This report provides recommendations to address four concerns of the New York City Council regarding its aging IT infrastructure located at City Hall. The concerns are: having over 1000 personal computers needing reduction to save on energy costs; whether the current PCs meet Windows 10 requirements; security of the operating system; and securely backing up documents. The report recommends upgrading to Windows 10, replacing 550 PCs that do not meet requirements, increasing RAM on 300 PCs, and using 200 PCs for three more years. It also recommends a 64-bit server operating system and cloud-based document sharing.
Presentation in GNOME Asia 2015 which focus in the topic of "In Memory Computing" with the tittle An Overview, Maximize the Ability of The GNU/LINUX Operating System using In Memory Computation for Academic, Business and Government.
This paper are mainly focus in moving the root file system from storage device into memory (RAM) device, minimizing bottleneck and maximizing performance, benchmarking and a little snippet script how to do that.
The document discusses computer hardware and software replacement recommendations from two sources. It recommends replacing computers every three years due to obsolete software and new models. Hardware updates should include an Intel dual-core processor, 2GB RAM, and larger hard disks. Software experts recommend Windows 7 and updated application software like Office, PHP, Java, and antivirus software. Further readings suggest large companies replace entire inventories every 2-3 years through staggered replacement of one-third annually.
This document discusses real-time operating systems (RTOs) and their use in embedded systems. It begins by defining an RTOS as an operating system designed to support real-time applications where the timeliness of result delivery is critical. It notes that RTOs have predictable behavior under unpredictable external events. The document then discusses characteristics of RTOs such as small memory footprint, determinism, and guaranteed worst-case interrupt latency and context switch times. It also covers the files generated during cross-compilation of code for an embedded system, such as listing files, hex files, map files, and object files.
This presentation gives a brief over view of Embedded Systems. It describes the common characteristics of Embedded systems, the design metrics, processor technologies and also summarizes differences between Microcontrollers and Microprocessors.
Performance Review of Zero Copy TechniquesCSCJournals
E-government and corporate servers will require higher performance and security as usage increases. Zero copy refers to a collection of techniques which reduce the number of copies of blocks of data in order to make data transfer more efficient. By avoiding redundant data copies, the consumption of memory and CPU resources are reduced, thereby improving performance of the server. To eliminate costly data copies between user space and kernel space or between two buffers in the kernel space, various schemes are used, such as memory remapping, shared buffers, and hardware support. However, the advantages are sometimes overestimated and new security issues arise. This paper describes different approaches to implementing zero copy and evaluates these methods for their performance and security considerations, to help when evaluating these techniques for use in e-government applications
The document summarizes business continuity, disaster recovery, and data backup. It discusses the differences between business continuity planning, disaster recovery planning, and backups. It also provides statistics on data loss and discusses factors like recovery point objectives and recovery time objectives. The document compares tape backups to disk backups and outlines costs associated with data protection and backup solutions.
Data centers are growing to accommodate more internet-connected devices, with innovations helping achieve network coverage for billions of devices by 2020. As data centers grow, trends like software-driven infrastructure, microtechnology, and alternative energy use are making data centers more efficient by consolidating resources and reducing size. Hyperconvergence allows more efficient use of rack space by consolidating computer storage, networking, and virtualization in compact 2U systems from companies like Simplivity and Nutanix.
Development of resource-intensive applications in Visual C++Andrey Karpov
The article will familiarize application developers with tasks given them by the mass introduction of 64-bit multi-core processors symbolizing revolutionary increase of computing power available for an average user. It will also touch upon the problems of effective use of hardware resources for solving everyday applied tasks within the limits of Windows x64 operating system
Presentation in GNOME Asia 2015 which focus in the topic of "In Memory Computing" with the tittle An Overview, Maximize the Ability of The GNU/LINUX Operating System using In Memory Computation for Academic, Business and Government.
This paper are mainly focus in moving the root file system from storage device into memory (RAM) device, minimizing bottleneck and maximizing performance, benchmarking and a little snippet script how to do that.
The document discusses computer hardware and software replacement recommendations from two sources. It recommends replacing computers every three years due to obsolete software and new models. Hardware updates should include an Intel dual-core processor, 2GB RAM, and larger hard disks. Software experts recommend Windows 7 and updated application software like Office, PHP, Java, and antivirus software. Further readings suggest large companies replace entire inventories every 2-3 years through staggered replacement of one-third annually.
This document discusses real-time operating systems (RTOs) and their use in embedded systems. It begins by defining an RTOS as an operating system designed to support real-time applications where the timeliness of result delivery is critical. It notes that RTOs have predictable behavior under unpredictable external events. The document then discusses characteristics of RTOs such as small memory footprint, determinism, and guaranteed worst-case interrupt latency and context switch times. It also covers the files generated during cross-compilation of code for an embedded system, such as listing files, hex files, map files, and object files.
This presentation gives a brief over view of Embedded Systems. It describes the common characteristics of Embedded systems, the design metrics, processor technologies and also summarizes differences between Microcontrollers and Microprocessors.
Performance Review of Zero Copy TechniquesCSCJournals
E-government and corporate servers will require higher performance and security as usage increases. Zero copy refers to a collection of techniques which reduce the number of copies of blocks of data in order to make data transfer more efficient. By avoiding redundant data copies, the consumption of memory and CPU resources are reduced, thereby improving performance of the server. To eliminate costly data copies between user space and kernel space or between two buffers in the kernel space, various schemes are used, such as memory remapping, shared buffers, and hardware support. However, the advantages are sometimes overestimated and new security issues arise. This paper describes different approaches to implementing zero copy and evaluates these methods for their performance and security considerations, to help when evaluating these techniques for use in e-government applications
The document summarizes business continuity, disaster recovery, and data backup. It discusses the differences between business continuity planning, disaster recovery planning, and backups. It also provides statistics on data loss and discusses factors like recovery point objectives and recovery time objectives. The document compares tape backups to disk backups and outlines costs associated with data protection and backup solutions.
Data centers are growing to accommodate more internet-connected devices, with innovations helping achieve network coverage for billions of devices by 2020. As data centers grow, trends like software-driven infrastructure, microtechnology, and alternative energy use are making data centers more efficient by consolidating resources and reducing size. Hyperconvergence allows more efficient use of rack space by consolidating computer storage, networking, and virtualization in compact 2U systems from companies like Simplivity and Nutanix.
Development of resource-intensive applications in Visual C++Andrey Karpov
The article will familiarize application developers with tasks given them by the mass introduction of 64-bit multi-core processors symbolizing revolutionary increase of computing power available for an average user. It will also touch upon the problems of effective use of hardware resources for solving everyday applied tasks within the limits of Windows x64 operating system
Development of resource-intensive applications in Visual C++PVS-Studio
The article will familiarize application developers with tasks given them by the mass introduction of 64-bit multi-core processors symbolizing revolutionary increase of computing power available for an average user. It will also touch upon the problems of effective use of hardware resources for solving everyday applied tasks within the limits of Windows x64 operating system
Running head 3D PRINTINGThe development of the 3D system will .docxSUBHI7
The document discusses the development of a 3D printing system to help architects and construction managers better explain building designs to clients. It outlines the waterfall project design methodology that will be used, which sequentially completes each phase before moving to the next. System requirements are also discussed, including minimum computer specifications needed to run the 3D software. Stakeholders are identified as programmers, customers, system designers, and consultants. The overall goal is to produce 3D printed models of building designs to make presentations more understandable for non-technical clients.
This document discusses IT infrastructure, including hardware, software, networks, and data management technology. It covers the types and sizes of computers from personal computers to supercomputers. It also discusses operating systems, application software, groupware, and contemporary trends like edge computing, virtual machines, and cloud computing. The document examines different types of networks including client-server, web servers, and storage area networks. It provides an overview of strategic decision making around managing infrastructure technology.
This document discusses various tools for deploying Windows 7 and Office 2010, including MDT, WDS, MAP, ACT, and SCCM. It explains what each tool is used for, such as MAP for inventorying systems and ACT for testing application compatibility. The document then discusses challenges of the deployment like migrating users and applications to the new systems. It provides recommendations on using tools like MDT and hard link migration to automate much of the process and minimize downtime for users.
Here are the basic steps to troubleshoot a Windows-based service issue:
1. Open the Services Manager (Start > Run > services.msc) and check the status of the service - if it is stopped or stuck in stopping/starting.
2. Note any error messages when the service fails to start.
3. Check the service properties, especially the Dependencies tab, to ensure the services it depends on are running.
4. Review the System Logs for any errors or additional details on why the service failed to start.
The document discusses the basics of IT architecture, including hardware, software, and virtualization. It describes the major hardware components like the CPU and RAM and how they work. It also covers different types of storage, virtualization, and the importance of scalability, reliability, and availability for organizations.
Running Head: System Proposal 1
2
System Proposal
System proposal
Your name
University
System Proposal
Client
Riordan manufacturing is virtual company and in this case is used for purposes of demonstrations.Riordan is a manufacturing business.
The brief
The brief is to design a database system which will be used to coordinate and manage the main operations of Riordan manufacturer. In addition to managing all customer relationships, management reports will also be allowed to be reported .The main data will be managed by Microsoftspreads sheets as well as paper-based work.
Main issues of the current system
· Aspread sheet can be accessed by only one person at a time for editing. A system is needed where multiple users can edit and access theinformation at once.
· The current system does not have a security of data.
· There is a duplication of data in multiple systems and this leads to a lot of mistakes being made as well as giving a lot of work.
· The reports which are produced by the current system are not meaningful.
