Free Essay

Cis 408 Wk 10 Technical Paper

In: Business and Management

Submitted By activitymode
Words 913
Pages 4
CIS 408 WK 10 TECHNICAL PAPER
To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-10-technical-paper/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 408 WK 10 TECHNICAL PAPER
CIS 408 WK 10 Technical Paper - Planning an Application Server Migration Technical Paper: Planning an Application Server Migration

Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it’s a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the “Wild Frontier” network into your domain, “Foghorn Leghorn” and migrate to your current standards.
The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the “Wild Frontier” under the “Foghorn Leghorn” domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your solutions.
The same design requirements specified in the writing assignments (support, hours of operation, remote staff, Internet access, and sensitive file access) still apply, but disk space management is no longer as much of a concern and being part of a large company brings economies of scale to licensing purchases; take advantage of these. Department cost allocation is even more of a priority. Providing shooting targets (large paper reports) for Sam is no longer a need (the managers celebrate).
Workstations will all be standardized and provided with Virtual Desktop Infrastructure (VDI). Use those to your best advantage for standardization and support staff man-hour savings while still addressing control over users’ access of unapproved media services and applications.
Write a ten to fifteen (10-15) page technical paper which covers the following:
1. Suggest how to use Terminal Services to help meet criteria for providing applications and support for the remote offices.
2. Determine how application pools will help to reduce costs. Be specific in your configuration specifications.
3. Formulate how using AD groups and NTFS permissions should best be configured for security and appropriate access.
4. Evaluate how you might use Windows SharePoint Services to provide support for the additional remote offices and help prevent duplication of work.
5. Examine how you can use high-availability technologies to manage costs.
CIS 408 WK 10 TECHNICAL PAPER
To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-10-technical-paper/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 408 WK 10 TECHNICAL PAPER
CIS 408 WK 10 Technical Paper - Planning an Application Server Migration Technical Paper: Planning an Application Server Migration

Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it’s a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the “Wild Frontier” network into your domain, “Foghorn Leghorn” and migrate to your current standards.
The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the “Wild Frontier” under the “Foghorn Leghorn” domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your solutions.
The same design requirements specified in the writing assignments (support, hours of operation, remote staff, Internet access, and sensitive file access) still apply, but disk space management is no longer as much of a concern and being part of a large company brings economies of scale to licensing purchases; take advantage of these. Department cost allocation is even more of a priority. Providing shooting targets (large paper reports) for Sam is no longer a need (the managers celebrate).
Workstations will all be standardized and provided with Virtual Desktop Infrastructure (VDI). Use those to your best advantage for standardization and support staff man-hour savings while still addressing control over users’ access of unapproved media services and applications.
Write a ten to fifteen (10-15) page technical paper which covers the following:
1. Suggest how to use Terminal Services to help meet criteria for providing applications and support for the remote offices.
2. Determine how application pools will help to reduce costs. Be specific in your configuration specifications.
3. Formulate how using AD groups and NTFS permissions should best be configured for security and appropriate access.
4. Evaluate how you might use Windows SharePoint Services to provide support for the additional remote offices and help prevent duplication of work.
5. Examine how you can use high-availability technologies to manage costs.…...

Similar Documents

Premium Essay

Cis 341 Technical Paper

...* Technical Project Paper: Information Systems Security Due Week 10 and worth 110 points You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to...

Words: 520 - Pages: 3

Premium Essay

Cis333 Technical Paper

...Running head: Information System Security CIS 333 Technical Paper: Information System Security Donald Shipman CIS 333 Prof. Clapp March 11, 2012 In consideration of the security of the network of the pharmacy, the following physical vulnerabilities and threats are to be considered. The threat of disaster is considerable in almost any case. Such an occurrence would have a substantial impact on the network. Such threats include flooding, lightning, earthquake, wind, tornadoes, hurricanes, fire, environmental failure, and electrical interruption as these can destroy whole infrastructures and can cause valuable and important data to be lost. For example, in case of flood or fire it is certain that infrastructure will be destroyed that contains many hardware and storage system that contains valuable data such as detail of customers, product etc. so we would need to provide security to this data because loss of this information would have extreme consequences to the business, as well as being virtually impossible to recover at a total loss. We can use the method “backup and recovery” for to substantially reduce the impact of this disaster threat. Cloud technology can be deployed which would create a remote cold site that would allow access to critical system information with limited physical resources if necessary. When considering logical vulnerabilities and threats, the following is to be considered. Unauthorized modification of the database is a major......

