Ecology and Global Warming

this essay is a reflection essay about this question “Is technology the cause of or the answer to environmental destruction?” I need 850 -1000 words  There is no specific requirement from the teacher

Read more

The Internet of Things

Must be at least 200 words each. No references or citations are necessary. 1. Reflect on what you think the Internet of Things (IoT) means. How has it affected the way you live? 2. Describe your home or office computer setup to include all peripheral equipment, networks, and the Internet or intranet. Be sure to describe all input, output, and storage devices.

Read more

Op-ED on Technology & Privacy Article

Op-Ed As it is an op-ed, you must take a side, advocating in a compelling, yet civil and respectful manner. There may also need to be a recommendation of a course of action, so be sure to formulate your argument appropriately. Within the op-ed, overt reference must be made to the topic in reference to business management and connected to HRM and the workforce.  https://www.cnbc.com/2019/04/15/employee-privacy-is-at-stake-as-surveillance-tech-monitors-workers.html

Read more

Mobile application Threat Modeling

Introduction Describe Your Mobile Application Architecture a) Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications. b) Identify the needs and requirements for application security, computing security, and device management and security. c) Describe the operational environment and use cases. d) Identify the operating system security and enclave/computing environment security concerns, if there are any. Include an overview of topics such as  mobile platform security, mobile protocols and security, mobile security vulnerabilities, and related technologies and their security, in your report. Include the Mobile Application considerations that are relevant to your mobile application  What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc.)? What are the common hardware components? What are the authentication specifics? What should or shouldn’t the app do? Define the Requirements for Your Mobile Application What is the business function of the app? What data does the application store/process (provide data flow diagram)? The diagram outlines network, device file system, and application data flows How are data transmitted between third-party APIs and app(s)? Will there be remote access and connectivity? Read this resource about mobile VPN security, and include any of these security issues in your report. Are there different data-handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME) Does the app use cloud storage APIs (e.g., Dropbox, Google Drive, iCloud, Lookout) for device data backups Is there specific business logic built into the app to process data? What does the data give you (or an attacker) access to? Think about data at rest and data in motion as they relate to your app. Do stored credentials provide authentication? Do stored keys allow attackers to break crypto functions (data integrity)? Are third-party data being stored and/or transmitted? What are the privacy requirements of user data? Consider, for example, a unique device identifier (UDID) or geolocation being transmitted to a third party. Are there user privacy-specific regulatory requirements to meet? How do other data on the device affect the app? Consider, for example, authentication credentials shared between apps. Compare between jailbroken (i.e., a device with hacked or bypassed digital rights software) and non-jailbroken devices. How do the differences affect app data? This can also relate to threat agent identification. Identify Threats and Threat Agents Identify possible threats to the mobile application and Threat agents Outline the process for defining what threats apply to your mobile application Does personal data intermingle with corporate data? Identify Methods of Attack Provide senior management an understanding of the possible methods of attack of your app. Controls What are the controls to prevent an attack? Conduct independent research, then define these controls by platform (e.g., Apple iOS, Android, Windows Mobile, BlackBerry). What are the controls to detect an attack? Define these controls by platform. What are the controls to mitigate/minimize impact of an attack? Define these controls by platform. What are the privacy controls (i.e., controls to protect users’ private information)? An example of this would be a security prompt for users to access an address book or geolocation. Conclusion a) Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications. b) Identify the needs and requirements for application security, computing security, and device management and security. c) Describe the operational environment and use cases. d) Identify the operating system security and enclave/computing environment security concerns, if there are any. Include an overview of topics such as  mobile platform security, mobile protocols and security, mobile security vulnerabilities, and related technologies and their security, in your report. Include the Mobile Application considerations that are relevant to your mobile application  What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc.)? What are the common hardware components? What are the authentication specifics? What should or shouldn’t the app do?

