PROJECT about RISK MANAGEMENT PLANNING
User Generated
forrerqql
Computer Science
Description
Hi friend,
This is sukumar, I need this Final project to be completed by tomorrow morning. All the details are available in the below attachment.
Thanks
Sukumar
Unformatted Attachment Preview
Project: Risk Management Plan
Risk Management Plan Final Project Submission
Business Continuity Plan (BCP)
After having reviewed and being impressed by your business impact analysis (BIA), senior management
at Health Network has decided that your team must also develop a BCP. Management has allocated all
funds for a BCP and your team has their full support, as well as permission to contact any of them directly
for participation or inclusion in your BCP plan. You have been assigned to develop this new plan.
Winter storms on the East Coast have affected the ability of Health Network employees to reach the
Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate
operations. The Arlington office is the primary location for business units, such as Finance, Legal, and
Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are
located only in the corporate offices. Each corporate location is able to access the other two, and remote
virtual private network (VPN) exist between each Production data center and the corporate locations.
The corporate systems are not currently being backed up and should be addressed in the new plan. The
BCP should also include some details regarding how the BCP will be tested.
You may refer to the following additional resources to help you and your team develop a BCP, and you
may use a BCP template if found during your research.
References:
Guide to Business Continuity Management: Frequently Asked Questions (Protiviti, 2013),
http://www.protiviti.com/en-US/Documents/Resource-Guides/Guide-to-BCM-Third-EditionProtiviti.pdf
Business Continuity Plan (Ready.gov), http://www.ready.gov/business/implementation/continuity
Project: Risk Management Plan
Evaluation Criteria and Rubrics
Did the student develop a BCP that could recover business operations while efforts are ongoing
to restart pervious operations?
Did the student completely fill out a BCP template if found during their research?
Did the student completely understand BCP concepts presented in class?
Did the student develop a BCP test plan with correct processes?
Did the student create a professional, well-developed report with proper grammar, spelling, and
punctuation?
Submission Requirements
Format: Microsoft Word or compatible
Font: Times New Roman, 12-point, double-space
Citation Style: APA
A minimum of 3 Academic References
After creating the BCP, compile all project parts and submit to your instructor. Make sure to
incorporate your instructor’s feedback on the previous submissions in the final risk management plan.
Total Academic References required should be no less than 9 in the Final Project Submission
document.
Evaluation Criteria and Rubrics
Did the student consider the inputs provided in their earlier submissions?
Did the student develop sound plans based on the requirements described during the project
phases?
Did the student provide clear and easy-to-understand documentation, which may include tables
and other presentation elements?
Did the student create a professional, well-developed report with proper grammar, spelling, and
punctuation?
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
What digital forensics are gathered to investigate this type of crime scenario, computer science homework help
Scenario:A large commercial corporation has witnessed a security breach of the network, and has found one laptop on the sc ...
What digital forensics are gathered to investigate this type of crime scenario, computer science homework help
Scenario:A large commercial corporation has witnessed a security breach of the network, and has found one laptop on the scene belonging to someone known to have the expertise for launching large-scale cyber-attacks against secure networks. The laptop and its data provide you with sources of physical and digital forensics evidence. Since the laptop was connected to the network, any communications involving the laptop could also provide you with some additional digital evidence. This commercial corporation’s Point of Contact (POC) has requested your computer forensics team provide investigative expertise in this matter in multiple areas. The investigative point of contact for this commercial corporation is confused concerning what constitutes a cybercrime case, the different types of digital evidence your team may be looking for, and what some of the general guidelines are in doing any forensic work.Questions:Examine what actions and tactics constitute a cybercrime and how law enforcement uses digital forensics to investigate this type of crime.Differentiate, at a high level, between the types of evidence associated with computer crimes: testimony, physical, and electronic evidence.Examine the types of digital forensic analysis and general guidelines for any forensic work.
Network Design Core of Most Modern Business Models Project
Purpose
This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network ...
