Appendix A
Operating Scenario
GPS/CDU Project for Wild Blue Yonder Technologies
Wild Blue Yonder Technologies Inc (WYBT) is a general holding company whose line of business is tailored to high-tech holdings. Wild Blue Yonder Technologies various subsidiary companies are maintained as one coordinated business from offices in New York City. The centralization of policy and planning direction at one location has historically produced higher revenues, profit margins, and customer satisfaction. The necessary degree of coordination is enabled by a global, enterprise network that is managed from the New York location.
That network provides secure telecommunications capability with embedded firewall protection, multi-carrier cellular access options and automatic access point database updates for all connection types. It enables access to the enterprise’s applications from any location on an as-needed basis. The network also provides integrated, any distance, seamless connectivity to WBYT’s centralized information resources.
WBYT’s holdings are concentrated in
advanced technology products
and services. Two closely held subsidiaries deal exclusively with the Federal government. The line of business of one, which is based in Gaithersburg, Maryland, is R&D and manufacture for advanced capability components for the F 16 Fighting Falcon and F 18 Super Hornet. The other, based in Jacksonville deals in R&D in target acquisition and fire control systems for Army helicopters. There is also a manufacturing facility in Detroit. That facility builds Leopard tanks for the Canadian Army under license from the German government. Other close holdings in WBYT’s empire include a commercial electronics R&D facility in Corvallis. The Corvallis facility also does contract work for the Idaho National Laboratory. In addition to the closely held corporations, there are loosely held electronics manufacturing, or service holdings in Pittsburgh, Houston, Des Moines, Sioux Falls, Denver and Bozeman. These facilities serve the consumer high-tech industry.
Finally, there are a number of loosely held international corporations in India, Australia and across the Pacific Rim, all concentrated in advanced technology. All computer services for that region are provided over
a public/private VPN
, which is maintained for that area in Singapore. The Singapore data center is actually owned and operated by WBYT, as part of the company’s global VPN. The VPN itself is maintained out of the New York office.
According to WBYT’s charter, the primary business goal of the Company is to utilize the global marketplace to provide high quality technology components at the lowest price possible price.
Wild Blue Yonder Technologies entered the market knowing that the ability to closely monitor its operation and deliver competitive business information quickly was going to be a prerequisite to its success, particularly in the integration and reuse of COTS products. In essence, its entire.
Building a Product Security Practice in a DevOps WorldArun Prabhakar
This is a whitepaper on Product Security that largely focusses on building key security capabilities for products that are developed using DevOps methodology. It also consists of an effort to set up and accomplish the governance of Product Security in the DevOps world.
3 Misconceptions Ruining The DevSecOps IntegrationEnov8
Every IT company aspires to be on every media agency's "hot news" and "latest headline" section, but not with such negative news. That's why DevSecOps security was introduced.
Quality Management, Information Security, Threat Hunting and Mitigation Plans for a Software Company or a Technology Start-up engaged in building, deploying or consulting in Software and Internet Applications.
Selecting an App Security Testing Partner: An eGuideHCLSoftware
In the age of digital transformation, global businesses leverage web application scanning tools to shape innovative employee cultures, business processes, and customer experiences. The surge in remote work, cloud computing, and online services unveils unprecedented vulnerabilities and threats.
Learn more: https://hclsw.co/ftpwvz
Procuring an Application Security Testing PartnerHCLSoftware
Procuring an Application Security Testing Partner is crucial for safeguarding digital assets. An Application Security Testing Partner specializes in conducting comprehensive assessments using keywords like vulnerability scanning, penetration testing, code review, and threat modeling. Their expertise ensures your applications are fortified against cyber threats, providing peace of mind in an increasingly interconnected digital landscape.
Learn More: https://hclsw.co/ftpwvz
Building a Product Security Practice in a DevOps WorldArun Prabhakar
This is a whitepaper on Product Security that largely focusses on building key security capabilities for products that are developed using DevOps methodology. It also consists of an effort to set up and accomplish the governance of Product Security in the DevOps world.
3 Misconceptions Ruining The DevSecOps IntegrationEnov8
Every IT company aspires to be on every media agency's "hot news" and "latest headline" section, but not with such negative news. That's why DevSecOps security was introduced.
Quality Management, Information Security, Threat Hunting and Mitigation Plans for a Software Company or a Technology Start-up engaged in building, deploying or consulting in Software and Internet Applications.
Selecting an App Security Testing Partner: An eGuideHCLSoftware
In the age of digital transformation, global businesses leverage web application scanning tools to shape innovative employee cultures, business processes, and customer experiences. The surge in remote work, cloud computing, and online services unveils unprecedented vulnerabilities and threats.
Learn more: https://hclsw.co/ftpwvz
Procuring an Application Security Testing PartnerHCLSoftware
Procuring an Application Security Testing Partner is crucial for safeguarding digital assets. An Application Security Testing Partner specializes in conducting comprehensive assessments using keywords like vulnerability scanning, penetration testing, code review, and threat modeling. Their expertise ensures your applications are fortified against cyber threats, providing peace of mind in an increasingly interconnected digital landscape.
Learn More: https://hclsw.co/ftpwvz
software product development services.pdfXlogia Tech
"xLogia Tech - Software development services are essential for several reasons in today's digital landscape. First and foremost, businesses and organizations increasingly rely on custom software solutions to meet their unique needs and challenges. Off-the-shelf software may not provide the specific functionalities required for a particular business process or industry, necessitating the development of tailored solutions.
Moreover, technology is constantly evolving, and staying competitive requires adopting the latest advancements. Software development services enable businesses to leverage emerging technologies such as artificial intelligence, machine learning, blockchain, and the Internet of Things (IoT) to enhance efficiency, automate processes, and gain a competitive edge."
The Business Conundrum Facing Manufacturers
Manufacturing companies have traditionally
had an on-again-off-again relationship with
technology. However, the paradigm shift driven
by global manufacturing and distribution,
combined with rapid digital innovation, is
changing this equation.