Read more

Membership Writeup

We are in need of technical write up under 4 sub categories as mentioned below.  We would like to invite writers with technical skills in the field of electrical engineering or any respected engineering background . Each category should contain no more than 500 Words  Categories as follows  1. Knowledge and Understanding of Engineering or Technology Principles 2. – Practical Application of Engineering or Technology Skills 3.Leadership, Management, Supervision and Personal Responsibility 4. – Interpersonal Skills 5. – Professionalism

Read more

Creating a Shared Folder Structure

There is 4 assignment in there only need 2-3 sentence per assignment. please read carefully to each question. Think Critically 4-2: Creating a Shared Folder Structure. CSM Tech Publishing has asked you to develop a file-sharing system for the company’s departments, which include Management, Marketing, Sales, Development, and Editorial. The following are some requirements for the file-sharing solution: Management must be able to access all files in all the shares unless stated otherwise and must be able to create, delete, and change files. The Management Department must have a share that only it can access, and each member of the department must be able to create, delete, and change files in the share. Marketing and Sales should have one common folder that both departments’ users have access to. Members of both departments should be able to create new files, have full control over files they create, and view and change files created by other group members. They should not be able to delete files created by other members. Sales should have its own share that only Sales and Management have access to. The Sales users must have full control over all files in the share. Development and Editorial have their own shares that only these departments and Management have access to. The users from these two departments must have full control over all files in their department shares. There should be a public share in which users in the Management Department can create, change, and delete documents, and all other users have the ability only to read the documents. There should be a share available to management that no other users can see in a browse list. It contains confidential documents that only selected users in the Management Department have access to. Users must be able to restore files they accidentally delete or restore an earlier version of a file without having to use a backup program. Sales users must be able to access the files in the Sales share when they’re traveling whether they have an Internet connection or not. When Sales users are back in the office, any changed files should synchronize with their mobile devices automatically. All Sales users have a Windows 8.1 laptop or tablet computer running Windows RT 8.1. All users except Management users should be limited to 10 GB of space on the volume housing shares. Management users should be limited to 50 GB. Given these requirements, perform the following tasks and answer the following questions: Design the folder structure and include information about the permissions (sharing and NTFS) you plan to assign to each share and group of users. Name each share appropriately. What tool will you use to create the shares? Why? What protocols and technologies (including file system) will be used to set up these shared folders? Explain the reason for using each protocol or technology. Think Critically 3-1: Outfitting a Branch Office with Server Core. You have been supporting CSM Tech Publishing’s Windows Server 2016 server network for over a year. The office has two Windows Server 2016 servers running Active Directory and a number of other roles. Management has informed you that a small sales office is opening in the same building three floors up. The sales manager wants to install a sales application on a server located in the sales office. This server will have limited physical security because there’s no special room dedicated for it, which means it will be accessible to non-IT personnel and visitors. You’re considering installing Windows Server 2016 Server Core on the new server because accessing its console regularly probably won’t be necessary, and this server will be managed from one of the other CSM Tech Publishing servers. What are the benefits and drawbacks of using Server Core for this branch office? What are some things you should do to set up this server management environment? Think Critically 3-2: Dealing with Server Core Angst. The owner of CSM Tech Publishing was at the sales office last week and out of curiosity wanted to sign in to the server there. The owner is somewhat tech savvy and has even worked a little with Active Directory in Windows Server 2012. He was shocked when he signed in and didn’t see a familiar user interface—only a command prompt. He asked you about this and accepted your explanation of Server Core and why you chose this installation option. However, he was wondering what would happen if you stopped providing support or were unavailable for an extended period, and your replacement wasn’t familiar with Server Core. Write a memo explaining how this situation could be handled easily. Think Critically 3-3: Ensuring Proper Server Configuration. You are called to consult with an organization that has well over 100 servers including virtual servers. The manager you spoke with told you that the organization is having problems keeping the servers properly configured. Different administrators make changes to the configuration or add and remove services to keep up with user demand. However, the manager finds that changes are not well documented and often cause problems. The manager would like to know if there is a way to automate control of changes to server roles, features, services, and so forth. What Windows Server 2016 feature can you suggest and why?