Network Design Core of Most Modern Business Models Project
Purpose
This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.
Required Source Information and Tools
Web References: Links to web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on September 18, 2020.
The following tools and resources are needed to complete this project:
§A web browser and access to the Internet to perform research for the project
§(Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft PowerPoint
Learning Objectives and Outcomes
§Apply core competencies learned throughout the course to a single project.
§Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
§Demonstrate logical reasoning and decision-making skills.
Overall Project Scenario
Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.
Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.
You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.
Deliverables
The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.
§Project Part 1: Network Design
Project Part 2: Firewall Selection and Placement
Course textbook
Course textbook §Project Part 3: Remote Access and VPNs
§Project Part 4: Final Network Design Report
Project Part 1: Network Design
Scenario
The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
§Current infrastructure elements
§A logical topology that separates the Accounting and Sales departments
§Redundant communications
§Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part of the project, perform the following tasks:
1.Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
2.Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3.Include a high-level plan that ensures communications are available 24/7.
4.Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5.Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6.Create a draft report detailing all information as supportive documentation.
7.Cite sources, where appropriate.
Required Resources
Internet access
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 2: Firewall Selection and Placement
Scenario
The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.
Tasks
For this part of the project, perform the following tasks:
1.Research and select firewalls for the Corporation Techs network.
Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.
Address network, server, and workstation firewalls. 2.Describe a plan for creating a DMZ, and explain how it makes the network more secure.
3.Research network authentication and create a high-level plan for secure authentication to internal network resources.
4.Create a draft report detailing all information as supportive documentation.
5.Cite sources, where appropriate.
Required Resources
Internet access
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I researched and selected firewalls.
I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.
I addressed network, server, and workstation firewalls.
I described a plan for creating a DMZ and explained how it makes the network more secure.
I created a high-level plan for secure authentication to internal network resources.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 3: Remote Access and VPNs
Scenario
As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.
The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.
Tasks
For this part of the project, perform the following tasks:
1.Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.
2.Recommend any other forms of remote access that are relevant and describe how they would be used.
3.Create a draft report detailing all information as supportive documentation.
4.Cite sources, where appropriate.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I researched and recommended an appropriate VPN technology.
I described the VPN technology and explained why it is the best choice.
I recommended other forms of remote access that are relevant and described how they would be used.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 4: Final Network Design Report
Scenario
You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.
Tasks
For this part of the project, perform the following tasks:
1.Create a final network diagram that includes the basic diagram and all relevant network enhancements.
2.Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement.
5 pages
Uses For Ieee802.1x
IEEE 802.1X can be described as a port that is used to allow Extensible Authentication Protocol over a Wireless Local Area ...
Uses For Ieee802.1x
IEEE 802.1X can be described as a port that is used to allow Extensible Authentication Protocol over a Wireless Local Area Network, abbreviated as ...
Assignment: Asset Recovery
Asset RecoverySunshine Health Corporation has acquired and merged with over 20 distressed or bargain companies in the past ...
Assignment: Asset Recovery
Asset RecoverySunshine Health Corporation has acquired and merged with over 20 distressed or bargain companies in the past 15 years. As such they have collected several outdated systems that they can no longer use and have replaced with more efficient systems that streamline from the companies to Sunshine Headquarters.Develop a document for assessing the decommissioned equipment from the different locations, collecting it and disposing of the equipment either in the form of revenue recovered or a benefit to the company. Equipment ranges from 5-15 years of age and works though is not current. All company information has been wiped already with hard drives wiped clean with the OS of the day.The assignment should be 2-3 pages of content not counting title page, reference page or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format. Use credible supporting materials to make your case. This is the challenge of professional and academic work, both require substantiation of the information. The resources support or refute the work.Submit your work as one attachment.
University of the Cumberlands InfoTech Import in Strat Plan Discussion
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming ye ...
