Free Essay

Cis 210 Term Paper

In:

Submitted By big007hed
Words 2926
Pages 12
Website Migration – Tony’s Chips

Website Migration – Tony’s Chips
With Tony's Chips being purchased by the Acme Company, they would like a new change the way the website is used for the business. The old method was an externally hosted site with no online ordering options. The new website plan is for it to be redesigned to allow for online ordering, onsite web hosting, and site redundancy to allow for maximum uptime. What they are asking for is called the system development life cycle (SDLC). Systems development life cycle is defined as "activities and functions that systems developers typically perform, regardless of how those activities and services fit a particular methodology” (Shelly & Rosenblatt, 2011). The systems development life cycle contains the following steps in the model: required analysis, testing, implementation, documentation, deployment, and maintenance.
Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.
The new web architecture is a complete change from the previous implementation of the site causing an entirely new template and architecture. Previous setup used manual ordering, so they would have to call in or physically come in to order the chips. The new architecture will allow for online ordering that will free up more user time in answering phones taking orders. I am assuming the previous network architecture is up to date and running properly. With this assumption, few technology upgrades will be fully required.
Improving the technology infrastructure would require an upgraded internet connection to help offset the new traffic that will be occurring with the web site being hosted locally. A new physical server to become a web server, using one of the current servers and repurposing it to become the new database server. Also, a more advanced router/firewall would be recommended to help keep security measures high with the new traffic that will be coming to the network infrastructure.
Moving a website from an external source to an internal source can be easy if all of the account information is current. With an external party hosting the site, there are security measures in place to make sure it isn't changed without authorization. Once all of the account information has been verified the external source will need to know a date to move the DNS entries for the website name (http://www.tonyschips.com) to the business IP address that will be assigned to the site. The website certificate will have to be purchased from a company (example GoDaddy and BlueHost) for you to host on your network. Multiple IP addresses will need to be purchased for your business location, so the website is on another IP address than the main business internet traffic.
For the backup and disaster recovery plan there are many options that could support and accomplish what is asked. The primary choice for maximum uptime is a hot site. "Hot sites provide the ultimate disaster recovery experience, with instantaneous or near real-time recovery of operations when the primary site fails” (Chappelle, 2012). A hot site is a location where it is setup the same as the primary installation. Servers are up and running with the software loaded and up to date. Hot sites allow for real-time backup from the primary location to be sent to the hot site and copied over for a minimal loss of time down and data. Real-time is relative as the system will have to be copied and sent through the internet to the hot site location using software (example SnapMirror). With an upgraded internet connection or a dedicated line to the hot site, it should not affect business functions. Why a hot site is ideal is that if a fire burned the main building down the hot site could pick up the website traffic and data transactions without the users noticing a difference, allowing for time to rebuild the previous server infrastructure.
The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).
As my expertise with project and system management is with Windows systems the new architecture will be based off of Windows Server 2012 R2 for server OS, IIS for the website hosting, and SQL for the database with Visual Studio for the site design. If this software is not available for the current system licensing will need to be purchased. When getting the members together who will be developing, implementing, and deploying a website they will have to have Visual Studio and SQL backgrounds to make a seamless transition in use and cooperation.
Windows Server 2012 R2 is the most up to date version of Windows server operating systems, with this operating system you can make a single server "play" multiple roles. It can be a file server, print server, domain controller, web server, or database server. In our instance, there will be at least two dedicated servers, one for the web hosting and the other for the database. Windows Server 2012 R2 "can use the Web Server (IIS) role to set up and manage multiple websites, web applications, and FTP sites” all from a single application (TechNet, 2012). SQL databases are an industry standard; it is a database program that allows for multiple connections to it. SQL can support having the inventory database, customer information database, and order history database all stored on the same SQL server. Visual Studio is not the top end of website design like C++, where C++ components perform faster but it does allow for the "ability to be created quickly and easily by a wide group of developers” as it is easier to use (Homer, 1999).
Evaluate alternatives to the company self-hosting the site.
With alternatives for self-hosting the site, the main choice is an externally hosted site. Now that can come in different flavors of externally hosted solutions. The options include free web hosting which is a basic service where the provider allows ads and other means to generate revenue, colocation which provides your business a dedicated server and internet connection, or e-commerce web hosting that provides SSL (secure socket layer) connections for safety with purchasing items.
For Tony's Chips website, the best solution would be the e-commerce choice as a new site requires online ordering. This version can be set as we own the hardware and pay for physical space in their data center and support time or where the hosting company owns the equipment, support team time and backup responsibilities. I would recommend the option where the hosting site owns the hardware as this ensures up to date software and hardware, no depreciating hardware or licensing to have to worry about, or increased bandwidth purchasing. This option can also be setup where the entire building of the site and maintenance of the data be handled by them thus reducing the employee time or physical workers needed at the central office.
Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website. The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.

