Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

week 6

(with the correct APA in paragraph Citation)

Policy: Jonathan Hujsak’s chapter on “sustainability’ really tails Hugos closely as it does the previous chapter on green. Many of the arguments in both previous chapters are reincarnate in this chapter.  I do not see much value in re-discussing electricity and the carbon footprint.  I was struck by several aspects of this chapter. The author writes (187): “Information technology holds the promise of revolutionary improvements in global enterprise sustainability that will dramatically enhance enterprise agility, increase operational efficiency, and even turn cost centers into profit centers.”

Several innovations in data management are reshaping the IT landscape. These are discussed in the chapter: server virtualization, storage virtualization, desktop virtualization, and the near future network virtualization. As an executive, the question raised by the chapter regarding virtualization as a sustainability strategy is less than a yes/no, but a when/how. We will ask ourselves, and discuss, the extent to which the virtualization of processing portends the removal of a dedicated IT staff. We will discuss the extent to which the CIO is no longer the manager of a dedicated expert staff, but fully engaged in vendor management and service oversight. Finally we should ask ourselves the extent to which bricks and mortar will even define the corporation as an entity. The corporation, or at least its administrative wing, is more of an abstract. Does it matter if the processing engine of your corporate data is in Bangladesh or Nairobi? Does it matter what flag the vendor’s employees salute or what god they worship? Once we have achieved global network infrastructure stability and redundancy, we may find ourselves seriously questioning our understanding of “corporation” or even employment.

Eisenhardt, K. 1989. Agency Theory: An Assessment and Review. Academy of  Management Review. 14(1), 57-74.

Hujsak, J. (2011.) Sustainability, Technology, and Economic Pragmatism: A View into the Future.  In Stenzel, J. (Ed.)  CIO Best Practices: Enabling Strategic Value with Information Technology (pp. 177-236).Hoboken,  NJ: John Wiley & Sons, Inc.


You can leave a response, or trackback from your own site.

Leave a Reply

week 6

Paper details:The first PC virus was detected in 1986. Earlier viruses during the 1980s and 1990s were easily detectable and less malicious than today’s viruses. Today organised criminals are responsible for most of the threats against networked systems. There are a variety of different ways criminals can attack a networked system. In this Discussion, you will analyse the security issues associated with networked systems. You will also suggest measures to overcome these security threats and prevent future attacks.
To prepare for this Discussion:

• Review your weekly Learning Resources with a focus on networked systems and security threats.
• Watch the TED Talk video, ‘All your devices can be hacked’.
• Research additional security threats to computer networks as needed.
• Reflect on how you could prevent security threats to a network.

To complete this Discussion:
Post: Create an initial post in which you analyse the security issues associated with networked systems. Address the following:

• Analyse the security vulnerabilities commonly associated with network systems.
• Summarise each vulnerability and explain why it is a threat.
• Recommend methods to prevent exploitations of these security vulnerabilities and prevent security attacks.
• Fully state and justify any choices, assumptions or claims that you make using the suggested resources for this week and/or your own research.
Learning Resources :

Laureate Education, (2014) Computer Networks: Week 6 Lecture Notes [Video, Online], (accessed: 11/06/14)

Brookshear, G. (2011) Computer science: An overview. 11th Ed. Boston: Addison Wesley/Pearson.
• Chapter 4, ‘Networking and the Internet’
• Section 4.1, ‘Network Fundamentals’
• Section 4.2, ‘The Internet’
• Section 4.3, ‘The World Wide Web’
• Section 4.5, ‘Security’

Rubin, A. (2012) ‘All your devices can be hacked’, TED [Online]. Available from:http://www.ted.com/playlists/10/who_are_the_hackers (Accessed: 10 March 2014).
Dodge, M. (2007) An atlas of cyberspaces [Online]. Available from:http://www.cybergeography.org/atlas, (Accessed: 26 April 2014).
This is a website dedicated to mapping and creating images of network traffic.

Goertzel, B. (1999) ‘Chapter 1: The network is the computer is the mind’. In: Wild computing [Online]. Available from: http://www.goertzel.org/books/wild/chapNC.html, (Accessed: 26 April 2014)
This article presents the network as the computer

Kurose, J.F. & Ross, K.W. (2010) Computer networking: A top-down approach. 5th ed. Boston, Massachusetts: Addison Wesley. ISBN: 978-0-13-607967-5

The World Wide Web Consortium (2014) W3C website [Online]. Available from:http://www.w3.org, (Accessed: 26 April 2014).
The W3C website provides resources for World Wide Web protocols and guidelines for an international community.

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes