After learning the more advanced features of Excel in Unit V, what is your favorite graphics or tables feature, and how will you utilize this feature in the future? Explain how this new feature might aid in your success. If no initial posts exist to allow for a response to be made, you may submit an additional initial post addressing another aspect of the unit topic.
Category: Computer Science
post at least two follow-up responses to your classmates. My post Linux in Actio
post at least two follow-up responses to your classmates.
My post
Linux in Action
After revisiting this Linux case study’s “Results” section, I was at a loss for words regarding its widespread success and how it can adapt to multiple industries. Linux operating system, which was first a hobbyist interest of Linus Torvalds, has grown to become the most dominant operating system in the world. What surprised me most was how it invaded sectors like financial markets, cloud computing, and even supercomputing fields, which proprietary systems dominated until recently.
The case study also noted Success areas of Linux, such as the New York Stock Exchange or global carrier data centres. For example, the New York Stock Exchange operates more than 250,000 orders per second, with speed and efficiency incomparable to Linux. Such scalability customization- particularly in the financial segment- presents a massive shift from proprietary systems to open-sourced technology. Also, knowing that 99.6% of the world’s supercomputers now run Linux showed impressive flexibility and reliability (The Linux Foundation, 2020).
This review positively influenced my opinion of Linux, from the impression I had about it relating most with web hosting and open-source enthusiasts to the critical sectors it is used in, such as telecommunication and cloud computing, and even finding its way into embedded systems. This goes to show great adaptability. What was initially an academic project has finally matured into an industrially leading solution. While the case study described the collaborative spirit that drove the success of Linux as a form of open-source innovation, it mainly attested to Linux’s status not only as a technological marvel but also as one founded upon effective collective effort (The Linux Foundation, 2020). The study deepened my appreciation for Linux and its role in modern computing.
References
The Linux Foundation. (2020, April 21). Linux Case Study – The Linux Foundation. Web.archive.org. https://web.archive.org/web/20200421021348/https://www.linuxfoundation.org/projects/case-studies/linux/
Classmate 1 Jason who needs a response
Learning about Linux, especially from this study, has really opened my eyes to its power. It’s amazing how Linux isn’t just a historical thing but is super important today in many industries.
I was shocked to learn how much Linux is used in financial markets. I knew it was popular because it’s open-source and flexible. But I didn’t realize how crucial it is for high-speed trading. The fact that the New York Stock Exchange handles so many quotes and orders every second on Linux blew my mind. It shows Linux’s speed and efficiency, and how it can meet tough financial demands. It’s not just a small player; it’s a big deal where milliseconds matter.
The study also taught me a lot about Linux in cloud computing. Over 75% of cloud-based companies use Linux. This shows it’s not just relevant but essential for IT today. Companies are moving to open-source solutions for scalability and cost-effectiveness. This trust in Linux proves it’s a strong choice for handling complex IT tasks.
Linux’s role in supercomputing also caught my eye. Almost all of the top 500 powerful computers use Linux. This shows it’s great for big tasks in science and tech, where performance matters. Knowing Linux is behind major research and tech advancements shows its importance.
The part about embedded systems and IoT was really interesting too. Linux has become a standard for these systems, showing its flexibility. It now supports many applications, from industrial controls to medical devices. This makes me respect Linux more and excited about its future uses as the world connects more.
Overall, this study changed my view of Linux for the better. I used to see it as just an alternative to Windows or macOS, mainly for tech enthusiasts. But now I see it’s a key part of modern tech across many fields.
The open-source model of Linux is really appealing today. Developers worldwide can work together on it, which is revolutionary. This teamwork promotes innovation and quickly fixes security issues, which is shown in Linux’s strong security record.
In conclusion, learning about Linux through this study made me appreciate its role in tech more. It’s not just an operating system but a vital ecosystem supporting many applications and industries. Its growth and open-source philosophy suggest it will keep shaping computing’s future. As tech evolves, I’m excited to see how Linux will continue to revolutionize industries.
Classmate 2 who needs a response Komla
The “Results” section about Linux case study was good and the study showed how Linux helps companies save money while still being fast and secure. I was surprised to see that many big companies, including famous tech ones, use Linux for their servers. This shows that Linux is reliable and works well.
My view of Linux has changed a lot. At first, I thought it was only for tech experts, but the case study showed how useful it can be in everyday situations. I now think it’s a great choice for businesses that want to cut costs without losing quality.