Manufacturing companies have traditionally
had an on-again-off-again relationship with
technology. However, the paradigm shift driven
by global manufacturing and distribution,
combined with rapid digital innovation, is
changing this equation. Deloitte’s 2016 MHI
survey reveals that 83% of manufacturing
organizations believe investing in key digital
technologies such as IoT, robotics, Big
Data, cloud computing, etc. will be key to
competitive advantage in the near future.1
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
How Can Your Organization Benefit From Application Modernization_.pdfAnil
Application modernization refers to the process of updating or transforming legacy software applications to make them more contemporary, efficient, and aligned with current business needs and technology trends. Adopting application modernization can bring several benefits to an organization
Modelling Determinants of Software Development Outsourcing for NigeriaIJMTST Journal
Software Development Outsourcing is one of the common practices in global business operations today; a
practice that has to a large extent changed the landscape of IT services in Nigeria. This research predicts a
fitted model using a number of success factors, for software development outsourcing in Nigeria. The
researchers adopted six success factors (Cost Saving and Financial Stability, Effective Communication and
Trust, Technical Expertise and Knowledge Transfer, Understanding Software Development Outsourcing
Industry, Effective Software Privacy and Security, and Overcome Cultural Barrier) for use from a prior study
carried out using factor analysis; and these six success factors were analysed using multiple regression to
determine those that are critical for software development outsourcing. The result of the analysis indicates
that both individually and collectively, the six success factors are all critical to software development
outsourcing in Nigeria. A model was thus derived to predict successful software development outsourcing;
휸 = −ퟏ. ퟏퟎퟗ + ퟎ. ퟐퟏퟏ푿₁ + ퟎ. ퟐퟑퟒ푿₂ + ퟎ. ퟐퟐퟓ푿₃ + ퟎ. ퟐퟓퟐ푿₄ + ퟎ. ퟏퟗퟔ푿₅ + 0.188푿₆, with 휸denoting the predicted
outcome (successful software development outsourcing), and 푋₁ to 푋₆ denotes the six independent predictor
variables. IT Businesses and organizations in Nigeria should therefore pay maximum attention to these
critical success factors in other to achieve a significant stride in outsourcing the development of their
software. In addition, the result of this research can be applied in further studies as well as in literatures.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
InnoviMobile outlines our Mobile Action Plan for mobilizing data in the enterprise. The end goal is to unlock productivity gains by enabling workers to do their jobs and use their line of business applications more effectively.
SpiderLogic provides software architecture, development and consulting services through its development labs located in Milwaukee, WI, Minneapolis, MN, Pune and Bangalore, India.
SpiderLogic provides software architecture, development and consulting services through its development labs located in Milwaukee, WI, Minneapolis, MN, Pune and Bangalore, India.
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
Project Quality-SIPOC
Select a process of your choice and create a SIPOC for this process. Explain the utility of a SIPOC in the context of project management.
(
Application security in large enterprises (part 2)
Student Name:
) (
Instructor Name
)
Detailed Description:
Large enterprises of a thousand persons or more often have distinctly distinct data security architectures than lesser businesses. Typically they treat their data security as if they were still little companies.
This paper endeavors to demonstrate that not only do large businesses have an entire ecology of focused programs, specific to large businesses and their needs, but that this software has distinct security implications than buyer or small enterprise software. identifying these dissimilarities, and analyzing the way this can be taken advantage of by an attacker, is the key to both striking and keeping safe a large enterprise.
The Web applications are the important part of your business every day, they help you handle your intellectual property, increase your sales, and keep the trust of your customers. But there's the problem that applications re fast becoming the preferred attack vector of hackers. For this you really need something that makes your application secure.
And, with the persistent condition of today's attacks, applications can easily be get infected when security is not considered and scoped into each phase of the software development life cycle, from design to development to testing and ongoing maintenance of the application. When you take a holistic approach to your application security, you actually enhance your ability to produce and manage stable, secure applications. Applications need training and testing from the leading team of ethical hackers, for this there should be an authentic plan to recover these issues that can help an organization to plan, test, build and run applications smartly and safely.
Large enterprises of a thousand people or even more have distinctly different information security architectures than many other smaller companies. Actually, they treat their information security as if they were still small companies.
We are going to discuss some attempts to demonstrate that not only do large companies have an entire ecology of specialized software, specific to large companies and their needs, but that this software has different security implications than consumer or small business software for the applications. Recognizing these differences, and examining the way this can be taken advantage of by an attacker, is the key to both attacking and defending a large enterprise. It’s really important to cover up the security procedures in the large enterprise.
Key Features:
· Web application security checking from development through output
· Security check web APIs and world wide web services that support your enterprise
· Effortlessly organize, view and share security-test outcomes and histories
· Endow broader lifecycle adoption th ...
Appendix A Peer Review Feedback Form 1Reviewer’s Name _Date _.docxlisandrai1k
Appendix A: Peer Review Feedback Form 1
Reviewer’s Name: _
Date: __
Writer’s Assigned #: _
Course:____
Section:__
Assignment
3:
PersuasivePaper
Part
1:A
Problem
Exists
Peer
reviews
should
provide
feedback
toapeeronthe
criteria
expectedinthe
paper.
Followthese
instructions:
1)
Receive
aclassmate’spaper
from
your
professor(inclass
if
on-ground;
by
e-mail
if
online).
2)
Copy
thePeerReviewFeedback
Form
from
the
Appendix.
3)
Comment
on
allcriteria,notingstrengths
and
/
or
areasforimprovement
on
thefeedbackform.
4)
Provide
completedPeerReviewFeedback
Form
and
classmate’s
paperto
your
professor.
Note
:
On-groundstudents
should
submit
the
feedbackform
and
papertotheprofessorduringthe
class
meetingin
which
thepaper
is
reviewed;
online
students
should
submit
the
feedback
form
and
paper
totheprofessorviatheAssignmentTab
in
thecourseshell.
Criteria
+ Strengths
Comments < Areas for Improvement
1.
Provide
an
appropriate
title
and
an
interesting
opening
paragraph
to
appeal
to
your
stated
audience
(appeal
with
logic,
ethics,
or
emotion).
2.
Include
a
defensible,
relevant
thesis
statement
inthe
first
paragraph.
(With
revised
thesis
statement.)
3. Describe
the
history
and
status
of
the
issue
and
provide
an
overview
of the
problem(s)
that
need
to
be
addressed.
This
should
beoneor
two
(1-2)
paragraphs.
4.
Explain
the
first
problem
(economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)and
provide
support
for
your
claims.
This should
be
one
or
two
(1-
2) paragraphs.
5.
Explain
the
second
problem
(economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)
and
provide
support
for
your
claims.
This should
beone or
two
(1-2)
paragraphs.
6.
Explain
the
third
problem (economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)and
provide
support
for
your
claims.
This should
be
one
or
two
(1-2)
paragraphs.
7. Use effective transitional words, phrases, and sentences throughout the paper.
8.
Provide
a
concluding
paragraph
that
summarizes
the
stated
problems
and
promises
a
solution.
9. Develop a coherently structured paper with an introduction, body, and conclusion
10. Support
claims
with
at
least
three
(3)
quality,
relevant
references.
Use
credible,
academic
sources available
through
Strayer
University’s
Resource
Center.
11. Other
The Case Against Instant Replay
Muyiwa Fagbami
Professor Virginia Rodriguez
ENG 215 – Research and Writing
11/06/2016
The Case Against Instant Replay
Professional sports are a cornerstone of several global cultures. In the USA, the NFL, NBA, MLB, and to a lesser extent, the NHL are major industries that draw large in-person and televised audiences, and sell billions of dollars of merchandise, TV rights, sponsorships and endorsements, among other things. In the British commonwealth, cricket and rugby are huge draws, and soccer dominates t.
Appeals ProcessDespite the efforts to submit claims that are.docxlisandrai1k
Appeals Process
Despite the efforts to submit claims that are "clean," denials, rejections, and partial payments will occur. When a facility receives a denial, rejection, or partial payment, a determination will need to be made regarding the action to be taken by the facility (accept the denial, rejection, or partial payment, resubmit the claim, or appeal).
