Research and investigate the strategy that a local company of your choice is using to stay on the top of the game and successfully compete against other companies in the market.

  Case Analysis
In this case study; you’re expected to research and investigate the strategy that a local company of your choice is using to stay on the top of the game and successfully compete against other companies in the market. This should include all levels of strategy; business, corporate and international. You should highlight what they are doing well and what they should work on to improve company performance. You need to support your argument with at least 10 academic and nonacademic references. You can also compare between the company of your choice and another company to evaluate its strategy.Examples of Canadian companies would be SNC-Lavalin, Canadian Goose, Shopify, Suncor, Encana, CGI Inc., Linamar, Canfor, Lulu lemon, Maple Leaf Foods, Blackberry, and Bombardier.Using APA, you are expected to write no less than 3500 words. You are expected to present it in class using PPT. 

What tasks or content did you find difficult or frustrating?

Throughout this course, you are keeping a journal about your experience in the class.  The purpose of this activity is to enable you to reflect on your learning:  what new things you have discovered, what surprises you have encountered, what topics or ideas you have found particularly challenging and how the course is going for you.  Last week you began the Environmental Footprint Reduction Project.  This week you will begin using this journal as a space for a progress report on your efforts.  Your entries will be evaluated in terms of how well they met the topic and length requirements, and your writing clarity.  Your entries should be a minimum of one typed page each (double spaced Times New Roman 12 point font) In the first paragraph or two of your journal entry this week, provide status report on your Ecological Footprint Reduction Project.  Have you intended changes?  What challenges have you encountered?  What have you learned so far from this activity?In another one or two paragraphs, share your thoughts about the second week of class.  What did you learn?  What experiences stand out for you?  What tasks or content did you find difficult or frustrating?  What activities did you find surprising or exciting?  Looking ahead what are you intrigued or concerned by in the third week of the course?

How do learners describe the characteristics of an effective online instructor?

 For this discussion, describe the methods and procedures for conducting the data analysis using your chosen research question, method, and model. Examples of applicable models are Giorgi’s model of phenomenology or Moustakas model of phenomenology; Stake’s model of case study or Yin’s model of case study; Corbin and Strauss’s model of grounded theory, or Charmaz’s model of grounded theory.Please do not mix the methods or models. Use the descriptions given in the introduction for this unit only as a guide. Your step-by-step data-analysis procedures should be paraphrased or otherwise depicted in your own words and referenced to the primary sources.The selected method for the proposed study is generic qualitative inquiry. The research question that was selected “How do learners describe the characteristics of an effective online instructor?

identify a product or service, and research, select, and submit a marketing template to use for developing your plan.

In this module, you will identify a product or service, and you will research, select, and submit a marketing template to use for developing your plan.  You may either explore existing marketing plans through Internet research.For this activity, submit your marketing plan template, identifying your selected product/service, to your instructor for evaluation and approval.Things to Remember! 

identify one change from the list below that you would make and thoroughly explain why you would make that change.

You received the following message via email from your supervisor. After reviewing the message, identify one change from the list below that you would make and thoroughly explain why you would make that change. Subject Line: Stop Working Overtime NOW!Message: Hey,When I reviewed this week’s timesheets I saw that way too many people worked overtime. This is costing our company too much money and needs to immediately stop. Going forward, before you work overtime, you must get approval from your supervisor. Thanks,Supervisor JohnRemember to answer each part of the question with a minimum of one paragraph that is 5-7 sentences with limited grammatical errors.

Calculate the expected rate of return on investments X and Y using the most recent year’s data.

Douglas Keel, a financial analyst for Orange Industries, wishes to estimate the rate of return for two similar-risk investments, X and Y. Douglas’s research indicates that the immediate past returns will serve as reasonable estimates of future returns. A year earlier, investment X had a market value of $20,000; investment Y had a market value of $55,000. During the year, investment X generated cash flow of $1,500 and investment Y generated cash flow of $6,800. The current market values of investments X and Y are $21,000 and $55,000, respectively. a. Calculate the expected rate of return on investments X and Y using the most recent year’s data. b. Assuming that the two investments are equally risky, which one should Douglas recommend?

Is gender dysphoria normal or abnormal?

 In this module, you will explore the concept of gender dysphoria. In what ways do our attitudes, beliefs, and culture influence our perception of gender dysphoria as normal or abnormal?Note: The American Psychiatric Association states that although some people who are transgender experience gender dysphoria, not all people who are transgender do (Help With Gender Dysphoria, 2020).Remember to respond to two peers while being respectful of and sensitive to their viewpoints.

What is the likely profile of a threat actor using this ransomware?

RESEARCH SCENARIO
ABC Services Ltd (‘ABC’) is a global financial services provider. To comply with local regulatory frameworks, they operate offices around the world, most of which have a legal requirement to store their Know Your Customer (‘KYC’) information in on-site servers.One of these servers, located in Lebanon, was recently infected with a variation of malware called ransomware, which has prevented ABC from accessing their local KYC data by encrypting it with a secret key. The threat actor behind the attack left behind a file on the server that demands a ransom for the return/decryption of this data.Once they became aware of this incident, they instructed their local IT team to bring the server offline to mitigate the risk of the malware spreading across their network. They also activated their business continuity plans to minimize disruption to their core business, which involved recreating the servers from backups taken over a month ago.ABC approached YOU  to help them answer several questions, specifically:? What type of ransomware was used?? How is the ransomware typically delivered? ? What is the likely profile of the original developers of the ransomware?? What is the likely profile of a threat actor using this ransomware?? Are there any known methods of decrypting the data encrypted by the ransomware?? What is the likelihood that the ransomware has exfiltrated data?? What additional information would you require to investigate whether the threat actor has exfiltrated KYC data?They have provided you with a sample of the ransomware and asked you to carry out a preliminary investigation. The sample they provided contains the following key information: ? Info.exe  (the ‘executable’) – this is the file name of the ransomware that was used to encrypt ABC’s data.? [email protected] and [email protected] – these email addresses are provided in the ransom note left as a text file on the client’s systems, as a means of contacting the threat actor. ? .no_more_ransom – this file name suffix is present on files encrypted by the ransomware that affected your systems and data. Your TaskPlease research and prepare a written summary of findings to answer ABC’s questions in an MS Word report.  While you will certainly have to make assumptions about the situation, we will expect you to be able to explain and answer above questions at a high level about some of the key technical concepts involved in your findings.Examples of topics you may consider including in the report are: RDP, asymmetric encryption, brute forcing, and phishing. Please be sure to capture the key findings from your research into the malware as well as the potential implications of this incident for ABC.   

How is the implementation of network security similar and difference between on-premise and cloud environments?

How is the implementation of network security similar and difference between on-premise and cloud environments? Give 2 examples for each scenario. Note- Post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.