Get help from the best in academic writing.

IMS180 CUNY Medgar Evers College Google & AOL PESTLE Environmental Analysis

IMS180 CUNY Medgar Evers College Google & AOL PESTLE Environmental Analysis.

GUIDELINE:Tip 1. Contextualize the case. There is a method to my madness. Cases generally correspond to a particular set of concepts and theories. Keep this in mind as you prepare your analysis. Tip 2. Read the case actively. The goal is not for you to grab your highlighter and speed through the case. Instead, ask yourself questions, wrestle with the core decisions, and think through multiple scenarios. Tip 3+. William Ellet argues that there are “four types of situations” that you will often see in cases, for each here are some tips: – Problems o Define the problem in the case. This may not be obvious. o Then, be able to diagnosis the problem using the various tools you’ve acquired throughout your business training. – Decisions o Identify the decision options. o Determine the criteria by which to evaluate the decision options. o Accumulate as much evidence as possible to support your decision. – Evaluations o Again, determine the appropriate evaluative criteria. o Make the evaluation that is most consistent with the evidence provided by the case and the key criteria. o Be sure to be holistic in your evaluations – think about positive and negative aspects. – Rules (This is particularly critical for quantitative analyses) o Know the information you need to apply a rule (For example, what data is necessary for a break-even or NPV analysis) o Know how to obtain this information. o Know how to apply the rule. o Make sure your data is accurate. Tools Ellet provides a nice model for analyzing cases. There are five key phases of the process. 1. Situation a. Figure out the big picture first; ask yourself, “What is the situation in the case? What is going on here? 2. Questions a. Develop questions about the problem, namely: i. What do you need to know about the situation? b. Think through issues related to the decision, namely: i. What are the decision options? Any seem particularly strong or weak? What is at stake here? What are the key criteria to base your decision? c. Questions about the evaluation, in particular: i. Who or what is being evaluated? Who is responsible for the evaluation? 3. Hypothesis a. Here is where your analytical work gains momentum. Develop your perspective on the case. b. Review the aforementioned questions – now begin to develop your answers for each set of questions. 4. Proof and Action a. Ask yourself, what evidence is provided by the case that supports my hypothesis? What additional evidence do I need to collect? b. Equally important for our course, also consider how would I implement my recommendations? 5. Alternatives a. Spend some time critiquing yourself, ask the following: i. How else could this problem be defined? If defined differently, would I have the same hypothesis? ii. Where are the weak links in my analysis? iii. What is the potential downside to my recommended decision? What is the strongest counterevidence? iv. How thorough have I been in my analysis? How might a different course of action be proved? ——————————————————————————————————————————————————————–1. Google currently enjoys approximately 70% market share of US searches, and well above 90% in many other countries. Do you expect the search business to become more concentrated (I.e. dominated by fewer firms)? Is search a winner-take-all business? 2. In renewing its deal with AOL, could Google afford to pay AOL more than 100% of revenue generated from AOL searches? How did Microsoft’s maximum affordable bid for AOL’s search traffic compare to Google’s? 3. Currently, 95%+ of Google’s revenue comes from online advertising. How important is it for Google to pursue alternative revenue streams? Which alternatives are the most promising?4. Do you view Google’s distinctive governance structure, corporate culture, and organizational processes as strengths or potential limitations?PLEASE DO THIS IN PESTEL STYLE. ATTACHING WHAT THAT IS.
IMS180 CUNY Medgar Evers College Google & AOL PESTLE Environmental Analysis

Research Paper: *NEED 15 PAGE RESEARCH PAPER* :Conduct a risk assessment and analysis of a company information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures..

I’m working on a Computer Science question and need an explanation to help me study.