For each reason in the table you downloaded, indicate the appropriate action (accept the denial, rejection, or partial payment, resubmit the claim, or appeal) and provide the rationale for your decision.
.
More Related Content
Similar to Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
software product development services.pdfXlogia Tech
"xLogia Tech - Software development services are essential for several reasons in today's digital landscape. First and foremost, businesses and organizations increasingly rely on custom software solutions to meet their unique needs and challenges. Off-the-shelf software may not provide the specific functionalities required for a particular business process or industry, necessitating the development of tailored solutions.
Moreover, technology is constantly evolving, and staying competitive requires adopting the latest advancements. Software development services enable businesses to leverage emerging technologies such as artificial intelligence, machine learning, blockchain, and the Internet of Things (IoT) to enhance efficiency, automate processes, and gain a competitive edge."
The Business Conundrum Facing Manufacturers
Manufacturing companies have traditionally
had an on-again-off-again relationship with
technology. However, the paradigm shift driven
by global manufacturing and distribution,
combined with rapid digital innovation, is
changing this equation.
Manufacturing companies have traditionally
had an on-again-off-again relationship with
technology. However, the paradigm shift driven
by global manufacturing and distribution,
combined with rapid digital innovation, is
changing this equation. Deloitte’s 2016 MHI
survey reveals that 83% of manufacturing
organizations believe investing in key digital
technologies such as IoT, robotics, Big
Data, cloud computing, etc. will be key to
competitive advantage in the near future.1
DevOps for Highly Regulated EnvironmentsDevOps.com
Financial institutions, medical groups, governmental organizations, automotive companies… these types of entities all have unique and sometimes difficult-to-meet regulations. You may be required to have fine-grained auditability of your SDLC or maintain specific third-party integrations. Security models may be heightened, or certain types of compliance processes maintained. So how are we supposed to “do the DevOps” when we have so many things to worry about? In this webinar, we’ll explore some ways that you can adopt DevOps best practices and even (gasp!) thrive when building your DevOps and DevSecOps pipelines in highly-regulated industries.
How Can Your Organization Benefit From Application Modernization_.pdfAnil
Application modernization refers to the process of updating or transforming legacy software applications to make them more contemporary, efficient, and aligned with current business needs and technology trends. Adopting application modernization can bring several benefits to an organization
Modelling Determinants of Software Development Outsourcing for NigeriaIJMTST Journal
Software Development Outsourcing is one of the common practices in global business operations today; a
practice that has to a large extent changed the landscape of IT services in Nigeria. This research predicts a
fitted model using a number of success factors, for software development outsourcing in Nigeria. The
researchers adopted six success factors (Cost Saving and Financial Stability, Effective Communication and
Trust, Technical Expertise and Knowledge Transfer, Understanding Software Development Outsourcing
Industry, Effective Software Privacy and Security, and Overcome Cultural Barrier) for use from a prior study
carried out using factor analysis; and these six success factors were analysed using multiple regression to
determine those that are critical for software development outsourcing. The result of the analysis indicates
that both individually and collectively, the six success factors are all critical to software development
outsourcing in Nigeria. A model was thus derived to predict successful software development outsourcing;
휸 = −ퟏ. ퟏퟎퟗ + ퟎ. ퟐퟏퟏ푿₁ + ퟎ. ퟐퟑퟒ푿₂ + ퟎ. ퟐퟐퟓ푿₃ + ퟎ. ퟐퟓퟐ푿₄ + ퟎ. ퟏퟗퟔ푿₅ + 0.188푿₆, with 휸denoting the predicted
outcome (successful software development outsourcing), and 푋₁ to 푋₆ denotes the six independent predictor
variables. IT Businesses and organizations in Nigeria should therefore pay maximum attention to these
critical success factors in other to achieve a significant stride in outsourcing the development of their
software. In addition, the result of this research can be applied in further studies as well as in literatures.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
InnoviMobile outlines our Mobile Action Plan for mobilizing data in the enterprise. The end goal is to unlock productivity gains by enabling workers to do their jobs and use their line of business applications more effectively.
SpiderLogic provides software architecture, development and consulting services through its development labs located in Milwaukee, WI, Minneapolis, MN, Pune and Bangalore, India.
SpiderLogic provides software architecture, development and consulting services through its development labs located in Milwaukee, WI, Minneapolis, MN, Pune and Bangalore, India.
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
Project Quality-SIPOC
Select a process of your choice and create a SIPOC for this process. Explain the utility of a SIPOC in the context of project management.
(
Application security in large enterprises (part 2)
Student Name:
) (
Instructor Name
)
Detailed Description:
Large enterprises of a thousand persons or more often have distinctly distinct data security architectures than lesser businesses. Typically they treat their data security as if they were still little companies.
This paper endeavors to demonstrate that not only do large businesses have an entire ecology of focused programs, specific to large businesses and their needs, but that this software has distinct security implications than buyer or small enterprise software. identifying these dissimilarities, and analyzing the way this can be taken advantage of by an attacker, is the key to both striking and keeping safe a large enterprise.
The Web applications are the important part of your business every day, they help you handle your intellectual property, increase your sales, and keep the trust of your customers. But there's the problem that applications re fast becoming the preferred attack vector of hackers. For this you really need something that makes your application secure.
And, with the persistent condition of today's attacks, applications can easily be get infected when security is not considered and scoped into each phase of the software development life cycle, from design to development to testing and ongoing maintenance of the application. When you take a holistic approach to your application security, you actually enhance your ability to produce and manage stable, secure applications. Applications need training and testing from the leading team of ethical hackers, for this there should be an authentic plan to recover these issues that can help an organization to plan, test, build and run applications smartly and safely.
Large enterprises of a thousand people or even more have distinctly different information security architectures than many other smaller companies. Actually, they treat their information security as if they were still small companies.
We are going to discuss some attempts to demonstrate that not only do large companies have an entire ecology of specialized software, specific to large companies and their needs, but that this software has different security implications than consumer or small business software for the applications. Recognizing these differences, and examining the way this can be taken advantage of by an attacker, is the key to both attacking and defending a large enterprise. It’s really important to cover up the security procedures in the large enterprise.
Key Features:
· Web application security checking from development through output
· Security check web APIs and world wide web services that support your enterprise
· Effortlessly organize, view and share security-test outcomes and histories
· Endow broader lifecycle adoption th ...
Similar to Appendix AOperating ScenarioGPSCDU Project for Wild B.docx (20)
Appendix A Peer Review Feedback Form 1Reviewer’s Name _Date _.docxlisandrai1k
Appendix A: Peer Review Feedback Form 1
Reviewer’s Name: _
Date: __
Writer’s Assigned #: _
Course:____
Section:__
Assignment
3:
PersuasivePaper
Part
1:A
Problem
Exists
Peer
reviews
should
provide
feedback
toapeeronthe
criteria
expectedinthe
paper.