Read more

Technology and Effectiveness in Law Enforcement

The paper needs to include: 1. Where technology the beginning of law enforcement?  2. where’s is law enforcement technology headed 3. what will be the impact on law enforcement as technology moves into the future.  The paper will need to be structured as follows: section 1:is the introduction/background of the topic/issue. The following questions to consider including what the historical background of the issue? Are the critical incidents were which emphasize the importance of the issue? Section 2: will be the statement of a problem. Questions to consider include the significant causes for emerging advancement in technology for law enforcement; what are the key questions, ethical debates, conversations associated controversies associated with emerging technology? Section 3: current policies. Questions to consider what current problems are associated with technology.? What are the major flaws or limitations of the current law-enforcement technology? Section 4: alternative solutions. A question to be considered what are alternatives to law enforcement’s current technology? Section 5: summary and conclusion, Questions that need to be included what will happen if law enforcement does not move forward in emerging technology? What will happen if law enforcement continues to move forward into technology?

Read more

The Most Inventions in Technology

Two questions please lable questions 1 and 2 1. The industry that I think probably has the most inventions is technology, but they probably have some of the most innovations as well. What are your thoughts? 2. What do you believe is the biggest obstacle to innovation?

Read more

Digital or Social Media

PROJECT 2: PRESENTATION  Objective The purpose of this project is to demonstrate your understanding of the following course concepts: 1. How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal. 2. How digital or social media has transformed the communication of idea, information, and arguments in society.  Project Description The use of digital and social media can have a profound effect on society.  This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others. Project 2 consists of: 1. Project Requirements (topics and content to cover) 2. Presentation Requirements (content organization) 3. Submission Requirements (how to submit your assignment) 4. Presentation Resources 5. Due Date Information and Late Policy  Project Requirements Select an organization or company that used or uses digital or social media to impact others. CREATE A PRESENTATION (using a professional presentation application such as Microsoft PowerPoint, Prezi, or Apple Keynote for the Mac) highlighting the information you found. NOTE 1: You are required to complete ALL THREE SECTIONS of this project (Sections 1, 2, and 3). PLEASE SELECT A DIFFERENT COMPANY THAN THE ONE YOU USED IN PROJECT 1. SECTION 1: ORGANIZATION OR COMPANY INFORMATION Provide the following information about the organization or company you select. Answer the questions below: Item 1: What is the name of the organization or company? Item 2: What year was the organization or company established? Item 3: What is the organization’s or company’s goal or mission? Item 4: Provide the company’s or organization’s website address (URL), if available. Item 5: Where is the company or organization’s headquarters located? Section 1 Source: Include at least one source for Section 1. Include this source as an in-slide citation and on your References slide(s). SECTION 2: DESCRIPTION OF THE DIGITAL OR SOCIAL MEDIA INFLUENCE Describe how digital or social media was used to influence others while answering the following questions: Item 1: Describe how digital or social media was used to influence others. Provide at least one example, instance, or situation that highlights this influence. Item 2: In the example, instance, or situation you provided in Item 1, what specific digital or social media platforms were used (e.g. Facebook, Twitter, Instagram, Snap chat, Pinterest, or YouTube) and how were they used? Item 3: What occurred as the result of the use of digital or social media? Describe the impact or magnitude of the change. Section 2 Source: Include at least one source for Section 2. Include this source as an in-slide citation and on your References Slide(s). To help you with completing Section 2, an example is provided below: Section 2 Example 1: Invisible Children – Kony 2012 In 2012, an organization called Invisible Children created and posted a 30 minute movie on YouTube to launch a campaign they called “Kony 2012.” View the movie here (https://www.youtube.com/watch?v=Y4MnpzG5Sqc). The Kony 2012 campaign was an effort to capture James Kony, who was portrayed as a ruthless rebel leader