Solution
My system is a window based system of information management which uses.NET and SQL. For multi-user applications, these technologies are the most applicable (Dyanna Gregory, 2014); the system will provide the needs, security and an application which is easy to use
The key issues will be addresses as follows:
The database which is relational willensure access of the system by multiple users who can access the need records simultaneously. However same people will not be allowed to edit same document simultaneously.This will be enabled by a locking functionality which will ensure that only one person will edit the record while others can access other documents .
The system will integrate a windows authentication system to ensure security by means of private log-ins. This will ensure security. All paper based and the spread sheet systems will be integrated into a single system to ensure secure storage of the data. The accuracy of the data will be ensured through forms data entry validation.
Investment and cost
The cost and total investment required in this report will be a fixed cost of $10000+VAT based on the following development stages.
Approval……………………………………………………….…..$1500+VAT
ALPHA-1 version delivery………………………………………..…$3000+VAT
ALPHA-2 version delivery…………………………………………..$3000+VAT
BETA-version delivery………………………………………………$1500+VAT
Project completion……………………………………………..…….$1000+VAT
Software
The windows 2007 will be adequate and sufficient to provide a platform which will run the database. Since SQL server is usually installed on this, there will not be any additional investment required. A dedicated server will also be required so as to provide an optimum performance although this may be considered sometimes later as the project develops.
Hardware
The hardware requirement will constitute of severs, computers and the.
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
MEDICAL FACILITY ANALYSIS 2
MEDICAL FACILITY ANALYSIS 16
Medical Facility Analysis
Connie Farris
Colorado Technical University
Information Technology Architectures
(IT401-1801B-02)
Jennifer Merritt
Running head: MEDICAL FACILTY ANALYSIS 1
Table of Contents
Project Outline………………………………………………………………………...3
System Requirements …………………………………………………………………3
Architecture Selection………………………………………………………………….6
Resources and Timeline……………………………………………………………….8
Security…………………………………………………………………………………11
Final Analysis and Recommendations………………………………………………….13
References……………………………………………………………………………….15
Project Outline
Health care delivery systems are complex sociotechnical systems, characterized by dynamic interchanges with their environments (e.g., markets, payers, regulators, and consumers) and interactions among internal system components. These components include people, physical settings, technologies, care processes, and organization (e.g., rules, structure, information systems, communication, rewards, work flow, culture). ("Agency for Healthcare Research and Quality,", 2012) A local medical facility has requested an analysis to determine what will be required to update the current system and include video consults for the patients. This company has locations in 7 states of the southeastern part of the US. The process will be implemented at 21 locations. Over the next few weeks I will research the details which will include software, hardware, cost for equipment upgrades, and other extra cost that may be involved according to system requirements listed below. Network configuration will be discussed in the functions of the system. The need for the time frame for the project will also be considered. The main concern is to deliver a quality system. The final product will include a system where patients will be able to have face to face consultations with the doctor or PA through video capability.
System Requirements
. The first step is that the operating systems be updated with Microsoft 64 or 32-bit Windows 10 Pro, Windows 8 Pro, or Windows 7 Professional for best performance. Systems utilizing the architecture will have processors that are Intel Core i5-3470 3.2GHz LGA 1155 77W Quad-Core Desktop Processor equivalent or higher. The architecture requires 6 GB DDR3 RAM for memory and 250 GB of free space or higher for the hard drive. Uninterruptible Power Supply (UPS) is required for the client’s Information Technology (IT) professional to install. The HP LaserJet 3000 or 4000 Series printers are recommended. Broadband internet connections (specifically Cable) are recommended. For the 21 locations Logitech Meetup 4K HD Video Conference Camera with Integrated Audio will be purchased and installed. ("Hardware Specifications - American Medical Software", 2018)
The Functions of the System
The functions of this system will be to perform the basic functions of any medical offices. The system will be able to book appoint ...
This document provides information about IBM's IT Economics practice and no-charge studies they provide to help clients prove the value of IBM technology and make financially-based IT decisions. It discusses how IT Economics assesses total IT costs, compares infrastructure alternatives, and uses transparent models to identify cost savings and efficiencies. The document outlines the benefits clients have experienced from IT Economics studies, including reduced software licensing costs through workload consolidation on IBM Z systems. It invites readers to request a no-charge study to assess opportunities in their own IT environment.
Discuss three (3) ways that large organizations are increasingly eng.docxrhetttrevannion
Discuss three (3) ways that large organizations are increasingly engaging in social entrepreneurship and the importance of stakeholder relationships in this effort.
Describe the concept of ‘Third Sector’ innovation and reflect on the motive of non-profit entrepreneurial organizations to service these social needs. Next explain how the concept of uneven global distribution of innovation influences this sector. Provide examples to support your rationale.
I am adding a web link for you to review, here are a few web links on Social Entrepreneurship
1. From Forbes.com here is a list of several young social entrepreneurs.
http://www.forbes.com/special-report/2012/30-under-30/30-under-30_social.html
2.
From Stanford University:
Social Entrepreneurship: the case for Definition.
http://ssir.org/articles/entry/social_entrepreneurship_the_case_for_definition
.
Discuss this week’s objectives with your team sharing related rese.docxrhetttrevannion
Discuss
this week’s objectives with your team sharing related research, connections and applications made by individual team members.
Prepare
a 350- to 1,050- word Reflection from the learning that took place in your team forum with:
·
An introduction
·
A body that uses the objectives as headings (2.1, 2.2, 2.3, & 2.4 spelled out). After commenting on or defining the objectives (no names) include a couple of individual team member’s specific connections and/or applications by name.
·
A conclusion that highlights a few specifics from the body of the Reflection.
·
A reference page that lists the e-text plus at least two other sources.
.
Discuss theoretical considerations or assumptions relevant to yo.docxrhetttrevannion
Discuss theoretical considerations or assumptions relevant to your issue. To determine these, consider the research hypothesis you developed in earlier units. What theory or theories (e.g., social learning theory, critical theory, constructivism theory, human behavioral theory, network theory, routine activities theory, etc.) would help to explain the relationship you hypothesize exists between your independent and dependent variables?
.
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxrhetttrevannion
Discuss the
principle events of PROCESS AND THREAD used in both the hosting OS and the OS management of the appropriate QUEUES. OS may only include Linux, Windows, Unix, ROS, RTOS, and Mainframe.
Initial Discussion - 300 words
2 Responses - each 250 words.
.
Discuss the Windows Registry System Hive1) What information.docxrhetttrevannion
The Windows Registry System Hive stores important system configuration settings and security incident information. Specifically, the System Hive retains logon events, user account changes, installed programs, network connections and security policy modifications. Forensic analysis of the System Hive can extract valuable evidence such as unauthorized logins, malware infections, and changes to user permissions that are critical for cybersecurity investigations.
Discuss the way the idea of heroism develops from Gilgamesh th.docxrhetttrevannion
Discuss the way the idea of heroism develops from
Gilgamesh
through
The Iliad
/
The Odyssey
, and
The Aeneid.
Focus your discussion of heroism in each text around both the connection between heroic action and divine will and the relationship between the hero and his people. THREE PARAGRAPHS
Compare the role of vengeance in
Agamemnon
,
Medea
, and
Beowulf
. In what ways does the avenger stand for justice? In what ways does the avenger pose a threat to the continuance of society? What does each text lead you to conclude about the viability of revenge in a civilized society? THREE PARAGRAPHS
Compare the depiction of love in
The Aeneid
,
Sir Gawain and the Green Knight
, and the Wife of Bath's Prologue and Tale. What place does love have in society in each text? What problems does it pose? How, if at all, are those problems resolved? THREE PARAGRAPHS
1 PAGE
.
Discuss the ways in which the history of the U.S. was presented in t.docxrhetttrevannion
Discuss the ways in which the history of the U.S. was presented in the stock certificate for the 1876 Centennial International Exhibition in Philadelphia by F. O. C. Darley and S. J. Ferris. Compare it with the overall narrative of nationhood contained in the early 19th century relief sculptures above the doorways in the Capitol Rotunda in Washington, D. C. Be sure to comment on the ways in which these images would have been influenced by the locations in which they were viewed.
200-300 words, work sited
.
Discuss the value of Lean Systems Engineering to systems develop.docxrhetttrevannion
Discuss the value of Lean Systems Engineering to systems development (1 – 2 pages).
This assignment will be graded on two factors: 1.) the degree to which the response depicts clear and comprehensive understanding of the topic/material (80 points); and 2.) the degree to which the response is well thought through and clearly articulated (20 points).
.
discuss the various pathways interest groups use to influence politi.docxrhetttrevannion
discuss the various pathways interest groups use to influence politics and policy in the U.S. Discuss three way interest groups influence government. What are these methods, how do they work, and why are they effective at influencing government.
discuss the three components of political parties. Discuss party-in-the-electorate, party organization, and party-in-government. Briefly describe who makes up each component and what each component does.
.
Discuss the various tools and techniques used by an HCO to incre.docxrhetttrevannion
An healthcare organization (HCO) uses various tools and techniques to increase logistical efficiency, such as measuring the capacity (throughput) of resources like x-ray equipment and exam rooms. Measuring capacity allows an HCO to understand utilization and support decision making about resource allocation and patient flow. (Dobrzykowski & Tarafdar, 2015)
Discuss the various means by which slaves resisted the slave system..docxrhetttrevannion
Discuss the various means by which slaves resisted the slave system. How widespread was such resistance? What were the most common and effective tactics? What does the prevalence of resistance reveal not only about slaves’ attitude toward slavery but also their ability to shape the conditions under which they lived and worked?
one page, doubled spaced, in Times New Roman font, with standard
1 inch margins on all sides
.