Followthese
instructions:
1)
Receive
aclassmate’spaper
from
your
professor(inclass
if
on-ground;
by
e-mail
if
online).
2)
Copy
thePeerReviewFeedback
Form
from
the
Appendix.
3)
Comment
on
allcriteria,notingstrengths
and
/
or
areasforimprovement
on
thefeedbackform.
4)
Provide
completedPeerReviewFeedback
Form
and
classmate’s
paperto
your
professor.
Note
:
On-groundstudents
should
submit
the
feedbackform
and
papertotheprofessorduringthe
class
meetingin
which
thepaper
is
reviewed;
online
students
should
submit
the
feedback
form
and
paper
totheprofessorviatheAssignmentTab
in
thecourseshell.
Criteria
+ Strengths
Comments < Areas for Improvement
1.
Provide
an
appropriate
title
and
an
interesting
opening
paragraph
to
appeal
to
your
stated
audience
(appeal
with
logic,
ethics,
or
emotion).
2.
Include
a
defensible,
relevant
thesis
statement
inthe
first
paragraph.
(With
revised
thesis
statement.)
3. Describe
the
history
and
status
of
the
issue
and
provide
an
overview
of the
problem(s)
that
need
to
be
addressed.
This
should
beoneor
two
(1-2)
paragraphs.
4.
Explain
the
first
problem
(economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)and
provide
support
for
your
claims.
This should
be
one
or
two
(1-
2) paragraphs.
5.
Explain
the
second
problem
(economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)
and
provide
support
for
your
claims.
This should
beone or
two
(1-2)
paragraphs.
6.
Explain
the
third
problem (economic,
social,
political,
environmental,
complexity,
inequity,
ethical/moral,
etc.)and
provide
support
for
your
claims.
This should
be
one
or
two
(1-2)
paragraphs.
7. Use effective transitional words, phrases, and sentences throughout the paper.
8.
Provide
a
concluding
paragraph
that
summarizes
the
stated
problems
and
promises
a
solution.
9. Develop a coherently structured paper with an introduction, body, and conclusion
10. Support
claims
with
at
least
three
(3)
quality,
relevant
references.
Use
credible,
academic
sources available
through
Strayer
University’s
Resource
Center.
11. Other
The Case Against Instant Replay
Muyiwa Fagbami
Professor Virginia Rodriguez
ENG 215 – Research and Writing
11/06/2016
The Case Against Instant Replay
Professional sports are a cornerstone of several global cultures. In the USA, the NFL, NBA, MLB, and to a lesser extent, the NHL are major industries that draw large in-person and televised audiences, and sell billions of dollars of merchandise, TV rights, sponsorships and endorsements, among other things. In the British commonwealth, cricket and rugby are huge draws, and soccer dominates t.
Appeals ProcessDespite the efforts to submit claims that are.docxlisandrai1k
Appeals Process
Despite the efforts to submit claims that are "clean," denials, rejections, and partial payments will occur. When a facility receives a denial, rejection, or partial payment, a determination will need to be made regarding the action to be taken by the facility (accept the denial, rejection, or partial payment, resubmit the claim, or appeal).
For each reason in the table you downloaded, indicate the appropriate action (accept the denial, rejection, or partial payment, resubmit the claim, or appeal) and provide the rationale for your decision.
.
Application Assignment 2 Part 2 - Developing an Advocacy Campai.docxlisandrai1k
Application Assignment 2: Part 2 -
Developing an Advocacy Campaign
To prepare:
·
Review Chapter 3 of Milstead, J. A. (2012).
Health policy and politics: A nurse’s guide
(Laureate Education, Inc., custom ed.). Sudbury, MA: Jones and Bartlett Publishers
·
In the first assignment, you reflected on whether the policy you would like to promote could best be achieved through the development of new legislation, or a change in an existing law or regulation. Refine as necessary using any feedback from your first paper.
·
Contemplate how existing laws or regulations may affect how you proceed in advocating for your proposed policy.
·
Consider how you could influence legislators or other policymakers to enact the policy you propose.
·
Think about the obstacles of the legislative process that may prevent your proposed policy from being implemented as intended.
To complete:
Part Two will have 4 pages of content plus a title page and references (MINIMUM OF 4 REFERENCES FROM THE REQUIRED READING BELOW).
Part Two will address the following:
·
Explain whether your proposed policy could be enacted through a modification of existing law or regulation or the creation of new legislation/regulation.
·
Explain how existing laws or regulations could affect your advocacy efforts. Be sure to cite and reference the laws and regulations using primary sources.
·
Provide an analysis of the methods you could use to influence legislators or other policymakers to support your policy. In particular, explain how you would use the “three legs” of lobbying in your advocacy efforts.
o
Summarize obstacles that could arise in the legislative process and how to overcome these hurdles
.
REREFERENCES
sr
MMilstead, J. A. (2013).
Health policy and politics: A nurse’s guide
(Laureate Education, Inc., custom ed.). Sudbury, MA: Jones and Bartlett Publishers.
Chapter 1, “Advanced Practice Nurses and Public Policy, Naturally” (pp. 1–27)
This chapter explains public policy and the nurse’s role in directing health care issues to the government and securing a response.
Chapter 2, “Agenda Setting” (pp. 19–44)
This chapter provides examples of the process of moving a problem to the attention of the government so the solution can be considered at the state and federal levels.
Chapter 3, “Government Response: Legislation—Politics: Playing the Game” (pp. 45–71)
This chapter explores the multiple factors that influence the development of public policy through the legislative branch of government.
Coalition for Patients’ Rights. (2012). Retrieved from http://www.patientsrightscoalition.org/
This website details the initiative of the Coalition for Patients’ Rights, which seeks to ensure that patients everywhere have access to the quality health care providers of their choice.
University of Washington School of Medicine. (n.d.)
Ethics in medicine: Managed care
. Retrieved from http://depts.washington.edu/bioethx/topics/manag.html
This article explains the effects and ethica.
APA writing STYLE & Formatting REQUIRED explanation of how gender mi.docxlisandrai1k
APA writing STYLE & Formatting REQUIRED explanation of how gender might affect two of the following: friendship, attraction, entering a relationship, or relationship satisfaction. Then explain whether you agree or disagree with the research you selected regarding gender and relationships and why. Be specific and use the current literature to support your response. references Course Text: Fiske, S. T. (2014). Social beings: Core motives in social psychology. (3rd ed.). Hoboken, NJ: Wiley. Chapter 9, �Helping: Prosocial Behavior� Course Text: The Sage handbook of social psychology Chapter 10, �Interpersonal Attraction and Intimate Relationships� Book Excerpt: Crisp, R. J., & Turner, R. N. (2010). Chapter 12: Friendship and love. In Essential social psychology (2nd ed.). Los Angeles, CA: Sage.
.