University of the Cumberlands InfoTech Import in Strat Plan Discussion
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside sources and references in APA format (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
12 pages
Cloud Development
To achieve a successful cloud migration platform, it is essential to carefully deploy all services to guarantee that they ...
Cloud Development
To achieve a successful cloud migration platform, it is essential to carefully deploy all services to guarantee that they function properly. Cloud ...
Similar Content
Lewis University What Is Your Opinion of The Practice of The Fist of Five Discussion
We’ve reviewed some agile practices and now understand how they work and more importantly ‘why’. One of the mo...
Different Between On Perm and Cloud Environments Discussion
Create one discussion thread and answer the following questions:
How is the management of network security similar and dif...
project phase 1 gowtham reddy sudini
ISOL532 Practical Connection Project Project Assignment Layout: This project will test your ability to apply what yo...
Wireless Security
Wireless is the current standard for tablets, laptops, mobile devices and many of the available smart devices around the w...
McMaster University Reverse Engineer Business System Discussion
Week 2: Requirements and
Use Cases
Systems Analysis & Design (7902)
Prof Evan Katsamakas
Gabelli School of Business
From...
IT 351 Saudi Electronic University Computer Networks Questions
College of Computing and Informatics
Assignment 1
Deadline: Day 18/09/2021 @ 23:59
[Total Mark for this Assignment is 8]
...
Data Warehousing In Business Intelligence
Data warehousing refers to collecting, managing, and storing a large amount of data from different sources to provide mean...
Blockchain Technolog1
In the current business setting, different technologies are emerging and used in various settings to improve an organizati...
Disaster Recovery Planning
Mendonca, J., Andrade, E., Endo, P. T., & Lima, R. (2019). Disaster recovery solutions for IT systems: A Systematic mappin...
Related Tags
Book Guides
Their Eyes Were Watching God
by Zora Neale Hurston
Twelve Years A Slave
by Solomon Northrup
Flowers For Algernon
by Alice Walker
Siddhartha
by Hermann Hesse
Mockingjay
by Suzanne Collins
Ezperanza Rising
by Pam Muñoz Ryan
Girl Stop Apologizing
by Rachel Hollis
Fast Food Nation
by Eric Schlosser
Pride and Prejudice
by Jane Austen
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
What digital forensics are gathered to investigate this type of crime scenario, computer science homework help
Scenario:A large commercial corporation has witnessed a security breach of the network, and has found one laptop on the sc ...
What digital forensics are gathered to investigate this type of crime scenario, computer science homework help
Scenario:A large commercial corporation has witnessed a security breach of the network, and has found one laptop on the scene belonging to someone known to have the expertise for launching large-scale cyber-attacks against secure networks. The laptop and its data provide you with sources of physical and digital forensics evidence. Since the laptop was connected to the network, any communications involving the laptop could also provide you with some additional digital evidence. This commercial corporation’s Point of Contact (POC) has requested your computer forensics team provide investigative expertise in this matter in multiple areas. The investigative point of contact for this commercial corporation is confused concerning what constitutes a cybercrime case, the different types of digital evidence your team may be looking for, and what some of the general guidelines are in doing any forensic work.Questions:Examine what actions and tactics constitute a cybercrime and how law enforcement uses digital forensics to investigate this type of crime.Differentiate, at a high level, between the types of evidence associated with computer crimes: testimony, physical, and electronic evidence.Examine the types of digital forensic analysis and general guidelines for any forensic work.
Network Design Core of Most Modern Business Models Project
Purpose
This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network ...
Network Design Core of Most Modern Business Models Project
Purpose
This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.
Required Source Information and Tools
Web References: Links to web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on September 18, 2020.
The following tools and resources are needed to complete this project:
§A web browser and access to the Internet to perform research for the project
§(Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft PowerPoint
Learning Objectives and Outcomes
§Apply core competencies learned throughout the course to a single project.
§Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
§Demonstrate logical reasoning and decision-making skills.
Overall Project Scenario
Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.
Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.
