Discussion 1
1. First analyze all four reviewers andfor each reviewer write at least one summary sentence describing what the review says about the acting in the film. In additionfor each reviewer quote the reviewer at least one time to demonstrate the sentiment he or she expresses about the acting.
Ann Hornaday-
Summary statement:
Quote from this reviewer to support the summary statement:
Rex Reed-
Summary statement:
Quote from this reviewer to support the summary statement:
Benjamin Lee-
Summary statement:
Quote from this reviewer to support the summary statement:
Anthony Lane –
Summary statement:
Quote from this reviewer to support the summary statement:
2. Then write three or four short paragraphs that synthesize all four reviewers and the points they make on the acting in the film. Remember when synthesizing you don’t simply list what each author says about the topic. You write about the issue of acting in the film and integrate the points of all four reviewers into that analysis.
You could group authors into categories if possible. For example consider the reviewers that tend to praise the acting and write about them in a paragraph or two. Then consider the reviewers that did not like the acting and write about them in a paragraph or two. Following this analysis you might write a concluding paragraph that summarizes all four reviewers’ views on the acting.
These are the four articles:
https://www.washingtonpost.com/goingoutguide/movies/steve-jobs-review-an-impressionistic-inner-portrait-of-the-apple-co-founder/2015/10/15/88e493e8-7276-11e5-8d93-0af317ed58c9_story.html?utm_term=.a134cb881617
https://www.theguardian.com/film/2015/sep/06/steve-jobs-movie-review-michael-fassbender-telluride
Aaron Sorkin’s Empty Jobs Search
http://www.newyorker.com/magazine/2015/10/19/wonder-boys
Discussion 2
This discussion thread is designed to help you see how a synthesis of sources essay or literature review is organized.
Please download the article Beyond Frequency: Perceived Realism and theCSI Effect by Evelyn Maeder and Richard Corbett. The article is available in the e-reserves of your class.
On pages 84-85 the authors provide an introduction to the research study they conducted. You can read this section if you would like to. Howeverfor this discussion thread please read from page 85 (The CSI effect defined) to page 94 (up to the section entitled Method).
Then answer the following questions:
1. In the first section (The CSI effect defined) do the authors ever give you their opinion on theCSI effect? How do they support their definition and their expansion on the definition? How many different sources do they cite in this section?
2. From pages 86-88 the authors discuss lawyers police officers judges and community members. In this section do the authors ever give you their opinion on any of the issues discussed?
3. Examine the section entitled Verdicts (pp. 90-92). How do the results from the study by Shelton et al. differ from the results of the study by Kim Barak and Shelton? How do the results of the study by Baskin and Sommers differ from the results of other studies?
4. As a result of having read this article please write a few sentences about what you might have learned about a) synthesizing sources or b) theCSI effect.
You need to respond to the following two posts. These are classmates SO BE CORDIAL AND NON CONFRONTATIONAL in your response.
First author’s name is Kimberly:
Firewalls are a network security system that blocks unauthorized access to a personal or business computer. Firewalls are a first layer defense to your network with the added ability to filter certain traffic at your discretion (Northrup N/A). Think of putting a lock on your door and giving certain people a key.
As stated without using a firewall the company loses about $250000 a year from successful hacking’s. Now lets say that the company does decide to implement the 10 firewalls for a total cost of $80000 and an additional $15000 a year for maintenance. For the first year they would be saving of $155000. For the course of five years they would be spending $235000 where as if they did not have a firewall in place the company would have a loss of $1250000.
Without a firewall the company could not only lose money but also potential clients as well as sensitive company/client information. A perfect example would be the case of 2014 Sony hack. Sony ended up paying close to $10 million dollars in a class action lawsuit to include $2 million dollars in legal fees (Raymond 2015). All because of their negligence when came to their network security.
references
Northrup T. (N/A). Firewalls. Retrieved February 16 2017 fromhttps://technet.microsoft.com/en-us/library/cc700820.aspx
Raymond N. (2015 Oct 20). Sony to pay up to $8 million in interview hacking lawsuit. Retrieved February 16 2017 fromhttp://www.reuters.com/article/us-sony-cyberattack-lawsuit-idUSKCN0SE2JI20151020
Second author’s name is Brandon:
There are quite a few advantages that a firewall offers a network. A firewall is not an actual wall but a figurative wall in the sense that it’s a way to block unwanted access to your network and its devices. Firewalls are useful in homes and in businesses. While in the home setting personal things can become vulnerable to attack businesses have a lot more potential for losing important information or causing significant downtime.
