...Summary of the Project part 3 is regarding the use of a Kernel & Recommended Software Management Plan for Linux, the need to install anti-virus software on Linux servers, & how to manage critical and noncritical security-related updates. Regarding the Kernel used to support the Linux based infrastructure is to use one of the vendors available (Red Hat, Novell, or Canonical/Unbuntu). Of these there were only two (Red Hat & Unbuntu) that are ready for enterprise systems and do a great job with customization. No matter what is chosen (open-source or vendor distribution), the first thing that needs to be done is to update the security. It cannot be stress enough that you must not implement security updates to a “live” network. Any security updates that are sent out by authorized personnel to use on the live network, must first be thoroughly tested inside a virtual “test’ environment. It is mentioned that the stock kernel option (open-source) is not recommended due to the amount of information that is needed to sort through in order for the specific needs of the industry (organization). Because of the work-load involved in sorting through system software that is used, and not all of the system software that is used will be listed. This is a complete waste of time and resources. The second thing mentioned is for a software management plan. It is recommended to use RPM as the software management tool, which forms the core of administration on most systems. The...
Words: 388 - Pages: 2
...Project Part 3 Task 1: Use a Kernel First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor. Tasks You need to: Make recommendations whether the organization should use a custom kernel, compile stock kernels from sources, or use a vendor-supplied kernel. Explain the pros and cons of each of the kernel options and support your recommendations with a valid rationale. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 8 Self-Assessment Checklist I have recommended the appropriate kernel that can be used by the organization. I have explained the advantages and disadvantages of using each of the kernel options with a valid rationale. The recommendation for First World Bank Savings and Loan’s Linux-based infrastructure in to use a vendor supplied kernel. The reason for this is two-fold; Security & Support. Both of which are essential to the daily inter-workings of the bank industry. With the choices of vendors available (Red Hat, Novell, or Canonical/Unbuntu), there are only two that do a great job regarding the customization for enterprise-ready systems; Red Hat and Unbutu. With these distribution-specific kernels, security issues that are related to them vary. With that now mentioned, you may not want to do a recent security update as soon as it comes available, as it...
Words: 408 - Pages: 2
...Final Project: Club IT, Part 3 There is no much that you have to take into consideration before you can open up a business and so much you have to maintain after it opens up. Club IT is a nightclub that has been open for a few months now and it seems to be very successful. To have a successful nightclub, you must make sure that you are offering you cliental what they want, so that they keep coming back and bring their friends and family with them. Owing a nightclub can be very expensive and risky, but sometimes you have to take chances like the owners of Club IT did. In this paper you will be reading about the technology plan that Club IT has. Organization Description and Demographic Information Both Ruben Keys and Lisa Tejada, in 2005, graduated from college and they both earned their degrees in business administration. While they were taking courses in college, Lisa and Ruben worked as musicians, Lisa on the jazz violin and Ruben on the drums, this allowed them to work at different nightclubs and also helped them earn money to get through school. While working in these different nightclubs they were able to learn and get firsthand experience on how to own and operate a nightclub. There is nothing wrong with getting the experience you need on someone else’s dime because this would be considered trial and error, when you are able to do this you really get to see if this is the kind of business that you want to get into, especially when you have to use your own money...
Words: 1796 - Pages: 8
...GE273 Micro Economics Project Part 2 and 3: The Debt Ceiling I would like to start by saying thank you that you would take the time to truly listen to your constituents and hear our concerns and ideas about the economy that we live in everyday. The debt ceiling is something that we must take very seriously. It seems that we are constantly raising our credit limit in order to justify our current spending habits. But is that a good idea? If my credit card company keeps raising my credit limit in order to allow me to continue spending more money, but I never pay down my balance, am I ever truly getting out of debt? During a time when I can financially afford to take on a high balance, raising the limit helps me attain the things that I want and/or need during that time. However, raising the limit is not a permanent solution. At a certain point, I may reach a debt level that I can no longer afford to pay back. That is becoming my concern with the current debt crisis. I fear that we are continuing to raise our credit limit but are not adequately paying back the debt we are accumulating. I feel what is needed for our country is the same thing that any normal family would need to do in order to address overspending; address current overspending habits and begin to implement a better savings strategy. These may be the most effective steps to take in order to truly attack the raising debt problem that may plague this country for generations to come. Life in America is...
Words: 1323 - Pages: 6
...Project Part 3 Task 2: Recommend a Software Management Plan Scenario The original task team at First World Bank Savings and Loan has concerns about the support and software management of the organization’s Linux-based infrastructure. The team wants you to recommend a software management plan keeping in mind the various servers and the cost. Tasks You need to: * Make a recommendation for a software management plan. Consider options available from the open source community and from vendors. If you select a vendor, specify the software it will support and how it will support. * Explain the need to install anti-virus software on Linux servers providing a rationale in support of your answer. * Summarize a plan for applying patches and security updates to the Linux system. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By:Unit 9 Self-Assessment Checklist * I have recommended a suitable software management plan. * I have explained the need to install anti-virus software on Linux servers. * I have explained how to manage critical and noncritical security-related updates. The recommendation for a software management plan is to use RPM. RPM is a software management tool originally created by Red Hat, and later GNU’ed and given to the public at http://www.rpm.org/. It forms the core of administration on most systems, since one of the major tasks for any...