**** paper should have at least 15 references, and all references must be scholarly peer-reviewed articles.Need atleast in 14-15 page requirement.All references must be cited in APA format.***Need a 10-slide PPT on this Research PaperMake sure to follow APA style. Please make sure your submission is 14-15 pages in length and meet the minimum APA formatting guidelines.1” margins on all sides, Please cite the source using APA formatting guidelines.Be sure to include reference sources.*****Acme Enterprise Scenario Residency WeekAcme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc. Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO. Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:Perimeter SecurityNetwork SecurityEndpoint SecurityApplication SecurityData SecurityOperationsPolicy ManagementAcme Perimeter SecurityAcme is currently protected by two dual Dynamic Stateful Inspection Firewalls that are configured in active and stand by mode. Acme is also configured to use PAT (port address translation) where 200.200.200.1 represents Acme on the public Internet. Acme translates this public IP through its clustered firewall to the internal IP space of 10.100.0.0/16 giving Acme 65334 useable IP addresses. As part of Acme’s infrastructure, it also accesses cloud services for its business office tools through Office 365 and uses Dropbox for end user’s storage. Acme uses a web hosting service for its web front end and ecommerce which is connected to a back-end Oracle Database using enterprise MySQL. The database administrators have full access to all database information, but they lack oversight from anyone else. There are two DMZ’s, but they are not utilized. Network SecurityAcme has a collapsed core design which means all internal LAN routing and Internet access occurs on its distribution level devices. This means, wireless access, web proxy access, access control lists and entries are located at this layer of the infrastructure. Currently Acme is using WPA 2 (wireless protected access 2) for is wireless security. The web proxy is configured with the following: General, Limited, and Exclusive Internet access. Each of these categories dictates what type of Internet access an end user will experience if belongs to one of these groups. The Local area network uses the IP block in the following way: 10.100.1.0/24 User VLAN, 10.100.2.0/24 Research and Development VLAN.Current access control lists are permit 10.100.2.0 0.0.0.255, permit 10.100.1.0 0.0.0.255. All other devices use the rest of the unallocated IP block of 10.100.0.0/16. Also, all IP space is statically assigned. There is one default route to Internet but users of complain about access to internal services. Endpoint SecurityThere is a mixture of MAC and Windows systems, XP, 7, and 10. JAMF is used to control and monitor MAC systems, the Windows devices rely on its end users to patch and update systems. The current endpoint security is signature-based MacAfee with no centralized control. Application SecurityDevOps is responsible for secure coding and development of applications, but it has no formal oversight. Policy for application monitoring tracking is adhoc there are no formalized procedures. The server farm houses all applications, the operating systems range from Server 2003 to 2016. Mobile device management, media server, content management, file server, directory services, database, are all the services being offered from the server farm. This server architecture is all hardware based there are no hypervisor systems in place. Data SecurityData has not been classified, identity access management relies on one factor authentication; encryption, digital signatures, PKI rely on self-signed certificates, protection in the cloud is also missing and there is a lack of DLP (data loss prevention). Acme does store financial information in its data center as well as personal identifiable information. OperationsInformation technology is responsible for security however there is a security team under the IT department. The Chief Information Security Officer reports to the Chief Information Officer. Policy ManagementAcme has one Information Security Policy that addresses its information security architecture and program. It is not based on any of the existing information security management frameworks such as: IS0 27002, NIST CSF, or COBIT 5. You are going to conduct a risk assessment on Acme Enterprise using the risk assessment concepts we have learned about thus far. Each of the areas of the infrastructure mentioned above is where you will concentrate your assessments. After you have completed your risk assessment, you will then provide recommendations for each area that you assessed to reduce risk, exposure, and threat. Also, as part of your final submission demonstrate through a redesign where your mitigations will take place within the architecture. You can use the image below as guide for your risk analysis of each area.
Research Paper: *NEED 15 PAGE RESEARCH PAPER* :Conduct a risk assessment and analysis of a company information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures.

Purdue University Healthcare Business Plan Paper.

Offer in-depth details of the type of practice, type and number of employees, estimated revenues, and expenses. You are responsible to present this plan to obtain a bank loan for the initial capital/start-up funding. Summarize your chosen model, and explain the elements you would include in your business plan and why. Give an evaluation of these methods and indicate when they should be used for best results.Based upon what you have learned in this class, prepare a 1,250–1,500-word paper in which you propose a plan to present for funding. Cite at least four references to validate your proposal.
Purdue University Healthcare Business Plan Paper

Bellevue University Organizational Reward and Recognition Programs Discussion

Bellevue University Organizational Reward and Recognition Programs Discussion.

There are many different types of reward and recognition programs. Each organization designs its programs based on organization size, available resources, alignment with organizational goals, and a host of other considerations. Analyzing and comparing different programs give managers insights into how successful programs are designed, as well as providing ideas for how their own programs might be improved.Instructions:Follow this link https://www.sbuxrecognition.com/StarbucksRecognitionGuide.htm#SOS to access Starbuck’s Recognition Guide and research the company’s formal employee recognition programs, located under the Performance Awards tab at the top of the page.Now, follow these links https://cache.hewitt.com/ytr/US05888/epc/pdfs/STORE_Success_Sharing_10_flyer_7-10.pdf and Service Excellence Employee Recognition Program to review two other companies’ information on employee benefits/reward and recognition programs.Use course content and outside research to complete the following instructions:Compare and contrast Starbuck’s formal employee recognition program(s) with the employee recognition program(s) offered by American Fork. Discuss each of the following areas as you compare and contrast the programs:What organizational values do each of the programs support and recognize?What is the specific purpose of each of the programs?Who is eligible to receive rewards in each program, including the criteria for recognition (e.g. – behaviors, accomplishments, etc.)?Describe the awards and explain the method used to select the award or recognition recipients, both quantitative and qualitative (if applicable).Synthesize the results of your work comparing and contrasting these recognition programs to develop an “ideal” employee recognition program. Identify the attributes of each element you incorporate in your recognition program, and explain how they would make your program a success.Present a plan for communicating the recognition program to employees.Present and defend your comparison and contrast of the recognition programs, along with your “ideal” employee recognition program and communication plan, in a six-page (minimum) paper. The minimum length does not include the title page, abstract, reference page, or any additional pages containing charts, appendices, etc. A minimum of two outside research sources are required for this assignment.Format Instructions: Your paper must be double-spaced, 12 point Times New Roman font, with 1” margins on all sides. It must consist of a title page, abstract, body of the paper, and a reference page. Level I, Level II, and Level III headings must be used in the body of the paper. An appendix (or appendices) must be included after the reference page. The appendix/appendices should contain materials to support your answers to the questions posed in this paper. Since outside sources are required on this assignment, APA style in-text citations must be included in the body of the paper.
Bellevue University Organizational Reward and Recognition Programs Discussion

