reduction of risks on failure of cloud-migration project

Reducing the Risk of Failure of a Cloud-Migration Project Discuss steps you would take to reduce the risk of failure of a cloud-migration project. In an essay, discuss the following questions based on

Reducing the Risk of Failure of a Cloud-Migration Project

Discuss steps you would take to reduce the risk of failure of a cloud-migration project. In an essay, discuss the following questions based on course readings:

  1. What is log management?
  2. What steps would you take to integrate virtualization into existing workflows?

Your assignment should be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

The length and formatting requirements include:

  • 3  pages in length, not including cover and reference pages. Written assignments must have a cover page, section headers, an introduction, a conclusion, and a reference page.
  • Formatted according to the APA guidelines.

Cite a minimum of three sources—two of which should be academic peer-reviewed scholarly sources—to support your positions, claims, and observations, in addition to your textbook.

virtualization environmental in past generations

dentify a Major Breach Draft Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will wr

Identify a Major Breach Draft

Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will write a critical evaluation of your chosen breach, and review and analyze the breach along the following dimensions:

  1. What went wrong?
  2. Why did it occur?
  3. Who was responsible?
  4. How could it have been prevented?
  5. What advice would you offer to prevent such a breach from occurring in the future?

For the purposes of this assignment, you will write the draft for the Portfolio Project.  Your outline should meet the following requirements:

  • Be approximately 4 pages in length, not including the cover page and reference page.
  • Your outline should include an introduction, a body, and a conclusion.
  • Cite a minimum of eight to 10 related sources—five of which should be academic peer-reviewed scholarly sources—to support your positions, claims, and observations, in addition to your textbook.r

Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

civil rights movement on nations

Explain if the Civil Rights Movement of the 1960s effectively changed the nation. What effect would the Civil Rights Act have across the continent on…

  1. Explain if the Civil Rights Movement of the 1960s effectively changed the nation. What effect would the Civil Rights Act have across the continent on minority groups?
  2. Do you think that the tactics and strategies that civil rights activists used in the 1960s would apply to today’s racial and ethnic conflicts? Why or why not?
  3. Do the ideas of the 1960s still have relevance today? If so how? If not, why not? Analyze how the Civil rights Movement would impact diversity in America today.

If use source, please include LINK in response.

philosophical theories applications

Assignment Instructions There are three questions listed below you must answer ONLY two. Each question is worth 5 points for 10 points total.Each question has a similar format: you’ll be presented w

Assignment Instructions

  • There are three questions listed below you must answer ONLY two. Each question is worth 5 points for 10 points total.
  • Each question has a similar format: you’ll be presented with a scenario and you must
    1. Explain the relevant aspects of the philosophical theories in question.
      • This is similar to a philosophical exegesis.  Click HERE Actionsfor tips on how to do philosophical exegesis.
    2. Apply the philosophical theories to the scenario in question.
      • For example, you should explain what Mill’s theory would require Mrs. Smith’s lawyer to do with her will and, most importantly, why. Then do the same for Kant.
    3. Assess which philosophical theory offers the best moral guidance for how one should act in the scenario in question.
      • This should include an argument about why, for example, you maintain that Mill’s theory gives the best guidance to Mrs. Smith’s lawyer AND an argument about why, following the same example, you maintain Kant’s theory is inadequate.  You should also include a potential way to strengthen the inadequate theory.
  • Although the assignment is like an essay, you DO NOT need an introduction or conclusion.  (Note that this is different than with your final essay answers, which do require introductions, thesis statements, and conclusions.)

Assignment Questions (remember, answer only two)