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxrhetttrevannion
Discuss the typica l clinical presentation of the diagnosis , Hip Osteoarthritis(OA), included possible therapeutic exercise treatment intervention, also recommendations for the management of the condition.
Introduction: First about OA and then write about Hip OA
Describe the pathophysiology of the diagnosis and the expected clinical presentation anticipated. If it varies, them describe common variations.
Discuss
etiology
and
demographics
related to the diagnosis(I.e., is this dx more common in men than women, what age, group ect)
Very important only use the articles provides, not citation work submitted via turnitin!!!!
.
More Related Content
Similar to Executive SummaryThis report addresses four major concerns that .docx
Development of resource-intensive applications in Visual C++PVS-Studio
The article will familiarize application developers with tasks given them by the mass introduction of 64-bit multi-core processors symbolizing revolutionary increase of computing power available for an average user. It will also touch upon the problems of effective use of hardware resources for solving everyday applied tasks within the limits of Windows x64 operating system
Running head 3D PRINTINGThe development of the 3D system will .docxSUBHI7
The document discusses the development of a 3D printing system to help architects and construction managers better explain building designs to clients. It outlines the waterfall project design methodology that will be used, which sequentially completes each phase before moving to the next. System requirements are also discussed, including minimum computer specifications needed to run the 3D software. Stakeholders are identified as programmers, customers, system designers, and consultants. The overall goal is to produce 3D printed models of building designs to make presentations more understandable for non-technical clients.
This document discusses IT infrastructure, including hardware, software, networks, and data management technology. It covers the types and sizes of computers from personal computers to supercomputers. It also discusses operating systems, application software, groupware, and contemporary trends like edge computing, virtual machines, and cloud computing. The document examines different types of networks including client-server, web servers, and storage area networks. It provides an overview of strategic decision making around managing infrastructure technology.
This document discusses various tools for deploying Windows 7 and Office 2010, including MDT, WDS, MAP, ACT, and SCCM. It explains what each tool is used for, such as MAP for inventorying systems and ACT for testing application compatibility. The document then discusses challenges of the deployment like migrating users and applications to the new systems. It provides recommendations on using tools like MDT and hard link migration to automate much of the process and minimize downtime for users.
Here are the basic steps to troubleshoot a Windows-based service issue:
1. Open the Services Manager (Start > Run > services.msc) and check the status of the service - if it is stopped or stuck in stopping/starting.
2. Note any error messages when the service fails to start.
3. Check the service properties, especially the Dependencies tab, to ensure the services it depends on are running.
4. Review the System Logs for any errors or additional details on why the service failed to start.
The document discusses the basics of IT architecture, including hardware, software, and virtualization. It describes the major hardware components like the CPU and RAM and how they work. It also covers different types of storage, virtualization, and the importance of scalability, reliability, and availability for organizations.
Running Head: System Proposal 1
2
System Proposal
System proposal
Your name
University
System Proposal
Client
Riordan manufacturing is virtual company and in this case is used for purposes of demonstrations.Riordan is a manufacturing business.
The brief
The brief is to design a database system which will be used to coordinate and manage the main operations of Riordan manufacturer. In addition to managing all customer relationships, management reports will also be allowed to be reported .The main data will be managed by Microsoftspreads sheets as well as paper-based work.
Main issues of the current system
· Aspread sheet can be accessed by only one person at a time for editing. A system is needed where multiple users can edit and access theinformation at once.
· The current system does not have a security of data.
· There is a duplication of data in multiple systems and this leads to a lot of mistakes being made as well as giving a lot of work.
· The reports which are produced by the current system are not meaningful.
Solution
My system is a window based system of information management which uses.NET and SQL. For multi-user applications, these technologies are the most applicable (Dyanna Gregory, 2014); the system will provide the needs, security and an application which is easy to use
The key issues will be addresses as follows:
The database which is relational willensure access of the system by multiple users who can access the need records simultaneously. However same people will not be allowed to edit same document simultaneously.This will be enabled by a locking functionality which will ensure that only one person will edit the record while others can access other documents .
The system will integrate a windows authentication system to ensure security by means of private log-ins. This will ensure security. All paper based and the spread sheet systems will be integrated into a single system to ensure secure storage of the data. The accuracy of the data will be ensured through forms data entry validation.
Investment and cost
The cost and total investment required in this report will be a fixed cost of $10000+VAT based on the following development stages.
Approval……………………………………………………….…..$1500+VAT
ALPHA-1 version delivery………………………………………..…$3000+VAT
ALPHA-2 version delivery…………………………………………..$3000+VAT
BETA-version delivery………………………………………………$1500+VAT
Project completion……………………………………………..…….$1000+VAT
Software
The windows 2007 will be adequate and sufficient to provide a platform which will run the database. Since SQL server is usually installed on this, there will not be any additional investment required. A dedicated server will also be required so as to provide an optimum performance although this may be considered sometimes later as the project develops.
Hardware
The hardware requirement will constitute of severs, computers and the.
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
MEDICAL FACILITY ANALYSIS 2
MEDICAL FACILITY ANALYSIS 16
Medical Facility Analysis
Connie Farris
Colorado Technical University
Information Technology Architectures
(IT401-1801B-02)
Jennifer Merritt
Running head: MEDICAL FACILTY ANALYSIS 1
Table of Contents
Project Outline………………………………………………………………………...3
System Requirements …………………………………………………………………3
Architecture Selection………………………………………………………………….6
Resources and Timeline……………………………………………………………….8
Security…………………………………………………………………………………11
Final Analysis and Recommendations………………………………………………….13
References……………………………………………………………………………….15
Project Outline
Health care delivery systems are complex sociotechnical systems, characterized by dynamic interchanges with their environments (e.g., markets, payers, regulators, and consumers) and interactions among internal system components. These components include people, physical settings, technologies, care processes, and organization (e.g., rules, structure, information systems, communication, rewards, work flow, culture). ("Agency for Healthcare Research and Quality,", 2012) A local medical facility has requested an analysis to determine what will be required to update the current system and include video consults for the patients. This company has locations in 7 states of the southeastern part of the US. The process will be implemented at 21 locations. Over the next few weeks I will research the details which will include software, hardware, cost for equipment upgrades, and other extra cost that may be involved according to system requirements listed below. Network configuration will be discussed in the functions of the system. The need for the time frame for the project will also be considered. The main concern is to deliver a quality system. The final product will include a system where patients will be able to have face to face consultations with the doctor or PA through video capability.
System Requirements
. The first step is that the operating systems be updated with Microsoft 64 or 32-bit Windows 10 Pro, Windows 8 Pro, or Windows 7 Professional for best performance. Systems utilizing the architecture will have processors that are Intel Core i5-3470 3.2GHz LGA 1155 77W Quad-Core Desktop Processor equivalent or higher. The architecture requires 6 GB DDR3 RAM for memory and 250 GB of free space or higher for the hard drive. Uninterruptible Power Supply (UPS) is required for the client’s Information Technology (IT) professional to install. The HP LaserJet 3000 or 4000 Series printers are recommended. Broadband internet connections (specifically Cable) are recommended. For the 21 locations Logitech Meetup 4K HD Video Conference Camera with Integrated Audio will be purchased and installed. ("Hardware Specifications - American Medical Software", 2018)
The Functions of the System
The functions of this system will be to perform the basic functions of any medical offices. The system will be able to book appoint ...
This document provides information about IBM's IT Economics practice and no-charge studies they provide to help clients prove the value of IBM technology and make financially-based IT decisions. It discusses how IT Economics assesses total IT costs, compares infrastructure alternatives, and uses transparent models to identify cost savings and efficiencies. The document outlines the benefits clients have experienced from IT Economics studies, including reduced software licensing costs through workload consolidation on IBM Z systems. It invites readers to request a no-charge study to assess opportunities in their own IT environment.
Similar to Executive SummaryThis report addresses four major concerns that .docx (10)
Discuss three (3) ways that large organizations are increasingly eng.docxrhetttrevannion
Discuss three (3) ways that large organizations are increasingly engaging in social entrepreneurship and the importance of stakeholder relationships in this effort.
Describe the concept of ‘Third Sector’ innovation and reflect on the motive of non-profit entrepreneurial organizations to service these social needs. Next explain how the concept of uneven global distribution of innovation influences this sector. Provide examples to support your rationale.
I am adding a web link for you to review, here are a few web links on Social Entrepreneurship
1. From Forbes.com here is a list of several young social entrepreneurs.
http://www.forbes.com/special-report/2012/30-under-30/30-under-30_social.html
2.
From Stanford University:
Social Entrepreneurship: the case for Definition.
http://ssir.org/articles/entry/social_entrepreneurship_the_case_for_definition
.
Discuss this week’s objectives with your team sharing related rese.docxrhetttrevannion
Discuss
this week’s objectives with your team sharing related research, connections and applications made by individual team members.
Prepare
a 350- to 1,050- word Reflection from the learning that took place in your team forum with:
·
An introduction
·
A body that uses the objectives as headings (2.1, 2.2, 2.3, & 2.4 spelled out). After commenting on or defining the objectives (no names) include a couple of individual team member’s specific connections and/or applications by name.
·
A conclusion that highlights a few specifics from the body of the Reflection.
·
A reference page that lists the e-text plus at least two other sources.
.
Discuss theoretical considerations or assumptions relevant to yo.docxrhetttrevannion
Discuss theoretical considerations or assumptions relevant to your issue. To determine these, consider the research hypothesis you developed in earlier units. What theory or theories (e.g., social learning theory, critical theory, constructivism theory, human behavioral theory, network theory, routine activities theory, etc.) would help to explain the relationship you hypothesize exists between your independent and dependent variables?
