Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

SLP 2 – 25

I need help with my homework assignment! 

Module 2 – SLP

IT Services and Cloud Computing

If Cloud computing is the greatest thing for business since sliced bread, then by extension, it certainly ought to be the greatest thing for education since chalk. In point of fact, a relatively large proportion of our university could be said to be effectively “in the Cloud,” since most documents we process do not exist except in electronic form, almost all of our interactions with students and a large portion of our faculty are electronically mediated, and there is relatively little in the way of physical objects to define us as a university. Of course, the major difference between our operation and how Cloud computing proponents see the model lies in the fact that we manage our own information technology rather than relying on someone else to provide it for us. But there is no denying that in terms of educational options, there is much to the Cloud model that would appeal to university faculty and administrators.

Some institutions have made a full-scale commitment to the Cloud in terms of educational opportunities with a large portion of their students’ interactions conducted with offsite group-based tools and technologies using Cloud-based systems. Watch the videos below to see how universities can use Blockchain for their administration of student records and students can chain how they purchase books. 


Office of Educational Technology: Blockchain in Education

When you have reviewed these materials, please summarize your assessment of the applicability of Blockchain and the use of the Cloud for self-organized and formal learning environments for our educational system in a 2- to 3-page paper. Please try to address the following issues somewhere in your presentation:

· Your understanding of how Blockchain works and the kinds of things that it can be used for.

· Your assessment of the Blockchain viability in education.

· A summary of your thoughts on the applicability of the Blockchain for Trident. 

The following items will be assessed in particular:

· The degree to which you have carried out the assignment completely, or clarified why you investigated alternatives.

· Your ability to describe your experiences clearly and draw conclusions from them, not just narrate events.

· Your ability to focus on the overall purposes of the assignment, not just its specific steps.

· Your use of some in-text references to what you have read; please cite all sources properly.

Your assignment will be graded according to the 
MSITM SLP Grading Rubric, which aligns with the expectations below. To see the rubric, go to the SLP Dropbox for this module and scroll to the bottom of the page. On the right under Assessment, click the rubric link.  

SLP Assignment Expectations

Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Assignment-driven criteria (14 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.

Critical thinking (6 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material. Conclusions are logically presented.

Scholarly writing (3 points): Demonstrates proficiency in written communication at the academic level of the course.

Assignment Organization (3 points): Assignment is well organized and follows the required structure and organization of the assignment.

Citing and using references (4 points): Uses relevant and credible sources to support assertions; uses in-text citations; properly formats references.

Please use Trident’s 

Introduction to APA
 for proper formatting and style.

Module 2 – Resources

IT Services and Cloud Computing

Required Material

MacLean, D., & Titah, R. (2023). 
I

mplementation and impacts of IT service management in the IT function.
 
International Journal of Information Management, 70, 102628.
 

Shrestha, A., Cater-Steel, A., Toleman, M., Behari, S., & Rajaeian, M. M. (2020). 

Development and evaluation of a software-mediated process assessment method for IT service management

Information & Management, 57(4), 103213.

Jarvis, A., Johnson, J., & Ananad, P. (2022). 
Successful management of cloud computing and DevOps. American Society for Quality (ASQ
).


Introduction to Cloud Computing for IT Pros
 from LinkedIn Learning


Office of Educational Technology: Blockchain in Education


Azure: Understanding the Big Picture
 from LinkedIn Learning


Security in the cloud
 from LinkedIn Learning


Learning Cloud Computing: Core Concepts
 from LinkedIn Learning

Mitra, S. (2013). 

Build a school in the Cloud

. TED. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Case 2 – 25

Need help please Module 2 – Case IT Services and Cloud Computing Assignment Overview The Case Assignment for this module involves thinking systematically about the IT services movement in general and about cloud computing as a particular instance of that approach. You will start by reviewing a number of sources

SLP 1 – 25

Need help with my homework Module 1 – SLP Web 2.0 and Social Networks The purpose of the Session Long Project in Trident University classes is to give you the opportunity to explore the applicability of the module to your own life, work, and place in space and time, and

Case 1 – 25

I need help with my homework please.  Module 1 – Case Web 2.0 and Social Networks Assignment Overview In this Case Assignment, you are exploring the technological underpinnings of the Internet. The objective of this Case is to better understand the evolution of the Web from Web 1.0 and Web