APA writing STYLE & Formatting REQUIRED explanation of how gender .docxlisandrai1k
APA writing STYLE & Formatting REQUIRED explanation of how gender might affect two of the following: friendship, attraction, entering a relationship, or relationship satisfaction. Then explain whether you agree or disagree with the research you selected regarding gender and relationships and why. Be specific and use the current literature to support your response. references Course Text: Fiske, S. T. (2014). Social beings: Core motives in social psychology. (3rd ed.). Hoboken, NJ: Wiley. Chapter 9, �Helping: Prosocial Behavior� Course Text: The Sage handbook of social psychology Chapter 10, �Interpersonal Attraction and Intimate Relationships� Book Excerpt: Crisp, R. J., & Turner, R. N. (2010). Chapter 12: Friendship and love. In Essential social psychology (2nd ed.). Los Angeles, CA: Sage.
.
APA Style Universal Design for Learning and its relationship to sp.docxlisandrai1k
APA Style
Universal Design for Learning and its relationship to special education student
How can Universal Design for Learning help meet the needs of all your Special Needs children on your current caseload? I have a class of third graders and my current load consist of three Intellectually disabled students, four emotionally disturbed students and four other health related. They all require me to do pull-out minutes daily. I have two of them that sleep most of the day. One is homeless and the other the parents are involved but there are three other disabled brothers with the same issues. I have six of them that fight very often of which two are female. How can the regular education teacher implement Universal Design for Learning to help the children that I service?
.
APA nursing essay and APA nursing power point due Wednesday 31721 .docxlisandrai1k
APA nursing essay and APA nursing power point due Wednesday 3/17/21 by 8 a.m. My topics are listed below for each assignment..
References should include Foundation of nursing book 8th edition Cooper and Gosnell.
Clayton's Basic Pharmacology edition 18 Willihnganz, Gurevitz and Clayton.
Nursing interventions & Clinical Skills & 7th edition Perry, Potter and Ostendorf.
Nanda list uploaded for approved nursing diagnosis outline for APA paper and power point is uploaded also APA paper. I also attached the outline.
APA PAPER CONCEPT - Hygiene for Bedridden/unconscious pts
APA PRESENTATION CONCEPT - Mental Health Assessment/Safety
.
APA power point and APA nursing essay due in 40 hours. topics are li.docxlisandrai1k
APA power point and APA nursing essay due in 40 hours. topics are listed below for each assignment
References should include Foundations of nursing book 8th edition cooper and Gosnell and others of choice.
NANDA LIST uploaded for approved nursing diagnosis
outline for APA paper and powerpoint is uploaded also
APA paper
Teaching Medications for an Elderly Patient
APA powerpoint
Therapeutic Communication and an Angry Patient
.
APA formatDue in 1 hourNeed 5 sociological resources a.docxlisandrai1k
APA format
Due in 1 hour
Need 5
sociological
resources about
sociology on
digital technology relating to
social media, education and employment.
key sociological concepts and theories while demonstrating the sociological perspective throughout as related to digital technology
The five sources should be in APA format.
Under each reference, provide
one paragraph for each reference
discussing how you plan on using that reference and how it relates to your paper topic.
.
APA Format4 Citations from Peer Reviewed Journals MinimumIn.docxlisandrai1k
APA Format:
4 Citations from Peer Reviewed Journals Minimum
In at least 600 words, discuss the differences between quantitative, qualitative, and mixed methods research methodology.
Text Book
Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches (4th ed.). Thousand Oaks, CA: Sage.
.
APA formatDue in 1 hourNeed 5 sociological resources.docxlisandrai1k
APA format
Due in 1 hour
Need 5
sociological
resources about
sociology on
digital technology relating to
social media, education and employment.
key sociological concepts and theories while demonstrating the sociological perspective throughout as related to digital technology
The five sources should be in APA format.
Under each reference, provide
one paragraph for each reference
discussing how you plan on using that reference and how it relates to your paper topic.
.
APA Format1-Define key terms in epidemiology, community health, an.docxlisandrai1k
APA Format
1-Define key terms in epidemiology, community health, and population-based research. (PO 1, 4)
2-Identify important sources of epidemiological data. (PO 4)
Sources:
Gordis, L. (2014
). Epidemiology
(5th ed.). Philadelphia, PA: Elsevier
Chapter 1: Introduction
Chapter 2: Dynamics of Disease Transmission
Chapter 3: The Occurrence of Disease: I. Disease Surveillance and Measures of Morbidity.
Chapter 4: The Occurrence of Disease: II. Mortality and Other Measures of Disease Impact.
National Notifiable Disease Surveillance System
Healthy People 2020
Morbidity and Mortality Weekly Report homepage (MMWR)
.
APA FORMAT4-5 pagesConsider, hypothetically, a small community.docxlisandrai1k
APA FORMAT
4-5 pages
Consider, hypothetically, a small community called Plainsville, Colorado, which has a critical rail line running through it. On this line, hazardous chemicals are routinely transported en route to a neighboring community (Southtown) where they are crucial for industrial use in manufacturing a certain type of nuclear defect x-ray material that is made nowhere else in the world. The rail line was first laid in the late 1800s and has been patchily maintained over its life.
Given new priorities through Department of Homeland Security (DHS) Grant Programs and state mandates, both the Plainsville community leaders and operators of the railway are concerned with increasing vulnerabilities associated with rail transport because there is evidence of structural decline due to its age and uneven maintenance. Serious damage to, or degradation of, the line in the vicinity of Plainsville might be catastrophic with worst-case consequences including: irreparable destruction of the rail; a train derailment; a chemical spill; the creation of a hazardous environment for people, livestock, and agriculture; disruption of the industrial manufacturing in Southland; and the possible economic crippling of the entire area. Any of these components alone could result in a crisis; yet a combination of these, or if combined in totality, would be a scenario considered unimaginable by Plainsville’s leadership and emergency management personnel.
By way of background, Plainsville has a "strong" mayor, meaning she is elected by the people rather than chosen by a council, etc. Based upon DHS grant dollars that have trickled down through her state and all-hazards homeland security region, Mayor Witley has determined that a commission in the form of a short-term task force should look at the vulnerabilities associated with the rail line. The commission would take the scenario outlined above, consider its many variations, study possible consequences while articulating and researching the problem(s) and receiving testimony from experts, and then make recommendations about courses of action to prevent, mitigate, or respond to any resultant crisis.
The issues at hand for the community include the integrity of the rail line, the prevention of a hazardous spill, the safety of the citizens, and the continuity of the neighboring town’s industry. (More issues may exist, but this gets you started.)
Consider and list at least 10 potential organizations that would either provide a representative to sit on the commission or that would provide information to the commission.
When listing each partner, describe his, her, or its value to the commission and what expectations the mayor (and others) might have as to the expertise, capabilities, resources, or anything else an individual or agency might contribute.
Choose the most relevant entities or individual experts you can, and think about everything from a public safety and emergency management perspective.