.
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxrhetttrevannion
Discuss the
principle events of PROCESS AND THREAD used in both the hosting OS and the OS management of the appropriate QUEUES. OS may only include Linux, Windows, Unix, ROS, RTOS, and Mainframe.
Initial Discussion - 300 words
2 Responses - each 250 words.
.
Discuss the Windows Registry System Hive1) What information.docxrhetttrevannion
The Windows Registry System Hive stores important system configuration settings and security incident information. Specifically, the System Hive retains logon events, user account changes, installed programs, network connections and security policy modifications. Forensic analysis of the System Hive can extract valuable evidence such as unauthorized logins, malware infections, and changes to user permissions that are critical for cybersecurity investigations.
Discuss the way the idea of heroism develops from Gilgamesh th.docxrhetttrevannion
Discuss the way the idea of heroism develops from
Gilgamesh
through
The Iliad
/
The Odyssey
, and
The Aeneid.
Focus your discussion of heroism in each text around both the connection between heroic action and divine will and the relationship between the hero and his people. THREE PARAGRAPHS
Compare the role of vengeance in
Agamemnon
,
Medea
, and
Beowulf
. In what ways does the avenger stand for justice? In what ways does the avenger pose a threat to the continuance of society? What does each text lead you to conclude about the viability of revenge in a civilized society? THREE PARAGRAPHS
Compare the depiction of love in
The Aeneid
,
Sir Gawain and the Green Knight
, and the Wife of Bath's Prologue and Tale. What place does love have in society in each text? What problems does it pose? How, if at all, are those problems resolved? THREE PARAGRAPHS
1 PAGE
.
Discuss the ways in which the history of the U.S. was presented in t.docxrhetttrevannion
Discuss the ways in which the history of the U.S. was presented in the stock certificate for the 1876 Centennial International Exhibition in Philadelphia by F. O. C. Darley and S. J. Ferris. Compare it with the overall narrative of nationhood contained in the early 19th century relief sculptures above the doorways in the Capitol Rotunda in Washington, D. C. Be sure to comment on the ways in which these images would have been influenced by the locations in which they were viewed.
200-300 words, work sited
.
Discuss the value of Lean Systems Engineering to systems develop.docxrhetttrevannion
Discuss the value of Lean Systems Engineering to systems development (1 – 2 pages).
This assignment will be graded on two factors: 1.) the degree to which the response depicts clear and comprehensive understanding of the topic/material (80 points); and 2.) the degree to which the response is well thought through and clearly articulated (20 points).
.
discuss the various pathways interest groups use to influence politi.docxrhetttrevannion
discuss the various pathways interest groups use to influence politics and policy in the U.S. Discuss three way interest groups influence government. What are these methods, how do they work, and why are they effective at influencing government.
discuss the three components of political parties. Discuss party-in-the-electorate, party organization, and party-in-government. Briefly describe who makes up each component and what each component does.
.
Discuss the various tools and techniques used by an HCO to incre.docxrhetttrevannion
An healthcare organization (HCO) uses various tools and techniques to increase logistical efficiency, such as measuring the capacity (throughput) of resources like x-ray equipment and exam rooms. Measuring capacity allows an HCO to understand utilization and support decision making about resource allocation and patient flow. (Dobrzykowski & Tarafdar, 2015)
Discuss the various means by which slaves resisted the slave system..docxrhetttrevannion
Discuss the various means by which slaves resisted the slave system. How widespread was such resistance? What were the most common and effective tactics? What does the prevalence of resistance reveal not only about slaves’ attitude toward slavery but also their ability to shape the conditions under which they lived and worked?
one page, doubled spaced, in Times New Roman font, with standard
1 inch margins on all sides
.
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxrhetttrevannion
Discuss the typica l clinical presentation of the diagnosis , Hip Osteoarthritis(OA), included possible therapeutic exercise treatment intervention, also recommendations for the management of the condition.
Introduction: First about OA and then write about Hip OA
Describe the pathophysiology of the diagnosis and the expected clinical presentation anticipated. If it varies, them describe common variations.
Discuss
etiology
and
demographics
related to the diagnosis(I.e., is this dx more common in men than women, what age, group ect)
Very important only use the articles provides, not citation work submitted via turnitin!!!!
.
Discuss the types of resources, tools, and methods that are availabl.docxrhetttrevannion
Discuss the types of resources, tools, and methods that are available to leaders for data collection and analysis, including organization assessments such as Baldrige, SWOT, and others. What techniques does your organization utilize to make decisions?
You can use US Navy for the organization.
.
Discuss the types of items that should be examined in a firewall log.docxrhetttrevannion
Discuss the types of items that should be examined in a firewall log:
a. IP addresses that are being rejected and dropped
b. Probes to ports that have no application services running on them
c. Source-routed packets
d. Suspicious outbound connections
e. Unsuccessful logins
.
Discuss the types of property, providing an example of each an.docxrhetttrevannion
Discuss the types of property, providing an example of each and why each falls into its classification.
Provide an instance of when you have seen eminent domain in action in your community. If you have not seen this situation, create an example of how this may occur.
.
Discuss the type of personality it takes to become a police officer..docxrhetttrevannion
Discuss the type of personality it takes to become a police officer. Why is this type of individual personality required for police work? What are the dangers to having this type of individual in police work?
Be sure to support your position with a very detailed explanation or a source citation.
.
Discuss the two major sources of crime statistics for the United Sta.docxrhetttrevannion
Discuss the two major sources of crime statistics for the United States. Uniform Crime Report (UCR), National Crime Victim Survey (NCVS), and the National Incident-Based Reporting System (NIBRS), including
but not limited to
: the Part I and II offenses, UCR terminology, how the UCR and NCVS collect crime data, types of information collected and not collected by the NCVS, accuracy issues with the UCR and NCVS, and the role and purpose of the NIBRS
.
Discuss the two most prominent theories related to the stage of adul.docxrhetttrevannion
Discuss the two most prominent theories related to the stage of adulthood: Erikson’s Stage of Generativity vs. Stagnation and Levinson’s Season’s of a Man’s Life. Describe how theory conceptualizes middle adulthood and explain the growth of development changes that occur during this stage. Using Figure 16.7 as your reference, describe the impact of daily hassles and daily uplifts on the midlife stage of adulthood. In your post, please address the role of stress and personal control on life satisfaction and happiness during midlife development.
.
Discuss the two elements required for the consent defense. In ad.docxrhetttrevannion
Discuss the two elements required for the consent defense. In addition, please identify three situations where consent can operate as a legal defense.
The paper must be 1-2 pages.
Use proper APA formatting and citations, including ‘in-text’ citations.
Reference at least 2 outside credible resources.
DUE SUNDAY MORNING STAND PACIFIC TIME
.
Discuss the Truth in Lending Act and what role it places in financia.docxrhetttrevannion
Discuss the Truth in Lending Act and what role it places in financial and regulatory reports requirements in regards to funds acquisition strategies. What are various important terms which must be disclosed and their meaning?
Rose, P.S., & Marquis, M.H., chap. 4, 17, & 21
Due Date:
7/13/2014 11:59:59 PM (5 Days)
Total Pts:
125
Points Earned:
n/a
Deliverable Length:
600-800 words
Assignment Type:
Individual Project
.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Executive SummaryThis report addresses four major concerns that .docx
1. Executive Summary
This report addresses four major concerns that the New York
City Council has for its ageing IT infrastructure located at City
Hall. After a recent renovation, the cost of project exceeded the
planned cost by more than $50 million. This has impacted on
their vision of improving the current IT infrastructure. The
mayor of New York has approached our firm and has shared
some of their concerns they have and have asked us to address
the following concerns.
The first concern relates to the New York City council having
more than 1000 personal computers (PCs) operating at City Hall
throughout the different departments. There is a need to reduce
the total amount of PCs across the department to save on energy
costs as well as updating the current operating system (OS) to
Windows 10. The second concern relates to the current
specifications of the PCs in relation to Windows 10 system
requirements and whether they can be salvaged and used for the
next three years. About half of the current PCs will have to be
removed as they will not be able to last for three years. The
third concern relates to the security of the OS system, where a
recommendation has been requested for the best server
operating system. The final concern relates to the best method
of securely backing up documentation that can be accessed by
all councillors at any time of the day.
This report contains all the recommendations for a new
operating system, hardware requirements, a recommendation for
a server operating system and the best method to securely share
documents. The recommendations that are contained within this
report are what we believe will address all the concerns that
have been put forth.
2. i
Table of Contents
Executive Summary i
Introduction 1
Standard Operating Environment 2
Hardware Requirements 3
Server Operating System Security 4
Cloud-Based Services 5
Conclusion 6
References 7
No table of figures entries found.
Introduction
Technology has changed the very way that we interact with each
other and how we conduct business. It is a powerful resource
that is ever-changing which requires us to constantly evolve on
how we harness the technology (Duncan 2011). The Mayor of
New York City (NYC) has approached our firm and has asked
for assistance in budgeting for new IT equipment in relation to
four major concerns over the current state of the IT
infrastructure in City Hall. These concerns are the current
energy usage of the 1000 personal computers, whether the
current PCs meet minimum specification, security implications
and secure documentation backup. This report outlines the most
suitable operating system for the councils standard operating
3. environment, new and existing hardware requirements,
recommended server operating system for optimal security and
the recommended cloud-based services for storage. Standard
Operating Environment
A standard operating environment (SOE) is the standardisation
of the operating system and software application that is used
throughout an organisation (Rouse). This determines the
standard configuration, applications used, and the updates
made. An SOE is used to maintain constant performance and
reliability of the system throughout the entire organisation and
reduce the complexity for Information Technology (IT) teams
(Rouse). Due to a recent renovation at City Hall, the overall
expenditure exceeded the expected cost of $100 million
totalling to an amount of $150 million. This has affected the
overall amount that is able to be spent on the IT infrastructure
upgrade. The replacement for the current operating system will
need to be relatively cheap and a long-term solution. Being a
long-term solution, this ensures reliability and performance of
the system and means that little to no changes have to be done
on the existing equipment thus saving on further cost. Another
concern raised was the amount of energy that is being used to
run all of the PCs and there is a need to reduce the total amount
of PCs. GREEN COMPUTING??
