Explore BrainMass

Management Information Systems

Collaboration Software and the ASP Model

This solution addresses two specific questions for the learner. First, this solution provides the learner an understanding of the different advantages and disadvantages of the use of a presence awareness feature in collaborative software packages. Next, this solution provides the learner with an overview of the ASP model. In par

Prototypes: Vaporware Awards for unreleased products

One of the disadvantages of building a prototype is that people will believe that the final system will follow shortly. Why do you think building a prototype will lead people to this inaccurate conclusion? If you were delivering a system prototype, how would you communicate to the system users that the real system would not be r

Boxed Detergent: P-Values and a Chi-Square Goodness-of-Fit Test

A manufacturer is interested in determining whether it can claim that the boxes of detergent it sells contain, on average, more than 500 grams of detergent. From past experience the manufacturer knows that the amount of detergent in the boxes is approximately normally distributed. The firm selects a random sample of 100 boxes an

MIS: IT infrastructures, web services, SAN and NAS

This solution provides the learner with an understanding of the concept of web services and further provides an explanation on the two primary types of data storage infrastructures: storage area networks (SAN) and network area storage (NAS). The solution further explains the difference between these two IT infrastructure compone

Teaching Assignment: Hungarian method

In the attached file is the chart that corresponds to the question. Question: Roscoe Davis, chairman of a college's business department, has decided to apply the Hungarian method in assigning professors to courses next semester. As a criterion for judging who should teach each course. Professor Davis reviews the past two ye

Machine Jobs Order: Assignment method

File attached has the chart that corresponds to the question. Question: In a job shop operation, four jobs may be performed on any of four machines. The hours required for each job on ach machine are presented in the following table. The plant supervisor would like to assign jobs so that total time is minimized. Use the as

Transportation Assignment Network Models: Hardrock Concrete Co

Attached is the chart that corresponds to the question. 1. The Hardrock Concrete Co has plants in three locations and is currently working on 3 major construction projects, each located at a different site. The shipping cost per truckload of concrete, daily plant capacities and daily project requirements are provided in the

Security, Privacy, and Other AIS Issues

1. Security, Privacy, and Other AIS Issues You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the orga

Supervisory Performance Survey with graphic display of results

1. Using a Microsoft® Word document, create a short survey based on a topic related to careers in general, careers in IT, or another occupational topic. (See Appendix B for further instruction and for examples.) 2. Include a disclaimer in your survey that indicates the project is for school, no name is needed from the indiv

Information Security

I am currently working in the accounting department and I was asked to describes the information security issues facing your industry and your organization; reviews legal/regulatory requirements/constraints; analyzes available technological and procedural mitigants, identify best practices; and frame your plan to manage the risk

Computer Forensics Analyzing Hostile Code

In this week, you need to analyze software. In your forensics practice, you often need to analyze hostile codes. In order to be safe, we do not recommend you take the risk of analyzing a real hostile code. However, if you could set up a secure environment and you decide to get some real experience on analyzing a real hostile cod

Technology threats and healthcare

In a service related health care organization with a staff to patient ratio of approximately 1:100 your role is to assess the quality of security of patient medical records. What technology threats might this organization face What information is contained in electronic medical records that needs to be protected? What p

Definition of Maturity level in the Software Process

Please help with the following problem. Define Maturity level in the Software Process Maturity level. Briefly write about five levels of PCMM and process capabilities developed at each level? If possible, please provide a comprehensive list.

Tools that Remotely Monitor a Computer

Discuss tools that could be used to remotely monitor a computer (with or without the computer owner's awareness). You can discuss the technical solutions and the legal impacts. Also will this kind of evidence admissible? Are they admissible under which conditions?

Emerging new technologies for the internet

Details: You attend T&F's strategy meeting. You know that emerging new technologies may move the market in new directions. Prepare a Power Point presentation of at least eight slides for the committee to explain: The advantages of utilizing the World Wide Web How this will meet company goals The major driving forces behin

Models/Implementation Strategies/Applications/IS Planning

Please help with the following study questions. Detail responses are greatly appreciated. 1. What is the Logic To-Be Model? What is accomplished with the Logic To-Be Model? 2. Discuss the following implementation strategies used to install new systems: 1) Parallel Strategy 2) Pilot Strategy 3) Phasing Strategy and 4

Sherman Computer Repair

Please help so that I can complete the following assignment: Sherman Computer Repair New Direction Assignment By now you should be familiar with the Synergetic simulation and Synergetic's decison to move from computer assembly to network assembly. Sherman Computer Repair, a small computer repair company, sees this as an op

Business Expense Laws: Case Study

Amos is a computer consultant and his office is located in Orange, Ca. He and his wife Susan used their Lear Jet which they had purchased for 2Million, to travel to their timber farm in Oregon (10 trips) to their Tahiti property (2 trips) to computer symposia (5 trips) and to Park City Utah (8 trips). The timber farm is operate

Java and product

What is Java and why is it important? How does it compare to Microsoft's .NET product. What are the determining factors for using each

Information Technology/Capital Investment

"Information technology now accounts for about 35 to 50 percent of total business capital investment in the United States." If productivity is a measure of the firm's efficiency in converting inputs to outputs, why is there a debate at all ? Will the massive investment in information technology ever meet our expectations or is

Systems Thinking - Is it enough to show that a change is rational?

1. Is it enough to show that a change is rational? Change can be very attractive if it appears to be in the best interest of the people expected to adopt it, if it is accompanied by the means for its fulfillment, and if it results in recognition and approval. Is this a true statement today? Was it ever true? 2. What is the r