You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.
Deliverables
The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.
§Project Part 1: Network Design
Project Part 2: Firewall Selection and Placement
Course textbook
Course textbook §Project Part 3: Remote Access and VPNs
§Project Part 4: Final Network Design Report
Project Part 1: Network Design
Scenario
The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
§Current infrastructure elements
§A logical topology that separates the Accounting and Sales departments
§Redundant communications
§Justification for continuing with IPv4 or upgrading to IPv6
Tasks
For this part of the project, perform the following tasks:
1.Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
2.Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
3.Include a high-level plan that ensures communications are available 24/7.
4.Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
5.Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
6.Create a draft report detailing all information as supportive documentation.
7.Cite sources, where appropriate.
Required Resources
Internet access
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 2: Firewall Selection and Placement
Scenario
The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.
Tasks
For this part of the project, perform the following tasks:
1.Research and select firewalls for the Corporation Techs network.
Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.
Address network, server, and workstation firewalls. 2.Describe a plan for creating a DMZ, and explain how it makes the network more secure.
3.Research network authentication and create a high-level plan for secure authentication to internal network resources.
4.Create a draft report detailing all information as supportive documentation.
5.Cite sources, where appropriate.
Required Resources
Internet access
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I researched and selected firewalls.
I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.
I addressed network, server, and workstation firewalls.
I described a plan for creating a DMZ and explained how it makes the network more secure.
I created a high-level plan for secure authentication to internal network resources.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 3: Remote Access and VPNs
Scenario
As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.
The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.
Tasks
For this part of the project, perform the following tasks:
1.Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.
2.Recommend any other forms of remote access that are relevant and describe how they would be used.
3.Create a draft report detailing all information as supportive documentation.
4.Cite sources, where appropriate.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Length of report: 3–4 pages
Self-Assessment Checklist
I researched and recommended an appropriate VPN technology.
I described the VPN technology and explained why it is the best choice.
I recommended other forms of remote access that are relevant and described how they would be used.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Project Part 4: Final Network Design Report
Scenario
You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.
Tasks
For this part of the project, perform the following tasks:
1.Create a final network diagram that includes the basic diagram and all relevant network enhancements.
2.Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement.
5 pages
Uses For Ieee802.1x
IEEE 802.1X can be described as a port that is used to allow Extensible Authentication Protocol over a Wireless Local Area ...
Uses For Ieee802.1x
IEEE 802.1X can be described as a port that is used to allow Extensible Authentication Protocol over a Wireless Local Area Network, abbreviated as ...
Assignment: Asset Recovery
Asset RecoverySunshine Health Corporation has acquired and merged with over 20 distressed or bargain companies in the past ...
Assignment: Asset Recovery
Asset RecoverySunshine Health Corporation has acquired and merged with over 20 distressed or bargain companies in the past 15 years. As such they have collected several outdated systems that they can no longer use and have replaced with more efficient systems that streamline from the companies to Sunshine Headquarters.Develop a document for assessing the decommissioned equipment from the different locations, collecting it and disposing of the equipment either in the form of revenue recovered or a benefit to the company. Equipment ranges from 5-15 years of age and works though is not current. All company information has been wiped already with hard drives wiped clean with the OS of the day.The assignment should be 2-3 pages of content not counting title page, reference page or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format. Use credible supporting materials to make your case. This is the challenge of professional and academic work, both require substantiation of the information. The resources support or refute the work.Submit your work as one attachment.
University of the Cumberlands InfoTech Import in Strat Plan Discussion
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming ye ...
University of the Cumberlands InfoTech Import in Strat Plan Discussion
Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside sources and references in APA format (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
12 pages
Cloud Development
To achieve a successful cloud migration platform, it is essential to carefully deploy all services to guarantee that they ...
Cloud Development
To achieve a successful cloud migration platform, it is essential to carefully deploy all services to guarantee that they function properly. Cloud ...
Earn money selling
your Study Documents