This Gantt chart shows the time it would take to go from developing a project idea to the full implementation if the job were a time sensitive project. I am assuming it as the purchasing of Tony's Chips by Acme Company means a change in management. Developing the idea and getting approval would take around three business days. Specifying project responsibilities and getting a general template together would take seven working days, this allows for changes and data manipulation ideas to be hashed out before infrastructure is fully built. Infrastructure building and deployment is a process that would take three business days. Testing is the next step, and it would require six days including weekends for a complete testing experience. Implementation and deployment is the final step and would require two days for moving to a production server and training of the users.
The last piece is maintenance of the system. It is built into this chart, but it is a continual process. Maintenance includes system updates, upgrades, bug fixes, security fixes, and other items found that require support. Maintenance of this kind should be shared among multiple employees in the IT department so that there is not one person responsible for the whole system and allows for better support. The more staff familiar with the system means quicker and better user support.
Explain and justify the system architecture you have selected.
The new architecture is based on systems development life cycle (SDLC) which “includes the following steps: Systems planning, Systems analysis, Systems design, Systems implementation, Systems support and security” (Shelly & Rosenblatt, 2011). These steps are a guideline for how to make a significant systems change for the business. The change from externally hosted site with no online ordering capabilities to an internally hosted site with online ordering options marks an important system change.
The planning step is about how to design a new site with the new features, how to move the old website to our control, and how to implement the best and safest website internally. Working with management to figure out what they want the site to look like as well as the other departments helps build a template or idea of what is going to be the final system look. Moving the old website to our control so users will be directed to the proper site is a crucial step, if missed users could be pointed to the old site or no site at all. Working with all required departments allows for the greatest communication and can reduce changes or issues with the site before it becomes a major problem. This step requires management, programmers, and systems administrators to work together as expectations and actual possibilities of what the site and project can do come into play.
The analysis step is about budgeting for the proper infrastructure, checking with services and other businesses on internet requirements, and bringing all information to the project team for review and approval. With the new site coming in house there will need to be a new network infrastructure such as a new servers and an improved router/firewall for security. Speaking with internet service providers (ISPs) can help alleviate the issue of slow site response or business usage with heavy traffic. If the proper bandwidth is purchased ahead of time, it will alleviate those concerns. Getting together to discuss the bandwidth options, server options, and other network infrastructure items help get everyone on the same page and make some changes if necessary. With this step the finance department, systems administrators, and management would be required to review the cost of the changes proposed.
System design stage is where the ideas of what the site will look like and how it will operate. The blueprint for the whole system is figured out in this step. Design process covers how the site will look, what type of internet connection, and what kind of server and back-end support it will have. The information gathered during the planning phase is the guideline for what is conceptualized during this stage.
System implementation brings the ideas to fruition. The different parts of the project team will begin work on their parts like building a generic website for testing, building a server with web capabilities, and creating the structure of the database. Once the pieces have been constructed they will begin the process of putting them together until it is a seamless system. That leads to a better understanding of how things will work and allows for changes to be made before it is in production. Once everything is tested, and it is running smoothly it is put into production. Implementation step requires that the programmers, database administrators, and systems administrators all collaborate to fulfill this.
System support and security step is a crucial step in the whole process. If there is no support or security the system could crash and there would be no one to bring it back up, or on a smaller scale if there is a wrong name entered for a bag of chips it could affect sales. Providing timely and appropriate support for the new system means there is a maintenance plan in place. Updates, bug fixes, security patches, testing of any changes before implementation, and monitoring are all essential to making sure the system is running at its best. The piece of this that is forgotten is licensing for software or hardware, if the license runs out the software could stop working which could be catastrophic.