Your answer m.
apa format. due sunday. 2-3 pages. grammer is correct. introduction .docxlisandrai1k
apa format. due sunday. 2-3 pages. grammer is correct. introduction and conclusion. 2 refrences at least
You have been asked to explain the differences between certain categories of crimes. For each of the following categories of crime, provide a general definition of the category of crime and give at least two detailed examples of specific crimes that fall into each category:
Crimes against persons
Crimes against property
Crimes of public morality
White-collar crime
Cyber crime
Then for the following scenarios, discuss the categories of crimes involved in each scenario and explain the specific criminal charges that you would apply to each scenario. You can utilize the Library, Internet and other resources to research the criminal statutes of a state of your choice in order to help you determine which criminal charges should be applied:
David S. was running around a public park without his clothes on, singing and shouting loudly, at 3 in the morning. Police arrived after neighbors called to complain. They saw David S. tipping over a garbage can and when they shouted for him to stop, he threw the garbage can into a car, breaking one of its side windows. The police arrested David S, His blood alcohol level was twice the legal limit.
Gary M. was arrested by the FBI when he showed up at a local mall to meet a "14 year old girl" for a date, which he arranged over the Internet. He didn't know that the "14 year old girl" was actually a 35-year old male FBI agent.
Elaine R. was an accountant working for a large corporation. She had been falsifying the accounting records and sending some of the corporate funds to her own bank accounts in an offshore bank. The corporation found out what she had been doing and reported her to the police.
.
APA format, minimum 3 pages +title,referencePlease Answer Follow.docxlisandrai1k
APA format, minimum 3 pages +title,reference
Please Answer Following Questions
1. Describe what are the 3 conditions that are likely to be present when a fraud occurs.
2. Which of the three conditions do you think have been the most prevalent at Enron's case and why?
3. Why the auditor of Enron did not detect the fraud?
.
APA format, 2 pages, reference page, and cover page. Prompt below, a.docxlisandrai1k
APA format, 2 pages, reference page, and cover page. Prompt below, all relevent files are attached.
Prompt:
Considering the financial components of healthcare marketing, reflect on the process that hospitals and other healthcare organizations go through to determine whether to outsource marketing. In your opinion, what are some pros and cons to hiring outside marketing versus keeping it internal? Include any personal experience you have with either method.
.
APA Format Please keep plagiarism at 22 or less assignment sent.docxlisandrai1k
APA Format
**Please keep plagiarism at 22% or less assignment sent through TurnItIN &Vercite **
1 page Paper
Research the areas and/or populations (e.g. homeless population, domestic violence, etc.) you are interested in supporting as a helper. Identify the support systems already in place (agencies, hospitals, government, etc.) near you.
.
APA format in WordNo minimum word count.9 questions, some are 2 .docxlisandrai1k
APA format in Word
No minimum word count.
9 questions, some are 2 parts.
Reference:
Abbott, P. (2013)
Natural Disasters
9th edition. McGraw-Hill.
Equilibrium Stream, Flash vs. Regional Floods, & Urbanization Effects
The 1993 Mississippi River flood
Assign. 1. In a narrative format, discuss the key facts and critical issues presented.
2. 1. What were the weather conditions that produced the flood? How long did the flood water take to pass through the entire river system?
2. What measures were taken to protect cities from flooding?
3. Control of flood waters requires that many decisions be made. Should more miles of levees be built? Should existing levees be built higher? Should the river bottom be dredged deeper?
Should more flood waters be diverted out of the river channel into farmland and rural communities? Should the river course be shortened by cutting through meander bends?
Evaluate each of your decisions against the knowledge that the river is an equilibrium system that will work against some human constructions.
Wildfire & Fire Fighting; Mass Movements & Gravity
The 2007 Witch Creek fire in Southern California
4.
In a narrative format, discuss the key facts and critical issues presented.
5. 1. What are the damage statistics of the Witch Creek fire? Was it fuel or wind driven? Why is the chaparral vegetation of the area so prone to burn?
2. What were the lessons learned from "The Trails" housing development?
6. How could The Trails subdivision been designed and built in ways to avoid having so many houses catch fire? How can you protect a house from flying embers?
Subsidence & Falls; Flows of Rock & Snow; Slides & Mitigation
The 2014 "Oso mudslide" in Washington
7.
In a narrative format, discuss the key facts and critical issues presented.
8. 1. The "Oso mudslide" was actually two separate events that occurred a few minutes apart. Describe what the earth/rock/mud did during each part of each event [Hint: neither was a mudslide.
2. What role did the river play in setting up the slope failure? Why were the rocks in the hill so weak? What were they? How old were they?
9. What could / would you say to convince strong-minded people living in a beautiful rural setting in an unincorporated area that their landslide threat was so dangerous that they should give up their houses and land and move somewhere else?
.
APA format Due in 4 hours.1. Explain the key characteristics and p.docxlisandrai1k
APA format Due in 4 hours.
1. Explain the key characteristics and philosophical foundations (what contributed to the origins or the start of the ideology) of liberalism, conservatism, socialism, and fascism.
Your response should be at least 500 words in length.
2.
Explain the difference between American liberalism and American conservatism. How is each of these influenced by liberalism?
Your response should be at least 200 words in length.
3.
Explain the relationship between power and choice in the field of political science.
Your response should be at least 75 words in length.
.
APA format at least 250 words, including at lease 2 references one f.docxlisandrai1k
APA format at least 250 words, including at lease 2 references one from :
Henslin, James M. (08/2013). Social Problems: A Down to Earth Approach, 8th Edition.
The Discussion will focus on the discrepancy of wealth and poverty in the United States. Please respond to the following questions:
What impact does the discrepancy between wealth and poverty in the United States have on society?
What are some of the emotional and physical consequences of poverty on individuals?
.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
1. Appendix A
Operating Scenario
GPS/CDU Project for Wild Blue Yonder Technologies
Wild Blue Yonder Technologies Inc (WYBT) is a general
holding company whose line of business is tailored to high-tech
holdings. Wild Blue Yonder Technologies various subsidiary
companies are maintained as one coordinated business from
offices in New York City. The centralization of policy and
planning direction at one location has historically produced
higher revenues, profit margins, and customer satisfaction. The
necessary degree of coordination is enabled by a global,
enterprise network that is managed from the New York location.
That network provides secure telecommunications capability
with embedded firewall protection, multi-carrier cellular access
options and automatic access point database updates for all
connection types. It enables access to the enterprise’s
applications from any location on an as-needed basis. The
network also provides integrated, any distance, seamless
connectivity to WBYT’s centralized information resources.
WBYT’s holdings are concentrated in
advanced technology products
and services. Two closely held subsidiaries deal exclusively
with the Federal government. The line of business of one, which
is based in Gaithersburg, Maryland, is R&D and manufacture
for advanced capability components for the F 16 Fighting
Falcon and F 18 Super Hornet. The other, based in Jacksonville
deals in R&D in target acquisition and fire control systems for
2. Army helicopters. There is also a manufacturing facility in
Detroit. That facility builds Leopard tanks for the Canadian
Army under license from the German government. Other close
holdings in WBYT’s empire include a commercial electronics
R&D facility in Corvallis. The Corvallis facility also does
contract work for the Idaho National Laboratory. In addition to
the closely held corporations, there are loosely held electronics
manufacturing, or service holdings in Pittsburgh, Houston, Des
Moines, Sioux Falls, Denver and Bozeman. These facilities
serve the consumer high-tech industry.
