After you’ve read the chapter from Shirky’s book and reviewed at least two of the other required materials, write a discussion post that draws on what you have read, seen, or heard (be explicit in naming which pieces you are discussing). You can additionally bring in any other recent examples that relate to Shirky’s points about group formation and what groups can achieve in this age of easy connection via social media and the internet, but you must also refer to and cite specific points in Shirky and some of the other required materials.
You may use the following ideas as a starting place for your discussion board post:
Toward the end of his chapter, Shirky poses two questions: “Why has group action largely been limited to formal organizations? What is happening now to change that?” What is new about the type of collective action he describes, and the way the groups are formed?
Apply Shirky’s ideas about group formation to a current group formed for activism, mutual aid, support, or community that interests you. You can talk about one of the examples in the required materials, or a group or community you’ve followed or been involved with. Think about how the group or community formed, and where, and what its members are getting from the experience, and make a connection with one of the other examples from the required materials this week.
Category: Technology
The National Cybersecurity Strategy March 2023 provides a comprehensive and coor
The National Cybersecurity Strategy March 2023 provides a comprehensive and coordinated plan to address the growing threats to the United States’ digital ecosystem. It aims to shift the burden of cybersecurity away from individuals, small businesses, and local governments and onto the organizations that are most capable of reducing risks for everyone. The strategy seeks to build and enhance collaboration around five pillars: defending critical infrastructure, disrupting and dismantling threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships to pursue shared goals. Its implementation will protect investments in rebuilding America’s infrastructure, developing clean energy, and reshoring America’s technology and manufacturing base.
https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf
I recognize that the availability of scholarly articles on this specific topic may be limited. Therefore, I am open to some flexibility in the sources you may use for this project. In addition to scholarly journals, you can consider using other reputable sources such as government reports, policy documents, academic books, or credible online resources related to cybersecurity and the National Cybersecurity Strategy.
1- I uploaded my draft with the professors feedback, please make sure to look at
1- I uploaded my draft with the professors feedback, please make sure to look at the feedback.
2- make the references in IEEE FORMAT
I just need help with 2 slides and I just need a second set of eyes to look ove
I just need help with 2 slides and I just need a second set of eyes to look over my work to make sure I did the final project right
Overall title slide: This includes project title, name, course number, session, and date.
Overall introduction: Describe the project as a whole and outline its major sections.
Executive summary of the project: This is a brief overview that describes the problem that you are attempting to solve or the process you are attempting to enhance. The overall solution(s) should be presented, although specific details need not be included.
Incorporation of Feedback: Summarize the feedback you received from teammates on each section of the project and describe how you utilized that feedback to improve your final product.
Career Readiness: Describe how completing this project has improved your readiness for your chosen career and how will you use the completed project to further your career goals.
Overall conclusion: Summarize the project and any conclusion(s) reached.
-What is your basic understanding of Network Administration. -Can you think of a
-What is your basic understanding of Network Administration.
-Can you think of any time or situation when you would utilize these new skills?
-Have you ever seen network management in use at a place of business?
-Would you use any of these new skills at home?
-Share your favorite way to memorize the OSI model. Draw and upload an image of the OSI model with each layer labeled and identify common protocols, hardware, or software that each layer is identified with.
Select ONE type of software tool from the list below. Using the internet or onli
Select ONE type of software tool from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific software tool you chose.
Summarize your findings in at least 300 words. Be sure to provide a link to the article, case study, or publication.
1) Device Seizure by Paraben
2) ForensicSIM by Evidence Talks
3) USIMdetective by Quantaq Solutions
4) SIMCON by Inside Out Forensics
5) .XRY by Micro Systemation
6) MOBILedit! Forensic by Compelson Laboratories
Using your own words, write a short descriiptive essay that defines and explains
Using your own words, write a short descriiptive essay that defines and explains selected environmental impacts of deforestation. As you write, imagine you are talking to a friend who has no knowledge of this topic. In short, write the way you speak, using a conversational tone. Also, try to alternate short sentences and longer sentences to make your writing more readable.
Your essay should include five paragraphs, as follows:
Paragraph 1 is your lead paragraph. It will contain an overview of what you have to say about these three topics: disruption of the carbon cycle, disruption of the hydrologic (water) cycle, and the reduction of species diversity.