The recommended replacement for the current Windows 8
operating system is Windows 10. This makes the most sense as
it is the easiest and a straightforward procedure. It is essentially
performing a regular upgrade but will be a bit more of an
involved process to ensure success. Windows is currently the
most used platform so it makes sense to use it.
1
Hardware Requirements
4. Windows 10 has the ability to be installed on all of the PCs but
the hardware that is installed in them needs to meet the
minimum required specification. The specification requirement
is in relation to the computer’s CPU, RAM and Hard Disk
Drive. The CPU, also known as the Central Processing Unit, is
responsible for the processing and executing of instructions
issued by the operating system and programs. It is essentially
the brain of the computer (Martindale 2020b). The RAM, also
known as the Random-Access Memory, is very fast short-term
memory that is used to temporarily store current data that can
increase performance and speed up computer processes
(Martindale 2020c). The Hard Disk Drive is long-term memory
that is used as a secondary storage device. The computer
permanently stores and retrieves data from this piece of
hardware (Lacoma 2020).
Windows 10 has the ability to be installed either as a 32-bit or
64-bit operating system (Microsoft 2020). This means it can
accommodate lots of different PC specifications. In simple
terms a 64-bit processor is more powerful than a 32-bit
processor which means there are more advantages to using a 64-
bit operating system (Martindale 2020a). A 32-bit operating
system can only be paired with a maximum of 4GB of RAM.
This means that it is not recommended to run resource heavy
programs (Martindale 2020a). A 64-bit operating is able to use
more RAM and is able to guarantee that any future programs
created are compatible with the system provided that there is
the available resources to manage it (Martindale 2020a). The
minimum requirements for a 32-bit operating system are 1 GHz
CPU, 1 GB of RAM and 16 GB of HDD. The minimum
requirements for a 64-bit operating system are 1 GHz CPU, 2
GB of RAM and 32 GB of HDD (Microsoft 2020). In order to
ensure continuity throughout City Hall, it is recommended that
a 64-bit operating system be installed on all the existing PCs.
This presents a problem as not all of the PCs are able to meet
the minimum system requirements for this type of operating
5. system.
From the PC information provided, 550 desktop PCs (1GHZ
CPU, 1GB RAM, 16GB HDD) will not be able to be reused as
they don’t meet the minimum specifications. It is recommended
to replace these computers to increase the RAM and HDD size.
Without sufficient RAM and HDD, the 64-bit OS cannot run.
For the 300 Desktop PC’s (1.4GHZ CPU, 2GB RAM, 64GB
HDD), meet the minimum requirements to run the OS but will
only last for the next 3 years and will definitely need to be
replaced after this time. If possible, it is recommended to
remove the RAM out of the redundant PCs and installed it into
the 300 desktop PCs to increase the RAM Size to aid in getting
through the 3-year period. For the 200 Desktop PC’s (2.4GHZ
CPU, 8 GB RAM, 128GB HDD), meet the minimum
requirements and are able to be re-used. These PCs will surpass
the 3-year period and most probably be able to be used for an
additional 3-year period.
Server Operating System Security
Cloud-Based Services
Conclusion
6. References – Min of 10, Made up of 2 or More Academic
Journals.
Duncan, Arne. 2011. "Harness the Power of Technology."
Learning & Leading with Technology 38 (8): 10.
Lacoma, Tyler. 2020. "What Is a Hard Drive?"
https://www.digitaltrends.com/computing/what-is-a-hard-drive-
your-guide-to-computer-storage/.
Martindale, Jon. 2020a. "32-Bit Vs. 64-Bit: Understanding What
These Options Really Mean."
https://www.digitaltrends.com/computing/32-bit-vs-64-bit-
operating-systems/.
Martindale, Jon. 2020b. "What Is a Cpu?"
https://www.digitaltrends.com/computing/what-is-a-cpu/.
Martindale, Jon. 2020c. "What Is Ram?"
https://www.digitaltrends.com/computing/what-is-ram/.
Microsoft. 2020. "System Requirements for Installing Windows
10." https://www.microsoft.com/en-au/windows/windows-10-
specifications.
Rouse, Margaret. "Standard Operating Environment (Soe)."
https://whatis.techtarget.com/definition/standard-operating-
environment-SOE.
Assignment Handout
Programme Name: Higher Diploma in Travel, Tourism &
Events Management
Module Name: Culture, Festivals, and Special Events
Management
Assignment Learning Objectives:
1. Describe the key principles and concept of the strategic
planning function of
events planning.
7. 1. Develop and manage events from initial idea to evaluation
and identify
requirements and select the right tools, people and
resources to meet demand.
1. Effectively plan, schedule, budget and manage the event
process.
1. Develop a strategy to market an event using integrated
marketing approach
1. Analyse apply risks management strategies to mitigate and
avoid potential
problems with events.
Assignment Introduction:
Event planning has become an important consideration for any
entity wishing to promote its business. Promotional events are
now necessary for any organization's marketing plan. Carefully
planned events allow organizations a closer, more personal
means of interacting with current or potential customers or
supporters.
The success or failure of a business can be determined, in large
part, by the events it sponsors.
Event planning can be defined as the coordination of all aspects
of an event, including budgeting and program development.
Designing and producing an event is analogous to a live stage
production.
Once the event begins, there is no turning back. There is no
guarantee of a successful outcome; however, event organizers
can plan, prepare, and be prepared for the unanticipated (Allen,
2000, KE Holley,2001).
Instructions:
Student may choose any ONE of the following events for your
assignment:
8. 1. Birthday party
2. Fashion Show
3. Wedding lunch
4. Alumni Re-union dinner
5. Sports Events
6. Community Event
You are the owner and manager of Dragon Events Pte Ltd. You
have been approached by one of your clients to come up with an
event proposal to be held in Singapore in November 2021.
You are to draft a proposal to your client and ensure that it
covers the following:
1. Introduction
1.1 The vision and mission of your organisation – See Lesson 2
1.2 The objective of the event, concept and description – See
Lesson 2
1.2.1 Objectives of the Event
1.2.2 Concept
1.2.3 The unique selling point (USP) of the event –
Lesson 3
1. Budget for the event
· Detail projection of revenue and expenses
· Funding of event (e.g. funded, self-funded or sponsorship)
seetemplate attachment 1 – Lesson 5
1. Marketing and promotional plan – Lesson 6
· Social media platform, tickets, posters, etc.
1. Division of tasks and individual responsibilities (before and
during the event day) – Structure – Lesson 2
1. Floor plan and event layout plan- see template attachment 3 –
Lesson 8
1. Menu and Beverage Planning (if any)
1. Activities and Games (if any)
1. Resource Planning – no of staff, equipment/speakers,
9. structure (tent, stage)
1. Action Plan
· Timeline and deliverables (Gantt chart) – see template
attachment 2 – Lesson 5
· Detailed event program including detailed running sheet for
the event, see template attachment 4
1. Conclusion (your learning outcomes)
The report must contain the following sections and details:
1. This is an individually assignment,
2. You are to choose one of the event theme given, with the
approval of your lecturer.
3. You are required to write a report of 3000 words, +/- 10%.
4. It must be supported by academic literature reviews on the
subject matter for all points.
5. The report must follow the correct format:
· Please type 1.5 line spacing
· 2 lines spacing between each paragraph
· Use Times Roman, 12 point font
· All pages of your assignment must be numbered appropriately
and justified
· Title the headers and/or sub headers (if applicable) and
provide relevant tables and figures (if necessary).
6. Please use the ‘spelling and grammar’ function in Microsoft
Word to ensure there are no spelling or grammar errors.
7. You must use in – text citations and end-text reference list
based on Harvard style of referencing format. Please note that
some marks may be deducted for incorrect referencing. Sources
from the Google and Wikipedia are excluded.
10. 8. All sources must be acknowledged in a “list of references”
employing the Harvard system. This must be included at the end
of report. When something is taken from source, it must be
referenced.
9. Individual are to submit your assignment through the Safe
Assign link through Blackboard, the last submission being the
final Safe Assign originality report.
Page 2/
Assessment Methods
This assignment contributes 80% to your overall assessment.
Please refer to your module descriptor for more details on
presentation and report assessment rubrics.
Due Date 29 May 2020
Sheet1 EVENT BUDGETEvent
Title_____________________________ Date
_________________________________________Est. no of
Attendees_____________________ Location
_____________________________________Projected
Cost$ExpensesEstimated CostFIXED EXPENSESVENUERoom/
Hall Rental$Furniture Rental$Equipment Rentals(speakers,
mics,
etc)$Decorations$Signage$OthersPROGRAMMEPresenter/MC/
Speaker$Entertainment$Others:$PROMOTIONPaid
advertising$Web development$Special giveawaysSponsors/
GrantS (- )SUBTOTAL $ + VARIABLE
EXPENSES$FOOD AND REFRESHMENTS$Coffee
breaksLunch$Dinner$Others$
ACCOMMODATIONLABOUR COSTPart
timers$MISCELLANEOUSSUBTOTAL $GRAND
TOTAL$DIVIDE NO. OF ATTENDEESTOTAL COST PER
PERSON$
11. CFSE Assignment – Event Proposal
Sample Structure/ Outline
---------------------------------------------------------------------------
--------------------------------
COVER PAGE
---------------------------------------------------------------------------
---------------------------------
CONTENT
PAGE
---------------------------------------------------------------------------
--------------------------------
The Dragon Events Pte Ltd is pleased to enclose our proposal
for your …………….event
on………………………………………………………………………
………………….