Liberal Optimism for Post Cold-War Period Essay

cheap assignment writing service The liberals in the cold war held an optimistic perspective that is attributed to a number of causes. One of the most prominent causes of this optimism lies in the fact that the liberals mainly campaigned in the favour of liberal democracies and against the use of force. The cold war was causing considerable losses and was motivating the country’s people and their perceptions against the incidence of such wars in the future. As a result, the liberals perceived that the termination of this cold war would place people in a state of mind where they would disapprove of the government if it took part in force-based measures (Risse-Kappen 1990). The liberals believed that the prevalence of this stance amongst the people would help create a positive springboard for the liberals’ movement. In addition, the liberals also believed that the state has misinterpreted the threat from the Soviets. The liberals argued that the threat was not present in the form of the Soviets but in the form of the rigidity with which Stalin had chosen to conduct his reign (Risse-Kappen 1990). The liberals were optimistic about their success following the end of the cold war, but they made sure that the need for protection and self-defence was not forgotten. However, even in this aspect, the liberals paid special attention to the victims of war and campaigned aggressively to highlight the damage caused by war. The liberals did not oppose the war effort outright and supported the need for a strong stance against the Soviet threat. While the liberals were not highly appreciative of the Cold War itself, the liberals looked forward to the conclusion of the Cold War. It was believed that the Cold War would help to bring forth the face of aggression that the liberals campaigned to reveal to the general public. The liberals did not approve of the war, but welcomed the end of the war because they believed that the war had had seriously diminished the probability of the regeneration of a Reich such as that against which the Allies fought. The liberals therefore believed that the victory in the Cold War was not that of military powers but represented the strength of liberal democracy (Risse-Kappen 1990). Furthermore, the liberals also believed that the post Cold-War period would give way to liberal democracy and the lessons learned from the Cold War would help to support liberal democracy in the future. The liberals believed that the incidence of the Cold War would help ensure that the need for such a war would not arise in the future. It was perceived that the prevalence of liberal democracy would be stimulated by world leaders in an attempt to avoid the incidence of the same in the future. Get your 100% original paper on any topic done in as little as 3 hours Learn More The liberals believed that the incidence of the Cold War would enable political powers to realize the necessity for a balanced power and economic structure. The liberals also believed that the end of the Cold War would drive world leaders to adopt discourse driven policies rather than transgress to war. Essentially, the liberals believed that the damage caused to the allies in the Cold War would clarify the stance of the liberals. They expected to acquire an increased support from the reaction of the people to the damage caused by the war. List of References Risse-Kappen, T. (1990) Predicting the New Europe. Bulletin of the Atomic Scientists , 46 (8)

Social Security Programs

Social Security Programs. I’m stuck on a Business question and need an explanation.

Conduct research on the current state of Social Security. Based on your research, write a three-to-five page paper (not including the title and reference pages). Your paper should be written in a scholarly third-person tone; it should be in APA format. The essay should address the following:

Explain the concept of Social Security as originally envisioned by President Roosevelt.
Evaluate the viability of Social Security within the next 20-30 years.
Provide two or three recommendations that would improve the viability of Social Security for the next generation.
Evaluate how these recommendations can best be implemented within the highly political environment that exists with this issue (including factors such as the implementation itself, communication, education, support, etc.).

In addition to the text, cite at least two scholarly references to support your discussion.
Social Security Programs

“A” WORK DISCUSSION IN 15 HOURS

Identify a task that you would need to perform in your current career or future career and explain how you would apply the knowledge you have learned in this course to succeed at performing the task in a real-world scenario. REPLY TO MY CLASSMATE’S DISCUSSION TO THE ABOVE QUESTION AND EXPLAIN WHY YOU AGREE. (MINIMUM OF 150 WORDS)                                                                CLASSMATE’S POST My future career aspirations are to become Chief of Police or Sheriff of my County. The classes that I have taken during this program has helped me become better at conducting research so that I can gain a better and more accurate understanding of the criminal justice system. This class has helped me learn how to apply all of the different elements and lessons together at the same time. I feel that it is important to recognize that society and law enforcement are connected and have an impact on one another. The lessons and skills that I have gained from this class will help me conduct research into emerging trends in law enforcement so that I can make the best recommendations for my community and department. I feel confident that I can provide references and justification to support my stances and provide me with credibility because I can justify my decisions and make effective changes. I think that this is an issue within law enforcement agencies now because many agencies avoid change because it is difficult to modify behavior or justify the cost to implement the changes. I hope to have better success with addressing this issue.