What were the major “ah ha!” moments that you experienced? What triggered them?

What were the major “ah ha!” moments that you experienced? What triggered them?

What were the major “ah ha!” moments that you experienced? What triggered them?
What is still unclear after your study?
Based on your experience and expectations, how would you characterize what you have learned in this course?
How are the major topics in this course connected to one another? To the profession?
What advice would you give an incoming student about this course based on your experiences?
What were your significant learning moments in this course?
What did you like or dislike about the course and the way it was conducted?
Considering the course outcomes in the Course Overview, how would you rate your mastery of them?
This course provides a conceptual survey of general systems theory followed by a conceptual and technological survey of the structure of distributed information systems architectures, operating systems, network operating systems, peripheral technology and user interfaces. Interoperability between these architectural components will be explored and current technology and trends in each architectural element will be reviewed. This course will de-emphasize, although not ignore, mainframe architectures in favor of information architectures more applicable to client/server computing. The various interacting categories of client/server computing as well as the benefits and implications of such a system will be fully explored.
Course Outcomes
Upon successful completion of this course, you should be able to do the following:
Apply a general systems perspective to the analysis and development of enterprise computer and network-based architectures that support enterprise applications.
Examine the responsibilities of the various roles involved in the development and implementation of enterprise information system architectures (EISAs).
Investigate existing enterprise business processes with a focus on general system properties, process goals, people, technology and information, human factors, complexity, and cost.
Analyze the workflow, dataflow, communication, and resources used in a business process.
Describe the elements of an EISA and relationship to business processes.
Explain the advantages of client/server and Web-based technology within the context of collaborative technologies and enterprise applications.
Evaluate the appropriate tools required to design, build and implement an information system.
Evaluate the importance of information security and associated technologies for identifying threat agents and response processes.
Develop a detailed physical view of an EISA that reflects the hardware, software, and network building blocks.
Develop an EISA suitable for a business application based on the needs of the application and available technologies.

I need my paper edited and information added to it. I will provide a rough draft

I need my paper edited and information added to it. I will provide a rough draft

I need my paper edited and information added to it. I will provide a rough draft, and the outline I made so that you can see the direction I am going in.
Instructions
1. Using the results of your research, write an 800-1000 word essay on your research topic.
2. The paper must follow APA format (use the template attached in Blackboard).
3. The paper must include source citations from at least three peer-reviewed journal articles and
two other credible sources.
4. Please do not use block quotations.
5. Consult the Purdue OWL (Online Writing Lab) for in-text citation guidelines (see Academic
Resources

Individually, answer the following questions in a Word document: Briefly describ

Individually, answer the following questions in a Word document:
Briefly describ

Individually, answer the following questions in a Word document:
Briefly describe what takes place at each layer of the OSI model.  
What equipment works at these layers? What protocols/software? What protocol data unit (PDU)? 
Watch the following videos:
How the OSI Model WorksLinks to an external site.
OSI Model Deep DiveLinks to an external site.
What have you additionally learned about the OSI model? Discuss at least two topics that were covered in the videos below that you found interesting and useful. 

Write a 2–4 page essay that constructs an overview of the significant informatio

Write a 2–4 page essay that constructs an overview of the significant informatio

Write a 2–4 page essay that constructs an overview of the significant information technology theories and models, including a timeline of their development and their interrelationships. Include how the theories and models have evolved, and how they are applied in a real-life context today. In your essay, address the following questions:
What are the key points of the evolution of the development of information technology theories and models?
What are the connecting points and threads between these theories and models?
How do the connecting points and threads illustrate similarities between the theories and models?
How do the connecting points and threads illustrate differences between the theories and models?
What were your most interesting discoveries while reviewing the evolution of technology theories and models? Why?
What theories and models apply to your academic and professional work, and how are they applied?
Additional Requirements
Written communication: Ensure written communication is free from errors that detract from the overall message.
Length: 2–4 pages, not including the title or reference page.
Font type and size: 12 point. Times New Roman, double-spaced.
References: Cite at least three sources.

A startup tech company has created a new app they refer to as the Virtual Person

A startup tech company has created a new app they refer to as the Virtual Person

A startup tech company has created a new app they refer to as the Virtual Personal Assistant. This app is designed to make life easier for the everyday person.
The app works as a personal assistant across smart devices. The app uses AI to understand the commands provided by users. Commands can be things like answering questions, sending emails, and controlling smart home devices.
The app was downloaded and used by thousands of people for over six months when the developers began to receive some concerning feedback from users.
While some users indicated they successfully used the app, a large percentage of other users indicated they had difficulties getting the software to respond to their commands.
The developers did some research into what might be causing this issue. As they looked into the users most impacted by this issue, they began to realize the problem was most pronounced when the software interacted with users who identified as women.
Instructions
Based on the information provided in the scenario, respond to the following questions:
What is the potential impact on the business?
Is this issue something that should be prioritized for change or just a product of the limitations of technology? Explain.
What specific recommendations would you suggest the creators of this AI could do to prevent this from happening in the future?
Your submission should also include the following:
Information from the scenario that supports your response to each question.
Resources from those provided in the course or quality sources from your own research to support your responses.

Your company Gamma is a big global enterprise. How will you design the network i

Your company Gamma is a big global enterprise. How will you design the network i

Your company Gamma is a big global enterprise. How will you design the network in the access network and backbone (core network)? Describe the difference in all layers and network management functions. Specify at least one network management tool.​
We sell toilets. We have our headquarters in Texas. We have brick and mortar stores in Texas, Alabama, Louisana, Mississippi, and Spain where we have a European office in Spain. We travel to sell toilets. The Department of Defense is our biggest customer so they have to be military grade. ​
Please create a power point slides and create a slide with a chart or diagram or picture I have Layer 4 transport TCP-IP/Packets . I also have to talk about SolarWinds Sensors deployed to analyze network traffic.
Please put minimal writing in the powerpoint explain in the note section and please put reference on a different page