Finally, there are a number of loosely held international
corporations in India, Australia and across the Pacific Rim, all
concentrated in advanced technology. All computer services for
that region are provided over
a public/private VPN
, which is maintained for that area in Singapore. The Singapore
data center is actually owned and operated by WBYT, as part of
the company’s global VPN. The VPN itself is maintained out of
the New York office.
According to WBYT’s charter, the primary business goal of the
Company is to utilize the global marketplace to provide high
quality technology components at the lowest price possible
price.
Wild Blue Yonder Technologies entered the market knowing
that the ability to closely monitor its operation and deliver
competitive business information quickly was going to be a
prerequisite to its success, particularly in the integration and
reuse of COTS products. In essence, its entire business model
was based on the presumed ability to do that. In fact, since
information was the key to company survival, that mission was
laid out even before the technical capability for achieving it was
in place.
3. Wild Blue Yonder Technologies information processing
operation delivers information and services to its various
subsidiaries in two ways: hosted and embedded. The hosted
model removes the burden of maintaining on-site data
acquisition and management functions from the facility’s
operations managers, while ensuring a secure and scalable
worldwide environment. The embedded model allows each local
facility to operate and maintain its own IT infrastructure, which
is tailored around WBYT’s enterprise systems to support that
subsidiary’s specific line of business and business operation.
Company Organization Overview
Because it is focused on the development of very advanced
software products WBYT gets most of its business from the
Pentagon. It utilizes a well-defined, flexible process for
planning for and developing this software. It is also known as
an innovative place to work. WBYT is operating under a
pressing NIST 800-53 mandate and the only process holding up
the assessment is the Risk Management area. As such, the
WBYT management would like you to implement a robust and
persistent risk management process for its supply chain.
Early software project planning is stressed at WBYT, and
project plans are developed to integrate effectively with the
other engineering plans within each project. There is strong
informal communication among all the engineering disciplines,
and a single program manager manages each new project from
an integrated system view. Software estimates are derived
through expert analysis and documented for use throughout the
project's life. These estimates are backed up with outputs from
estimation tools that are used to provide a “reality check” to the
experts’ initial idea. Actual project data is retained to support a
cost estimation improvement effort under way at WBYT but it is
not used in a formal feedback sense.
4. Software project management metrics are used to provide
visibility into project performance at the project level. When
performance deviates from the initial plans, the project manager
is responsible for either making changes to the way the project
is being handled (in order to bring the project back into
conformance with the plan), or re-planning. Software
subcontracts are managed using a set of defined policies and
procedures. Software requirements, design, and code
inspections are used to support development. Defect metrics
from the inspections are maintained. Other product related
metrics are identified and maintained for each development
effort to help keep reasonable visibility into the development
effort. These metrics also are used to support software project
management and risk assessment. The only problem is that all
of this takes place at the project rather than the organizational
level. The Program Manager and upper management never see
the results of this extensive measurement process.
The review culture at WBYT is not well developed. However,
assurance is primarily defined as testing the code. There is no
software configuration management at any level in the supply
chain. A SEPG team of engineers and managers from the
software engineering organization are responsible for keeping
the approved software engineering processes up to date, and
identifying new opportunities for improvement. This team
reports to the manager of software engineering and to the
corporate vice president of engineering. The vice president of
engineering maintains a keen interest in the software
engineering processes for the corporation. The manager of
software engineering and the vice president of engineering are
responsible for providing quarterly reports to the company
president on the state of software engineering and software
assurance process improvement. The problem is that most of
this reporting up and down the chain of command is in the form
of rumor rather than objective data.
5. COTS and GOTS
WBYT uses COTS and GOTS software when possible, but it
does not hesitate to build its own components when necessary or
to mitigate risk. Humongous Holdings chief architect and the
CIO are both former employees of a major Web search engine
site/content provider. In four years back in the late 1990s, they
watched that provider’s usage go from 45,000 to 45,000,000
page views per day. With millions of people using the system,
they learned very quickly to take whatever security precautions
needed to avoid being awakened in the middle of the night with
a business-threatening problem.
WBYT’s management’s major concern about COTS products
centers on the ability to ensure its security.
That was particularly true when targeted bench-checks found
Trojan code embedded in products that were acquired from an
overseas source. Thus, when security is essential and the source
of the code is in doubt, WBYT will not hesitate to build the
necessary components in-house. WBYT’s rule of thumb is that
if the function is unimportant, COTS will do. If there’s an
actual or de facto security requirement for some aspect of the
system, the COTS product will have to be proven secure.
Otherwise, that component is a strong candidate for in-house
implementation.
Operations
The “Operations” practice area is concerned with the day-to-day
running of the assurance operations, the primary mission is to
ensure that all new systems are, built, launched and deployed
6. correctly. That implies extensive use of all of the software and
quality assurance and testing practices as well as security
assurance. In order to identify security problems the core
security team, which is based in New York, holds a quarterly
“security summit” event every month involving the security
managers from all of the subsidiary sites and any major sub-
contractors. The aim of these summits is to address any
operations-level concerns as well as ensure that all projects are
satisfying their security metrics. The objectives of these
meetings include
Coordinate the dialog between owners of front-end components
and owners of backend components. The outcome could be a
written description of interface roles and responsibilities, which
is captured in a formal organizational agreement.
Resolve any communication or operational conflicts.
Make sure that everyone is on track. In the words of one
participant, they “will stop heaven and earth to resolve issues.”
The idea in these meetings is to do what it takes to make sure
that everybody is on the same page.
Data Collection, Metrics, and Tracking
WBYT uses security metrics as a key-planning tool. For each
protected item in its inventory, WBYT measures the:
Projected number of threats with impact (as likelihood percent)
New threats identified (as frequency)
Actual number of incidents (as count)
Time/Date of incident
Cost of incident
Violations involving staff (as incident count)
Number of software defects reported (as count)
Number of software defects repaired (as percent)
Cost of repair
These measures help WBYT determine how to allocate its
security resources. The measures also ensure that Humongous’s
7. security operation is properly targeted and monitored. The
measures also help to alleviate executive level prioritization
battles by establishing a historical baseline for each item. That
baseline allows WBYT to make decisions about expansion of its
holdings and other strategic directions.
The GPS/CDU Project
For this project, WBYT has contracted with the Air Force to
upgrade the F-16F aircraft. Specifically, the Air Force wishes to
update the navigation system with Advanced Global Positioning
System (GPS) capability that will allow that fighter-bomber to
pinpoint targets down to the foot, even in overcast and
nighttime conditions. The GPS model chosen for this aircraft
has been used in a similar application for the fire control system
for the AH64D Apache Longbow helicopter, so it is considered
to be off-the-shelf (COTS). However, because it’s an Army
item, modifications to the software will be required in order to
integrate this GPS system into Air Force aircraft. Revisions will
need to be written (and/ or modified) to support the following
needs:
a)
Integrate the GPS into the existing on board navigation system.
b)
Display updated navigation information on the pilot's Head-Up
Display (HUD).
c)
Allow the pilot access to the modified navigation data through
the Control Display Unit (CDU).
d)
Communicate GPS information to ground control and to other
8. aircraft in a mission. (Note: no equipment upgrades are planned
to support the increased communications requirements.)
