Identify factors contributing to a winner vs. failure proposals

  Purpose:  Start developing your term project ideas by learning from the winner and failure proposals. What you’ll learn:  1. Identify factors contributing to a winner vs. failure proposals2. Observer what questions being asked by the venture capitalists and how the entrepreneurs respond3. Analyze market potential, consumer needs, technology feasibility…etc.4. Think strategically to form your argument from different perspectives.Instruction: Choose one of your favorite winner and failure entrepreneurial proposal from Shark Tank, Dragons Den, KickStarter, Indiegogo,…. or any other business proposal competition site. 

Describe the process of coaching and explain why is it important for managers to be effective coaches.

  Review the following conversation:Marcy:  Dana, can I talk to you for a couple of minutes? We’ve been roommates for two years and I think I have a time management problem. I just don’t get enough done in a day. What do you think?Dana:  Tell me more. How did you decide that you have a problem?Marcy:  I never get everything done on my to-do list. The more I get done, the more I end up adding to the list. Dana:  What would solving the problem look like to you?Marcy:  Well, I’d get everything done on my list.Dana:  Is that realistic?Marcy:  It’s not, but what else am I going to do?Dana:  What else can you do that will help? Can you work with an advisor? Use a scheduling program?This is an example of coaching. Describe the process of coaching and explain why is it important for managers to be effective coaches.

identify challenges, including remedies, other organizations have faced in implementing a key management system.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.The following are the deliverables for this project:There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.Review these authentication resources to learn about authentication and the characteristics of key management.Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.Read these resources on data at rest, data in use, and data in motion.Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.Incorporate this information in your key management plan.In the next step, you will consider key management capabilities.In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.Include this information in your enterprise key management plan.Provide a summary table of the information within your key management plan.Incorporate this information in your implementation plan.You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.Incorporate this information in your implementation plan.In the next step, you will provide information on different cryptographic systems for the CISO.In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems and recommend a system for Superior Health Care.Describe the cryptographic system, its effectiveness and efficiencies.Provide an analysis of the trade-offs of different cryptographic systems.Review and include information learned from conducting independent research on the following topics:Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.Incorporate this information in your implementation plan.In the next step, you will begin final work on the enterprise key management plan.In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.A possible outline could be:The following are the deliverables for this segment of the project:Submit your plan to the Assignments folder.After submission, complete the final step of writing the enterprise key management policy.The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.Review and discuss the following within the policy:Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

as a leader, how might an international company enter into a joint venture in Saudi Arabia with a domestic company and demonstrate the commitment to working together well

 Module 05: DiscussionDanone’s Wrangle with WahahaThis week’s discussion will focus on cultural decision-making using the case study about Danone in China (p. 255 in the textbook).This case focuses on the cultural differences and management styles of the French company Danone Group in its joint venture with its Chinese company partner, Wahaha Group.  In this situation, Wahaha established other companies outside the joint venture that Danone Group claimed infringed on Danone’s interests. These infringements were alleged to be in violation of a non-compete clause and unauthorized use of the “Wahaha” trademark owned by the joint venture. Danone sued Wahaha and the lawsuit eventually resulted in Danone Group accepting a cash settlement from Wahaha Group to the “Wahaha” trademark. After reflecting on this situation involving cultural differences, as a leader, how might an international company enter into a joint venture in Saudi Arabia with a domestic company and demonstrate the commitment to working together well, respecting the Saudi Arabian culture and management style to resolve such a conflict? What types of decisions would you need to make? Would there be bias in the decision-making process? Can you give an example? Embed course material concepts, principles, and theories, which require supporting citations along with two scholarly peer-reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.Be sure to support your statements with logic and argument, citing all sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to your peers’ posts as well. 

What are the ethical issues and obligations that come with trust once it is built?

Are you especially loyal to any one brand? If so, what is it and why are you so loyal? When successfully building loyalty and community, trust seems to be the biggest factor. How can a company build trust and what is the best approach to do so (incorporating concepts from both the field of marketing and psychology)? What are the ethical issues and obligations that come with trust once it is built? Should consumers trust companies? Why or why not? Do you think some consumers are just more prone to be loyal to companies and other consumers are not? Why or why not?Note: Please review my expectations for the assignment. I expect your response to include 2 or more references from the APUS Library system (failure to include such references will detract from your grade on the assignment), and be presented in APA Format. Deliverable length is a minimum of 2 body pages.

How is ethical behavior an integral part of the doctorally prepared advanced practice nurse’s role?

 How is ethical behavior an integral part of the doctorally prepared advanced practice nurse’s role? Why is the doctorally prepared advanced practice nurse considered a role model? How does one display the characteristics of a role model? Does a doctorally prepared advanced practice nurse have a legitimate right and/or ethical foundation to interject their ideas into business practice? 1 page, 2 sources. APA.

What does that story reveal about our culture (or the culture the story originated in?)

Follow the directions below: 200 words minimum  Discuss a scary story, you’ve heard, read, or watched recently. What does that story reveal about our culture (or the culture the story originated in?) As the reader, watcher, or listener of the story, do you think the story says anything about you, in particular? Your response should be at least 200 words. No cover page and no reference page needed

create your own tutorial that you could give to your family or friends on how to configure your home wifi to be secure.

 For this week’s project, you are to first conduct an Internet search on “How to Secure Home Wifi”. With those results, you are to create your own tutorial that you could give to your family or friends on how to configure your home wifi to be secure. Your tutorial should include step-by-step instructions on how to do it. Include technical settings for a home router as necessary. Images and graphics showing steps are encouraged. Any information or picture taken from a reference must be cited. Also, you must be able to explain your instructions, so no copying from your Internet reference. -Your tutorial should be at least two pages in length.

Why is it so hard for many people to lose weight?

In this module you learned about cellular respiration which breaks down the food you eat to create energy for your cells (ATP).  The latest from the National Health and Nutrition Examination Survey (posted by the CDC) put the rate of obese adults at 42.4 (up 2.5% from the 2015-2016 survey).  Why is it so hard for many people to lose weight?  Why are there so many different “diets” out there, and which ones actually work?  Watch the video “Should you eat everyday?” and read a short article about how obesity impacts those who are infected with COVID, then answer the questions below.  Don’t forget to respond to another student.Should You Eat Every Day 1.  What kind of “diet” is this video discussing?2.  Name two pieces of evidence discussed in the video used to convince you that this type of eating pattern will help you lose weight.3.  Would you try this type of “diet”?  Why do you think diets do or do not work for many people?4.  Review the section on Obesity and Covid-19 (Links to an external site.).  How does this information affect your thoughts about dieting and maintaining a certain weight?For some statistics from the CDC read this article on Prevalence of Obesity (Links to an external site.)Discussion Directions:After you type your initial post, read through the other entries and reply directly to at least two classmates.Make sure to use professional grammar and punctuation in this college level course in all correspondence.