The study also pointed out how strong the community support for Linux is. This means users can find help easily, making Linux more user-friendly. Because of this, I feel more excited to try out Linux for my own projects and school work.
In conclusion, the Linux case study taught me a lot about its advantages and changed how I see open-source software. I now see how useful it can be in different industries and can’t wait to learn more about how it’s used.
– I will upload a research paper and it needs to be formatted according to the j
– I will upload a research paper and it needs to be formatted according to the journal template I will provide.
Chapter 22: Discuss how you might address risk analysis in the text box (Lack of
Chapter 22: Discuss how you might address risk analysis in the text box (Lack of Planning… ) on page 388. Give examples for solutions that you would’ve implemented. How would risk play into the design strategy for data, sites, etc?
Throughout this project, the necessary information has been assembled to provide
Throughout this project, the necessary information has been assembled to provide your boss Maria with a risk assessment so that she may begin developing a long-term risk management strategy. This final step is compiling that information into a cogent “summary report” for presentation to company executives. This report will summarize the Vulnerability and Threat Assessment with the addition of the Risk Assessment just completed.
It is critical to provide recommendations to help the organization implement effective information risk management practices. Use findings in the previous steps to recommend risk management strategies such as least privilege, separation of duties, mandatory vacation, risk management technologies, and others you have found appropriate.
Remember, the recommendations included in the report should address all aspects of the research—business, economic, and technical reasoning for the conclusions.
Follow these Final Risk Assessment Summary Report requirements while writing the final risk assessment summary.
In this step, you will prioritize your selected risk responses from the last ste
In this step, you will prioritize your selected risk responses from the last step based on several factors:
The economic impact to the organization should the assessed risk occur.
The likelihood (probability) of an event that would activate the risk.
The arrangement of assets ranked by priority based on the highest value of the following formula: (economic impact) X (probability) = risk
Risk Formula – Economic Impact times Probability equals Risk
Use the Prioritized Risks and Response Matrix template to submit your findings for feedback.
You identified the potential financial impacts should identified threats become
You identified the potential financial impacts should identified threats become realities in the last step. Here, use your findings to complete the Business Impacts and Probabilities Matrix, listing each identified threat and the risk, the probability, and a potential mitigation to include all policies, processes, and technologies to be used in formulation of financially and logistically sound mitigation strategy.
After you’ve completed this step, you will document and prioritize risk responses.
You’ve reviewed the list of vulnerable assets, and in this step, you will docume
You’ve reviewed the list of vulnerable assets, and in this step, you will document threats. Recall that a threat is any event, action, or factor that has the potential to cause damage to the enterprise. Threats can come from a variety of sources, including people (a hacker stealing employee passwords) and natural events (a power blackout causing data loss).
Use the Internal and External Threats Template to add all threats and vulnerabilities—internal and external to the enterprise—and tie them to the itemized assets that will be affected. Note that external threats will include a comprehensive review by device type at network access, both direct and indirect, a view of the social media landscape as a threat.
In the opening step, you considered the risk management implementation framework
In the opening step, you considered the risk management implementation framework and the risk management technologies you might use. Now, it’s time to list the organization’s vulnerable assets.
In order to conduct effective information risk management, the vulnerabilities of the system must be understood and documented prior to starting the assessment, regardless of which of the risk assessment approaches is used.
Begin by conducting a thorough review of the recently completed Vulnerability and Threat Assessment report. During the review, pay particular attention to which security risks to information systems that might be relevant and consider varying types of risk assessment and analysis.
Using the Vulnerable Assets Template, identify and create a list of assets considered vulnerable. This is a simple list, not prioritized, not valued, simply identified, but complete. Pay particular attention to application software in both the acquisition and implementation phases. This list of vulnerable assets will also be used during the next step.
https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-data-factory-
https://azure.microsoft.com/mediahandler/files/resourcefiles/azure-data-factory-data-integration-in-the-cloud/Azure_Data_Factory_Data_Integration_in_the_Cloud.pdf
read the first whitepaper posted, Azure Data Factory – Data Integration in the cloud and answer the questions in the same folder.
With regard to the Azure Data Factory, summarize the journey of data from the customer, through the Extract, Transform and Load process, for a company using Machine Learning and Data Science Tools (select specific tools that might be used), discuss the different aspects of pipeline processes and what role do SSIS packages play?