# Blog

## case study

TELOXY ENGINEERING (A)

Teloxy Engineering has received a one-time contract to design and build 10,000 units of a new product. During the proposal process, management felt that the new product could be designed and manufactured at a low cost. One of the ingredients necessary to build the product was a small component that could be purchased for \$60 in the marketplace, including quantity discounts. Accordingly, management budgeted \$650,000 for the purchasing and handling of 10,000 components plus scrap.

During the design stage, your engineering team informs you that the final design will require a somewhat higher-grade component that sells for \$72 with quantity discounts. The new price is substantially higher than you had budgeted for. This will create a cost overrun.

You meet with your manufacturing team to see if they can manufacture the component at a cheaper price than buying it from the outside. Your manufacturing team informs you that they can produce a maximum of 10,000 units, just enough to fulfill your contract. The setup cost will be \$100,000 and the raw material cost is \$40 per component. Since Teloxy has never manufactured this product before, manufacturing expects the following defects:

Percent defective                  0      10     20    30    40

Probability of occurance    10     20     30     25    15

All defective parts must be removed and repaired at a cost of \$120 per part.

1. Using expected value, is it economically better to make or buy the component? 2. Strategically thinking, why might management opt for other than the most economical choice?

• Posted: a day ago
• Due: 20/02/2019
• Budget: \$1

## TELOXY ENGINEERING

#### TELOXY ENGINEERING

18 hours ago

Using the expected value, is it economically better to make or buy the component?

Unit cost                                             : 10,000 10,000 10,000 10,000 10,000

Cost of the resources per element: 40           40         40          40          40

Elements had defects per cost            : 120        120      120         120        120

Percentage default                   0                10        20            30         40

The possibility of the availability (%)      10              20         30           25        15

Charges (\$)                              100,000      10,000   10000 10000 10,000

The cost of the material expected         400,000          400,000    400,000 400,000 400,000

Defaulted elements                0.00               1000.00       2,000      3,000      4,000

All defaulted elements                       0.00               120,000      240,000   360,000 480,000

Cost possibility (\$)            50,000                124,000         222,000    215,000      147,000

\$ 758,000 was the exact figure which was expected should the firm consider the manufacturing of the product in them. However, 10,000 ×72= \$ 720,000was the amount it would cost the firm in purchasing the complete product. From the calculations above, it is well postulated that the company was supposed to incur a lot of expenses in buying the raw materials and all the other resources to manufacture the product by themselves (Helsloot & Groenendaal, 2011). The company should around \$38,000 if it could consider the option in purchasing the finished product. However, being that the company did not count the loss it could have in producing the product, many factors forced the company not to go for the most economical option.

The company maybe had evaluated its relationship with the customers and through their contact realized the best design the customers desire to purchase it (Schoeneborn, 2010). This way the company now decided to make the product from the customers’ interest. Optionally, the firm can decide to produce the product to be the sole producer in the region. The region maybe did not have the firm producing this product, and thus, this company realized any opportunity to be producing the product as it distributes to the other firms within the region.

References

Helsloot, & Groenendaal, (2011). Naturalistic Decision Making in Forensic Science: Toward a    Better Understanding of Decision Making by Forensic Team Leaders. Journal of Forensic           Sciences, 56(4), 890-897. Doi: 10.1111/j.1556-4029.2011.01714.x

Schoenborn, (2010). Organization as Paradox Communication: Luhmannian Contributions to             ‘Communication Constitutes Organization’ (CCO). SSRN Electronic Journal. Doi:             10.2139/ssrn.1647606

## Applying The Web Or Other Resources, Research An Example Of Cyber Terrorism. Write A Brief Discussion Describing The Terrorism Attack And It’s Aftermath.

Applying The Web Or Other Resources, Research An Example Of Cyber Terrorism. Write A Brief Discussion Describing The Terrorism Attack And It’s Aftermath.

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

The post Applying The Web Or Other Resources, Research An Example Of Cyber Terrorism. Write A Brief Discussion Describing The Terrorism Attack And It’s Aftermath. appeared first on best homeworkhelp.

## discussion

The system administrator should generally establish routine backup procedures for the whole system at each site. However, application programmers should be sufficiently aware of these procedures to understand what is backed up and how often. After considering the tradeoffs between saving time on daily backups and losing time on a complicated restore procedure, the administrator should develop a backup strategy that meets the system’s needs and file usage patterns. It should be noted that complex backup procedures can sometimes lead to data loss when inexperienced operators use them.

Given the ever – decreasing availability of backup times (known as the backup window) and the increasing time required to actually perform this backup, corporate IT was caught in a binding position. It could not guarantee that the system would run without up – to – date backups, but it could not even partially shut down the system so that it could actually do those backups.