Illustrate the system architecture using Visio or equivalent software.
The diagram above shows the architecture and how it will work: * Website visited by user * Primary web server answering the request * Primary database server pulling up the required data * Real-time backups running to hot site location * If primary web server is unresponsive, the traffic will be directed to the backup web server at the hot site * Data differences between primary and backup site depend on change size and internet speeds * Allowing for seamless use for the end user
Create a use case that documents the event of a customer ordering a bag of chips from the new Website. The use case should include a graphical representation using Visio or equivalent software and a text description of the events.
Brief Description: This use case will describe how a customer will order a bag of chips through the website.
Actors: Customer
Preconditions: The customer has a working laptop with an active internet connection. The website is up and functional.
Basic flow of events: Customer navigates to http://www.tonyschips.com and searched the inventory. To accomplish this the web server points to the database server with the up to date stock. The customer finds the type of chips they want to purchase. They select an amount of bags and click purchase. The web server checks with the database server to make sure the quantity is available and then moves forward with the sale. The customer is presented with the cost and enters a valid payment option. The web server communicates with the payment options bank to make sure the funds are available. Once verified there are adequate funds the purchase is approved, and the inventory is removed from the database it is set to be withdrawn from the warehouse for shipment. The customer receives payment verification and waits for the chips. The warehouse pulls the inventory ordered and set it to be shipped to the customer. The chips are then sent to the customer. Once a shipment is marked as delivered the sale is closed and marked as successful. Discuss the support operations that the internally hosted Website will require after implementation.
Support for an internally hosted website will need work and support from different sections of the IT department. The systems administrator will have to make sure that the hardware is up and running properly. That encompasses servers, routers, firewalls, and internet connections. Programmers will be required to fix code issues, bugs, or database changes that are requested. Support technicians will be tasked with supporting the end users in the company and issues reported from customers who need help.
Maintenance will be required for the systems themselves with updates and upgrades but if there is a change than the support technicians will need to be informed and possibly trained on any changes. When the upgrade is made, it is imperative that all support groups are aware and have a functional idea of what the changes entail. If the company is large enough there could call/support centers after regular business hours to support customers and log work tickets for issues experienced.
Explain how you will evaluate the performance of the new site and the success of your project.
The project would be considered a success when the website is up and running with orders being received and processed correctly. To put a timeframe for the project to be considered a success would be a fiscal year, this is long enough for proper reporting and data collection and have it presented. Within a financial year, there will have also been updates done and maintenance showing that the procedures in place are working.
The evaluation of the project would be determined by the ease in which the site is running and how many changes the support staff has had to make to get it fully working. One evaluation step I would like conducted before anything could be considered a success would be a set outage at the primary site and testing the backup and hot site procedures. If the internet is disconnected at the main site does the hot site come up within the allotted time? If so than that part of the project is a success. As always if the customer is satisfied with the site and orders and leave compliments that make management happy.
References
Chappelle, M. (2012, June). Which Disaster Recovery Site Strategy Is Right for You? Retrieved from Biztech: http://www.biztechmagazine.com/article/2012/06/which-disaster-recovery-site-strategy-right-you
Homer, A. (1999, September). Components and Web Application Architecture. Retrieved from Microsoft Developer Network: http://msdn.microsoft.com/en-us/library/bb727121.aspx
Shelly, G., & Rosenblatt, H. (2011). Systems Analysis and Design. Cengage Learning.
TechNet. (2012, February 29). Web Server (IIS) Overview. Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/hh831725.aspx