  1. Consider the following scenario: A burning building, relatively structurally sound, is engulfed in flames, with 4 small children trapped inside. There are two people who must decide how to respond to the situation: Granny — an 80-year-old misanthropic, pyrophobic, Luddite, who saw her mother burn to death in a fire when she was younger. She’s in relatively good health, although she uses a cane. She has a cell phone for emergencies, but she hates it. Clark Kent — a 30 year, world-renowned firefighter who is on his way back from the latest firefighting championships. He has all his gear with him but, like Wolverine in the X-men, has loads of superpowers, so he rarely needs it.
    1. Explain, thoroughly, the relevant aspects of Aristotle’s and Mill’s theories. In other words, what would Aristotle and Mill think is (morally) at stake in this scenario?
    2. Explain how Granny and Clark Kent should both respond to the situation of the burning building from both Aristotle’s and Mill’s perspectives. Would Aristotle require both Granny and Clark Kent to do the same thing? Why or why not? Would Mill?
    3. Make an argument explaining which philosopher gives the better moral guidance and which gives the worst.  What’s something that you would change to ameliorate the “worse” theory? Be sure to thoroughly explain your assessments here.
  2. Imagine you are Mrs. Smith’s lawyer, and you have promised to execute the terms of her will after she dies. Years ago she had you draw up a will leaving her substantial fortune to a famine relief fund. When she dies and you go through her papers, however, you find a more recent, legally binding will, written and signed by Mrs. Smith herself, in which she bequeaths all her money to her lazy niece, who (you know) will spend it on beer and Beanie Babies. No one else knows of the later will, but by law a later will supplant an earlier one.
    1. Explain, thoroughly, the relevant aspects of Kant’s and Mill’s theories. In other words, what would Kant and Mill think is (morally) at stake in this scenario?
    2. From Kant’s perspective: Should you execute the later will? Or should you secretly destroy it, act as if it never existed, and carry out the terms of the earlier one (giving the money to famine relief)? Why? From Mill’s perspective: Should you execute the later will? Or should you secretly destroy it, act as if it never existed, and carry out the terms of the earlier one (giving the money to famine relief)? Why?
    3. Make an argument explaining which philosopher gives the better moral guidance and which gives the worst. What’s something that you would change to ameliorate the “worse” theory? Be sure to thoroughly explain your assessments here.
  3. Imagine that there’s a famous, rich celebutante whose Bentley is dangling precariously off the edge of a cliff.  Below, past a jagged craggy precipice, a school of hungry hammerhead sharks is circling.  The celebutante is frantically tweeting her plight to her millions of followers, promising a large reward to whoever can rescue her.  You decided to try your luck, even though you are afraid of sharks, cannot swim, and have no search-and-rescue abilities.
    1. Explain, thoroughly, the relevant aspects of Aristotle’s and Kant’s theories. In other words, what would Aristotle and Kant think is (morally) at stake in this scenario?
    2. From Aristotle’s perspective, what should you do and why?  From Kant’s perspective, what should you do and why?
    3. Make an argument explaining which philosopher gives the better moral guidance and which gives the worst. What’s something that you would change to ameliorate the “worse” theory? Be sure to thoroughly explain your assessments here.

neuroimaging using fmri and erp

What are the ways in which neuroimaging, including fMRI and ERP, may benefit efforts to diagnosis and treat autism?

  1. What are the ways in which neuroimaging, including fMRI and ERP, may benefit efforts to diagnosis and treat autism?
  2. What are the core symptoms of ASD, and why is the social brain of particular interest?
  3. The atypical antipsychotic medications, which were developed and tested for adult schizophrenia are now being widely used to treat disruptive and self injurious behaviors in children and adolescents with conduct disorder, autism spectrum disorder, and a variety of other diagnoses. Read the article at this link https://www.apa.org/monitor/dec04/psychotropics.aspx and respond to the question below:
  4. If your child had significant problems with aggressive and disruptive behavior or self-injury, would you agree to have him or her take atypical antipsychotics if they were prescribed by a child psychiatrist? What do you think should be the policy on the prescription of drugs for children when the drugs have been tested primarily on adults?
  5. 4. What are the possible biological causes of autism spectrum disorder and how do medications help with the symptoms of autism spectrum disorder?

juvenile on adult courts

Respond to the following in a minimum of 175 words: Why might a juvenile be waived to adult court? How does the waiver to adult court process work? What other types of judicial waivers exist? What ki

Respond to the following in a minimum of 175 words:

  • Why might a juvenile be waived to adult court? How does the waiver to adult court process work? What other types of judicial waivers exist? What kinds of reports might you encounter while working in a juvenile court? Who are the key players in a juvenile court? What are their roles? If you were to apply for a position in the juvenile court process, which job title or role would suit you the best? Why?

nine point mission statement for company

Your new corporate CIO has devised a nine-point mission statement for the company. As one of the operations managers in the department, you have received a memo on the new policy and an associated tas

Your new corporate CIO has devised a nine-point mission statement for the company. As one of the operations managers in the department, you have received a memo on the new policy and an associated task. The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback on LAN and MAN technology. Refer to Table 3.1 in Chapter 3 of the textbook for the nine points of the mission statement.

