Category: Internet technology (IT)

  • Title: Comparative Analysis and Business Case for Implementing a New System Introduction: In today’s highly competitive business environment, organizations need to constantly evolve and adapt to stay ahead of the competition. One way to achieve this is by implementing new systems and

    Modify the chart from attached by adding the following:
    The strengths and weaknesses of each system
    The impact of the strength and weakness
    Cite at least 2 sources in the additional columns in your chart. 
    Write a business case for your recommendation. As a guideline, this section of the business case should be approximately 3 to 4 pages in length.
    Use the information from your executive summary and add the following information:
    At least 3 measurable organizational values the new system will bring
    The benefits of the value to the business
    How these values will differentiate the business to customers
    The risks of doing the project
    The risks of not doing the project
    The modified comparison chart (from above)
    References
    Submit your assignment.

  • Title: The Impact of Social Media on Mental Health: A Comprehensive Analysis

    Please submit an outline of your research paper. For week two, you only need to submit your outline as the example illustrates below.
    I. INTRODUCTION
    (The introduction clearly states the main topic and previews the structure of the paper.)
    II. MAIN TOPIC
    (Details are placed in a logical order and correspond to the structure presented in the introduction.
    (Information clearly relates to the main topic. It includes supporting main points and subpoints.)
    a. main points
    b. main points
    c. main points
    III. CONCLUSION
    (The conclusion should effectively summarize the discussion and provide at least two recommendations for further research.)
    VI. REFERENCES
    (All sources (information and graphics) are accurately documented in APA)
    a. Source 1
    b. Source 2
    c. Source 3 
    Refer to the Research Paper Proposal provided.

  • Title: Enhancing Business Operations with ERP, CRM, and BI/DSS Systems: A Comparison and Recommendation for PFE’s C-Level Management

    Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business.
    Cite at least 2 sources within your chart.
    Compare the following information:
    Elements of the system
    How the system would support management
    How the system would create successful partnership between the business and IT
    Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at 12-point font, and single-spaced. 
    Include the following in your summary:
    An overview of the business needs and desired outcomes
    The system comparison chart (from above)
    Your system recommendation
    The scope of the project
    References
    Submit your assignment.

  • “Virtualization Proof of Concept for Caduceus Inc.: Installing and Configuring an AWS EC2 Instance” “Getting Started with Amazon EC2: A Comprehensive Guide”

    Hello. It is nice to work with you.
    I want you to let me know ASAP if you have enough information and you can do this. This semester, I have a very tight deadline. Please let me know. Please make sure you can open AWS virtual lab!!!!
    Also, When We finish this semster successfully, I will leave a tip as usual. Thanks.
    please use this AWS Virtual lab website. You DO NOT need to create an AWS account. ! so use this website !!
    https://labs.vocareum.com/main/main.php?m=clabide&mode=s&asnid=2139207&stepid=2139208&hideNavBar=1
    ——————————————————————
    You have recently begun your new career as a cyber professional at Caduceus Inc., a health services organization. Although Caduceus has been involved in the health care industry for decades, its CEO has recently reenvisioned the organization’s online presence to include telehealth advising through the internet.
    Eliza, your chief technology officer (CTO), informs you that there has been a recent surge in business, and now the company must expand its shared computing resources. She wants to propose a plan to do so, but she needs someone to test the company’s capacity for virtualization—the ability to make one computer perform the functions of multiple other machines through its software. 
    “We want to have a working proof of concept up by the end of this week. We’ll have to set up a Linux Instance through Amazon Web Services (AWS). Can you do it?”
    You tell her you can. 
    “Good,” she says. “Once you are done, I’d like you to help the team with its proposal for further virtualization of our systems. I’m going to need you to report on how this process went, the steps you took, what difficulties emerged, and some other questions that I’ll detail in an upcoming memo. Most importantly, I need you to consider how we can leverage virtualization to get a competitive advantage. Give me your best idea for how our company can use this in the future.”
    Instructions
    For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.
    Step 1: Launch the AWS Academy Learner Lab virtual environment from the left navigation bar
    Step 2: Download the Week 1 Project Template
    Download the template you will use to submit your project. (Virtualization Assignment Template.docx)
    Step 3: Install and Configure an AWS EC2 Instance (Virtual Machine)
    Using the newly created AWS free account, install and configure an Ubuntu Server virtual machine (VM) using the most recent version of the 64-bit operating system.
    You will need to provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, including screenshots of each step in the process in the Week 1 Assignment Template.
    Review the following documentation detailing an overview and step-by-step procedure on how to install and configure an AWS EC2 instance. 
    Getting Started with Amazon EC2 
    Create an EC2 instance and install a web server 
    Get started with Amazon EC2 Linux instances 
    Step 4: Complete the Week 1 Project and Upload to the Assignment Folder
    Answer the questions and embed the appropriate screenshots of your Ubuntu server installation. When providing a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, make sure to include screenshots of each step in the process. Further details and instructions are included within the Week 1 Assignment Template.
    These 3 websites help you understand. 
    https://aws.amazon.com/pm/ec2/?trk=36c6da98-7b20-48fa-8225-4784bced9843&sc_channel=ps&sc_campaign=acquisition&sc_medium=ACQ-P|PS-GO|Brand|Desktop|SU|Compute|EC2|US|EN|Text&s_kwcid=AL!4422!3!536323490070!p!!g!!aws%20ec2%20virtual%20machine&ef_id=CjwKCAjw9LSSBhBsEiwAKtf0n3WxjDO0dwhp9lmbp0oWuMpp_xMV-WOsQI9AMrxo9Cn3__C-gIOe7RoCUycQAvD_BwE:G:s&s_kwcid=AL!4422!3!536323490070!p!!g!!aws%20ec2%20virtual%20machine
    https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Tutorials.WebServerDB.CreateWebServer.html
    https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EC2_GetStarted.html