Similar Documents

Premium Essay

Cis 210 Term Paper

...Benjamin Porter 12/13/13 Benjamin Porter 12/13/13 Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Abstract Developing and designing an effective in house e-commerce website for Tony’s Chips. Website MIGRATION PROJECT [Document subtitle] Website MIGRATION PROJECT [Document subtitle] Introduction Tony’s Chips has been acquired by a new independent company. The new company’s intention is to focus on the e-commerce website that they have planned. Currently, the old website is externally hosted and it is required to be moved to an internal one. This new system will store, retrieve, and have data recovery solutions for the company. An additional backup site will need to be created as a failover if the main site goes down. The new and improved site will need to allow customers access to order products online. Project Goal This project has an overall goal of producing a system and website that is in accordance to the demands of Tony’s Chips. The systems architecture will involve all of the systems requirements in its design. The architecture will make use of programs that perform efficiently and properly. Application compatibility is also key to for all of the system components that are going to be used in the system. The project is also aimed at creating a reliable backup and recovery solution for the system. Available system component alternatives The requirements for the system is one that has a system architecture...

Words: 2669 - Pages: 11

Free Essay

Cis 210 – Systems Analysis and Development Website Migration Term Paper

...Website Migration Project Chinnasut Nhurod CIS 210 – Systems Analysis and Development Dr. Wesley E. Phillips Strayer University September 15, 2013 Website Migration Project for Tony’s Chips Building the Web Architecture In order to build the web architecture, the system analyst would be required to analyse the business requirements of the organization and then develop a clear statement of goals of the organization. Since, the old site of the company is running it would be vital to understand the technological and business related issues associated with the previous website. Along, with that it should also be determined whether the IT staffs of the company possesses necessary experience and skills essential for the implementation of the project. The company might have to consider additional resources, training programs, and hiring of consultants for the project’s success (Nelson et.al, 2010). The project should be developed on a modular manner so the users can approve and test the various functional elements of the website. Since the Tony’s Chips website was already operating, it would be essential for the developer to gather the existing functional requirements for the website. During the data collection process the system analyst will conduct interviews of the people from the product support department, and they will gather the system documentation using the fact finding techniques (McArdle et.al, 2010). Once all the requirements are fulfilled the next step would...

Words: 3871 - Pages: 16

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...com/downloads/acc-206-entire-course-new/ http://homeworktimes.com/downloads/acc-206-new-week-1-assignment-chapter-one-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-assignment-chapter-two-three-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downloads/acc-492-complete-course-acc-492-entire-course/ http://homeworktimes.com/downloads/acc-548-entire-course-acc-548-complete-course/ ...

Words: 3197 - Pages: 13

Premium Essay

Aau Catalog

...ALLIED AMERICAN UNIVERSITY Personalized. Flexible. Dedicated. Online Programs – Individual Support – Open Enrollment – Ease of Transfer Credits UNIVERSITY CATALOG 2013 Seventh Edition 22952 Alcalde Drive, Laguna Hills, CA 92653 Phone: (888) 384-0849 ∼ Fax: (949) 707-2978 7:00 A.M. – 5:00 P.M. (Monday – Friday) Email: info@allied.edu Website: www.allied.edu KEY STAFF AND FACULTY Charlotte Hislop, Ph.D. Candidate, President/CEO Bonny Nickle, Ed.D., Provost Eric Sharkey, M.Ed., Director of Education Bill Luton, Ph.D., Director of Assessment and Dean of Business Carlo Tannoury, Ph.D. Candidate, Dean of Computer Information Systems Patricia Drown, Ph.D., Dean of Criminal Justice and General Studies C.J. Bishop, M.B.A., Institutional Research Frank Vazquez, Operations Director Parrish Nicholls, J.D., Director of Compliance Lindsay Oglesby, Admissions Director Abby Dolan, B.A., Registrar Sasha Heard, M.B.A., Student Services Manager Barbara Jobin, B.S.B.A., Career Center Manager Hugo Aguilar, B.A., Chief Financial Officer Richard Madrigal, B.A., Financial Aid Officer As a prospective student at Allied American University, you are encouraged to review this catalog prior to signing an enrollment agreement. You are also encouraged to review the student performance fact sheet which must be provided to you prior to signing an enrollment agreement. This catalog is not a contract between the student, AAU, or any party or parties. Reasonable effort was made at the time this document...