Paragraphs 2, 3, and 4, are your body paragraphs.
Paragraph 2 should describe how deforestation disrupts the carbon cycle.
In paragraph 3, you’ll write about how deforestation disrupts the hydrologic (water) cycle.
In paragraph 4, you’ll explain how deforestation is related to declining species diversity.
Paragraph 5 is your conclusion paragraph. Here, you can describe how you feel about the three effects of deforestation discussed, and what we might do about it.
Use direct quotes from your reading to support your ideas, but don’t use too many. One to three such quotes should be your limit.
Richmond Alternative Family Therapy is a small family counseling practice. It ne
Richmond Alternative Family Therapy is a small family counseling practice. It needs an information system to schedule appointments. There are currently five counselors working in the practice. Their facility has four rooms that can be used for scheduling counseling sessions. Each appointment is scheduled for a particular date and has a start time and a duration (in minutes). Each appointment is for exactly one counselor and at least one client, but may be for multiple clients. Each counselor may have many appointments and each client can have many appointments. Each appointment is scheduled by an employee. Each appointment is in a particular room and each room can have many appointments. Additionally, appointments have a free-text field named “notes” where the counselor to keep notes about the counseling session. These notes may be as long as 3,000 characters. Each client who is scheduled for an appointment may have an assignment to complete in preparation for the counseling session. The descriiption of the assignment may be as long as 2,000 characters. The system must also be able to record which clients actually came to the appointments for which they were scheduled. Appointments must be made in such a way that rooms, clients, and counselors do not have time conflicts. Of course, when a new employee, counselor, client, or room is added to the system, it will not have had any appointments, so it is possible for each to exist without being associated with a particular appointment.
Employees, counselors, and clients are all people, so they will need standard contact information: first name, last name, address, city, state, zip code, phone number, email address. In addition, Counselors have a degree suffix (such as MD or PhD). Clients have “FoundOut” attribute that allows for a free text descriiption of how the client became aware of the practice. In addition, New Dawn needs to be able to record which clients were referred by which other clients. Each client may be referred by a single client and each client can be recorded as the referring client of many other clients. Clients also have a “reminder method” attribute that indicates how they prefer to be reminded about appointments (e.g. email, phone, text message, postcard). In addition to standard contact information, employees have a “date hired” attribute and a “wage” attribute. Also, each employee is supervised by exactly one other employee; an employee who is a supervisor may supervise more than one employee. The supervisory role is hierarchal and it is said that the top most employee in the hierarchy supervises herself. Rooms have a room number and a room name.
Counselors in the frim are partners, not employee; however, it is conceivable that a counselor could be hired in an employee role. For example, one of the counselors could be hired as a marketing agent to promote the firm’s counseling services. It is also possible for a counselor to receive counseling from another RAFT counselor. The only kinds of people that the practice keeps information about are clients, employees and counselors.
Design your solution such that it represents all basic contact information in a single entity and use inheritance to combine the contact information with other attributes of employees, clients, and counselors. Indicate which attributes serve as identifiers by underlining the attribute name. Do not include attributes to serve as foreign keys as that information is captured by relationships.
Points: 4
Started on Sep 26 at 07:42
Your Submission:
1. Bookmark question for later
Develop an EER diagram for the Richmond Alternative Family Therapy.
Express as many of the constraints in this scenario directly in the EER diagram as possible. If there is a constraint that you are unable to show using the diagram, you may express in a textual note. Show both minimum and maximum cardinality constraints.
Introduction: In this module, you will create a business plan in which you will
Introduction:
In this module, you will create a business plan in which you will justify the creation of a certain business or service you want to offer, based on your program or career goals. The proposal will require you to think critically about why your business should exist and integrate research that conveys a need for a certain service, technique, or need. The audience for this assignment will be local, business leaders, financial supporters, agencies, etc. that would be able to help you get your business off the ground.
Learning Objectives:
1. Identify important aspects of a successful proposal for a business or service.
2. Research relevant information from reliable sources.
3. Craft an effective and detailed business plan.
4. Revise and strengthen your writing skills to meet audience expectations.
Research Requirement: You are required to use and cite information from at least three (3) sources to support ideas presented in your business plan.
