Information Technology Solution for the Company
Software as a Service is slowly becoming one of the most widely used software technologies that businesses use for enterprise resource planning (ERP), replacing traditional enterprise IT infrastructure. A recent Forrester report found that the budget for on-premise software across diverse enterprises experienced a steady drop of 13 percent, whereas the spending budget for SaaS experienced a 53 percent increase (Dalal, 2016, p.1). Although there is a rapid increase it is important to understand that there are certain disadvantages to using SaaS from a vendor, such as Microsoft.
One of the disadvantages is that the company loses autonomy over their applications and data because a vendor is collecting and storing the data and because the software is owned by the vendor not the company. It is important to remember that Microsoft is one of the leading companies in ERP software and that it is most likely a better situation for the company because the management will be better and more efficient and the company can use Microsoft as a resource and get the help of Microsoft’s IT department that is experienced in SaaS and enterprise systems that can come to a solution quicker than the IT department of the company. It also allows the IT department to lower the amount of high-paid skilled workers needed to run the Enterprise IT infrastructure.
Another disadvantage that some argue is that SaaS loses that customizable factor that can be tailored to a company’s ERP needs where on-premise or in-house software does not lose that customizable factor. However, SaaS is constantly evolving and the services that the software provides from Microsoft and other vendors is constantly being updated and more functionalities are arising from the innovation. The integration of the SaaS can be tailored to the individual company’s ERP needs for a more effective and cost-efficient solution for ERP, rather than being the same services for each company regardless of how the organization operates. Microsoft Dynamics 365 takes advantage of their partners and other independent software vendors that allow them to extend and provide value added solutions that tailor to a wide variety of business capabilities without having to custom build foundational infrastructure that can be costly. This allows Microsoft Dynamics to not only incorporate their SaaS system in large companies, but also be able to tailor to medium and smaller companies that need niche SaaS products. Microsoft Dynamics is able to cater to a wide variety of companies which is important because a lot of companies that were skeptical of the idea of Saas replacing their current enterprise IT systems, can use Saas to benefit them without worrying about disadvantages in regards to customization.
Another risk identified with SaaS is the security, safety, and privacy of data that is stored on a cloud-based server. “The Software as a Service (SaaS) model faces similar challenges as other online services required to protect private information, such as financial or health-care services. In this case, a user interacts with cloud services through a well-defined interface. In principle, therefore, it’s less challenging for the services provider to close some of the attack channels” (Marinescu, 2013, p.1). It is emphasized that protection of storage servers is important and that the methods for protecting and securing said storage servers constantly advances with technology to prevent possible security breaches by new technology, DoS attacks, and malicious insiders. SaaS is constantly updating and even though such challenges arise in terms of security and privacy there are a lot of ways to prevent such attacks and secure a company’s data. Using Microsoft’s Dynamics SaaS is taking advantage of the sophisticated analytics and professional management of several IT departments that Microsoft is equipped with, making evolving security risks less of an issue because not only is it a professional company that has experts in security but, it also stays up to date with the latest security threats and combative measures to provide a high value product for its SaaS users. “Microsoft Dynamics 365 and Microsoft Dynamics 365 (online) provide a security model that protects data integrity and privacy, and supports efficient data access and collaboration. The goals of the model are as follows: Provide users with the access only to the appropriate levels of information that is required to do their jobs. Categorize users by role and restrict access based on those roles. Support data sharing so that users and teams can be granted access to records that they do not own for a specified collaborative effort. Prevent a user’s access to records the user does not own or share” (Microsoft, 2016, p.1). Microsoft Dynamics 365 is also available as an on-premise platform that allows any cloud-based security skeptics to rest easy as it does not necessarily run the same risks as having your data on the cloud.
Microsoft Dynamics 365 provides customizable solutions that tailor to any businesses’ ERP needs, while maintaining the security and privacy of the data that is stored in cloud-based servers. Like any technology SaaS, more specifically, Microsoft Dynamics 365 is constantly evolving, increasing its value, efficiency, customizability, accessibility, and security that makes it a strong solution that can replace current on-premise enterprise IT infrastructure as it creates more value for the business process than on-premise solutions.