  • Title: “Exploring Municipal WiFi: Network Configuration and Marketing Impact in Cities” Introduction: Municipal WiFi, also known as citywide WiFi or public WiFi, is a network infrastructure that provides free wireless internet access to residents and visitors

    Take a look at cities in the world that offer free Wi-Fi by reviewing the article How Municipal WiFi Works. Choose a city and research its network configuration. Write a short paper explaining the city’s network configuration, and describe how the reliability and coverage of the network throughout the city could affect marketing for smartphone users. What are the costs associated with this type of venture? Provide one labeled diagram, created in MS Visio, to illustrate the network configuration.
    Please show the diagram
    Here is the link: https://computer.howstuffworks.com/municipal-wifi.htm

  • “Ethical Considerations in the Age of Data Breaches: A Critical Analysis of IT and Info Sec Practices”

    Need to write a paper on ethics and data breaches. I’m looking for someone who has experience in writing papers about IT and Info sec space. Preferably a native English speaker but you should be fine if your English is good enough. I will send full list of requirements in private.

  • Title: “Network Configuration and Marketing Implications of Municipal WiFi: A Case Study of [City Name]”

    Please only add the diagram. 
    Take a look at cities in the world that offer free Wi-Fi by reviewing the article How Municipal WiFi Works. Choose a city and research its network configuration. Write a short paper explaining the city’s network configuration, and describe how the reliability and coverage of the network throughout the city could affect marketing for smartphone users. What are the costs associated with this type of venture? Provide one labeled diagram, created in MS Visio, to illustrate the network configuration.
    Here is the link: https://computer.howstuffworks.com/municipal-wifi.htm

  • “Data Breaches: Causes, Consequences, and Prevention Strategies for Companies”

    Security Paper Instructions, Grading Rubric, and Topics
    You are to write a research essay on an approved computer security or privacy topic (see page 3 for a list
    of approved topics). Your essay must include a work cited page for any information that you find from at
    least three sources (your book can count for one source). If you choose to use internet sources, they
    must be cited correctly. The specifications for the paper are listed below. All essays will be run through
    plagiarism-checking and AI-checking software. If any portion of your paper is copied directly from an
    internet source or copied from another student, I will act as deemed appropriate according to the
    Academic Dishonesty portion of your syllabus.
    • You can submit the paper only once
    • No late papers will be accepted
    • The paper must be written using Microsoft Word
    Word Document – Written Essay
    • Length: Must be at least 3 full pages but no more than 6 NOT including the cover page and
    works cited page (that means at least 3 pages of written text).
    • References: You should have at least 3 sources and they need to be referenced according to
    APA rules.
    • Title page: Your header will appear on the first page only (cover page) in the upper-left header
    and contain the words “Running head: TITLE OF YOUR PAPER”. The following pages will only
    contain the title of your paper in the upper-left section of the header. The page number should
    appear in the right section of the header and not appear on the first page. In addition, the title
    should appear centered horizontally and vertically on the page. The title should be your own
    unique name for your paper, not just the topic of the essay. Under the title, you should have
    your name and the name of the college.
    • Font: Times New Roman, 12pt.
    • Spacing: Double-spaced, with no extra spacing between paragraphs
    • Margins: All margins set to 1”
    • Works Cited Page: This page should appear on a page of its own at the end of the essay. No
    separate document or file will be accepted.
    • No abstract is needed for this paper.
    The formatting of this paper follows general APA formatting. If you need further information on how to
    set up a research paper using APA format you can go to: Purdue University Online Writing Lab-Gen
    My topic what is a data breach and what can companies do to prevent them

  • “Case Study Analysis: Exploring Real-World IS Management Challenges and Solutions”