SP DB

See attached. In your own words, please discuss a cybersecurity policy with which you are familiar. The example can come from work, school, or a business relationship. You can also research organizational policies posted online. Give a brief description of the policy. What is the purpose and value of the

Changes in existing interview question for Info I’m attaching th topic

Topic:   Enhancing Cybersecurity in IoT Networks: A Comprehensive Study on Threat Detection and Mitigation Strategies · Details about the research (Background, methodology, research questions) · ·  The rapid proliferation of IoT devices has opened up new avenues for cyber threats. Securing these devices has become increasingly complicated, as over 75 billion

Active directory automation

Need help to get an assignment done. Requirements are VMware, windows server core (not the full GUI). PowerShell Automation for Active Directory Submission Template Screenshot 1 Onboarding New Users from CSV Single screenshot showing: Script output (e.g. “Created user: jdoe”). Get-ADUser results for those SamAccountNames. Your custom prompt (server name

HIMS 11

  Assignment Instructions:  Using the Patient Healthcare Data in the attached Excel file (attached below), construct a 3-D Clustered Column Chart depicting the three healthcare parameters (weight, height, age), and title this chart ” Patient Healthcare Data” at the top center and show Legend at the bottom. After reviewing the

Governance, Ethics, and Security

 Assume the role of an IT security consultant who has been contacted by a company to provide them with a written code of IT conduct for its employees and a security policy for the firm. In preparation for undertaking this large job, prepare a proposal explaining what topics you will

Cloud-Based Management and Analytics

Final Project Topic: (5 pages research paper) Topic: Data Management and Analytics: Explore how enterprises use cloud-based data management and analytics tools to drive business decisions and gain competitive advantages. Competitive advantages through cloud analytics: Citation: Cooper, A. (2020). How Netflix Uses Big Data and Analytics to Drive Success. Forbes.

Powtoon commercial

see attached file Powtoon Commercial Project Do not pay for anything on this site! Learning animation can be very challenging yet very fun. Navigate to the Powtoon website, click Pricing in the top menu, scroll down, and click FREE Start Now $0 free. Create an account if you do not

HIMS W12D12

 What is Big Data in healthcare? How is it generated in a typical healthcare facility, like a hospital? What two common formats are used, and what are the advantages and disadvantages of each? How is this data used for unraveling hidden trends, strategic planning, and operational decision-making?  What are the

INFA W12D12

  In the discussion this week, you and your peers are asked to consider and discuss information security career pathways relevant to your personal goals and career plans. Where are you currently in your career? What is the next level up or sideways for you in your desired career field?

CASE 4 – 40

i need help please Module 4 – Case Database Systems and Knowledge Base Assignment Overview The Case Assignment for this module considers the emerging and important trend toward what is called “open-source software.” The Background Information contains material regarding this movement; its effect is being felt in many different areas

SLP 4 -40

I need help Module 4 – SLP Database Systems and Knowledge Base Go to  Kaggle.com  and register with any one of your email addresses. Kaggle is a open-source data repository often used in Data Analytics to practice with datasets. Go to this  Kaggle dataset  that has 9,514 movies on Netflix,

Information Systems Book Assignment

IS 373 Book Chapter Review Project Goal: CHAPTER 2 Each student will be assigned one chapter from the following eBook by the instructor. The student should study the chapter carefully and in depth and do extra research to ensure his/her dominance on all of the concepts in the chapter. The

Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan

Module 03 Project Procurement Plan [Insert Name] Network Administration Capstone Table of Contents Introduction 1 Procurement Management Approach 2 Procurement Definition 2 Type of Contract to be Used 2 Procurement Risks 2 Procurement Risk Management 2 Cost Determination 2 Standardized Procurement Documentation 2 Procurement Constraints 2 Contract Approval Process 2

Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan Module 03 Course Project – Network Diagram, Procurement Plan and Communication Plan

Module 03 Project Procurement Plan [Insert Name] Network Administration Capstone Table of Contents Introduction 1 Procurement Management Approach 2 Procurement Definition 2 Type of Contract to be Used 2 Procurement Risks 2 Procurement Risk Management 2 Cost Determination 2 Standardized Procurement Documentation 2 Procurement Constraints 2 Contract Approval Process 2

Module 03 Course Project – Network Diagram

Module 03 Content In this Module, you are responsible for completing a network diagram and creating both a Procurement Plan and a Communication Plan. The following item(s) are required in this Module: Network Diagram Utilize the proper diagramming software (e.g. Visio, draw.io, etc.) to detail the key elements of the