Day: April 27, 2018
SOC497: Sociological Research Methods
Extra-Credit Opportunity:
Review a Methodology Article
Comments
You may receive extra credit by reviewing an article that fits the methodological focus of this course. The grade
on this assignment, if completed, will be counted as an additional homework. (That means there would be ten
total, of which still only three are dropped, leaving seven rather than six. It does not mean an additional “lowest
grade” is dropped, or that another assignment is replaced.)
Instructions
Select an article which explores and attempts to answer a methodological question. (If you select something that
addresses an empirical or theoretical question, you will not receive the extra credit, so don’t waste your time. I
recommend that you run the article, or at least a citation and abstract, by me for approval in advance.) Typically,
this will mean that there is an independent variable which is a methodological choice, such as about something
you’ve learned, read, or studied in this course.
You will find some sociology journals, such as the American Journal of Sociology, in CSUN’s library. However,
you are strongly encouraged to consider journals such as Sociological Methodology, Studies in Qualitative
Methodology, Political Methodology, or Political Analysis, in which almost every article will fit.
Read the article with the questions below in mind. Write an annotation and/or review of at least 300 words, which
answers at least some of the questions below, and include a complete citation for the article.
Submit your typed work no later than the beginning of the last lecture meeting of the course.
Questions
1. What is the methodological question at issue?
• What is the research hypothesis?
• What is the dependent variable?
• What is the independent variable?
2. How it that question addressed or resolved?
• What kind of data is considered, and how is it analyzed?
• What conclusions are made about data (if any)?
• What conclusions are made about the research question?
3. Does this methodological research also answer any empirical or theoretical questions?
4. Was the given data and/or method an appropriate test of the methodological question?
• What would you do differently to address that question?
If the assignment was for a term paper about mobile forensics, this paper would be well-written and deserving of a high mark. However, the assignment is for a Standard Operating Procedure. An SOP should serve as a guide for an examination. It should tell the examiner what steps are expected for the lab. As of this moment, while much of the content is good, this paper does not meet the scope of the assignment.
This comment for the acquisition part (third page)>>
The information/content in this section is well presented and accurate. However, the format (throughout) is more typical of a term paper and not of an SOP. Please consider reformatting to provide steps which an examiner would take.
In other words, please answer the questions, for your lab, what procedures are taken in acquisition?
The purpose of a Standard Operating Procedure is to serve as a guide for an examiner. An example can be found here: https://www.swgde.org/documents/Current%20Documents/SWGDE%20QAM%20and%20SOP%20Manuals/SWGDE%20Model%20SOP%20for%20Computer%20Forensics
What about Backups? What about File System Acquisition?
When should I use what methodologies? Who is authorized to do what procedure? Is there required training or proficiency testing to do chip off? What are the procedures for the lab? If the device is on what type of acquisition should I do first? If the device is off what do I do first? Am I required to get each of the applicable image types? Do I image the SIM separate from the device? What about the SD card? When do I use write blockers?
If an examiner were to pick this document up, it would be informational; however, it does not provide a procedure for how to conduct examinations in your lab.
Lets spend some time on Monday night discussing format. While a great deal of your content is valuable, the format is not indicative of an SOP and does not provide a guideline for an examiner to use in a lab.
This comment for the beginning of page#6 >>
Are Chip-off and JTAG methods used in your lab? What are the requirements in your lab for personnel to do these types of extractions? Data owner permission? Does the device need to be returned in its original state?
Page#8 the Encase paragraph >>
These are traditional forensics tools and while they can be used, an examiner would be more well suited using tools specifically for mobile forensics.
Please think through some questions you would want to know if you were working in my lab on day one. Here are just some examples:
Seizure
How do we handle network isolation?
How do we document the scene – photography, chain of custody, etc?
How do we ensure network isolation?
Acquisition:
What do we do if the device is off?