Write a three to four (3-4) page paper in which you:

  1. From Table 3.1, speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.
  2. Imagine only three (3) points are to be rolled out in the first phase. Evaluate each point to determine the most important three (3) for the initial rollout phase.
  3. Recommend one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement. Explain your rationale for the inclusion.
  4. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Points: 80

Assignment 2: Requirements for the Corporate Computing Function

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.

Weight: 30%

Did not submit or incompletely speculated why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.

Partially speculated why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.

Satisfactorily speculated why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.

Thoroughly speculated why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine (9) points.

2. Evaluate each point to determine the most important three (3) for the initial rollout phase.Weight: 30%

Did not submit or incompletely evaluated each point to determine the most important three (3) for the initial rollout phase.

Partially evaluated each point to determine the most important three (3) for the initial rollout phase.

Satisfactorily evaluated each point to determine the most important three (3) for the initial rollout phase.

Thoroughly evaluated each point to determine the most important three (3) for the initial rollout phase.

3. Recommend one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.  Explain your rationale for the inclusion.

Weight: 25%

Did not submit or incompletelyrecommended one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.  Did not submit or incompletely explained your rationale for the inclusion.

Partiallyrecommended one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.  Partially explained your rationale for the inclusion.

Satisfactorilyrecommended one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.  Satisfactorily explained your rationale for the inclusion.

Thoroughlyrecommended one (1) additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement.  Thoroughly explained your rationale for the inclusion.

4. 4 references

Weight: 5%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

5. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

information governance and data science

Words requirement: 500 Courses 1 : Information Governance Course 2 : Data science and Big data analysis It is important for students to understand how their curriculum is applied to real world workpl

  • Words requirement: 500

Courses 1 : Information Governance

Course 2 : Data science and Big data analysis

It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future).

Assignment Details:Part 1 – Identify a Problem

  • Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.

Part 2 – Solve the Problem

  • Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.

Please include your Program  PHDIT in the reflection

syllabus :

Alves de Freitas, Andrade dos Reis, E., Senra Michel, W., Gronovicz, M. E., & de Macedo Rodrigues, M. A. (2013). Information Governance, Big Data and Data Quality. 2013 IEEE 16th International Conference on Computational Science and Engineering, 1142–1143.Tallon, Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178.

Tallon. (2013). Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost. Computer (Long Beach, Calif.), 46(6), 32–38.Turel, Liu, P., & Bart, C. (2017). Board-Level Information Technology Governance Effects on Organizational Performance: The Roles of Strategic Alignment and Authoritarian Governance Style. Information Systems Management, 34(2), 117–136.Simberkoff. (2016). 5 best practices for information governance and risk management. KM World, 25(8), S30–.

Generally Accepted Recordkeeping Principles 2017 ARMA International, www.arma.org/principles.MacLennan, Alan. (2017). Information Governance and Assurance: Reducing Risk, Promoting Policy, pp.10 – 44. Facet Publishing.Hulme. (2012). Information Governance: Sharing the IBM approach. Business Information Review, 29(2), 99–104.New IGRM version recognizes value of privacy, security. (2013). The Information Management Journal, 47(1), 16–.Saffady. (2015). Records management or information governance? The Information Management Journal, 49(4), 38–.

Calderaro, & Craig, A. J. S. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), 917–938.Ali, Green, P., Robb, A., & Masli, A. (2022). Governing information technology (IT) investment: A contingency perspective on organization’s IT investment goals. Australian Journal of Management, 47(1), 3–23.DeNardis. (2017). Cybersecurity Governance. In The Global War for Internet Governance (pp. 86–106). Yale University Press.

Manning. (2020). “Rifled Precision”: Using E-discovery Technology to Streamline Books and Records Litigation. Vanderbilt Journal of Entertainment and Technology Law, 22(3), 663–.Ward, Purwin, C., Sipior, J. C., & Volonino, L. (2009). Recognizing the Impact of E-Discovery Amendments on Electronic Records Management. Information Systems Management, 26(4), 350–356.Vinjumur. (2018). Predictive Coding Techniques With Manual Review to Identify Privileged Documents in E-Discovery. ProQuest Dissertations Publishing.Vogel, & Rood, D. K. (2019). Dealing with subpoena requests for digital data. Journal of Accountancy, 227(3), 12–13.