Words: 52297 - Pages: 210

Free Essay

Contingency Analysis

...Department of Electrical and Electronic Engineering Bangladesh University of Engineering and Technology Dhaka, Bangladesh E-mail: nahid@eee.buet.ac.bd S. Ahmad1, G.A.K.Biswas, A.U.Elahi, N.M.Zakaria Department of Electrical and Electronic Engineering BRAC University Dhaka, Bangladesh E-mail: 1 shahriar.me@gmail.com Abstract—In recent years, power systems are frequently operating under highly stressed and unpredictable conditions because of not only the market-oriented reform of power systems but also the integration of various renewable energy sources. The uncertain factors resulting from the market constraints and the inherent randomness of renewable energy set higher requirements on the reliability of electric networks. This paper presents the reliability assessment of Bangladesh Power System (BPS). Reliability index, loss of load probability (LOLP) of BPS is evaluated using cumulant method. The rationale for using the cumulant method is to take advantage of its computational efficiency. BPS has sixty one generators and a total installed capacity of 5275 MW. The maximum demand of BPS is about 5000 MW. The relevant data of the generators and hourly load profiles are collected from the National Load Dispatch Center (NLDC) of Bangladesh and reliability index ‘LOLP’ is assessed. The simulation results show that the LOLP of BPS is 2.06%. Keywords—cumulant method, convolution, LOLP, forced outage rate, Gram-Charlier series Introduction An electric utility’s...

Words: 2786 - Pages: 12

Free Essay

Data Indexing for Heterogeneous Multiple Broadcast Channel

...Data Indexing for Heterogeneous Multiple Broadcast Channel Andrew Y. Ho and Dik Lun Lee Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: andrewho@cs.ust.hk, dlee@cs.ust.hk Abstract vision in the computing industry – from traditional wired This paper studies a heterogeneous multiple channel and stationary desktops to a fast growing area of mobile environment (HMCE), in which the channels are computing. The trend of using notebook computers, controlled by different wireless operators. To the best of palm-size computers, and personal digital assistants (PDA) our knowledge, there is no previous research on this is already in full swing. Furthermore, the enhancement in scenario. In this paper, we first present the architecture for reliability, transmission, and speed of wireless links HMCE which makes use of a centralized index server to facilitates the mobility of communication. Usually, a broadcast index information about the broadcast data on a wireless communication environment consists of two sets dedicated index channel. An analog can be drawn between of entities: a large number of users equipped with mobile HMCE and WWW: the wireless operators are web sites devices (mobile clients – MCs) and a relatively fewer and the index channel is Google; Google indexes web number of stationary mobile service stations (MSS) that pages so that...