What do we do if the device is on?
What do we do if it is PIN locked?
What do we do for backups?
Analysis:
Where do we look for data on Android? IOS? Feature Phones?
etc…
This is Florida. I teach Math for 7th Graders. So the Unit could be about any content related to Number Sense, Algebra Thinking, Geometry, one of those 3 would be fine. See the Rubric attached, because It’s needed to be followed.
You have to make an assignment which is a Unit Lesson plan (for a math teacher) including several requisites and an essay.
Review existing curriculum in your content area and identify a unit you teach that could be modified to include the new technology tools introduced in this course and/or were part of your identified necessary resources in past assignments. This assignment will be submitted at the end of Module 6.
Formalize a teaching unit.
1. Document how your unit meets CCSS and other relevant standards for your state and curriculum.
Mathematics Standards – www.corestandards.org/Math/
Standards for Mathematical Practice – www.corestandards.org/Math/Practice/
2. The unit should consist of 3-5 days of lessons that address the following:
a. Unit title
b. Concept/topic
c. Unit goals/objectives
d. Required materials
e. Introduction/anticipatory set
f. Step-by-step procedures
g. Technology integration
h. Assessment
i. Adaptations and extensions
You have to provide 3 separate documents:
– Task 2 is the lessons plans that each should include all the letters a, b, c, etc. The writing is an essay separate from the lesson plans. You have 4 pages for this task (writer about 5 days).
– The first task should be included in the lesson plans. The writing should get more than 500 words so 2 pages with double space should be sufficient.
– Include a 500-750 word justification explaining the need for this technology in your classroom and the benefits your students would get from the unit. This justification should be written as though it will be shared with administrators, guardians, and other support staff.
You can find the info about new technology in the attached sources. The 5 technology tools I chose to always talk about in my assignments are:
1.IXL
2.i-ready
3.Edmodo
4.Algebra Nation
5. Achieve 3000
Those are programs I use in the classroom and must be included on the lessons.
Not all of the resources need to be cited but the more the better.
APA is not required, but solid writing is expected.
This paper is write a paper in which you convince your audience that the communication skills that they will learn as undergraduate students in your academic discipline will prepare them for the communication situations that they will encounter as professionals in that field. Your audience for this paper is undergraduate students who are preparing for the profession that you have chosen or are considering doing so. Your purpose in this paper is to convince these students that the rhetorical practices that they use in their undergraduate classes are of value to them because that can help them learn the communication skills that they will need as professionals. You can convince them that the rhetorical practice is valuable by identifying the specific skills that are needed both in the profession and in the rhetorical practice. In order to meke an insightdul and convincing case that their classroom activities are connected to their future professional lives, the paper will need as professionals. You can convince them that the rhetorical practice is valuable by identifying the specific skills that are needed both in the profession and in the rhetorical practice.
(EACH PARAGRAPH HAD TO HAVE PROFESSIONAL SITUATION, COMMUNICATION SKILL, RHETORICAL PRACTICES. MY FIELD IS FILM DIRECTOR)
(EXAMPLES FOR EACH PARAGRAPH)
1ST SPEAKING TO ACTORS – USING PRECISE VOCABULARY TO THE ACTORS – PAPER WRITING
2ND PRESENTING A PROJECT TO PRODUCERS – USING VISUALS – PRESENTATION
Online Support Group Meeting Assignments
In order to accurately critique each of the online support group meetings, you will need to attend the meetings. You are to review 2 online support group meetings and submit the answers to the following questions for each meeting:
1. What is the name of the support group?
2. Who is the sponsor of the support group? (i.e. Mayo Clinic, the Recovery Group, Alcoholics Anonymous, Overeaters Anonymous, Psych Central, etc)
3. What is the purpose? Or, what and how does it claim to help?
4. What is the cost or registration required to attend?
5. How do the meetings work?
6. How long are the meetings?
7. How easy or difficult is it to use the online site?
8. What resources does it provide?
9. What types of interaction takes place, peer-to-peer and participant-to-facilitator?
10. How many people typically log on to participate in the meeting?
11. What did you like about the support group?
12. What did you dislike about it?
13. Would you personally use this support group or refer people to it?
14. Could you see yourself working for the organization that runs this support group?
15. What would you suggest to improve this support group?
Submit the assignment to the Support Group Dropbox no later than Sunday 11:59 PM EST/EDT of the module in which it is due.
