Task 1: creating a bucket in amazon s3

Hosting a Static Website Lab
Insert a screenshot showing you have completed each task.
Task 1: Creating a bucket in Amazon S3
Task 2: Uploading content to your bucket
Task 3: Enabling access to the objects
Task 4: Updating the website
Task 5: Testing high availability
Lab Complete
Insert screenshot showing the panel indicating that “DELETE has been initiated… You may close this message box now.”

Task 3: connecting to your ec2 instance via ssh

Introducing Amazon Elastic File System (Amazon EFS)
Insert a screenshot showing you have completed each task.
Task 1: Creating a security group to access your EFS file system
Task 2: Creating an EFS file system
Task 3: Connecting to your EC2 instance via SSH
Task 4: Creating a new directory and mounting the EFS file system
Task 5: Examining the performance behavior of your new EFS file system
Lab Complete
Insert screenshot showing the panel indicating that “DELETE has been initiated… You may close this message box now.”

One slide on the conclusion.

Instructions
You will present your findings to the C-Suite of the AWS Customer Success Story:https://aws.amazon.com/solutions/case-studies/?customer-references-cards.sort-by=item.additionalFields.sortDate&customer-references-cards.sort-order=desc&awsf.customer-references-location=*all&awsf.customer-references-segment=*all&awsf.customer-references-industry=*all&awsf.customer-references-use-case=*all&awsf.customer-references-tech-category=*all&awsf.customer-references-product=*all&awsf.content-type=*all, company in a narrated 10-minute PowerPoint presentation with 15-25 slides.
Use the Cloud Presentation PowerPoint Template.
These Presentation Resources can help you prepare and record your presentation.
https://leocontent.umgc.edu/content/umuc/tus/cmit/cmit426/2228/course-resource-list/presentation-resources1.html?ou=845779
Presentation Guidelines
Your presentation should be comprised of the following:
One to two slides on the company’s profile.
One to two slides on their current success.
One to two slides on their current AWS infrastructure.
Three to six slides on general cloud details. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
Three to six slides on the company’s cloud services. Include their core services: EC2, VPC, S3, RDS, Lambda, Route 53, SNS, SQS, ELB, or other key services essential to their architecture and explain the role all these services play in achievement of their business needs.
Three to six slides on the Shared Responsibility Model. Include how the company complies with industry and/ or regulatory standards.
One to two slides on recommended improvements for one of the Well-Architected Framework Pillars -https://aws.amazon.com/blogs/apn/the-6-pillars-of-the-aws-well-architected-framework/, cost optimization, security, performance efficiency, scalability, or operational excellence.
One slide on the conclusion.

This motivation paper is part of the application to ellis phd program.

This motivation paper is part of the application to Ellis Phd program. The motivation letter requires me to explain why I want to earn a PhD within the ELLIS network. Details of Ellis program https://ellis.eu/phd-postdoc https://ellis.eu/uploads/ckeditor/attachments/1015/ELLIS_PhD___Postdoc_Program_-_Information_for_applicants__v4_2022_.pdf .

Research the meaning of a responsive design.

Part 1 :
1. Select one of these topics to conduct research and write a report to share your findings with the class as your graded DQ.
1. Research the meaning of a responsive design. Provide the links to three websites that use responsive design and explain how they demonstrate responsive-design behavior.
2.Research the criteria and cost to put a mobile app into Apple’s App Store.
3. Research what elements to use to estimate the cost of building an app.
2.Develop a response (300 to 500 words) to:
Give a summary of your research to give the readers enough context to understand your topic.
Discuss what decisions and trade-offs entrepreneurs need to know in making their decision.
3. Submit your research as your graded DQ response & make three or more substantive comments as replies to at least two different individual posts .
Part 2 : Now that you have read this chapter, write a short discussion to let me know:
1. Are there topics that are easy to understand?
2 .What were topics that were hard to understand? What would make it easier for you?
3. Other feedback about what to keep, remove, modify, or add?
4. Please add one study question or discussion question for this chapter and explain what you expect as the answer.

It need s to be more in depth with diagrams and pictures.

This is a group paper my portion is dealing with the effect of Cellphones on the body, both physically and emotionally. It need s to be more in depth with diagrams and pictures. Also it should entail various ways we as consumers can address those issues both individually and as a society

Write a paper discussing the benefits of a cybersecurity compliance audit and what areas would be expected in the documentation of this audit.

Write a paper discussing the benefits of a cybersecurity compliance audit and what areas would be expected in the documentation of this audit.
Additionally, provide an analysis of how cyber vulnerability audits need to be developed and how they need to be executed and supported by upper management (C-Suite) in order to meet corporate goals.
Formatted according to APA requirements, including a title and reference page, Times New Roman, 12-point font, and proper citations

Since she, like other executives, is very busy, she has asked you to limit this paper to approximately 300 words and 3 key points.

This week, you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing attacks (including “spear phishing” and “whaling”) that could allow hackers to steal login credentials and other information. One of the outcomes of this meeting will be recommendations for improvements and/or changes to the company’s guidance to employees, managers, and executives regarding use of laptops, cell phones, and other mobile devices to access company email and databases while traveling.
Resort Operations is involved in this meeting since the majority of employees who travel on company business work for RO. The head of RO, R. Rose Padgett, has asked you to review the Read Ahead package (see below) and then prepare a position paper for her use during this meeting. Since she, like other executives, is very busy, she has asked you to limit this paper to approximately 300 words and 3 key points. (You may exceed this target but conciseness is valued.) She has also asked that you list and cite the resources used so that she can have a senior staffer can fact check your work. (APA format citations are preferred.)
Note: a “position” paper is used by staff to inform an executive and assist in preparations for meetings with other executives. The position paper should be written in the third person and usually has three parts:
(a) statement of the issue(s) — clear and concise
(b) the position to be taken on the issues (intentions, beliefs, attitudes)
(c) recommendations which restate key points and provide suggested resolutions or actions.
Read Ahead Package
The read ahead package for this meeting includes the following resources:
1. https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While-Traveling-Tip-Sheet-122019-508.pdf
2. https://resources.infosecinstitute.com/30-cybersecurity-tips-for-travelers/#gref
3. https://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/
4. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-charging-station-could-hack-your-phone.html