Words: 5335 - Pages: 22

Free Essay

Cis 210

...Assignment 1: Inventory Management Systems CIS 210 Prof. Souza April 16, 2014 In this paper I’m going to describe how I can come up with a plan to run automated inventory system on a low budget, for a retail clothing store. In detail I will describe the necessary equipment that it takes to run such a project. Also, I will be explaining the overall cost and the maintenance that is required to run the system properly. First off, we need to purchase an inventory management system. According to Inflow, (2014) over 300,000 small businesses use Inflow inventory. Joelle Krummenacher a uniform retailer states “I recommend it to any small business that needs software to manage all their inventory and orders with a limited budget.” For this software you have a choice to download it for free or pay $299 for the regular edition, which I recommend because you can read and write your data. To execute this plan fully, you would also need to purchase a barcode scanner, barcode printer, and labels. According to Barcodesinc.com, (2014) a barcode scanner cost $74, labels $18.00 and a high speed label printer with built in Ethernet and wireless cost $195, making this project total cost come to $586 dollars. Although this sounds good but, maintenance is required to keep this system running smooth. Wireman, (2014) states this catalog is not used for planning, since the on-hand or order information would be dated. But the catalog allows maintenance...

Words: 927 - Pages: 4

Free Essay

Inventory Management Systems

...Inventory Management Systems CIS 210 Nathan Heil 10/17/14 Prof. Kurt Brandquist In a changing and growing market, many businesses are turning toward automated systems to perform not just inventory, but many tasks that are in their everyday routine. Automated systems can replace the cost and time consuming processes that were once completed by hand while providing companies with more accurate data. This system is used to track the merchandise and goods of retail stores, grocery stores, hardware stores, etc.  In this paper I will discuss the background of automated inventory systems, including what they are, how they work and what type of data and what goes into the implementation of such a system. Automated inventory systems play a large role in today’s businesses, especially the retail industry.  This is because businesses want the ability to access and organize data in a quick and efficient manner.  With an automated inventory system, businesses can rely on computers to do tasks that were once performed manually, such as inventory checks and product sales.  These tasks can be very overwhelming for businesses to do manually because of their size, number of stores, and their product diversity.  This can all be changed, though.  With automated inventory systems these processes can be handled in a timelier manner and also be more accurate and reliable than ever before. Automated Inventory Systems are specialized software that allows businesses to input their inventory...

Words: 1373 - Pages: 6

Premium Essay

Jessica

...acceptance 审计承兑 24 audit approach 审计靠近 25 audit committee 审计委员会,审计小组 26 ahudit engagement 审计业务约定书 27 audit evaluation 审计评价 28 audit evidence 审计证据 29 audit plan 审计计划 30 audit program 审计程序 31 audit report as a means of communication 审计报告如一个通讯方法 32 audit report 审计报告 33 audit risk 审计风险 34 audit sampling 审计抽样 35 audit staffing 审计工作人员 36 audit timing 审计定时 37 audit trail 审计线索 38 auditing standards 审计准则 39 auditors duty of care 审计(查帐)员的抚养责任 40 auditors report 审计报告 41 authority attached to ISAs 代理权附上到国际砂糖协定 42 automated working papers 自动化了工作文件 43 bad debts 坏账 44 bank 银行 45 bank reconciliation 银行对账单,余额调节表 46 beneficial interests 受益权 47 best value 最好的价值 48 business risk 经营风险 49 cadbury committee...

Words: 2307 - Pages: 10

Premium Essay

Reducing Rehospitalizations in Skilled Nursing Facilities Increases the Quality of Care Residents Receive and Decreases Unnecessary Health Care Cost

...Reducing Rehospitalizations in Skilled Nursing Facilities Increases the Quality of Care Residents Receive and Decreases Unnecessary Health Care Cost Nurses have the power to increase positive patient outcomes by implementing changes in their practice based on the evidence found in the nursing literature. Utilizing evidence-based practice (EBP) increases nurses job satisfaction, increases communication across the interdisciplinary team, enables nurses to provide their patients with high-quality care and decreases health care cost. The purpose of this paper is to describe why readmissions from nursing homes (NHs) is a nurse practice problem, nurse practice changes to reduce hospitalizations in NHs, evidence found in the nursing literature that supports the change in nursing practice and how to evaluate the change in practice after implementation of interventions. The Problem Residents in NHs continue to experience potentially avoidable 30-day readmissions to hospitals. Rahman, Foster, Grabowski, Zinn, & Mor (2013) define 30-day readmissions as when the resident is readmitted to the hospital within 30 days of being discharged from the hospital to NHs and avoidable readmissions as conditions that can be managed safely and efficiently in NHs instead of the resident being transferred to the hospital (p. 1901) There are more than 1.6 million Americans living in NHs in the United States and 23.5% of these Americans experience readmission to the hospital within 30 days of discharges...