Support Group Meetings Update
The requirement for attending support group meetings for this semester is optional between in-person and online support groups rather than just online groups as the class notes indicate. You may replace two online groups with one in-person group if you choose. The first group assignment is due week three and you may either review two different online groups or one in-person group. This option will be the same for week 7. There are separate instructions for each option on the course menu. It is my goal to make this assignment as interactive as possible and the option of observing a group in person has this benefit. Please let me know if you have any questions.
Explanation of In-Person Support Group Meeting Assignments
For each in-person support group meeting, you are to submit an organized one page paper that should include the following:
Heading:
Your name
Name of support group you attended
Date and time of support group meeting
Location of the meeting
Name of group leader of speaker
Meeting Overview:
Use outline form here
Write 5 brief bullet points of what occurred at the meeting
Outline form / bullet points / no long sentences
Reaction: (try to keep this close to 350 words if possible %u0432%u0402%u201C points will be deducted if you write less than 250)
Use paragraph form in this section and be sure to address the following issues:
1. What you expected to learn from this experience
2. What you learned that was similar to or different from what you expected
3. What you saw or heard that was impressive
4. What you saw or heard that was troubling or upsetting
5. What you learned that applies to this class
6. Your opinions and evidence to support those opinions regarding the value of this experience and the extent to which it increased your knowledge about specific issues in applying psychological ideas and concepts to clinical or group practice
Additional tips about this assignment
Students should be vigilant about following directions. Points will be deducted for failure to follow the above required format and word count, and for grammar, spelling, punctuation, etc. errors.
You will need to check your local paper, your local online paper (look for links to community, health, self-help,) your local Navy Family Services, community services, area hospitals, military ESOs, or other local organizations in your area. Numerous support groups are typically available and open to those who are interested.
Some of the most widely available meetings are those based on the 12 steps of Alcoholics Anonymous, i.e. AA, Al-Anon, Overeaters Anonymous, Narcotics Anonymous, Codependents Anonymous, Cocaine Anonymous, etc. (You do NOT have to introduce yourself by saying, %u0432%u0402%u045AHi, I%u0432%u0402%u2122m Gloria and I%u0432%u0402%u2122m an alcoholic.%u0432%u0402%u045C You can simply say, %u0432%u0402%u045AHi, I%u0432%u0402%u2122m Gloria and I%u0432%u0402%u2122m here to learn.%u0432%u0402%u045C) You may also easily find support groups for people with medical disorders or those affected by someone else%u0432%u0402%u2122s disorder, i.e. Alzheimer%u0432%u0402%u2122s, HIV, diabetes, etc Most meetings are about one hour and are free of charge. If you are unsure, ask ahead of time, as some do charge fees, i.e. Overeaters Anonymous has no fee but Weight Watchers charges roughly $15.
Support groups are intended for gaining mutual empathy. Please attend meetings that have topics with which you can relate. Announcing that you are a psychology student who is required to attend will most likely result in you being asked to leave the meeting. Students may attend open AA meetings, but those that are designated as closed should only be attended by those who have the desire to quit drinking.
I DID NOT ATTEND A IN PERSON SUPPORT GROUP YOU CAN MAKE ONE UP. IT MUST BE IN HAMPTON VIRGINIA WHERE I LIVE, IT CAN BE A MISCARRIAGE SUPPORT GROUP SINCE I SUFFERED FROM A MISCARRIAGE.
Support Group Meetings Update
The requirement for attending support group meetings for this semester is optional between in-person and online support groups rather than just online groups as the class notes indicate. You may replace two online groups with one in-person group if you choose. The first group assignment is due week three and you may either review two different online groups or one in-person group. This option will be the same for week 7. There are separate instructions for each option on the course menu. It is my goal to make this assignment as interactive as possible and the option of observing a group in person has this benefit.
