Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

SLP 2 – 25

I need help with my homework assignment! 

Module 2 – SLP

IT Services and Cloud Computing

If Cloud computing is the greatest thing for business since sliced bread, then by extension, it certainly ought to be the greatest thing for education since chalk. In point of fact, a relatively large proportion of our university could be said to be effectively “in the Cloud,” since most documents we process do not exist except in electronic form, almost all of our interactions with students and a large portion of our faculty are electronically mediated, and there is relatively little in the way of physical objects to define us as a university. Of course, the major difference between our operation and how Cloud computing proponents see the model lies in the fact that we manage our own information technology rather than relying on someone else to provide it for us. But there is no denying that in terms of educational options, there is much to the Cloud model that would appeal to university faculty and administrators.

Some institutions have made a full-scale commitment to the Cloud in terms of educational opportunities with a large portion of their students’ interactions conducted with offsite group-based tools and technologies using Cloud-based systems. Watch the videos below to see how universities can use Blockchain for their administration of student records and students can chain how they purchase books. 


Office of Educational Technology: Blockchain in Education

When you have reviewed these materials, please summarize your assessment of the applicability of Blockchain and the use of the Cloud for self-organized and formal learning environments for our educational system in a 2- to 3-page paper. Please try to address the following issues somewhere in your presentation:

· Your understanding of how Blockchain works and the kinds of things that it can be used for.

· Your assessment of the Blockchain viability in education.

· A summary of your thoughts on the applicability of the Blockchain for Trident. 

The following items will be assessed in particular:

· The degree to which you have carried out the assignment completely, or clarified why you investigated alternatives.

· Your ability to describe your experiences clearly and draw conclusions from them, not just narrate events.

· Your ability to focus on the overall purposes of the assignment, not just its specific steps.

· Your use of some in-text references to what you have read; please cite all sources properly.

Your assignment will be graded according to the 
MSITM SLP Grading Rubric, which aligns with the expectations below. To see the rubric, go to the SLP Dropbox for this module and scroll to the bottom of the page. On the right under Assessment, click the rubric link.  

SLP Assignment Expectations

Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Assignment-driven criteria (14 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.

Critical thinking (6 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material. Conclusions are logically presented.

Scholarly writing (3 points): Demonstrates proficiency in written communication at the academic level of the course.

Assignment Organization (3 points): Assignment is well organized and follows the required structure and organization of the assignment.

Citing and using references (4 points): Uses relevant and credible sources to support assertions; uses in-text citations; properly formats references.

Please use Trident’s 

Introduction to APA
 for proper formatting and style.

Module 2 – Resources

IT Services and Cloud Computing

Required Material

MacLean, D., & Titah, R. (2023). 
I

mplementation and impacts of IT service management in the IT function.
 
International Journal of Information Management, 70, 102628.
 

Shrestha, A., Cater-Steel, A., Toleman, M., Behari, S., & Rajaeian, M. M. (2020). 

Development and evaluation of a software-mediated process assessment method for IT service management

Information & Management, 57(4), 103213.

Jarvis, A., Johnson, J., & Ananad, P. (2022). 
Successful management of cloud computing and DevOps. American Society for Quality (ASQ
).


Introduction to Cloud Computing for IT Pros
 from LinkedIn Learning


Office of Educational Technology: Blockchain in Education


Azure: Understanding the Big Picture
 from LinkedIn Learning


Security in the cloud
 from LinkedIn Learning


Learning Cloud Computing: Core Concepts
 from LinkedIn Learning

Mitra, S. (2013). 

Build a school in the Cloud

. TED. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

public finance

Module 1 Assignment Details · Due Sunday by 11:59pm   Weekly Objectives Students will: · Define public administration and why it is important. · Define and explain key terminology related to public budgeting and finance administration.  · Differentiate between the four stages of public budgeting (preparation, approval, execution, and audit/evaluation) and describe their

VII

see attached. CybersecurityPolicies Without Borders This assignment measures your mastery of ULOs 2.1, 2.2, 2.3, 5.3, and 6.2. Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions:

Information Systems VI Aassignment

see attached. Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

power point

Video Presentation As a synthesis of the prior five weeks, each student will create an informational video presentation. The video presentation must be a Senior Executive Level presentation to a real world company/organization. If students are unfamiliar with that style of presentation, they are to research it.  Application of Learning:

V

see attached During the Bush and Obama administrations and because of 9/11, the Department of Homeland Security (DHS) assumed lead responsibilities for many of the CIKR sectors assigning Sector-Specific Agencies (SSAs) to establish sector-specific protocols for protection. However, most of these sectors have the DHS as its SSA. Under this

IV Journal

see attached. Should the private sector be proactively involved in all phases of preparedness for attack avoidance (either physical or cyber-based) or should the private sector act solely as a resource when called upon by the public/government sector? Why, or why not? Your journal entry must be at least 200

SA

see attached  Begin by researching and identifying a critical infrastructure sector or component (there are 18 of them to choose from) such as power, finance and banking, or municipal services. Perform an analysis of the selected component, identifying its vulnerabilities. After conducting your research, either in the CSU Online Library

Course Closure

  Congratulations on reaching the end of this course! This week: Discuss the salient manner in which you would apply the learning outcomes of this course to your professional and/or personal life. Talk about the topics you found most valuable or useful, either personally or professionally.

Relational Set Operators

  A relational database model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as “union” and “intersect” may be used. Describe a business scenario where a “union” relational set operator may be used to merge two similar data sets. Analyze the analysis and data consistency

Concurrency Control

  There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where “commit” and “rollback” would be required. Describe how these functions would be essential for business continuity and concurrency

Healthcare Industry Solutions: Transforming Patient Care and Operational Efficiency

Healthcare industry solutions refer to a wide range of technologies, tools, and strategies designed to improve the way healthcare organizations operate and deliver patient care. These solutions combine software, digital platforms, data analytics, medical devices, and process innovations to address challenges in hospitals, clinics, pharmaceutical companies, insurance providers, and the

Comprehensive SharePoint and Teams Migration Solutions

   Modern businesses depend on collaboration and document platforms to stay productive, and moving these systems during a tenant migration is often complex. CloudBik’s Teams to Teams Migration offers an effective way to transfer Teams environments, including chats, channels, and files, without impacting end-users. At the same time, the SharePoint

Why Businesses Need Tenant to Tenant Migration

   The need for Tenant to Tenant Migration is growing as many companies go through mergers, acquisitions, or restructuring. Having data in two separate tenants can create confusion and extra work for IT teams. Moving everything into one tenant gives users a simple and unified experience. The OneDrive Migration Tool

Easy Data Transfer from Google to Office 365

  Many businesses choose Microsoft 365 over Google Workspace because it connects better with apps like Excel, Teams, and Outlook. But during migration, the main worry is losing data or breaking folder structures. The migrate from Google Workspace to Office 365 blog explains how to transfer emails, calendars, and files safely

HIS-D40-C

I have a question about Health Information System, who can help with questions?

HIS-B39-C

My questions are about Health IS. Who can help with these questions?

Advanced SQL and PL/SQL

  Extracting and interpreting data can be very valuable to an organization. Describe the importance of using sub queries in a database system. Provide at least two business case scenarios to support your response.

creating

Create a Visual Origin Story In Module 1 you are to complete the team-building exercise ” Visual Origin Story: Adventures in collaborative storytelling .” This exercise is from the book:  Murdoch-Kitt, K. M., & Emans, D. J. (2020). Intercultural collaboration by design drawing from differences, distances, and disciplines through visual