Think about what the mission and purpose of your company would be so that you can justify why your audience should support this new venture and how the product or service you offer is unique.
In your proposal, you will need to either paraphrase (put into your own words) or quote (use the source’s actual words) – and properly cite information from your sources you use. Inclusion of your research can happen anywhere throughout your proposal where you find it relevant.
At the end of your document, you will include a Works Cited page in which you correctly list the publication information for your sources.
Assignment Guidelines:
Required: 2-3 pages, typed, double-spaced, 12 pt. Times New Roman font.
Plus you will include a Works Cited page documenting your research sources.
Your Business Plan must include:
Executive Summary / Purpose: introductory paragraph explaining exactly what business / service you will offer.
Analysis of Need / Market Research: 1-2 paragraphs explaining why your particular business or service is necessary. You may include appropriate charts or graphics to help support your ideas.
Uniqueness: paragraph explaining how what you offer will set you apart from competitors.
Structure: paragraph discussing how your business will be organized – structure and leadership, job positions number of employees, etc.
Investment: 1-2 paragraphs explaining why and how outside support for your business will help you establish the business and what resources you will need to get started.
Conclusion – paragraph re-emphasizing the purpose and potential of your business.
As wireless and mobile technologies continue to grow in presence and popularity,
As wireless and mobile technologies continue to grow in presence and popularity, the world is becoming more and more connected. Unfortunately, this also means that devices and networks are becoming more and more vulnerable to outside threats. Businesses must identify and mitigate these vulnerabilities and threats in order to protect employees’ personal information and ensure the organization is secure from passive leaking of proprietary information.
In this task you will assume the role of an IT professional who is responsible for identifying wireless and mobile vulnerabilities, as outlined in the scenario below. You will then present your findings and recommend solutions to mitigate these risks and prevent future threats.
SCENARIO
________________________________________
You are a network professional on the IT team at Alliah Company, a new but fast-growing social media provider. One year ago, Alliah launched a social media website aimed at young professionals. The company also released a mobile app for accessing the site from cellular devices. Alliah was able to launch its website with money generated by a crowd-funded campaign, but most of the funds were spent on the site and app development, with relatively little money (and time) devoted to the internal office network infrastructure.
Alliah has 35 full-time employees, all of whom have offices or shared work spaces in a three-story building that serves as the company headquarters. The building is an old warehouse that was converted for office use and is approximately 10,000 square feet. Currently, the employees occupy only two floors; the third floor is vacant and available for expansion.
The Alliah WLAN has a gigabit managed switch, a multiservice wireless LAN controller, and seven wireless access points strategically located to provide coverage to office staff. One access point services a large back patio area for employee use. The network is protected by a firewall. The Alliah website servers are located in a data center 100 miles from Alliah headquarters.
Five employees are account representatives who are on the road at least 80 percent of the time, and each rep has a company-issued laptop, tablet, and smartphone. They use a large, shared office in the headquarters building when they are not traveling.
Employees use company-owned computers that connect to the WLAN, and, in an effort to control costs during the launch, Alliah has a bring your own device (BYOD) policy.
The IT staff consists of five employees; three are devoted to website maintenance, one manages the headquarters’ computers and network, and another employee assists with the website and the office network. IT staff uses wired Ethernet connections to remotely access the website servers.
The Alliah website is successful, attracting more and more visitors each month. Jennifer, the CEO, anticipates hiring more employees and is considering a strategy that would take the company public within a few years. In preparation, she wants to ensure that Alliah’s wireless networking infrastructure is highly secure, especially because it may need to grow quickly in a short period of time, and she wants to understand the security risks the company faces. She also wants to decide if Alliah should continue allowing BYOD or restrict network access to company-owned devices only, or if a compromise solution is available.
REQUIREMENTS
________________________________________
. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Describe two WLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.
B. Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.
C. Summarize the steps for mitigating each identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation.
D. Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.
E. Recommend a solution for the company’s BYOD approach, including research to justify your recommendation.
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.
**I will be attaching a version I found of assignment I found please rewrite in your own words, etc.**