in Uganda who committed numerous atrocities against humanity, including kidnapping and murder. The Kony 2012 campaign had a tremendous impact. The video generated over 100 million YouTube Views. Over 20 million dollars was donated to support the effort to capture James Kony NOTE 2: You cannot use Invisible Children in your project. To help you with completing Section 2, a second example is provided below: Section 1 Example 2: The ALS Ice Bucket Challenge In 2016, the Amyotrophic Lateral Sclerosis Association (ALS) organized the Ice Bucket Challenge. The challenge involved pouring a bucket filled with ice and water over a person’s head, followed by the person nominating 3 people who then had to take the challenge.  The person would then making a contribution to ALS research.  The challenge quickly became viral, gaining support and participation from celebrities.  As a result of the challenge, traffic to the ALS web page increased, over 250,000 new donors signed up, and over 13.3 million dollars was raised. NOTE 3: You cannot use the ALS Ice Bucket Challenge in your project.  SECTION 3: ANALYSIS What was the full impact of the use of Digital or Social Media? Item 1: Was the change created by the use of digital or social media positive or negative (or both) in your opinion? Item 2: How successful was the company in accomplishing the objective? Support your answer. Item 3: List one thing the company could have done better to accomplish their objective. To help you with completing Section 3, we have provided two examples below: Section 3 Example 1: Invisible Children – Kony 2012 The Kony 2012 campaign had both positive and negative results: The Kony 2012 campaign received global attention. This attention lead to political and military action. The US government, lead by President Obama, backed a mission of 5,000 soldiers to James Kony. The organization came under scrutiny as many have questioned their efforts (see YouTube video https://www.youtube.com/watch?v=okmswBs4rdg or CNN report at https://www.youtube.com/watch?v=TEVKNVTnYRA). James Kony has not been caught. Some people even believe that he is no longer living or a threat to the region. Section 3 Example 2: The ALS Ice Bucket Challenge The Ice Bucket Challenge was extremely successful. The ALS Ice Bucket Challenge increased the level of awareness of ALS and was extremely positive. The Ice Bucket Challenge campaign has ended. In order to sustain the effort by coming up with a new challenge each year. One idea would be to use a number of celebrities to start the new challenge every year. Also, the association could do a better job of showing how the money donated has gone to furthering the cause. I would also create a thank you video from current ALS patients. The key here is to find ways to take advantage of the momentum the Ice Bucket Challenge initially created. Section 3 Sources: Include at least two sources for Section 3. Include the two sources as in-slide citations and on your References page. At least one source should be professional or scholarly.  NOTE 4: You can not use in your project or any company or organization we discussed in class or in this assignment (e.g. The Ice Bucket Challenge or Invisible Children).  Presentation Requirements 1. SLIDE SETUP AND ORGANIZATION Your presentation must include the following slides and sections: Item 1: Title Slide Your Title Slide should contain the following: Project Name Your Name Instructor’s Name Course name and section number Item 2: Organization or Company Information (Section 1) Item 3: Description of the Digital Media Influence (Section 2) Item 4: Analysis of the Digital Media Influence (Section 3) Item 5: Summary Slide Item 6: Question Slide (this is where the audience is invited to ask questions). You will only need to include a “Title Only” slide . Item 7: References Slide(s) (Your References MUST be in APA format)! 2. PRESENTATION LENGTH Minimum of 15 slides; Maximum of 25 slides. (Title and Reference slides do not count toward the total slide count).  NOTE 5: Going over 15 slides is fine, but if you are under 15 you will be penalized 10% (one letter grade) for every 2 slides you are under the 15-slide minimum. 