To solve this dilemma, a number of strategies have been developed. Partial backups are the first. These depend on the existence of full backups at regular intervals, and the idea is to save time by saving only those files that have been changed, knowing that the other unchanged files are already backed up. The backup software looks at the modification date and time of each file on the system to determine which files have changed, and if the time stamp of a file is later than the last full backup, the file will be included in the next differential backup.

Reference:

## Discussion

Provide a 50-75 word discussion reply to the following post below.

Setting up a wireless network could potentially put a businesses data at risk if not protected sufficiently. The network data should be protected from unauthorized use with encryption and authentication. Encryption is where the data that is transmitted on the wireless network is disguised in only a way that the sender and receiver can read it. Authentication includes methods such as passwords and fingerprint readers to ensure no unauthorized access. If the network is going to be connected to the internet it would also be important to include anti-virus software. Anti-virus software will prevent malware from being introduced on the network.

When determining the encryption protocol to use for your wireless network, it is always best to use the most secure. Wired Equivalent Protection (WEP) does not provide a significant amount of encryption for data and shouldn’t be used if your network contains sensitive information. TJX, the parent company for TK Maxx used WEP encryption for their wireless network which contained millions of credit card numbers (Espiner, T., 2007). The WEP encryption ended up getting cracked by hackers who stole all this information back in 2005 (Espiner, T., 2007).  This event was the largest loss of credit card data in history (Espiner, T., 2007). Wireless networks should be encrypted using the best available methods such as Wi-fi Protected Access to better secure the data transmitted on them.

References

Shaffer, Carey, Parsons, Oja, Finnegan. ACP IT 221. [VitalSource]. Retrieved from https://bookshelf.vitalsource.com/#/books/9781285229591/

Espiner, T. (2007) Wi-Fi hack caused TK Maxx security breach. Retrieved from https://www.zdnet.com/article/wi-fi-hack-caused-tk-maxx-security-breach/

## Resource

Resource: Principles behind the Agile Manifesto

Create an 8- to 12-slide Microsoft® PowerPoint® presentation that summarizes the Agile Manifesto.

Present at least two points of praise (i.e. Agile principles you believe are positive/productive).

Present at least two points of criticism (i.e. Agile principles you believe are negative/counterproductive).

Contrast the Agile principles with the typical software development practices found in the traditional Waterfall methodology.

Investigate recent professional or academic research regarding the effectiveness of the Agile methodology.

Format your PowerPoint® speaker notes according to APA guidelines.

Submit your presentation as a Microsoft® PowerPoint® file to the Assignment Files tab.

• Posted: a day ago
• Due: 23/02/2019
• Budget: \$20

## PowerPoint Presentation

In this module, M7A1, you will complete the first part of the PowerPoint Presentation assignment for this course. Your task is to use the MS PowerPoint skills you learned in this module to create a presentation on the Systems Development Life Cycle (SDLC) alternative you identified in M7D1:

1. Create a new MS PowerPoint presentation and save it as SDLC_Alternative.pptx.
2. The Presentation should include:
1. A Cover slide including the name of the presentation, your name, the course, and the date
2. An Outline slide containing a brief description of the presentation
3. 6 to 10 slides containing the information about system development methodology you picked in M7D1 and its comparison with the SDLC
4.  A Conclusion slide
5.  A Reference slide.
6. Tables, animations, and multimedia are needed in your slides. The multimedia content can be any relevant pictures, graphs, audios, drawings or other items.
7. Include a footer on each slide except the cover slide with the name of the presentation and the current date.
8. Save and close the presentation.
9. Once you have successfully completed all the requirements of this assignment, submit your SDLC_Alternative draft presentation to M7A1 dropbox.
• AgileMethodology.docx
• Posted: a day ago
• Due: 25/02/2019
• Budget: \$20

## Design Scenario – C

Case Study 3: Design Scenario – C
Due Week 9 and worth 60 points

Read the Design Scenario, Klamath Paper Products case study found in Chapter 11 of the textbook.

Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet).

Write a one to two (1-2) page paper in which you:

1. Describe the service in technical terms. Make sure to include security and pricing information. Note: You may need to contact the provider to obtain this information.
2. Describe security offered by the vendor.
3. Describe pricing information for the service.

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying Quality of Service (QoS) requirements.
• Use technology and information resources to research issues in network architecture and analysis.
• Write clearly and concisely about network architecture and analysis using proper writing mechanics and technical style conventions.
• Chapter11SelectingTechnologiesandDevicesforEnterpriseNetworks.docx
• Posted: a day ago
• Due: 01/03/2019
• Budget: \$25

## Disaster Recovery 7

Search “scholar.google.com” or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment.

2)

7.1. Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try

to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?