Entries by Peter

Information Systems Security

Information Systems Security Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the […]

Term Paper: Legacy to Cloud Computing Migration Project

Due Week 10 and worth 180 points This assignment consists of three (3) sections: a written paper, a Work Breakdown Structure (WBS), and a Gantt Chart. You must submit each section as a separate file for the completion of this assignment. Label each file name according to the section of the assignment it is written […]

ITNA359 Network Administration – discussion 5

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding […]

Assignment 4: Performing Effective Project Monitoring and Risk Management

Imagine that you are employed as an IT project manager by a prestigious coffeemaker organization. This organization operates many coffee shops within the region and would like to promote its brand by creating a mobile application that will provide its customers with the ability to view the nearest coffee shop location within their geographical area. […]

A “WORK DISCUSSION

In this unit, we have discussed a number of considerations related to communication, and special attention has been paid to the importance of nonverbal communication, particularly in organizational settings. As more and more methods of communicating in nonverbal manners have grown in popularity, it is important to gain a better understanding of some of the […]

IT Evaluation and Implementation II Unit IV DBs

IT Eval & Implementation II (Unit IV)   DUE DATE:  FEB 12, 2015   1.  Compare and contrast a progress report versus a status report.  Describe the means and timing    by which each is delivered.  Your response should be at least 75 words in length. You are    required to use at least your […]

professor2013

  Case Study 3: Carlson Companies    Read the case study titled “Carlson Companies” found at the end of Chapter 10.   Write a three to four (3-4) page paper in which you:   1.      Assess how the Carlson SAN approach would be implemented in today’s environment.   2.      Compare the pros and cons of […]

A WORK DISCUSSION REPLY

Discuss and give examples of when age can be a bona fide occupational qualification (BFOQ). What are some examples of age discrimination under the Age Discrimination Employment Act? As the head of human resources, what recommendations would you have to prevent your company from violating this act? PLEASE REPLY TO MY CLASSMATE RESPONSE TO THE […]

Case Study 1: Cyber Security in Business Organizations

Protecting organizational assets and information within the company has become a top priority for many organizational leaders.  Review the article titled “Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It”, located here.   Write a four to six (4-6) page paper in which you: Determine the fundamental challenges that organizations face in […]

Network Adminstration – ITNA359 DB5

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding […]