response eric

In a world controlled by technology, the internet is something that has become a staple of any business. You have a range of options on how you choose to connect to the internet. DSL was one of the first options, carrying data through telephone lines, next came cable that uses buried ground lines serviced by cable companies. WiMax entered the industry around 2001 and uses wireless technology to carry data. Fiber is the newest technology, utilizing modulated light pulses.

In terms of security, DSL and cable are relatively equal as they are simple copper wires that can be tapped into with easily available equipment. WiMax is the least secure technology as wireless signals are easier to intercept than having to tap into a physical line. Fiber is the most secure option as it is expensive to get equipment for attempting to tap into and decode the data. The best security option is to protect your data inside your network and secure packets for transfer over the internet. You can use firewalls to ensure that your company’s data isn’t accessed without authorization in your network and encryption for when you transmit packets over your chosen connection medium.

Module 2: Online Discussion: CRM and Social Networking

In this module, you were introduced to CRM, a software that helps companies manage their customer relationships.  To that end, mobile CRM has grown in popularity.  For example, you must receive emergency alerts on your cell phones. CRM is the basis of this type of communication.

From the perspective of the customer, name a few approaches to mobile CRM that you would welcome to receive and some that you would not.

From the perspective of the company, what are the challenges of implementing mobile CRM targeted to customers? 

Next, find out how CRM systems are integrating social networking technologies to improve customer relationships.  Search social networking sites such as Facebook, Twitter, and YouTube to identify how a specific company of your choice is using social media to interact with customers. Share your findings.

Share your answers to these prompts in your initial post. Then scan your classmates’ threads and reply to at least TWO classmates whose answers interest you most. In your reply, comment on what you like about his/her sharing. Further the discussion in a direction you deem appropriate.

Personal Database

Think of an example of a database that you could use to help manage your personal data.  Using that example, explain the following points:

What is the purpose of your personal database?

How many tables do you think would be needed to support your database?

Give examples of a few attributes that your database would store.

Give an example or two of a type of query and a report you may generate based on the data in your personal database.

Share your answers to these prompts in your initial post. Then scan your classmates’ threads and reply to at least TWO classmates whose answers interest you most. In your reply, comment on what you like about his/her sharing. Further the discussion in a direction you deem appropriate.

Pros and Cons of Telecommuting

Define telecommuting and discuss the collaborative technologies that a company would have to provide to create an effective telecommuting program. 

How would providing improved collaborative technologies facilitate telecommuting? Name a few of such technologies and explain their role. 

Describe at least three human behavior challenges with telecommuting, and explain what a company would have to do to overcome each of them.

Record your responses to these questions in a Word document.  This written assignment should be 250-500 words, formatted in APA style. If you use outside sources, be sure to cite them using APA style as well.  Save the Word document under your name and M4 Written Assignment, and submit the file to the assignment submission folder.

Problem 4- Initiating Project

Please see attached file for question

Text

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

A Guide to the Project Management Body of Knowledge (PMBOK(R) Guide-Sixth Edition / Agile Practice Guide Bundle (HINDI) 

ISBN: 9781628255393 

Authors: Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2019-08-05

CIT-502-L1-Discussion-1 Discuss three fundamental roles of information systems in business

Reflect on your ideas and in three hundred words or more, discuss three fundamental roles of information systems in business.
Step 2: Review resources.
Review your notes from the resources provided to organize your data and approach for the paper.
Step 3: Write.
Write a 300-word forum post based on the topic. Make sure you backup your assertions with adequate supporting detail and cite your sources.

CIT-502-L1 – Project Proposal – Information Systems in Business Organizations

Analysis of Information Systems in Businesses
2. Types and Components of Information Systems.
3. Management and Decision Support Systems
Instructions:Please Use the below listed questions as a guide to writing the Project Proposal. You may use the number format as I have here or change it into an essay format anything is fine. Please add plenty of depth and breadth to your replies. I would expect at least a half page per question (double spaced) ( minimum 4-5 sentences / question).
1.
What
is your proposed topic?
2.
Why
are you interested in this topic?
3.
What
do you already know about the topic?
4.
What
do you need to know or don’t know about the topic?
5.
What
is your research question?
6.
What
is the intended goal or purpose?
7.
Who
is the intended audience?
8.
Why
is this important?
9.
Fill
in the blanks with any information of value.
10. What scholarly references have you found? Find
at least ten.
Please use full version of Grammarly for grammatical errors and sentence formation and the overall score should be over 90%.
Note: Once the Proposal gets approved, need to work on a full project 2000 words that is a next assignment.

Review Section 1.3 on effective versus ineffective security governance in Westby, J. R., and Allen, J. H. (2007), Governing for

Review Section 1.3 on effective versus ineffective security governance in Westby, J. R., and Allen, J. H. (2007), Governing for Enterprise Security (GES) Implementation Guide, which is located in your Module 3 readings (and available online from http://www.sei.cmu.edu/reports/07tn020.pdf (Links to an external site.)).   Compare and contrast the effectiveness criteria in Table 1 on pp. 8-9 of Westby and Allen (2007) with Table 25.3 on pp. 287-288 of Hopkin (2014).  Be sure to identify any effectiveness criteria from Westby and Allen (2007) that you believe should be added to the criteria outlined in Hopkin (2014). 

week2 discussion

Week 2 discussion: Changing norms/culture
Sometimes cultural changes are slow and sometimes they are fast. In the reading for this week by Howard Becker, he says “culture is always being made, changing more or less, acting as a point of reference for people engaged in interaction. Given new conditions, people create culture continuously.” (Becker)
It seems we have had a lot of changes to our daily lives and how we go about doing things and interacting with others since the beginning of this global pandemic in March of 2020. In about 3-5 sentences, comment on some cultural norms you have seen change since the COVID-19 pandemic. What are you doing differently? What do you see around you? What does this “new normal” look like to you?
Please post this initial post by Friday. Then make sure you reply to at least one classmates’ post in a substantive way by Sunday. Remember to be kind and respectful when you are doing these discussions – just like the past 2 weeks.

For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or

For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

Describe the organization’s environment, and evaluate its preparedness for virtualization.

Explain Microsoft (or another product) licensing for virtualized environments.

Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.