Words: 963 - Pages: 4
...After reading the article of corporal punishment for children I would have agree to a certain extent with John Rosemond. He not only defends spanking but also believes that it is a vital part of raising healthy children. I understand some of his assessment, being from the era of paddling and detention I seen firsthand how effective this kind of punishment could be. Students were more attentive and respective to the teachers in that time. There were some that still caused problems due to no discipline at home but for the most part if you had the right teacher, they could speak enough fear in you that you never wanted to “feel the pine”. With that being said, I was one of the one that needed to “feel” in order to believe what the teacher was saying was true. I had gotten in some trouble earlier one day due to not listening to the teacher because I was the class clown and was liking the attention that the girls and my male classmate was giving me but mainly because the girls was giving some attention. The teach I guess had taken all the disruptions she was going to take and decided that I would be perfect candidate to help her demonstrate how far back her little arm could go back behind her She called me up front and walked over to a drawn that came out about five foot. She pulled out a long board like she was wilding a sword. This thing had holes drilled in it that was about two inches in diameter space throughout the flat portion. I learned that the hole help eliminate...
Words: 470 - Pages: 2
...Marketing Violence to Kids Jeremy Eisnor ITT Online Written Analysis January 9, 2015 Abstract It is said that video game makers advertise their violent games, to young children and that that leads to violence among the youth. I believe that companies market their games in general, and when it comes to ones deemed violent, they are careful not to market to children. I also believe the games cannot be blamed for the children being violent. I play violent video games and so does my son, and we are the least violent people you will ever meet. At some point we as parents have to stop blaming games, movies, TV, or any other type of media for the violent actions of our kids. Marketing is everywhere, and no matter how well you control it, kids will see it, especially in this day and age of information. My son and I play video games all the time and some of our favorite are the ones considered violent. The Grand Theft Auto series of games are some of the best if you like video games. It isn’t the best because of the violence but because the content of the game and what you’re allowed to do. You can roam free in this world and explore things and basically do things as you want or you can do specific missions. We will continue to play these games and if they are violent then so be it. We are with the majority of people who understand these are just games and they do not makes us any more violent then we already want to be. The truth is we give our...
Words: 3192 - Pages: 13
...Module 1 Final Project Part 3: Leadership Critique The leadership theories in this course flowed and ended up cascading for me starting with the expectations set by a leader (Pygmalion Effect); J.S. Livingston (2003) influencing the follower’s performance. Lower expectations for a subordinate resulted in their performance being of poor quality whereas higher expectations resulted in better performance. Livingston went on to also highlight that the expectations had to be realistic if they were to be achieved by the subordinate. This leads me to the leadership style that is exhibited by the leader who sets the expectations for his/her followers. A lot of research was done to study the leadership styles of various individuals and the studies revealed that there are a lot of influential factors that determine these leadership styles Bill George et al (2007:130) discovered in their research that a person is...
Words: 868 - Pages: 4
...For the Midterm Project Part 3: Campaign Recommendations, I pretended to be a campaign consultant for Candidate Smith. My goal was to create a plan that will lead him into a success, in other words, help him to reach the presidency. Before the assignment, I collected and analyzed data from the 2012 Obama v. Romney presidential campaign. Which included a four video campaign analysis, statistical data from two swing states, and an analysis on the impact social media has on presidential elections. Thus, my time management, writing skills, and critical thinking skills were all put to the test. Along with this assignment, I was working on completing the weekly module, and the coursework for my other classes. And in order to effectively improve my time management skills, I prioritized my assignments based on points and which ones will affect my grade the most. Moreover, for this particular assignment, I worked on it for an hour or so over a period of three days, so that I will have a clear mind and a new set of ideas each time. This helped my writing skills too, as my mistakes became much more visible,...
Words: 397 - Pages: 2
...Impact of Uninsured Population Project, Part 3: Impact of Alaska Natives with Colon Cancer on Alaska Native Tribal Health Consortium T. Jayd HCS/531 February 21,2011 Joe Rudd Impact of Uninsured Population Project, Part 3: Impact of Alaska Natives with Colon Cancer on Alaska Native Tribal Health Consortium Colon cancer has been identified as one of the leading causes of death among the Alaska Natives. In response to this discovery and in an effort to improve the health of the Alaska Native population, the Alaska Native Tribal Health Consortium (ANTHC) has developed several health support services to increase awareness, provide preventative services, and offer a variety of treatment options. Because of the large percentage of uninsured and underinsured among this population, ANTHC faces the financial impacts that the decline of health in the Alaska Native people has on the organization. Frugal management of the allocated finds and resources will enable ANTHC to stimulate economically profitable areas of the organization and create internal supplementation to the financial concerns. Providing accessible preventative programs and health education in the remote villages throughout Alaska will enable ANTHC to more effectively observe the health trends and effectively manage and provide health care services for the Alaska Natives. Demographics and Needs of Alaska Natives with Colon Cancer The Alaska Native population is a largely uninsured and underinsured population, living...