The Sixth Extinction as Man’s Long-Lasting Legacy
In her book The Six Extinction, Elizabeth Kolbert argues that humanity is solely
responsible for the “sixth extinction.” Humanity stands on the edge of the knife; one step
backward will likely spell doom. Kolbert is no prophet of doom. Scientists all over the world are
currently monitoring the sixth extinction, deemed to be one of the most devastating mass
extinctions since the time of the dinosaurs. Accordingly, this is humanity’s long lasting legacy –
a legacy characterized mainly by biodiversity loss and ecological imbalance caused by man’s
insatiable greed, climate change, and the proliferation of climate-altering industrial systems.
Thus, in the book, the author chronicles the fate of several species in the wake of the sixth
extinction. These include the Panamanian golden frog, the great auk, ammonites, the brown bat,
and the Sumatran rhino.
More than a decade ago, Panama was once home to the Panamanian golden frogs. They
were practically everywhere, in the streets, in the woods, and even in gardens. However, within a
couple of years, the frogs started to disappear. Scientists have concluded that the introduction of
the Chytrid fungus was solely responsible for the disappearance of the frogs. Of course, the
Chytrid could not travel on its own. There is evidence to suggest that humans were solely
responsible for introducing this invasive species to Panama. The “extinction” of the Panamanian
golden frog was therefore man-made.
Sharon Maselli:
This is a great start to an introduction, but it is lacking an argument. If you want to discuss the species you list, how do their extinctions prove human responsibility? And why should your reader be concerned? Do you have a suggestion for what should be done in order to combat human influence/responsibility for species extinction? Is your argument that there is nothing we can do? And if so, why not?
The same case can be said with the Sumatran rhino. Before the turn of the 20th century,
the Sumatran rhino was once considered to be a pest. There were literally thousands of rhinos in
the jungles of Sumatra. Due to excessive logging, the rhino’s habitat became essentially
fragmented. By 1900, barely a few hundred survived in the wild. Although a captive breeding
program was implemented, only a few dozen rhinos survive to this day. Again, this is a man-
made induced extinction event.
Evidently, even coral reefs are disappearing at an increasing rate all over the world. It is
interesting to note that since the Industrial Revolution, enough fossil fuels have been consumed
and burned, emitting more than half a trillion tons of CO2 over the past 300 years or so.
Unknown to many, these emissions find their way into the sea. Higher CO2 emissions translate
to higher acidity. If CO2 emissions remain at their current levels, the oceans will be 150% acidic
by 2100 that it was at the start of the Industrial Revolution. At the present surface pH, a small
proportion of the world’s coral reefs are dying each year. Again, in the case of coral reefs, its
gradual disappearance is man-made rather than natural.
Of course, the disappearance of some species was not due primarily to the Industrial
Revolution and the perpetual rise in carbon emissions. The disappearance of the great auk, a
flightless bird native to the Northern Hemisphere, was due to excessive human hunting. Early
settlers used the bird for a variety of purposes, as fish bait, fuel, and stuffing material. Similarly,
the disappearance of the ammonites was primarily due to the KT extinction event which also
wiped out the dinosaurs. The dust created by the asteroid impact proved lethal, as it raised the
ocean acidity to unprecedented levels.
For the author, although the sixth extinction is man’s lasting legacy, there is still hope.
Humans are living in a time of very elevated extinction rates. How human will respond to this
challenge will ultimately define its character as a species. And as of the present time, people
around the world are exerting immense effort to avert this disaster.
