "Introduction to Primary Research."
Assignment Overview
In this response, each individual student will work on conducting primary research for your collaborative technology research report. Do this as soon as possible (asap)! You must have survey results for Due Date #6.
To do this, you will
Individually answer the questions below.
Draft 3 possible questionnaire questions.
Discuss what information your questions are trying to gather.
Answer Questions | Develop Questionnaire Questions
Identify what you are trying to learn (what are your research questions?). Remember, for Project #1 you are focusing on the collaborative tool(s) of a specific field/profession/discipline. What do you already kno
Use the Secondary Research handout to find resources about collaborative communication technologies in the professional culture you chose for Project #1. While searching, consider using search terms like "communicating/working/ researching/writing" "technology/technologies/apps/programs" in __<enter field/profession/discipline>__.
**Activities 1 and 2 in the Secondary Research handout should be completed after you've spoken with your group members so you can select a style guide and search terms** This means you will need to reach out to your group to discuss these decisions.
Remember that a collaborative tool is any technology that is being used to aid in collaboration. For example, in this class, we're using Google Drive, and in the last assignment, you looked up project management apps and video conferencing programs. These are all examples of collaborative tools. Some professions/fields might call these types of applications or programs by another name, so you
Elon Musk's SpaceX Starlink internet service now has 10,000 users
Compile a seven-page paper on how we can secure our nations computer infrastructure in our society. It could be related to the financial system, health care, energy grid, id theft, government intrusions etc. Use credible sources from books, magazines, newspapers, journal articles, websites etc.
Your paper should not have cited material from wikipedia.com, nor just various .com websites. Explore college library database for relevant articles at http://library.ccsf.edu
Your paper should have a cover page, five or more pages of documentation completed in MLA style and a Works Cited page.
The purpose is to make an analysis / presentation of the course content. It may cover a wider range of topics or more limited content from the course.
The work should have an introduction at the beginning and finally a summary of the whole work. In this work, it would be good to point out the most important things of the parts from the point of view of iot technology and to explain how everything is connected to each other and the whole iot is formed. And what business opportunities iot technology has and what has already been done. For example, google, amazon, facebook, etc.
Also pictures / tables of different functions and how they combine forward are needed in this work.
The topics of the course are
- sensors
- telecommunications
-iot-data transfer techniques
-Application protocols
-iot platforms
security
-business opportunities
Using APA standards, write a five (5) page document as follows:
One Cover Page
One page for your Works Cited
Three pages with your interpretation and comments of one of the Disciplined Agile Life-cycles (only one, make a selection of the list below):
1.The Agile lifecycle. This project lifecycle is based on Scrum but extended so as to provide a streamlined strategy from beginning to end. It is depicted in Figure 5 and described in the article DAD Lifecycle Agile (Scrum Based).
2.The Lean lifecycle. This project lifecycle is based on Kanban. It is depicted in Figure 6 and described in the article DAD Lifecycle Lean.
3.The Continuous Delivery: Agile lifecycle. This modern agile, stable-team lifecycle is based on Scrum. It is depicted in Figure 7 and described in the article DAD Lifecycle Continuous Delivery: Agile.
4.The Continuous Delivery: Lean lifecycle. This modern agile, stable-team lifecycle is based on Kanban. It is depicted in Figure 8 a
I chose a Roomba. You will choose your own topic (with exception of the not allowed technical objects listed in the previous section) for this assignment. The subject of your description must be a technical object (e.g., clock radio, digital thermostat, Roomba, CPAP machine, blender, food processor, etc.). Because you must accurately describe an object in at least 500 words, do not pick something too simple such as a paper clip. Choose a topic that is complex but manageable. Once you have identified a technical object, research it. Take time to learn about what the parts are called, and how the parts work. This might require you to read background information or otherwise inform yourself about the topic.
Audience and Content Requirements
Your primary audience would be someone who has little experience with the object that you are describing (e.g., if you select a stapler, then you need to imagine an audience of people who have little experience with the object, perhaps child
Topic: 5G doesn't cause COVID-19, but the rumor it does spread like a virus
by Gina Mantica, Boston University.
Sources: https://medicalxpress.com/news/2021-01-5g-doesnt-covid-rumor-virus.html
Instruction: A 1/2 page summary and a link or co
Researchers found that COVID-19 misinformation spread exponentially across the countries, much like the coronavirus itself. Credit: Frederik Lipfert on Unsplash
People's fear of 5G technology is rational. Such technology does emit radiation, even if it's at low levels. But 5G isn't all that different from 4G, and it certainly doesn't cause COVID-19 despite such rumors having spread rapidly across the globe.
Researchers need to better understand how misinformation like this spreads in order to hone their intervention efforts and prevent misinformed perspectives from taking root. In society's virtual world, preventing technological misinformation, in particular, is important now more than ever.
A resea