Words: 2622 - Pages: 11
...There are many considerations that have to be looked at in order to create a new network for Kudler Fine Foods that will allow the company to perform well in the current market, be able to expand and grow, and connect all locations together as well as keep each facility running at optimal conditions. In order for the new network to be successful consideration have to be taken in the use of LANs and WANs in the network, other wireless technologies used in the company, various other parts included in today’s data communication networks, and in the types of security used in all of these items. All of these items are important in building a network that will operate for the company in the manner that is required, help improve communication within the different stores of the company as well as the entire company, and allow for future network growth within the company. Kudler Fine Foods will require the use of Local Area Networks (LANs) in each of its facilities, Wide Area Networks (WANs) to tie each of the facilities together and to the rest of the world, and the use of other wireless technologies in order to be successful in the business world today. Each facility will use a LAN to tie all of its computers and systems together. The facilities will then be linked to each other and to other companies, such as vendors and general information like the internet, through a WAN. The entire company will also be using certain wireless technologies within the facilities to enhance work performance...
Words: 1563 - Pages: 7
...Integrative Network Design Project As the Integrative Network Design Project moves in to part three the need to evaluate the Patton-Fuller Community Hospital network to identify additional properties and functions. This paper will look at the hardware and software needed to secure the network against electronic threats, will examine the use of Wide Area Networks (WAN) and Local Area Networks (LAN) and the technologies used to implement them, and finally the concepts of data communication networks will be explored. In any organization it is imperative that measures are taken to protect the network from potential threats. Vital information contained on the network may be at risk to potential internal or external network threats. With this stated it is important that the organization determines the safeguards that need to be in place to protect that data. Patton-Fuller Community Hospital will need to evaluate the software and hardware options that are available and will provide the most secure method for protecting the critical data stored on the network. To make an informed decision the types of potential threats must be first identified. There are a number of threats to networks; social engineering, port scanners, packet sniffers, password cracking, trojans, denial of service attacks, server bugs, and super user exploits. Each of these uses techniques designed to access the network and impair the networks ability to function or to obtain vital data. Social engineering...
Words: 827 - Pages: 4
...The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”. Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how...
Words: 296 - Pages: 2
...The True Richard I have chosen to analyze the character of Richard III due to his cynical yet honest personality. One thing that sticks out about his character is his relationship with the reader and how he tells us exactly what he’s planning. Even when we are told what Richard will do, the reader is still surprised when he goes about the actions. For example, Richard tells us he is “subtle, false, and treacherous”(I.i), but there is nothing we can do to stop him from being that way. Another quality of Richard that sticks out to me is his ability to manipulate his peers. In act one scene two Lady Anne is mourning the death of King Henry VI, but Richard is set on manipulating her into loving him. Richard has no interest in Lady Anne, but instead wants to be closer and closer to becoming King. Richard’s dedication to achieve his goal no matter what obstacles come his way is a defining feature that sticks out to me. Throughout the play, Richard is faced with obstacles that test his commitment to becoming king. His first major test is when he has to win over Lady Anne. Richard killed Henry and knows Anne is out for his guts, but he has the courage to lie to her saying that he did not kill him. Later, Richard admits to killing Henry, but sweet talks Anne by making her believe that the murder was in an attempt to win her over. While reading this scene, we see Richard being honest to the audience, but a liar to the characters in the show. He knows that his actions have caused Lady...
Words: 1108 - Pages: 5
...Unit 7 Project Part 3: Opposing Sides My initial position Euthanasia is wrong and should never be legalized Laws against euthanasia and assisted suicide are in place to prevent abuse and to protect people from unscrupulous doctors and others. They are not, and never have been, intended to make anyone suffer. Activists often claim that laws against euthanasia and assisted suicide are government mandated suffering. This claim would be similar to saying that laws against selling contaminated food are government mandated starvation. In a society as obsessed with the costs of health care and the principle of utility, the dangers of the slippery slope are far from fantasy. Assisted suicide is like a half-way house, or a stop on the way to other forms of direct euthanasia. If terminating life is a benefit, the reasoning goes, why should euthanasia be limited only to those who can give consent? Why do we need to ask for consent? In cases like Schiavo's touch on basic constitutional rights, such as the right to live and the right to due process, and consequently there could very well be a legitimate role for the federal government to play. There's a precedent as a result of the highly publicized deaths of infants with disabilities in the 1980s. The federal government enacted 'Baby Doe Legislation, which would withhold federal funds from hospitals that kept lifesaving treatment from newborns based on the expectation of disability. The medical community has to have restrictions...
Words: 919 - Pages: 4