For this project, you are preparing to initiate a Secure Software Engineering In

For this project, you are preparing to initiate a Secure Software Engineering Initiative in your organization. These are the first steps before implementation, so you want to ensure you are laying down a solid foundation. First, you will need to determine the following (company profile):
What is your company name?
What industry/space is your company in?
What is your company’s mission?
What is the organization structurehierarchy?
Who will be involved in the initiative?
What will their roles and duties be?
Format:
The first step of any initiative is to get buy-in (strategic value). Discuss the importance of this initiative. Use strong and persuasive language backed by scholarly sources to “sell” your initiative.
Discuss how your initiative will enhance customer security.
Talk about any external initiatives or frameworks you will incorporate into your project. How will they be implemented and used.
How will this impact the SDLC and what implementation of SDLC are you impacting or changing?
Discuss how you will manage risks and the direct value from the security initiative. What metrics and KPIs are being tracked to ensure/demonstrate success?”
Finally, bring it all together (summary)!
Except there is no word or page count; however, it is expected to be a “high value” document and contains sufficient information to facilitate a more refined and specific 15-20 minute presentation that would be given to executive leadership..
Grading Criteria
Title Page (10 pts)
Executive Summary (50pts)
Company Profile (20pts)
Strategic Value (35pts)
External Initiatives (30pts)
Software Development Life Cycle (Implementation) (25pts)
Risk Management (25pts)
Summary (35pts)
References (15pts)
Appendices as Needed

Problem: Copy and paste the code below to https://godbolt.org/ Use the following

Problem:
Copy and paste the code below to https://godbolt.org/
Use the following compiler for the ASM code generation: armv7-a clang 11.0.0
Under the compiler options, use -Os
Explain each and every single line of the C program
Explain each and every single line of the ASM program
#include
#include
__attribute__((noinline))
int sum2(int a, int b) {
return a + b;
}
__attribute__((noinline))
void print_the_value(int value) {
printf(“%d”, value);
}
int entry_point() {
int a = rand(); // R4
int b = rand(); // R0
int result = sum2(b, a);
print_the_value(result);
}

Be sure to answer the following questions (do not copy and paste Chatgpt respons

Be sure to answer the following questions (do not copy and paste Chatgpt responses):
Explain the different types of flash memory (NOR, NAND etc.)
Outline its limitations
Why is serial flash memory preferred in embedded systems
Provide information about how memory is re-written
Is writing to a flash memory straightforward ? How will you set/clear a particular bit of flash memory ?

see the picture below to know what exactly I need Use the following tool: https

see the picture below to know what exactly I need
Use the following tool:
https://logic.ly/demo/Links to an external site.
Build 8-bit adder:
Reference:
https://www.geeksforgeeks.org/4-bit-binary-adder-subtractor/Links to an external site.
Requirements:
Design the adder such that it can add 8-bits, and have 9-bit output (9 output LEDs)
Design the adder such that a lightbulb or similar can be viewed intuitively (bulbs are horizontal)
Please submit your screenshot of the adder to gain credit for the assignment

see the picture below to know what exactly I need Use the following tool: https

see the picture below to know what exactly I need
Use the following tool:
https://logic.ly/demo/Links to an external site.
Build 8-bit adder:
Reference:
https://www.geeksforgeeks.org/4-bit-binary-adder-subtractor/Links to an external site.
Requirements:
Design the adder such that it can add 8-bits, and have 9-bit output (9 output LEDs)
Design the adder such that a lightbulb or similar can be viewed intuitively (bulbs are horizontal)
Please submit your screenshot of the adder to gain credit for the assignment

Find at least two credible sources to study the VW Diesel Scandal and read what

Find at least two credible sources to study the VW Diesel Scandal and read what this topic is about.
1.
Discuss your understanding of this case from the software engineering
ethics viewpoint by referring to the IEEE-CS/ACM’s principles for ethics
and professional practices in software engineering.
Consider including in your post on your thoughts related to following questions (6 points):
What VW software engineers should have done to contribute to the good life for others in this case (1pt)
Who are the public’ to who the VW software engneers is obligated; (1pt)
Why the software engineers is obligated to protect the public (2pt),
How VW software engineers failed in this case (1pt), and
Why it’s important to discuss ethics in the software engineering field and in the digital world (1pt).
Your posting should contain at least 100 words;
2. List the two sources used in your research at the end of your post (2 points);

Examine two advantages and two disadvantages for both hardware and software fire

Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend a hardware or software firewall. Provide the rationale for your response.
Consider the importance of your home or personal network security. Discuss where to use a firewall to secure a home office. Provide a rationale for your response

Instructions will be in attachment EVM. Given the following 10-month project. I

Instructions will be in attachment
EVM. Given the following 10-month project. It is now the end of month 7. The monthly planned value is provided for all 10 months; the actual cost and earned value are provided through month 7. These are all by month values.