Information Technology

Discussion Question 3

Use the following materials to examine the current state of cloud computing:

By now, it is a safe assumption that techies and non-techies alike have heard of cloud computing and its associated benefits: cost savings, increased efficiency, improved agility, opportunities for growth and innovation, and so on.

  • Discuss a strategy for implementing a cloud solution.
  • Examine the possible innovations that cloud computing has yet to realize in organizations.
  • Provide at least three recommendations that you could suggest to a CEO that would invoke disruptive change to an organization.

Requirements: 1 OR 2 Pages

Discussion Question 3 Read More »

Blockchain

Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Blockchain Read More »

Discussion board post around 250 words on an article

https://thehackernews.com/2020/12/iranian-rana-and…

Look for a cyber attack using malware that has happened in the last 6 months (since June 2020) and don’t duplicate someone else’s posts.

  1. Explain the details of the attack.
  2. Indicate the source and web link to the attack.
  3. Explain the type of malware.
  4. What could have been done to protect against such an attack.
  5. Respond to 2 colleagues about their attack.

Please make it look simple and clear, I have attached the link for the cyber attack I chose

Requirements: around 250 words

 

 

 

 

Discussion board post around 250 words on an article Read More »

Scroll to Top