Reference no: EM132455528
Assignment: Linux Implementation Proposal: Client Response Memo
Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:
• How will security be implemented in the Linux systems-both workstations and servers?
• End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?
• The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?
• Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?
• How does software installation work on Linux? Can we use existing Windows software?
• How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.
Discuss role of artificial intelligence and machine learning
: Please answer the following questions: Discuss the roles of Artificial Intelligence and Machine Learning in Big Data Analytics. Must be APA and Citations.
|
What is the value of your alligator stock now
: The Alligator Lock Company is planning a two-for-one stock split. You own 5,000 shares of Alligator's common stock that is currently selling for $120 a share.
|
Develop proposals for your development strategy
: For this assignment, you will develop 3 proposals for your development strategy, which include outsourcing (buy), insourcing (make), or a combination of both.
|
Infotech import in strat plan
: Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years?
|
How will security be implemented in the linux systems
: How will security be implemented in the Linux systems-both workstations and servers? End users have expressed some concern about completing their day-to-day.
|
How your approach to security and to dr matches the value
: A 3-4 page APA original document in MS-Word describing your Information Security and DR approach. This will include your assessment of the value of your data.
|
What steps might you take to gain the cooperation
: Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty.
|
Discuss internal controls and provide an example
: Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site's user experience.
|
Summarize a recent sop bypass exploit
: Thus far your readings have explored Same Origin Policy (SOP) Bypass vulnerabilities. Using the UC library or the Internet, research, identify, and summarize.
|