+1-316-444-1378

DD6HW2 Questionnaire Data

Take a few minutes to review the data collected by your questionnaire in DD4HW3: (INDIVIDUAL) Prepare for Primary Research. What patterns might you predict?  What do you think you would have learned from the survey had it actually been conducted? What answers to your questions would be most useful in Read more…

hardware

Summarizes the papers in about 8 sentencesLists positive aspects of the work (in bullet points)Lists negatives/potential improvements (in bullet points)Expanded arguments based on the positives and negatives paper https://people.eecs.berkeley.edu/~dawnsong/papers/Oakland13-SoK-CR.pdf

Excel assignment-String processing

Follow instructions on “string processing” pdf file carefully, replicate formulas exactly as required and follow all steps carefully. Be familiar with string processing and use EVERY FUNCTION AS INSTRUCTED, making the final tables/strings look exactly as in the pdf instruction file. Use the starter file data to do this, also Read more…

Cloud Computing

First, assume that you must select a cloud-based data storage solution for your company. Discuss the factors you would consider when selecting a U.S.-based vendor. (Minimum of 1 page of content)Write a 1-2 page memo for your company outlining the decision of migrating to a U.S.-based cloud vendor, the steps Read more…

Social Engineering

As you analyze any modern corporate setup, you will see that companies want to ensure that all users are aware of their own individual responsibility to help protect the enterprise. Social engineering (SE) is becoming a more prevalent threat at all levels of business. To combat it, you first need Read more…

Any topic (writer’s choice)

Conduct a serious and deep assessment of your competencies vis-a-vis those listed in this bullet points.  Rate yourself from 1 (just getting started) to 5 (complete mastery) on each item.  Write-in any management competencies or occupation-specific requirements you have. Write a fully-formatted memo to me with your complete evaluation by Read more…

Wireless is More

Identify any vulnerabilities associated with dynamic routing. Do these issues outweigh the advantages? Defend your response with examples. For your citations, you might use articles that show examples of common vulnerabilities in dynamic routing. You can also find articles from experts that suggest the pros and cons of dynamic routing.

Trouble at PeachTree

Imagine the company you work for has a policy that allows users to bring their personal computers to the office. How does this policy pose a threat to Layer 2 security? What additional policy/policies can help ensure an employees laptop does not infect the network? For your citations, you might Read more…

Get down at the Hot Hop

Low levels of packet loss at the first hop inside a providers network can sometimes indicate a connection thats struggling to maintain service. This might be because of noise on the line or marginal hardware. Water in a junction box is one example, or maybe a bad splitter or terminator Read more…