Words: 2526 - Pages: 11

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Premium Essay

Cis 510 Week 10 Technical Paper

...A++PAPER;http://www.homeworkproviders.com/shop/cis-510-week-10-technical-paper/ CIS 510 WEEK 10 TECHNICAL PAPER CIS 510 Week 10 Technical Paper, CIS 510 Week 10 Technical Paper - Strayer Technical Paper: Final Project Plan Due Week 10 and worth 200 points Especially for You Jewelers is a small jewelry company in a college town. Over the last couple of years, it has experienced a tremendous increase in its business. However, its financial performance has not kept pace with its growth. The current system, which is partly manual and partly automated, doesn’t track accounts receivables sufficiently, and the company is finding it difficult to determine the reasons why the receivables are so high. The company runs frequent specials to attract customers but has no idea whether these efforts are profitable or if the benefit—if there is one—comes from associated sales. Especially for You Jewelers wants to increase repeat sales to its existing customers; thus, it needs to develop a customer database. It also wants to install a new direct sales and accounting system to help solve the outlined problems. The new direct sales and accounting system for Especially for You Jewelers will be an important element in the growth and success of the jewelry company. The direct sales portion must track every sale, be able to link to the inventory system for cost data, and provide a daily profit and loss report. The customer database must be able to produce purchase histories......

Words: 621 - Pages: 3

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...CIS 333 Week 10 Technical Project Paper – New 2015 http://homeworkfy.com/downloads/cis-333-week-10-technical-project-paper-new-2015/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves....

Words: 462 - Pages: 2

Free Essay

Umuc Wk 10 Paper

...The ESA’s Balanced Scorecard Damian Miles June 15, 2015 AMBA 630 – WEEK 10 EXECUTIVE SUMMARY The Entertainment Software Association (ESA) is a U.S trade association dedicated to serving the business and public affairs needs of companies that publish computer and video games for video game consoles, personal computers, and the internet. Each year the ESA looks to find ways to highlight, and bring positive awareness to the video game industry, while also deterring negative press along the way. Our industry is fun, innovative, creative, and inspiring; and also has an enormous amount of growth potential. The ESA is directly serving the publishers of the gaming industry, by offering a range of services. Services are as follows, but not limited to; a global content protection program, business and consumer research, government relations and intellectual property protection efforts. The ESA also provided the industry with the biggest trade show, which allows our member companies to use a huge platform to bring their newest innovation, and technology to the public. The ESA measures company success from services provided video game industry is usually evident through different factors. The ultimate goal is to have every U.S. video games publishing company become a member of our company. That will happen if we continue to support, work, and build the industry through our services to our member companies.......

Words: 3516 - Pages: 15

Premium Essay

Cis 525 Week 10 Term Paper

...CIS 525 WEEK 10 TERM PAPER A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-10-term-paper Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 10 Term Paper, Term Paper: Using Agile Project Management on Mobile Application Development Due Week 10 and worth 150 points Fictitious assumptions and details may be assumed or created for the completion of this assignment. Imagine you are the project manager for a critical project for an organization. The organization wants to implement an application on an iPad and Android Tablet such that the marketing executives and managers can get near real-time updates on how effective their marketing campaigns are doing. Since this project is so critical to the overall financial health of the company, you were asked to complete this project in three (3) months. Your business sponsors are very interested in your approach to manage this project and they are also demanding to see what the project team can deliver on a weekly basis. Due to the tight deadline, the project team was assembled quickly with ten (10) team members of various backgrounds. There are three (3) offshore developers in India and two (2) QA testers in San Francisco, CA. The rest of the project team and the product owner are in Herndon, VA. The team members were unfamiliar with each other. Additionally, there are ethical issues. For example, a developer has been consistently blaming an analyst for his accent......

Words: 653 - Pages: 3

Free Essay

Cis 333 Wk 10 Technical Project Paper

...CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-10-technical-project-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 2. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 4. Identify all potential vulnerabilities that may exist in the documented network. 5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 333 WK 10 Technical Project Paper in order to ace their studies. CIS 333 WK 10 TECHNICAL PROJECT PAPER To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-10-technical-project-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 10 TECHNICAL PROJECT PAPER CIS 333 WK 10 Technical Project Paper - Information Systems Security Write a ten to fifteen (10-15) page paper in which you: 1. Identify and analyze any potential physical......

