Technology;Technological Decisions

Technology.

Technology
Technology

A technology is useless unless it is put to use.

This is a crushingly obvious statement, but it does serve to remind us that a technology that never makes it out of a laboratory or an inventor’s basement might as well not exist.

We have recently discussed the process by which technologies are introduced and then put into use.

Here, we examine the method of diffusion, the process by which technologies make it into homes, factories, and so forth.

In this assignment, you discuss how a CEO makes technological decisions and the rationale behind those thought processes.

After reading the module notes and all supplemental materials, respond to following:

Scenario:

You are a CEO of well-established and profitable software technology firm that has a choice to invest in one of two new software technologies; one that promises modest profit with very little risk and another that may yield a very high profit but at considerable risk.

Keeping in mind cultural factors (social values/priorities, politics, economy, technology, regulation, etc.)

Answer the following:
  1. What would your choice be?
  2. Who in your company might support the first technology and who might support the second? Think about individuals from all levels of the company, from the CEO and board members down to R&D personnel.
  3. What considerations of your decision need to be made from a societal perspective? Consider individuals outside of the company itself.
  4. How might the type of industry affect this type of decision?

Support your position using appropriate sources that are properly cited.

Your paper should be 1-2 pages in length (not including title and reference pages).

It must be formatted according to APA standards (Links to an external site.)

[PDF, File Size 131 KB], 6th edition, including title and reference pages.

 

Microsoft Word 2016 Project

Microsoft Word 2016
Microsoft Word 2016
Field: English – Article writing
Report Issue
Microsoft Word 2016 Project –
PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU CREATE WORD FILES

Use Microsoft Word 2016 to complete the following project.

You can also use Microsoft Word 2010 or 2013 to complete this project, however you will not be excused from any part of the project because you are using a different version.

You may have to search for features in Word 2010 or 2013 to complete this project.

You are to create a personal resume and a cover letter using the following instructions.

Assume that you are graduating this semester.

1. RESUME –

Use a Resume Template (Open Microsoft Word 2016 and search “Resume” in the Search for online templates box) to create a personal resume using whichever style you desire.

Try to be as accurate as possible when personalizing the resume. But you also can create or improvise information, if you wish to change or embellish certain areas of your resume.

Check spelling and grammar in the resume.

Save the resume as [Your]LastNameResume.docx.

2. COVER LETTER –

Go online to any job search website you wish, i.e monster.com or careerbuilder.com.

Find a job ad in an area of your major or that interests you.

Carefully following the instructions below, create a cover letter for your resume, gearing the letter to the advertised job; this is a letter inquiring about the advertised job.

You do not need to use a template file to create the letter. You can simply write the letter from scratch, but it MUST be a complete letter of inquiry about a job.

If you do not know what a cover letter is, then use a search engine, i.e Google, to learn about it.

Complete the following in your Cover Letter:

A. Use the job advertisement information, either the company mailing address or their email address, for the inside (sending) address; you must set this sending address at the 3″ mark on the ruler using a left tab alignment tab-stop (review pages WD149-150).

B. You also MUST include at least One table (review pages WD157-159).

C. You also MUST include one bullet list (review page WD21-22) in the body of the cover letter.

Do NOT create a table or list for any addresses in the letter; the table and list must be in the body of the letter and separate from each other (no lists inside the table).

Try using information about yourself related to the job inquiry to develop the table and the numbered list, such as relevant course work, personal references, hobbies or skills.

Again, you may improvise and create information, if you wish.

Computer Science; Computer Security

Computer Science
Computer Science

Computer Science.

The United States Government Configuration Baseline (USGCB) evolved from the Federal Desktop Core Configuration mandate and is a government-wide initiative to maintain and properly update security settings

(http://usgcb.nist.gov).

Research and summarize at least 2 recent security patches that relate to your current operating system.

In a separate paragraph, do you feel these security patches help secure your computer? Why?

Defend your response.

Comp. science is the study of the theory, experimentation, and engineering that form the basis for the design and use of computers.

It is the scientific and practical approach to computation and its applications and the systematic study of the feasibility, structure, expression, and mechanization of the methodical procedures (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to, information

Security Vulnerability; Computer Science

Security Vulnerability
Security Vulnerability

Security Vulnerability.Personal computer, I am running the Windows 10 1803 (April) update.

Two recent vulnerabilities that have been patched was the Meltdown and Windows Defender exploits.

At the beginning of 2018, Meltdown was (and still is) the biggest security vulnerability heard of.

It affects most, if not all, Intel Desktop CPU’s dating back to 2006.

(Wong, 2018) Microsoft released a security patch that mitigated the exploit by forcefully implementing kernel page isolation.

This helps to prevent attackers from using the Meltdown exploit against Intel based PCs.

(Wagenseil, 2018) However, when the security patch was pushed to Windows 10 1709 PCs, it opened another vulnerability, which undermined the security patch.

Windows 10 1709 PCs are still vulnerable and should be updated to the latest version, 1803.

(Freedman, 2018)The second vulnerability was the Windows Defender/Anti-virus vulnerability.

A critical flaw was found in the Windows Defender and other anti-virus’s malware engine that runs on the PC.

An attacker could have a file downloaded to the computer and when Windows Defender or another affected anti-virus would scan the file, the attacker could execute code and take control of the system.

The attacker would gain full access over the system.

Microsoft has since rolled out a patch to fix this vulnerability.

(Tung, 2018)I feel better knowing that critical security vulnerabilities like these have been patched.

It gives me peace of mind knowing that more security vulnerabilities each day are being found and patched.