Tallon, Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178.Brooks. (2019). Perspectives on the relationship between records management and information governance. Records Management Journal (London, England), 29(1/2), 5–17.Bhatia, Douglas, E. K., & Most, M. (2020). Blockchain and records management: disruptive force or new approach? Records Management Journal (London, England), 30(3), 277–286.

Borgman. (2018). Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier. Berkeley Technology Law Journal, 33(2), 365–412.Henttonen. (2017). Privacy as an archival problem and a solution. Archival Science, 17(3), 285–303.MacLennan, Alan. (2017). Information Governance and Assurance: Reducing Risk, Promoting Policy, pp. 113 – 123. Facet Publishing.Viktor Mayer-Schönberger. (2010). Beyond Privacy, Beyond Rights—Toward a “Systems” Theory of Information Governance. California Law Review, 98(6), 1853–1885.

Lappin, Jackson, T., Matthews, G., & Onojeharho, E. (2019). The defensible deletion of government email. Records Management Journal (London, England), 29(1/2), 42–56.Bojana, K. (2018). Why your information governance strategy must start with email. Jatheon.Gundling, M. (2019). What every company should know about email management for Sarbanes-Oxley Compliance.

Haynes. (2016). Social media, risk and information governance. Business Information Review, 33(2), 90–93.Olly Jackson. (2018). GDPR: companies at risk over unstructured data. International Financial Law Review.Madhava. (2011). 10 things to know about preserving social media. The Information Management Journal, 45(5), 33–.

Chhabra, & Bala, M. (2018). A Comparative Study of Data Deduplication Strategies. 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), 68–72.Franks. (2015). New technologies, new challenges: Records retention in a cloud environment. Canadian Journal of Information and Library Science, 39(2), 191–.Luciana Duranti & Corinne Rogers. (2019). Trusting Records in the Cloud: The Creation, Management, and Preservation of Trustworthy Digital Content , pp 119 – 131. Facet Publishing.

application of rate of returns

Assessment Description The purpose of this assignment is to apply principles and skills associated with rates of return. Using what you have learned from the topic resources, complete the following pr

Assessment Description

The purpose of this assignment is to apply principles and skills associated with rates of return.

Using what you have learned from the topic resources, complete the following problems and cases from the textbook.

  1. Problems and Cases 11.10
  2. Problems and Cases 11.12
  3. Problems and Cases 12.12

Prepare the assignment in Excel with each problem or case as a separate tab. All narrative questions should be fully addressed within the Excel document on the tab associated with the problem or case.

APA style is not required, but solid academic writing is expected.

  • This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

sexual misconduct in puritan america

Sexual Misconduct in Puritan America Introduction: When one thinks of sex, the last thing that comes to mind were Puritans. Our assumptions about Puritan sexual habits would suggest a very represse

Sexual Misconduct in Puritan America Introduction: When one thinks of sex, the last thing that comes to mind were Puritans. Our assumptions about Puritan sexual habits would suggest a very repressed sexual appetite, which is correct. However, a combination of suppression of sexuality through religion, no outlet for sexual satisfaction and the demographics of the Puritan colonies led to deviance from the proscribed social norms. Today, our society seems plagued by social immorality, rising divorce rates, unwed mothers, adultery, and sex crimes. However, these things are not just products of our own times. We must remember that the Puritans were also normal people with desires and weakness. Instructions In this assignment you will examine the aspects of gender relationships and sexual deviance in Puritan New England. You are required to write a short essay examining your choice of potential questions, derived from the sources provided. Minimum Requirements • 750 word minimum length (you are encouraged to exceed this) • Your essay needs a thesis • You must provide citations and footnotes • Please keep your writing formal Questions: Please choose one of the questions below to base your essay on. • Analyze the relationship between what the law states and what the actual punishments were? In your assessment, were the Puritans lenient in their criminal sentencing? • What crimes were worse in Puritan society? What are the most common and why? • Under the law, what were the Puritan’s view on gender, in regards to marriage and sexual deviance. Were the punishments for fornication and adultery different for women and men? • In regards to sexual deviance, what protections if any, existed to protect people of lower social status. (i.e. servants, Natives, women, etc. ) Sources: I have selected some primary and secondary sources for this assignment. They are located on the Eagle Online Course, under the assignment submission area.

Ps: citations in chicago please