Words: 2557 - Pages: 11

Premium Essay

Public-Key Encryption

...Public-key Encryption Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption and...

Words: 3473 - Pages: 14

Free Essay

Psycho Education

...Psychoeducation for schizophrenia (Review) Xia J, Merinder LB, Belgamwar MR This is a reprint of a Cochrane review, prepared and maintained by The Cochrane Collaboration and published in The Cochrane Library 2013, Issue 1 http://www.thecochranelibrary.com Psychoeducation for schizophrenia (Review) Copyright © 2013 The Cochrane Collaboration. Published by John Wiley & Sons, Ltd. TABLE OF CONTENTS HEADER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PLAIN LANGUAGE SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SUMMARY OF FINDINGS FOR THE MAIN COMPARISON . . . . . . . . . . . . . . . . . . . BACKGROUND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OBJECTIVES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . METHODS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISCUSSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AUTHORS’ CONCLUSIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ACKNOWLEDGEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . REFERENCES...

Words: 61871 - Pages: 248

Premium Essay

Public-Key Encryption

...Public-key Encryption David Burianek Saint Leo University Network Theory & Design COM-309 Dr. Eduardo Bautista August 01, 2014 Public-key Encryption Intent The intent of this paper is to present the reader with an explanation of Public-key encryption without delving too deeply into the math behind encryption schemes to better facilitate understanding for the layperson. Introduction Cryptography is a fascinating world that predates computers. Beginning in ancient times through the revolutionary period and into modern times, there have been many schemes to protect sensitive data. Notable technics are George Washington's book-key ciphers, Thomas Jefferson’s ‘cylinder,’ (Menezes, Van Oorschot, & Vanstone, 1997, p. 243) and the Nazi Enigma Machine of World War II. (Piper & Murphy, 2002) There has always been a need to have secure communications and the ability to safeguard data that has been intercepted. Modern Cryptology is an art form that uses the science of mathematics in order to provide secrecy, authenticity, and security in the transport of data. “Cryptology also enables us to create trust relationships over open networks; more in general, cryptographic protocols allow mutually distrusting parties to achieving a common goal while protecting their own interests.” (Furnell, Katsikas, Lopez, & Patel, 2008, p. 105) The methods by which these transactions can occur are many; however, they can be broken down into two categories; symmetric key encryption and...

Words: 3477 - Pages: 14

Free Essay

Adult Nursing

...Are smoking cessation interventions prior to elective surgery, effective in achieving short and long term smoking cessation? ABSTRACT: 178 Objectives: Smoking cessation intervention programmes prior to elective surgery are reviewed in relation to achieving short and long term abstinence. Research studies examining smoking cessation interventions and its overall effectiveness were critiqued and evaluated using a systematic literature review. Methods: Specific medical databases were utilised, followed by a methodical search strategy to identify key articles. Through evaluation of the studies, reliability and validity will be established. Evidence based practice will be explored throughout the report and will demonstrate how to source and appraise relevant research, whilst indicating how research findings can be implemented within todays nursing practice. Findings: It has been identified that smoking cessation intervention programmes are successful in short and long term abstinence with evidence identifying that post-operative complications are higher in patients that smoke. Implications: The right time to introduce smoking cessation pre-operatively is debatable although the majority of research argues that even the shortest time will be of benefit to the patients overall health and recovery time. Patients attitudes and willpower towards smoking cessation have a considerable impact upon how effective the intervention is. INTRODUCTION: 110 Modern medical practice is...

Words: 2160 - Pages: 9

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599