Based on the information provided if a company ends up losing around $250000 a year since they have no firewall installed they can definitely have a savings with 10 firewalls installed. For the first year you would be spending $80000 for the 10 firewalls and then $15000 for the maintenance. Taking that amount away from the regular $250000 lost each year you end up with a savings of $155000. If there were no firewalls installed for the next five years the estimated amount of loss would be $1.25 million. Using firewalls for the next five years would cost the company $235000 $125000 for the first three years since it only is good for that duration of time along with the cost of maintenance and then another $110000 for another three years of firewall life and then only $30000 for maintenance since it’s only 2 years instead of 3. With all of that in mind the company would end up saving $1015000 for the next 5 years.
There are a couple of considerations in addition to finances when contemplating a firewall. We all know that viruses and other forms of malware can cause havoc on all kinds of different levels though those aren’t necessarily the only threats to the network. With the proper knowledge and access someone could access secure files on a company’s network and distribute them. Any business home user or organization should definitely take advantage of using a firewall.
I would definitely recommend for Iverness Investments to invest in a firewall. You would have the option to hire someone in-house to monitor it and keep it secure or you would have to seek the help of an outside company to monitor it. As the referenced article says emails are also a piece of information that could be compromised. Especially in this technological age a firewall for the network is almost imperative.
References:
Firewalls: Protecting your business from unwanted intruders. (n.d.). Retrieved February 17 2017 fromhttp://blogs.cisco.com/smallbusiness/firewalls_protecting_your_business_from_unwanted_intruders
Third author is Tanisha:
Usabilityis one of the top priorities in relation to IT architecture. Usability is the degree of ease with which products such as software and Web applications can be used to achieve required goals effectively and efficiently. Ensuring that your targeted audience expectations are addressed and that they are satisfied helps determine between a successful site and a borderline one. When analyzing usability three principals are the focus:Iterative focus on the user and the task (how easy is it to use learn and navigate the system) Iterative design (visually is it appealing to the eye not overcrowded and too busy) Realistic measurement (are your expectations qualitative or quantitative and how/what is it being compared to). Smashing Magazine published an article regarding the usability of Craigslist website. In the article they explored the pros and cons of the website including the current simplicity and need to update the login process. Check out the article and determine if you agree or disagreehttps://www.smashingmagazine.com/2009/03/redesigning-craigslist-with-focus-on-usability/. This just solidifies how usability is an imperative aspect of the IT architecture.
What is Usability? – Definition from Techopedia. (n.d.). Retrieved February 15 2017 from https://www.techopedia.com/definition/4919/usability
Usability analysis and design. (n.d.). Retrieved February 15 2017 from https://www-935.ibm.com/services/us/en/it-services/usability-analysis-and-design.html
Snell S. (2016 December 12). Redesigning Craigslist With Focus On Usability Smashing Magazine. Retrieved February 15 2017 from https://www.smashingmagazine.com/2009/03/redesigning-craigslist-with-focus-on-usability/
Fourth Author is Kimberly:
calability is the ability for a machine network or infrastructure to grow within its own environment like adding a stronger engine to your car instead of replacing it. A perfect example would be the new windows server 2016. Server 2012 supports nearly twice the logical processor support of its predecessor Server 2012. As well as 12 times the virtual memory. If you already have a Server 2012 environment upgrading to Server 2016 would substantially bolster you current IT infrastructure(ie scaling)( Microsoft 2016). Your current virtual hosts could handle a considerably larger number of machines on the network with minimal costs to upgrade your current hardware. This is scalability by definition instead of throwing away your previous and likely costly initial investment you simply add to your current investment to increase your return.
references
Microsoft Windows. (2016 August 25). Windows Server scalability and more!. Retrieved February 16 2017 fromhttps://blogs.technet.microsoft.com/windowsserver/2016/08/25/windows-server-scalability-and-more/