    Instructions
    As an individual, select one (1) of the Case Studies for Section 2.
    Coordinate with the Instructor to ensure the class covers a number of Case Studies (i.e., avoid duplication).
    Provide a concise summary of the Case Study.
    Include, at a minimum the following information, as appropriate:
    Executive Briefing
    Introduction
    Analysis
    Conclusion, Recommendations and Next Steps
    Appendixes
    Additional information on Business Case Analysis is presented here.
    Source:
    Wikipedia – Business Case Studies
    Case Studies
    To demonstrate real-world IS management challenges, this textbook also includes a set of six to eight full-length case studies for each of the four parts of the textbook. These full-length case studies are based on research by academic authors with access to Fortune 500 companies, midsized companies, and some not-for-profit or government organizations. Some of the company names are camouflaged, but many are not.
    The 30 case studies in this seventh edition provide rich descriptions of both successful and problematic real-world situations so that students can learn about the challenges of implementing new information systems, the capabilities of different types of software applications—including those that leverage the Internet, the difficulties encountered when managing IS projects with different levels of complexity, and approaches to effectively address systems integration and other technology leadership challenges—from both IS manager and non-IS manager perspectives. The five completely new case studies in the seventh edition address these specific topics:
    implementing technologies to support mobile clinics (Case Study I-4)
    deciding on a new enterprise-level IT platform (Case Study I-6)
    developing a business intelligence capability (Case Study II-3)
    mining data to increase government tax revenues (Case Study II-4)
    exploring the potential organizational benefits of social media (Case Study II-6)
    Several other case studies have also been significantly revised to take into account new technical or managerial developments
    Week 2 – As an individual, select one (1) of the following:
    Case Study II-1 Vendor-Managed Inventory at NIBCO 279
    Case Study II-2 Real-Time Business Intelligence at Continental Airlines 284
    Case Study II-3 Norfolk Southern Railway: The Business Intelligence Journey 294
    Case Study II-4 Mining Data to Increase State Tax Revenues in California 300
    Case Study II-5 The Cliptomania™ Web Store 308
    Case Study II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy 321
    Ahmad 

  • Title: Evaluating the External Environment and Decision Models for Strategic Management

    Course Textbooks:
    Gamble,
    Peteraf, & Thompson: Essentials of Strategic Management
    Keller: Every
    Good Endeavor: Connecting Your Work to God’s Work
    Krogerus &
    Tschäppeler: The Decision Book: 50 Models for Strategic Thinking
    Rumelt: Good
    Strategy/Bad Strategy: The Difference and Why It Matters
    Discussion Assignment Instructions
    Overall
    Guidance:
    The first six discussions in this class will
    focus on a series of questions in the areas of Process (steps to be taken),
    Strategic Thinking (current theory), and Decision Models (decision making
    methodology. The student should organize their main thread by using the bolded
    headings provided and then respond to the question. The student will post a
    reply to a single main thread and should organize their reply by using the
    bolded headings provided.
    Discussion Thread: External Environment, Power/Weakness, and Decision Models
    Evaluating the external environment that the company does business in is critical to the process of developing a company’s strategy. When evaluating the external environment, it is important to understand key sources of power or weakness that exist. Decision models continue to impact strategy development and should continuously be evaluated, and others considered.
    For your main thread, perform the following:
    Discuss the process of evaluating the external environment.
    Discuss a key source of power or weakness.
    Discuss your current decision model(s) and others that are being considered.
    Develop an Annotated Bibliography for the additional references used in your discussion.
    Support all of your factual assertions with citations.
    Minimum of 500 words in the body.
    Minimum of 2 sources from the literature
    in addition to course texts.
    Use bolded headings below in the
    discussion.
    Current APA format must be used.
    Use
    the following outline:
    ·        
    Introduction
    ·        
    Process: Business Strategy Development – What is the
    process for developing a business strategy? Discuss the process in no less than
    200 words.
    ·        
    Strategic Thinking: Key Decisions – What are the key decisions necessary
    for making strategy
    choices and why are they
    important? Discuss the key decisions and their importance in no less than 150 words.
    ·        
    Decision Model – What are my current decision models
    and how do they aid / hinder this process. Discuss your current decision models
    and how they aid / hinder the strategy development process in no less than 150 words.
    ·        
    Conclusion
    Support your
    factual assertions with citations.
    Include an
    Annotated Bibliography, in current APA format, of the 2 additional Sources:
    ·        
    Minimum
    of 250 words in each annotation
    ·        
    Use
    the bolded headings below for each annotation
    Use the following
    outline:
    ·        
    Summary of Key Points
    ·        
    Evaluation of the Quality of the Publication
    ·        
    Evaluation of the Quality of the Author(s)
    ·        
    Where this fits into the discussion