Explanation of In-Person Support Group Meeting Assignments
For each in-person support group meeting, you are to submit an organized one page paper that should include the following:
Heading:
Your name
Name of support group you attended
Date and time of support group meeting
Location of the meeting
Name of group leader of speaker
Meeting Overview:
Use outline form here
Write 5 brief bullet points of what occurred at the meeting
Outline form / bullet points / no long sentences
Reaction: (try to keep this close to 350 words if possible %u0432%u0402%u201C points will be deducted if you write less than 250)
Use paragraph form in this section and be sure to address the following issues:
1. What you expected to learn from this experience
2. What you learned that was similar to or different from what you expected
3. What you saw or heard that was impressive
4. What you saw or heard that was troubling or upsetting
5. What you learned that applies to this class
6. Your opinions and evidence to support those opinions regarding the value of this experience and the extent to which it increased your knowledge about specific issues in applying psychological ideas and concepts to clinical or group practice
Additional tips about this assignment
Students should be vigilant about following directions. Points will be deducted for failure to follow the above required format and word count, and for grammar, spelling, punctuation, etc. errors.
You will need to check your local paper, your local online paper (look for links to community, health, self-help,) your local Navy Family Services, community services, area hospitals, military ESOs, or other local organizations in your area. Numerous support groups are typically available and open to those who are interested.
Some of the most widely available meetings are those based on the 12 steps of Alcoholics Anonymous, i.e. AA, Al-Anon, Overeaters Anonymous, Narcotics Anonymous, Codependents Anonymous, Cocaine Anonymous, etc. (You do NOT have to introduce yourself by saying, %u0432%u0402%u045AHi, I%u0432%u0402%u2122m Gloria and I%u0432%u0402%u2122m an alcoholic.%u0432%u0402%u045C You can simply say, %u0432%u0402%u045AHi, I%u0432%u0402%u2122m Gloria and I%u0432%u0402%u2122m here to learn.%u0432%u0402%u045C) You may also easily find support groups for people with medical disorders or those affected by someone else%u0432%u0402%u2122s disorder, i.e. Alzheimer%u0432%u0402%u2122s, HIV, diabetes, etc Most meetings are about one hour and are free of charge. If you are unsure, ask ahead of time, as some do charge fees, i.e. Overeaters Anonymous has no fee but Weight Watchers charges roughly $15.
Support groups are intended for gaining mutual empathy. Please attend meetings that have topics with which you can relate. Announcing that you are a psychology student who is required to attend will most likely result in you being asked to leave the meeting. Students may attend open AA meetings, but those that are designated as closed should only be attended by those who have the desire to quit drinking.
I DID NOT ATTEND A IN PERSON SUPPORT GROUP YOU CAN MAKE ONE UP. IT MUST BE IN HAMPTON VIRGINIA WHERE I LIVE, IT CAN BE A MISCARRIAGE SUPPORT GROUP SINCE I SUFFERED FROM A MISCARRIAGE.
Support Group Meetings Update
The requirement for attending support group meetings for this semester is optional between in-person and online support groups rather than just online groups as the class notes indicate. You may replace two online groups with one in-person group if you choose. The first group assignment is due week three and you may either review two different online groups or one in-person group. This option will be the same for week 7. There are separate instructions for each option on the course menu. It is my goal to make this assignment as interactive as possible and the option of observing a group in person has this benefit.
You should use a good selection of academic and business references, especially relevant academic journal articles.
There are many useful sources of critical and trade information including:
• https://www.marketingritson.com/,
• https://www.private-eye.co.uk/media-news,
• https://www.monbiot.com/category/media/,
• https://www.ft.com/companies/media,
• PR Week,
• Campaign.
A good essay will tend to do more than merely describe what’s happening – it will make an argument, put across the writer’s point of view, while helping to clarify relevant theoretical issues for the reader from the academic literature.
Strong answers will
• Be Theory-driven.
• Demonstrate evidence that you have thought carefully about the essay.
• Use terms with precision – and relate convergence to fragmentation – and both of these to the question.
• Integrate the theoretical (and practical) ideas gleaned from the academic (and practitioner) literature with the reality of the contemporary agency scene.
• From the first paragraph of the essay directly address the question that had been posed; throughout the body of the essay continue to attempt to answer the question; and at the end summarise your argument.