In the case of the GPS/CDU Upgrade itself, the products are the
onboard GPS Interface and the pilot CDU. This project can also
be decomposed into the constituent management processes. In
this case the major processes are project management, COTS
acquisition and integration, COTS interface and software
assurance support, software customization and risk
management, supplier and software qualification, and post-
development support.
The requirements for the GPS interface are well known. The
current navigation system and interface software is written in
Java, and due to the limited nature of the changes to the
navigation software, no change in language will be required.
ISO 12207-2008 will be used as the software development and
documentation standard for this acquisition. NIST 800-30 and
NISTIR 7622 will be used to manage the risk portions.
ISO 15408 might also be consulted to describe any product
certification needs. The final product will also have to satisfy
all relevant elements of NIST 800-53
The contractor that developed the GPS system for the Army will
make the GPS software modifications on a subcontract to
WBYT.
Consequently their supply chain will have to be vetted along
with that of WBYT. WBYT will provide a specification of the
modification requirements to all subcontractors however any
subsequent product and process assurance up and down the
supply chain will be up to the individual subcontractors by
contract. This will reduce the cost associated with modifying
this aspect of the system.
9. WBYT has determined that besides any COTS acquisitions
about 9,000 SLOC will have to be developed and/or modified to
implement this new capability. The condition of the existing
navigation software is not known and the customer wants formal
documentation, so it was assumed in the planning for the bid
that the relative level of productivity would be at about the
same level as that for a new development. The Air Force
(acquirer) has contracted to supply a System/Subsystem
Specification (SSS), a System Design Description (SSDD), and
an Operational Concept Document (OCD). The acquirer will
modify the OCD during development to reflect the changing
needs of the system. WBYT will be responsible for the
following technical documentation:
1.
Software and Interface Requirements Specifications (SRS &
IRS)
2.
Software and Interface Design Descriptions (SDD & IDD)
3.
Software Assurance Case
4.
Software Test Plan (STP)
5.
Software Test Description (STD)
6.
Software Test Report (STR)
7.
System Qualification Test Report (SQTP)
10. 8.
Assurance Case Management Plan (ACMP)
The developer will also be responsible for the following
management and support documentation:
1.
Software Acquisition Plan
2.
Software Assurance Plan
3.
Software Risk Management Plan
4.
Software Development Plan
5.
Software Configuration Management Plan (SCMP)
6.
Software Integration Plan
7.
Software Qualification and Testing Plan (SQTP)
8.
Software Transition Plan (STP)
9.
A Software Version Description (SVD)
Resource Requirements
11. Based on the preliminary project plan, the software effort will
take approximately 3.25 person-years over a period of 12
months. The development, test, and technical documentation
effort will be approximately 2.25 person-years; the remaining
1.0 person-year will be dedicated to software project
management, the support documents, SQA, SCRM and SCM.
User documentation will be produced as part of the new CDU
development effort. The GPS subcontractor will develop the
SRS and SDD for the GPS from existing materials created for
the Army.
The pilots for this aircraft dislike the CDU and want a
replacement. The current CDU has a very small keypad, and the
display is only 4 lines by 40 characters. The pilots would like to
at least double the display capacity, increase the display
visibility, change the keypad, and add new query capabilities.
The pilots want an opportunity to help determine the
requirements for the CDU and to have significant inputs to the
changes to the user interface. Since the pilots want so much
input to the new CDU, WBYT feels that prototyping will be
useful to support the user interface development. Also, it is not
known how many new capabilities will be added to implement
the pilots' query requirements. WBYT is assuming that the new
CDU will have all new software. The Air Force wants the new
CDU to be implemented in Java, and the existing code is in C++
so it is assumed that there will be no software code reuse in that
module. ISO 12207-2008 also will be used for the CDU
development, and as with the GPS integration, the Air Force is
requesting significant amounts of formal documentation.
Based on WBYT's knowledge of the existing CDU and a
rational appraisal of the possible new requirements, WBYT
assumes that the new CDU will require about 20,000 SLOC to
implement. Given the unknown nature of the new requirements,
this is a soft estimate. The customer wants the new CDU to be a
12. significant improvement from the current version, so there may
be some flexibility to re-negotiate the terms of the contract
when the first sets of prototypes are completed and approved by
the pilots. In both parts of this upgrade project, software
supportability is a primary concern. Thus, planning for the
software transition to the Government and for Post Deployment
Software Support (PDSS) is stressed in the acquisition. This
may add labor to the existing software estimates from WBYT.
Project Characteristics
Here is some additional information that you might need:
1.
The project size is approximately 29000 SLOC.
2.
There are five interfaces involved between the user, the GPS
and the CDU.
3.
150 aircraft in the inventory are to be upgraded; one user for
each aircraft. It is assumed that the aircraft will remain in
service for at least another decade
4.
There are approximately 800 pages of documentation
5.
There will be a subcontract for modifications to GPS code and
for new (or modified) GPS documentation
6.
There is high technical complexity
7.
13. It is a life critical application
8.
There is a moderate need for management visibility up and
down the supply chain
9.
Because it is life critical testing needs to be employed sufficient
to assure that the aircraft requirements have been reliability
met.
The areas for concern are human safety, the level and formality
of documentation, compliance with all relevant regulations and
standards and the degree of change in philosophy from previous
standards, lack of formal reviews, and the unknown complexity
that could exist in the interface code. On examining the project
characteristics, the project manager notes the following
regarding these issues:
1.
Adding the GPS to an existing aircraft is a known problem and
the system will be small; thus a waterfall life cycle can be used.
2.
Reliability metrics will be stressed during testing. These
metrics are already documented in the corporate handbook on
metrics practices for use with life-critical or safety-critical
systems.
3.
There is a need for in-process reviews for this project.
4.
Since use of ISO 12207-2008 is new to the organization, it will
14. be important to track progress on document development for
this standard.
5.
The metrics practices are internal; they do not cover sharing
data with the acquisition organization (sharing metrics data also
may become interesting as part of the lessons learned at the end
of the project.)
6.
Although the risk management practices will be used, there is
nothing in the approach to risk management for this application
that is out of the ordinary.
7.
The project manager is responsible for developing the
compliance agreement for the project’s software process and for
developing the software development plans
.
Here are some additional things to consider
The
integration needs to be carefully controlled throughout the
project
Review requirements must allow for in-process reviews. These
should be fully documented.
The metrics practices and the means for external distribution of
metrics data has to be specified. This should be fully
documented.
Where no reviews exist, those reviews will need to be supplied
to cover a specific process area.
All identified risks must be mitigated