I. Our vision and mission of our company is:
…………………………………………………………………………
…………………………………………………………………………
………………………………………
…………………………………………………………………………
………………….
---------------------------------------------------------------------------
-------------------------------
The objectives of the event are:
1.
2.
3.
4.
5.
The concept for your/the event
……………………………………………………………….
…………………………………………………………………………
……………………..
…………………………………………………………………………
12. ……………………..
…………………………………………………………………………
……………………..
The unique selling point for this event is/are
………………………………………………..
II. The budget for the event is as attached in Figure 1 in the
Appendix. The total cost for dinner will be $ per person.
III. Marketing and promotional plan
IV. The Gantt chart attached in Figure 2 in the appendix
display the time line of the
planning and responsibilities.
V. The proposed Floor Plan is as attached in Figure 3 in the
Appendix
VI. The menu for food and beverage according to your request
are as follows:
VII. We proposed the following activities and games for the
evening as follows:
VIII. We are pleased to share with you the resource planning
for:
Manpower
…………………………………………………………………
…………………………………………………………………
Equipment
Structure
Transport
IX. The proposed Event Programme is as attached in Figure 4 in
13. the appendix.
As you can see the
event…………………………………………………………..
…………………………………………………………………………
…………..
…………………………………………………………………………
…………..
…………………………………………………………………………
……………
We hope the proposal is agreeable by you and we are happy to
discuss further on any amendments that you may have. We look
forward to be able host your event.
References
2
Programme Agenda
Event:
Venue:
Date:
TIME
AGENDA
REMARKS
14.
15.
16.
17. Sheet1EVENT FLOOR PLANBack AreaBack AreaBack
AreaEntrance/ExitEntrance/ExitFoyer
CFSE Assignment – Event Proposal
Sample Structure/ Outline
---------------------------------------------------------------------------
--------------------------------
COVER PAGE
---------------------------------------------------------------------------
---------------------------------
CONTENT
PAGE
---------------------------------------------------------------------------
--------------------------------
The Dragon Events Pte Ltd is pleased to enclose our proposal
for your …………….event
on………………………………………………………………………
………………….
I. Our vision and mission of our company is:
…………………………………………………………………………
…………………………………………………………………………
………………………………………
…………………………………………………………………………
………………….
---------------------------------------------------------------------------
-------------------------------
The objectives of the event are:
1.
2.
3.
4.
5.
The concept for your/the event
18. ……………………………………………………………….
…………………………………………………………………………
……………………..
…………………………………………………………………………
……………………..
…………………………………………………………………………
……………………..
The unique selling point for this event is/are
………………………………………………..
II. The budget for the event is as attached in Figure 1 in the
Appendix. The total cost for dinner will be $ per person.
III. Marketing and promotional plan
IV. The Gantt chart attached in Figure 2 in the appendix
display the time line of the
planning and responsibilities.
V. The proposed Floor Plan is as attached in Figure 3 in the
Appendix
VI. The menu for food and beverage according to your request
are as follows:
VII. We proposed the following activities and games for the
evening as follows:
VIII. We are pleased to share with you the resource planning
for:
Manpower
…………………………………………………………………
…………………………………………………………………
19. Equipment
Structure
Transport
IX. The proposed Event Programme is as attached in Figure 4 in
the appendix.
As you can see the
event…………………………………………………………..
…………………………………………………………………………
…………..
…………………………………………………………………………
…………..
…………………………………………………………………………
……………
We hope the proposal is agreeable by you and we are happy to
discuss further on any amendments that you may have. We look
forward to be able host your event.
References
2
Sheet1 Schedule of TASKSRESPONSIBILITYMay
'20JunJulyAugSeptOctNovDecJan
'21FebMarAprMayJunJulyAugSeptOctNovPlanning- idea, obj,
conceptGantt Chart
Sheet1 EVENT BUDGETEvent
Title_____________________________ Date
_________________________________________Est. no of
Attendees_____________________ Location
_____________________________________Projected
Cost$ExpensesEstimated CostFIXED EXPENSESVENUERoom/
20. Hall Rental$Furniture Rental$Equipment Rentals(speakers,
mics, etc)$Decorations - flowers, hanging light,
$Signage$Others$PROGRAMMEPresenter/MC/Speaker$Enterta
inment$Others:$PROMOTIONPaid advertising$Web
development$Special giveaways$Sponsors/ GrantS (-
)SUBTOTAL (Fixed expenses) $ SUBTOTAL /DIVIDE BY NO
OF ATTENDDES $ + VARIABLE EXPENSESFOOD AND
REFRESHMENTS$Coffee breaks @ 30 $ Lunch @ $35 pp
$Dinner$Beverage @$ ACCOMMODATIONSingle
Room $Double Room$LABOUR COSTPart
timers$MISCELLANEOUSGiftsSUBTOTAL (Variable
Expenses) $GRAND TOTAL( Fixed + Variable
expenses)$TOTAL COST PER PERSON ( F+V / No of
persons)$
Table of Contents
1) Introduction 3
2) Suggested Standard Operating Environment4
a) Productivity 4
b) End of Life Support 4
c) Efficiency 4
d) Flexibility 4
e) Control 4
2.1. Recommendation and Justification of the Operating System
5
3) Hardware Requirements for Windows 10 5
3.1. Possible reuse of Hardware 6
4) Operating System Security 6
4.1. Justification of Operating System Security 7
5) Sharing of Documentation 8
5.1) Justification of Sharing Method 8
6) Conclusion 9
21. 7) References 10
I. Executive Summary
The suggested standard operating environment is Windows 10
because they are using windows 8, the windows are similar as a
lot of the functions and icons are same and can easily be learned
and get used to so employees don’t need special training to use
the new system. The suggested operating system is quite secure
it has firewall defender which protects the user and the data
from any harm and denies any dangerous data to affect the
computer and can be manually controlled and Windows 10 also
allows to create group policies so an unauthorized person
cannot access with system and probably there will be no chance
of stealing confidential documents just authorized persons can
access system and see documents. Then mayor asks for
hardware requirements so mostly hardware’s they are using is
already compatible and is reusable so they don’t need to spend
more money on hardware but if required they can always use the
old computers by just updating the ram to the requirements of
Windows 10. For sharing documents there are a lot of methods
that can be used with the new operating system. Due to shortage
of budget it is advised that google drive be used as it is secure
and safe and also it is good choice, it can be used for free and
they can access it everywhere they don’t need to carry anything
with them they just need to know there username and password
to use google drive and they can make restrictions and only
allow the users they intend to share the documents with.
22. 1) Introduction
In the modern era, any organisation or any govt department
cannot survive without proper technology. Technology changes
day by day and its importance increase in every field of
organisations and govt departments so it should be updated as
per requirements like in New York city council are using old
operating system and hardware’s and the mayor want to upgrade
hardware and operating system that can increase the capability
of computers. Mayor asks for a suggestion to have a secure
method of sharing documents and minimum costs of upgrading
the computers and its operating software because they are
already went more than the desired budget. It is not easy to
communicate with computers without an operating system. An
operating system is a software that can run applications on
computers, operating system includes windows, android, Linux,
Apple OS, and hardware include motherboard, ram, hard drive,
CPU etc for better performance of computers these operating
systems and hard drives need to be upgraded on time to time
(Holt, Feveyear and Corrie 2001).
2. Suggested Standard Operating Environment
As we all know Windows 8 is being used by different
departments and city hall. Windows introduced Windows 10 on
29th July 2015 which we as firm deeply suggest council to
update as the Standard Operating system for all the computers
(Fisher 2019).
Why Windows 10? a) Productivity
Changing to Windows 10 from Windows 8 should be simple.
1) Windows 10 has a similar feature of control and navigation
like the start menu, desktop items, taskbar and many more. All
these features are now also available for touch mode. This will
make it easier for previous Windows users to use Windows 10
with ease (Forbes 2015).
2) This Operating system now has been systematized across
different platforms like mobile phones, tablets, PCs, Xbox and
IoT, it also supports future devices or platforms such as Surface
23. Hub and HoloLens (Forbes 2015).
3) Windows 10 allows users to opt for the device platform right
for the task as it supports all the different types of applications
on the tablets, 2 in 1 device touch-enabled devices it appeals the
government agencies as it reduces the cost of the hardware and
the process to maintain it (Forbes 2015).b) End of Life Support
Support for Windows 10 will be given till 14 October 2025 so it
will be good for next few years and there will be no expenditure
on a new OS for upcoming years and can safely use the
Windows 10 (Carly 2015).c) Efficiency
Windows 10 has many new features that will help its users to
work faster and efficiently. For example, Cortana is a digital
assistant which allows users to organise calendars, find files
quicker and allow fast access to information they need (BASHA
2015).d) Flexibility
There is the business version of Microsoft store which allows
users a flexible method manage, acquire and distribute
applications to Windows 10 devices it includes not only
Windows 10 store apps but also custom build apps for the
business and government use (BASHA 2015).e) Control
1) Windows 10 will allow the government to take full control
over how they want to manage the system. Mobile Device
Management allows the IT department to manage the access all
the Windows 10 devices either it is mobile, 2 in 1 touch-enabled
device or a laptop and also the Internet of Things (BASHA
2015).