Words: 496 - Pages: 2

Free Essay

Cis 408 Wk 3 Assignment 1 the Wild Frontier Part 1

...CIS 408 WK 3 ASSIGNMENT 1 THE WILD FRONTIER PART 1 To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-3-assignment-1-the-wild-frontier-part-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 408 WK 3 ASSIGNMENT 1 THE WILD FRONTIER PART 1 CIS 408 WK 3 Assignment 1 - The Wild Frontier, Part 1 Write a three to four (3-4) page proposal paper which covers the following: 1. Differentiate between best uses of Active Directory (AD) versus New Technology File System (NTFS) permissions. 2. Analyze how you would utilize NTFS permissions for security and appropriate access. 3. Compare and contrast the advantages and disadvantages of different application server options. Be specific in your configuration specifications. 4. Choose an application server option that best suits the needs described by the scenario and explain why the application server option you chose is best. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 408 WK 3 Assignment 1 The Wild Frontier Part 1 in order to ace their studies. CIS 408 WK 3 ASSIGNMENT 1 THE WILD FRONTIER PART 1 To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-3-assignment-1-the-wild-frontier-part-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 408 WK 3 ASSIGNMENT 1 THE WILD FRONTIER PART 1 CIS 408 WK 3 Assignment 1 - The Wild Frontier, Part 1 Write a three to four (3-4) page proposal paper which covers the......

Words: 729 - Pages: 3

Free Essay

Cis 417 Week 10 Term Paper

...CIS 417 WEEK 10 TERM PAPER To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: 1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab. 2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. 3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. 4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week......

Words: 784 - Pages: 4

Premium Essay

Cis 462 Wk 10 Term Paper Disaster Recovery Plan

...CIS 462 WK 10 TERM PAPER DISASTER RECOVERY PLAN To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-10-term-paper-disaster-recovery-plan/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 10 TERM PAPER DISASTER RECOVERY PLAN CIS 462 WK 10 Term Paper - Disaster Recovery Plan This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization. Part 1: Written Paper 1. Write a six to eight (6-8) page paper in which you: a. Provide an overview of the organization that will be......

Words: 1069 - Pages: 5

Premium Essay

Cis 517 Wk 11 Final Exam

...CIS 517 WK 11 FINAL EXAM To purchase this visit here: http://www.activitymode.com/ product/cis-517-wk-11-final-exam/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 11 FINAL EXAM CIS 517 WK 11 Final Exam 1. Overrun is the additional percentage amount by which estimates exceed actual costs. 2. The primary output of the planning cost management process is a change request. 3. IT project managers must be able to present and discuss project information both in financial and technical terms. 4. Project managers must conduct cash flow analysis to determine net present value. 5. Intangible costs can be easily measured in monetary terms. 6. When deciding what projects to invest in or continue, one should include sunk costs. 7. It is important for project managers to focus on indirect costs because they can be easily controlled. 8. If an important supplier goes out of business, management reserves can be set aside to cover the resulting costs. 9. Contingency reserves are also known as unknown unknowns. 10. A cost management plan can include organizational procedures links, control thresholds, and process descriptions. 11. A budgetary estimate is the most accurate of the three types of estimates. 12. Budgetary estimates are made even before a project is officially started. 13. Definitive estimates are made one year or less prior to project completion. 14. Estimates should become more accurate as time progresses. 15. Supporting details for an estimate include...

Words: 879 - Pages: 4

Free Essay

Cis 534 Week 10 Term Paper

...CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit......

Words: 600 - Pages: 3

Premium Essay

Bshs 408 Wk 3

...Patterns and Characteristics of the Abuser and the Abused Roseana Martin BSHS/408 May 10, 2016 Timothy Allison-Aipa Patterns and Characteristics of the Abuser and the Abused As a human service professional, it is our responsibility to understand the patterns and characteristics of the abuser and the abused to complete a comprehensive screening. In this paper I will discuss: (1) the patterns and characteristics we, as human service providers, would look for during the screening process of family members of a potentially abused or neglected child, (2) how the characteristics of the abuser differ from the abused, (3) what are the patterns and characteristics we, as human service representatives, would look for while screening a potentially abused or neglected child. (4) How these patterns and characteristics would help in determining the proper assessment, and lastly (5) which methods would we, as human service representatives use these methods in a screening scenario. By the end of this paper we will have a better understanding of the patterns in the characteristics of the abuser and he abused. Patterns and characteristics of abused or neglected children Characteristics of the abuser differ from the abused How characteristics of the abuser differ from the abused Screening a potential abused or neglected child Determining the proper assessment methods Methods used in screening......

Words: 427 - Pages: 2