Designing the Ideal Computer System for Maximum Productivity and Performance

 

Design your ideal system. There are a lot of options. Would you have a netbook, a laptop, or a desktop? What would you want included? WHY?

Get creative, and then explain it. Explain every detail of what you want and why, as if to your dear old Aunt Sally who knows nothing about computers, or even why you need a keyboard.

Your system must have all the necessary components to function, detailed specifically, and explained for the computer illiterate. “Keyboard” is not OK, but “standard wired keyboard, for data entry and fast response” is, or “Lenovo USB backlit keyboard, for data and text entry, because it is cool looking, I can work in low light, and it is robust and includes a palm rest, and I do a lot of typing” is also.  Or “Logitech standard USB keyboard, because it is simple, inexpensive, and I just need to be able to type commands and text” is also great.

You may use an online site to “build” your computer. That would be 25-30 % – the rest comes from your knowledge, and your explaining what you need, and most importantly WHY. You have experts on the devices in the class – use their knowledge. Your system must be complete, in each area, and explained. Please check the rubric so you make sure you include all the necessary components, and full explanations.

 

 

A Comparative Analysis of EA Frameworks: Huawei (TOGAF) vs. EA3 Cube

 

Please use Huawei (TOGAF) to compare between EA3 Cube Framework.
https://carrier.huawei.com/en/technical-topics/service/softwareservice/applying%20enterprise%20architecture-harry
Kindly provide reference whereever needed in Chicago format.
Written Report
In this assignment you will find a case related to Enterprise Architecture (EA), introduce the case, and discuss how the documentation framework in the case is different from the EA3 cube framework in the textbook.
Your report is required to follow the structure below:
Introduction – provide the background and purpose(s) of this report
Case Description – briefly introduce the case
Architecture in the case – Discuss the EA framework in the case (e.g., different levels, EA components)
Comparison – Discuss how the EA framework in the case is different from the EA3 cube framework in the textbook (table can be used)
Conclusion – State the benefits of the EA framework implemented in the case; Discuss if the EA framework in the case is more appropriate in the context of the case than the EA3 cube framework (if so, why; if not, why not). It is possible that the EA framework in the case is quite similar to the EA3 cube framework. You could argue that it is just an adapted version of the EA3 cube framework.

Reflecting on Cybersecurity Learning: Penetration Testing, Incident Response, and Coursera Insights

In 300 – 500 words, reflect on this week’s learning.
1. Watch the Podcast, “Up in the Air” with Dr. Brandon McIver (Is Penetration Testing effective enough to be worth the cost?) will assist you in writing your paper.
2. Watching the video, “Storytime” with Dr. Brandon McIver (Stop the Madness of Incident Response) https://youtu.be/MObyz4F-MWk will assist you in writing your paper.
3. Reviewing the Coursera material will assist you in writing your paper.

 

Enhancing Efficiency and Effectiveness: The Role of Business Information Systems in Organization X

 

Business information systems use information technologies to provide information businesses need to improve their efficiency and effectiveness. The primary components of business information systems are people, process, data, and information technologies such as hardware, software, and networks.
Post an analysis of the role of business information systems in your selected organization. In your analysis, be sure to address the following:

Identify three of the most important technologies and/or aspects of business information systems used in your selected organization.
Examine what role(s) these business information systems and technologies play in how the organization functions and conducts business.
Based on your analysis, identify at least one potential area for improvement in how this organization could improve its use of business information systems and technologies.

 

The Challenges of Implementing a Digital Transformation Initiative

 

There are change processes that are common to most organizations. Some of the changes affect the processes of doing business, and some of the changes affect the people within the organization. Drawing from this week’s lecture and readings, choose one of the common change initiatives, and define the issues that might emerge at the forefront or those responsible for implementing or facilitating the change. Be sure to support your points with the concepts discussed in the text.

 

A Sweet Breakfast Memory That Connects With the Wrong Market

Business case studys:
A Sweet Breakfast Memory That Connects With the Wrong Market – The New York Times.https://wilmu.instructure.com/courses/58533/files/9086293?wrap=1
Write a summary of the case study. Research and describe at least 3 technologies that could be used to support or enhance the business in the case study. Your paper should include at least 3 references from peer-reviewed journals associated with how other companies are using the 3 technologies you are recommending.

 

The Business Owner Who Backed Off Tries to Step Back In

Business case studys:
A Business Owner Who Backed Off Tries to Step Back In https://wilmu.instructure.com/courses/58533/files/9086395?wrap=1
Write a summary of the case study. Research and describe at least 3 technologies that could be used to support or enhance the business in the case study. Your paper should include at least 3 references from peer-reviewed journals associated with how other companies are using the 3 technologies you are recommending

The Impact of Human Error in Data Breaches

Use your favorite search engine and search for “world’s greatest data breaches and hacks.” Scan through the hits until you find visual diagrams or a text-based list of major data breaches that have occurred recently. (Major data breaches are defined as those in excess of 30,000 records.) Select and carefully review at least two of these data breaches. Briefly describe the two data breaches you selected. Explain in layman’s terms how you think these breaches occurred. Discuss whether or not you agree with Verizon’s assertion that over 80% of breaches are caused by human error. Describe how appropriate governance frameworks might have prevented these data breaches from occurring. Support your statements with evidence from your sources.