2) Azure Active Directory allows administrators to maintain one
directory by allowing employees with one login which will
allow to securely login across all devices with data and settings
intact (BASHA 2015).2.1. Recommendation and Justification of
the Operating System
Windows 10 offers better security and is very user-friendly it
protects confidential data and has encryption and authorisation
features which allow only authorised personnel to access
confidential data. It enables users to do their work on any
24. platform whether it be a tablet or 2 in 1 touch-enabled device. It
can secure data by enabling biosecurity by face Id or fingerprint
scan.
Allowing council to reduce the budget they can buy 2 in 1
touch-enabled devices for some users and tablets for others
while allowing PC’s to be used by essential staff which requires
a computer by also being future enabled as Windows 10 also
support for a very long time and it will not be required to
change the Operating system in the foreseeable future as it
allows software updates and security updates (Forbes 2015).
The best part of upgrading to Windows 10 is its free as all the
computers were running on Windows 8 the activation key that
was used to activate Windows 8 can also be used to activate
Windows 10, once you download Windows 10 from Microsoft
and put the Windows 8 activation key it will send back and
verify if the key is genuine and once it is confirmed Windows
10 will be activated and the best part of this also is if Microsoft
in future do not allow this method to activate Windows 10 it
will still be legal and will allow the devices to stay activated for
the Windows 10 which was activated by this method (Fish
2019).3. Hardware Requirements for Windows 10
1) Processor: 1 gigahertz (GHz) or faster processor or SoC
2) RAM: 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
3) Hard disk space: 16 GB for 32-bit OS or 20 GB for 64-bit OS
4) Graphics card: DirectX 9 or later with WDDM 1.0 driver
5) Display: 800 x 600
("Windows 10" 2019)
The hardware used by the city council right now is as follows:
1) 550 Desktop PC’s (1GHZ CPU, 1MB RAM, 16GB HDD)
2) 300 Desktop PC’s (1.4GHZ CPU, 2GB RAM, 64GB HDD)
3) 200 Desktop PC’s (2.4GHZ CPU, 8 GB RAM, 128GB HDD)
3.1. Possible reuse of Hardware
300 Desktop PC’s with 1.4GHZ CPU, 2GB RAM, 64GB HDD
AND 200 Desktop PC’S with 2.4GHZ CPU. 8GB RAM, 128GB
HDD can be reused and Windows 10 supports it and can be
installed which saves a lot of money without buying new
25. hardware only thing required is to download the software. If
more PC’s are required 550 computers which has 1MB RAM can
be replaced with 1GB RAM which will support after
determining how many PC’s are required we can choose to
replace some PC’s with tablets or 2 in 1 touch-enabled devices
which will decrease the energy use and cost of maintaining the
PC’s and will ease the access to its users and it will be more
convenient as it will not be fixed to a place (Forbes 2015). as
Windows 10 support different devices. So, it is possible to reuse
the hardware which was previously being used by the city
council.4. Operating System Security
One of the challenges faced by government agencies is to
fight against advancing cyber danger. Windows 10 has a wide
variety of tools and process to tackle such threats and keep
secure important data (Forbes 2015).
Some of the tools and processes are as follows: -
1) The main vulnerability for any security environment is using
passwords, it can be effortlessly hacked to gain access to
important data and resources. Windows 10 helps agencies by
limiting access and give access to authorised personnel’s by
integrated 2-factor authorisation by asking for facial recognition
or fingerprint (Forbes 2015).
2) Windows Information Protection (WIP) previously known as
Enterprise Data Protection (EDP) prevents possible data leakage
without causing any problems to the employee experience. It
also prevents accidental data leak on the employee’s work
device and also the personal device which they use to send data.
It separates personal data from work data without any need to
switch environments (Windows 10 2019).
3) Hardware-based security also increases protection against
any attacks. Trusted Platform Module is an accepted chip, it has
capabilities like Secure Boot, and it helps to stop malware from
connecting itself with hardware. There is a new attribute called
Device Guard and it makes sure that only authorised
applications and code run on the device (Forbes 2015).
4) Windows 10 has its own security known as Windows
26. Defender which is much better than its predecessors operating
systems. It scans for threats, viruses and malware continuously
it is a real-time protection and it also downloads security
updates to keep the device safe from any new threats (‘Stay
Protected with Windows Security” 2019).
4.1. Justification of Operating System Security
Windows 10 has its own security and allows users to get the
latest antivirus protection against the new threats and it protects
its users from the time you turn the computer on it have
different protection for files, internet and you can also manually
run scans to detect any threats. It not only gives the
administrator to limit access and give access to authorised
personnel but also protects the users who usually go on the
internet and are vulnerable to countless threats. The Windows
Information Protection protects the important data on the
computer and gives a better experience to the user (Forbes
2015). It allows users to schedule the scan from time to time
which is good as the IT personnel will not have to check every
PC daily if it’s already scheduled (‘Stay Protected with
Windows Security” 2019). It allows the administrator to put
security measures such as facial recognition or fingerprint
which will allow the important data to be more secure (Forbes
2015).
Windows 10 has much better security than its predecessor and
will continuously be updated to stay up to date to the new
threats (BASHA 2015).
Windows 10 also includes a windows defender firewall as
mentioned above which helps to fight against different types of
malware, viruses and hackers. The job of the Windows defender
is to protect the data of the computer and also the identity of the
user (Ballew, 2019).
Why firewalls are important?
If we compare the firewall in the physical world so it can be
interpreted in simple words that it is a huge wall protecting us
against the fire and different kinds of harm by standing between
27. the person and the dangerous things behind the wall (Henry
2005).
Windows defender does the same thing but in the digital world
protects the data and user from any harm it protects the data
packets in the computer. Its jobs include monitoring data that
comes and goes out of the computer, for example, it monitors
websites and emails and makes the conclusion whether it is safe
or not (Ballew, 2019).The data that has no threat is allowed to
pass and the data which can be dangerous is denied by it. It
works the same as the physical firewall it is just a simple
explanation of the technical word (Ballew, 2019).
Though the firewall has been set to default active it can be
managed manually to block a program or the applications to
pass data without any block and it also gives the option to turn
it off but this not advised if you don’t have any other anti-virus
programs like McAfee or Norton (Ballew, 2019).
Group policy another amazing feature of Windows 10 it allows
the administrator to either centralize or make it a local policy in
this the administrators has the power to either restrict
operations to the certain or all users as suggested by the term
local and central it is a wonderful feature in Windows 10 this
can include restricting access to particular folder or any other
type of data that the admin does not want to share with certain
users. And can also be used to encrypt the data with password
and only the users that know the password are allowed to access
the files it has many other features that make it a really good
security feature that can work for many users and can be
controlled by the administrators which reduce the risk of leak of
the important data (CHRIS, 2016).
5) Sharing of Documentation
Many organisations face a lot of challenges for data sharing and
they want to share a document without any theft of data. Before
technology revolution organisations used to share documents
via post or other traditional ways in printed of (McAughtrie
2016). Now in the modern technological era, there are a lot of
28. ways of saving and sharing documents online. In these online
methods authorized persons access these documents, authorized
persons can see these documents and some authorized can edit
these documents on online sharing applications, sites, such as
google drive. Google drive can be introduced to the system as it
is one of the most convenient ways of sharing data. Google
drive is software from google which was invented in April 2012
and this allows the users of it to share data with other preferred
users (Brigham 2014). The shared data stays secure as it is not
available to anyone other than those who have an administrative
permit (Brigham 2014). The drive is also cheaper than other
data sharing options and also allows a good amount of free
space to its users, which can also make it easy for the company
to stay in a budget. 5.1) Justification of Sharing Method
The google drive is a very flexible application which can be
used in any operating system and even the using option is very
simple as there is no need of installing the application as well
and just browsing in the internet and using the email account
google drive can be accessed and the data that is created and
edited stays saved and secured without any hustle (Piper 2005).
It is a single platform where everything is included, for
example, google docs, google slides, google photos, everything
can be accessed and used by any permitted users, so there is no
need of using any other additional platform (Brigham 2014). A
google drive is a portable option for the users as they do not
require to carry it everywhere, all the data are saved in the
cloud and it can be accessed from anywhere.
6) Conclusion
It is recommended that the Standard operating system be
Windows 10 as it is secure and free to upgrade to which saves a
lot of money as buying a new operating system is expensive,
29. this would resolve the difficulty that the council faces with no
extra cost. Windows 10 supports a lot of software and has tools
which will be useful in the daily day to day business of the
government. Most of the hardware is supports the Windows 10
and as mayor said they need to cut back on computers but if
required the computers that are not compatible due to less ram,
though it can be upgraded to the required ram that supports
Windows 10 which will not only reduces the expense but also
fulfil the mayor’s wishes to decrease the number of computers.
Security of Windows 10 is better than the Windows 8 it has its
own firewall and it is updated regularly to tackle new threats
and the devices can also be encrypted with facial recognition
and fingerprint sensor to secure it more on the important data
and can only be accessible to authorised users which make the
security top-notch and allows them to be up to date to the latest
trends. As for the sharing of documentation google drive is
suggested which is quick and can be accessed from anywhere
and is free of cost till certain storage but it also allows it users
to allow the administrator to restrict access and only allow the
authorised people as it an online cloud-based document sharing
system even if the computer is broken the files can be restored
from the cloud and can be updated from one computer and the
progress can be seen by the administrator and also be shared by
as many people as possible.