3. SLIDE DESIGN REQUIREMENTS a. Keep it Simple: Slides must be easy to read and uncluttered. Keep in mind the 7 x 7 rule with presentation software, which effectively states no more than 7 words per bullet and 7 bullets per slide. b. Images: Pictures and images should be used sparingly to avoid distraction from the main contents. Include at least one table, graph, or image of an appropriate size that is relevant and supports the information provided in your paper. Feel free to create the image if you like, but it must be professional. c. Fonts: Use a standard font like Times New Roman or Helvetica. Use 36-point font for your slide title, 28-point font for main points, and 24-point font for secondary points. d. Footer: Include the slide number, title of your presentation, and your name in the footer (except on title slide). e. Background: Appropriate for the presentation. Use creativity here, but your background color or design must not detract from the readability of the slides. A bad example would be using dark text against a dark background. Make sure the background and font colors are a good contrast. f. Contrast: Appropriate Foreground-Background Segregation (use dark text against a light background or white or light colored text against a dark background. This creates contrast. 4. PRESENTATION NARRATION Add “Narration” to each and every Slide in your presentation. I would like you to present your presentation as if you were giving it to a LIVE AUDIENCE. In addition to designing each slide, I also want you to provide me with the transcript of the words you would actually say, word-for-word. while each slide is being displayed.  Adding Narration You can accomplish this in several ways: a. Adding Text Narration to the Notes Section of each slide, OR b. Adding Voice Narration to each slide (Export the Narration as a .MOV file). 5. SOURCES Include at least Four (4) Sources (Total) a. Include at least One (1) Source for Section 1. b. Include at least One (1) Source for Section 2. c. Include at least Two (2) Sources for Section 3. At least one of the two sources must be a Professional or Scholarly Source. Clarification: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar.  Examples of scholarly sources include textbooks, articles, academic journals, and conference proceedings. Scholarly resources are written by experts in their fields, grounded in research, and often refereed (reviewed and edited by researchers in the field). Examples of professional sources include: trade journals or magazines. Professional sources are written for a specific audience that works in certain field. They are not research-based. You can also use our course content (e.g. Read & Watch resources) as a source as well. UMGC has a top-notch, extensive online library. You can find many scholarly and professional sources there. NOTE 6: You can also use social media (e.g. Twitter posts, blogs, YouTube) sources as well as this is a paper about the use of digital and social media.  Presentation Resources The following optional resources may be helpful in completing this project: 1. Life After Death by PowerPoint (3 mins | Automatic Closed Captioning) https://www.youtube.com/watch?v=MjcO2ExtHso This Youtube video provides great tips sprinkled in with humor! 🙂 2. PowerPoint Tutorial: Recording and Exporting Videos (5 mins | Automatic Closed Captioning). https://www.youtube.com/watch?v=uKgfVZ4aCE0  Submission Requirements Please submit the following to your Assignments Folder in our CMST 301 LEO Classroom by the specified due date: 1. The completed presentation (PowerPoint .PPT or .PPTX, or Keynote project file) or a link to your online Prezi presentation.  Due Date Five (5) Day Late Period: The Assignments Folder will remain open 5 days after the due date for late submissions. There will be a 10% (or 2 point) reduction each day (24-hour period) the assignment is late.  After 5 days, late assignments will not be accepted or graded. The Assignments Folder will be closed at this point as well and you will not be able to physically submit the assignment. Exceptions may be allowed, on a case-by-case basis, for life situations (military deployment, medical illness, death in the family, etc). In all cases, timely notification of a “life situation” is critical to the approval of any extensions. All exceptions must be accompanied by official documentation, which is subject to inspection and approval. Work load, course load, vacations, or bad memory are not acceptable excuses. Running Close to the Deadline?: Please do not wait until the last minute to submit your assignment. Give yourself at least a 5-hour window to account for any technical difficulties that might arise. If you experience technical difficulties beyond your control that do not allow you to successfully complete the assignment, immediately follow the steps below:

Read more

The Life of Craig Federighi

include (doesn’t have to be everything here): -Background of the individual (Craig Federighi, Apple), Education, Employment -Influences on Computer Technology -Developmental breakthroughs -Career highlights. What is his/her legacy? -Developments in the industry as a result of his/her contributions -Collaboration with other Computer Scientists (others relevant to industry) -Awards, Recognitions, Honors, Accolades

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information