7) References
30. 1. Brigham, Tara J. 2014. "Taking Advantage Of Google's Web-
Based Applications And Services". Medical Reference Services
Quarterly 33 (2): 202-210. doi:10.1080/02763869.2014.897521.
2. McAughtrie, David. 2016. "10 Methods To Improve The
Efficiency Of Document Sharing For Your Project". Blog. Unit4
Blog. https://www.unit4.com/blog/2016/06/10-methods-to-
improve-the-efficiency-of-document-sharing-for-your-project.
3. Piper, Paul S. 2005. "Google And Privacy". Internet
Reference Services Quarterly 10 (3-4): 195-203.
doi:10.1300/j136v10n03_17.
4. Forbes, Insights. 2015. "Windows 10: A New Operating
System For Government IT". Blog. Microsoft Industry Blogs. 2)
https://cloudblogs.microsoft.com/industry-
blog/government/2015/07/29/windows-10-a-new-operating-
system-for-government-it/.
5. Holt, John, Duncan Feveyear, and Nick Corrie. 2001. "Do We
Need Yet Another Office PC Upgrade?". OR Insight 14 (3): 3-
12. doi:10.1057/ori.2001.10.
6. "Stay Protected With Windows Security".
2019. Support.Microsoft.Com. https://support.microsoft.com/en-
au/help/4013263/windows-10-stay-protected-with-windows-
security.
7. Fish, Tom. 2019. "Windows 10: Can You Get Windows 10
For Free? Is There A Free Download Of Windows
10?". Express.Co.Uk. https://www.express.co.uk/life-
style/science-technology/1105494/windows-10-for-free-free-
download-of-microsoft-windows-10.
8. BASHA, ERIC. 2015. "Six Reasons Why Governments
31. Should Upgrade To Windows 10 - Microsoft Industry
Blogs". Microsoft Industry Blogs.
https://cloudblogs.microsoft.com/industry-
blog/government/2015/12/23/six-reasons-why-governments-
should-upgrade-to-windows-10/.
9. Carly, page. 2015. "Windows 10 Will Reach End Of Life On
14 October 2025 | Theinquirer". Http://Www.Theinquirer.Net.
https://www.theinquirer.net/inquirer/news/2418619/windows-
10-end-of-life-date
10. "Windows 10". 2019. Answers.Microsoft.Com.
https://answers.microsoft.com/en-
us/windows/forum/all/windows-10/8b0ecd27-0868-4415-9f5a-
f6e365549ca0.
11. "Protect Your Enterprise Data Using Windows Information
Protection (WIP) (Windows 10)". 2019. Docs.Microsoft.Com.
https://docs.microsoft.com/en-us/windows/security/information-
protection/windows-information-protection/protect-enterprise-
data-using-wip.
12. Fisher, Tim. 2019. "Windows 10: Everything You Need To
Know". Lifewire. https://www.lifewire.com/windows-10-
2626217.
13. Ballew, J. (2019). Find and Use the Windows 10 Firewall.
Lifewire. https://www.lifewire.com/windows-10-firewall-
4145353
14. CHRIS, H. (2016). What Is “Group Policy” in
Windows?.How-To Geek.
https://www.howtogeek.com/125171/htg-explains-what-group-
32. policy-is-and-how-you-can-use-it/
15. Henry, Paul A. 2005. "Firewall Considerations for the IT
Manager." Information Systems Security 14 (5) (Nov): 29-51.
https://search-proquest-
com.dbgw.lis.curtin.edu.au/docview/229562617?accountid=103
82.
2
Introduction to Business Technology (ISYS2008)
Contents
Case Study – New York City Council 2
Case Study – Requirements 3
Assignment Aim: 3
Date Due: 3
Submission Format: 3
Submission Requirements: 4
Assignment Weighting: 4
Late Assessment Submission and Extensions 4
Assignment Marks Breakdown: 4
Report Presentation Requirements: 5
Important Tips: 5
A Sample Report Outline 6
Peer Evaluation Template7
Assignment Marking Guide 8
33. Case Study – New York City Council
New York City (NYC) Council is one of the largest councils in
the world. Consisting of 51 districts, the NYC Council is
responsible for the creation of local laws that enable the council
to respond to issues and community needs within NYC. The
council has more than 294,000 employees that work in the many
skyscraper buildings within the borough of Manhattan. Recently
New York City Hall, home to the Mayor of New York and over
1000 staff, has undergone a renovation, to the interior and
exterior of the 17th Century building. As a result, the cost of
this renovation exceeded the planned cost by 50 million US
dollars and ended up costing 150 million US dollars.
Unfortunately, the council also now needs to spend a
considerable amount of money on the ageing IT equipment at
City Hall, but due to the over expenditure on the renovation, a
minimal budget remains for IT expenditure.
As a result, the Mayor of New York has approached your
consulting firm and asked for assistance in budgeting for the
new IT equipment. The Mayor has raised some interesting
concerns as detailed below.
Concern 1: The council currently has more than 1000 desktop
personal computers running Windows 8 operating system,
spread across the departments and locations within City Hall.
The Mayor feels this is far too many personal computers and
understands that reducing the number of required PC’s will also
reduce energy consumption.
Concern 2: The desktop personal computers within City Hall
currently use the following hardware
specifications.
34. · 550 Desktop PC’s (1GHZ CPU, 1GB RAM, 16GB HDD)
· 300 Desktop PC’s (1.4GHZ CPU, 2GB RAM, 64GB HDD)
· 200 Desktop PC’s (2.4GHZ CPU, 8 GB RAM, 128GB HDD)
The Mayor would like to understand if any of the current PC
devices can be salvaged and used for at least the next three
years.
Concern 3: The Mayor is security conscious and is very
concerned about the security implications that may be present
since the council is running an operating system that is seven
years old.
Concern 4: The Mayor has indicated that all documentation
recorded electronically in council meetings needs to be securely
backed up in a location that all councillors can access at any
time of the day.
Case Study – Requirements
To address the Case Study, provide a report to the Mayor that
includes the following:
1. Advise and explain why Windows 10 would be the most
suitable Operating System to use as the councils Standard
Operating Environment (SOE), over similar operating systems
such as Unix, Linux and MacOS X (Catalino), given the
difficulties the council is facing with IT expenditure. (ULO 2,
ULO 3)
2. Advise the council on what additional hardware is required to
support Windows 10, and explain how it may or may not be
possible to re-use some of the existing hardware. (ULO 2)
3. Direct the council on what Server Operating System based
security would alleviate the Mayors security concerns. (ULO 4)
4. Explain how cloud-based services such as Microsoft Azure
and Amazon Web Services, may or may not be the best solution
to the fourth (4th) concern that the Mayor has raised. (ULO 4)
PLEASE NOTE THIS FINAL REPORT PARTIALLY FULFILS
THE REQUIREMENTS FOR THE UNIT AND COVERS THE
35. FOLLOWING UNIT LEARNING OUTCOMES (ULO) AS
LISTED IN THE UNIT OUTLINE
ULO 2: Explain the concepts and theoretical aspects of the
components in an operating system.
ULO 3: Demonstrate security mechanisms at the operating
system level.
ULO 4: Explain the fundamentals of networking (networking
protocol concepts, TCP/IP, domain
and addressing)
Assignment Aim:
The assignment consists of a set of evaluation exercises to
familiarise students with the features of operating systems and
networking. The team working skills component is designed to
encourage students to think about and understand how well you
and your partner performed in the team activity for you to
develop these essential skills.
Assignment Weighting:
The assignment is worth 30% of the unit final grade.
Late Assessment Submission and Extensions
Please refer to the unit outline, available on blackboard.
Assignment Marks Breakdown:
The overall mark for the assignment is 100 Marks. The marks
are broken down into the following:
· Group Report – 90 Marks
· Evaluation (Peer) – 5 Marks
· Evaluation (Group) – 5 Marks
Please note it is unlikely that students in the same group will
receive the same score since evaluations are included in the
marks allocation.
Report Presentation Requirements:
· Normal Text - Arial 10 pt
· Major Headings – Arial 12 pt (Bold)
· Minor Headings – Arial 10 pt (Bold)
· 1.5 line spacing, Page numbering (centred at the bottom of
36. each page - footer)
· Header (Student Names and ID: Arial 8 pt, italics, right-
aligned)
· 2.5cm margin-left of page, 2.5cm margin-top, bottom and right
of the page.
· Assignment should be submitted in MS Word Format, Spell
Checked, and Grammar Checked.
· Approximately 3,000 words in length, excluding diagrams;
appendices; and references.
· The assignment should contain no less than two academic
journal references and textbooks. However, it is expected that
students will provide approximately ten references.
· Chicago referencing format must be used.
Important Tips:
· Avoid Plagiarism
· Plagiarism detection software will be used to detect
plagiarism.
A Sample Report Outline
I. Cover Page
II. Executive Summary
III. Table of Contents
IV. Table of Figures (If Applicable)
V. Table of Tables (If Applicable)
1. Introduction
2. Standard Operating Environment
3. Hardware Requirements
4. Server Operating System Security
5. Cloud-Based Services
6. Conclusion
7. References
37. Assignment Marking Guide
Criteria
Marks
Executive Summary
2.5
Table of Contents
Table of Figures (If Applicable)
Table of Tables (If Applicable)
Introduction
2.5
Standard Operating Environment
20
Hardware Requirements
20
38. Server Operating System Security
20
Cloud-Based Services
20
Conclusion
2.5
References
2.5
Report Total Marks
90
Peer-Evaluation
5
Group-Evaluation
5
Evaluation Total Marks
10
Assignment Total Marks
100