Write a 500-word minimum abstract of your proposed paper.

Networking Function Virtualization

Write a 500-word minimum abstract of your proposed paper.

Articles;

  • Service platform and monitoring architecture for network function virtualization (NFV) BY Hyuncheol Kim1 · Seunghyun Yoon2 · Hongseok Jeon3 · Wonhyuk Lee4 · Seungae Kang5
  • Network Function Virtualization
  • Network Function Virtualization: Opportunities and Challenges

 

What is a relational database? What is the role of the relational database in an organization today? What are the main functions of the Relational Database Management System (RDBMS)? List at least five functions. What other types of databases exist today on the market? What is the fundamental difference between NoSQL and a relational database? What is the role of a relational database in the Big Data ecosystem?

Relational Database

Topics discussed in the paper should address the following questions:

What is a relational database?
What is the role of the relational database in an organization today?
What are the main functions of the Relational Database Management System (RDBMS)? List at least five functions.
What other types of databases exist today on the market?
What is the fundamental difference between NoSQL and a relational database?
What is the role of a relational database in the Big Data ecosystem?
In your opinion, what is the future for relational databases? Explain your reasoning.

What should Gordon and Barton do about the Ivan Korsky situation? What might Barton be able to learn from the way jazz ensembles work about how to manage top-notch IT talent? Should Barton seek a technological way of monitoring what his employees are doing and/or should Barton reorganize the IT function so that the best talent is in a central shared services organization available to the entire organization? What are the pros and cons of such an arrangement?

Managing Talent

Read the case attached titled Managing Talent and answer the questions below. Feel free to use any number of sources.

1. What should Gordon and Barton do about the Ivan Korsky situation? What might Barton be able to learn from the way jazz ensembles work about how to manage top-notch IT talent?

2. Should Barton seek a technological way of monitoring what his employees are doing and/or should Barton reorganize the IT function so that the best talent is in a central shared services organization available to the entire organization (rather than only a particular business unit)? What are the pros and cons of such an arrangement?

3. Select a company and develop a problem/opportunity statement and proposed solution in the area of managing talent. To help get started and improve learning, connect the response to something you may already know from your other courses, career path knowledge, or current events.

Explore a business project of interest with applied technology. Discuss the importance, impact, and strategic goals of the project, and alignment with overall organizational strategy. Show the current state (as-is), and the proposed Amazon process/solution (to-be) to demonstrate the business improvement.

PillPack by Amazon Pharmacy

Explore a business project (PillPack by Amazon Pharmacy) of interest with applied technology (Pharmacy OS).

Project must include:
o Executive Summary -> Analysis -> Design -> Implementation
o 20 Pages (double-spaced)
o APA style
o Provide at least 10+ resources
o Include Appendices (Exhibits like financials, market data, etc.)

1. Executive Summary:
At a high level discuss the importance, impact, and strategic goals of the project, and alignment with overall organizational strategy (increased revenue, patient satisfaction/experience, etc.).
o Outline business problem/opportunity
o Big Picture Overview
o Key messages/objectives/goals (3)
o Clear visuals to support summary

2. Business Analysis:
For this section, show the current state (as-is), and the proposed Amazon process/solution (to-be) to demonstrate the business improvement. You can also include best practices or compare similar organizations (e.g. CVS/Aetna, etc.).
o Business problem approach
o Data flow diagram
o Summary of best practices
o Other industry examples
o Business impact ($)
o Tables/graphs to support

3. Solutions Design:
For this section, compare pharmacy technology solution options based on cost, delivery, features, implementation time, etc.
o Technology solution options to meet business needs
o Solution comparison
o Solution model/prototype design

4. Implementation:
For this section, recommend a proposed solution, project plan, and schedule for completion. This can also be implemented following an iterative or agile approach.
o Proposed solution, timeline, resources, agile phases
o Gantt Chart/project plan
o Recommendations (ROI, risk/impact, pilot)

Describe how the authors establish their ethos or credibility to speak about the issue. Why would the target audience be interested in these authors? Describe the structure and format of the advocacy letter. How do that structure and format shape what the authors say and how they say it?

PROJECT 3B – ISSUE, AUDIENCE, AND GENRE ANALYSIS WORKSHEET INSTRUCTIONS

Enter your responses to the following questions directly on this Word document. Save the document using the following file name: LastNameAnalysis. Some questions will require more content to answer than others, but you should aim for two substantive paragraphs for each question. Make sure you cite your sources, and cite only sources your audience would respect. Your evidence should include information from at least one scholarly source.

QUESTIONS
NAME OF YOUR DISCIPLINE: Information technology YOUR refined and narrowed RESEARCH QUESTION: Which is the most efficient and safest method of data recovery and technique of data loss prevention in cloud computing?

1. : Describe THE ISSUE appropriately narrowed, current, and unresolved issue relevant to your field of study. Explain what caused this controversial issue to arise and why people disagree about how it should be resolved. Make sure it is either about to happen or is just getting underway, which means it has arisen as controversy within the last 12-18 months. Be specific. Do not choose overly broad issues that have been debated for a long time, such aslegalizing marijuana. Think much more narrowly, such as a piece of legislation at the specific federal or state level that has not yet been voted upon (e.g., how a specific state considering legalizing marijuana plans to negotiate the federal prohibition against its use). Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately.

The main issue identified is data loss in cloud computing. One of the most recent technologies is cloud technology and massive data storage in online platforms. Many companies rely on big data analytics to collect information from potential customers stored in cloud technology databases. However, some companies have not installed appropriate safety frameworks to ensure the data is safe. This has made cloud technology a target for many cyber criminals using the data for other crimes such as identity theft or blackmailing big organizations

(Kumar & Saha, 2019). In the end, the damage control could cost the company millions in paying the criminals and repairing the system. Some small companies may not have the capacity, and such
data breaches and losses have continued to be a major problem. Some people have proposed strong legislation targeting companies using cloud technology to solve the problem and ensure security. However, some claim that such measures through legislation are not enough as it only places the liability on the companies and agencies. Instead, getting strong data management systems that are integrated could be a more secure solution. This causes differences in the most effective strategies for preventing data loss and enhancing data recovery. In the recent past, there have been debates as to whether even the companies using cloud computing should allow enforcement agencies to access the data and if such access could increase the risk of data loss by the company, among other ethical concerns.

2. THE AUDIENCE: a primary audience who has direct influence over the Identify and describe issue you researched and analyzed in your annotated bibliography. Explain the audience’s vested interest (decision-making authority) in the issue and describe any current events or trends that may be currently affecting your audience’s interests. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The audience with a decision-making authority focused on is the US government. In 2018, the CLOUD (Clarifying Lawful Overseas Use of Data) Act was passed in the US and became law. The regulation indicates that law enforcement agencies have a right to access data from cloud computing technology for crime prevention for US citizens, US companies, and US-hosted corporations irrespective of the jurisdiction of the data‘s location. The US is especially vested in the issue because some of the frameworks have been difficult to access the information the government works on due to the data security firewall installed by some companies. Moreover, while requesting such data, most companies had a problem giving the government access to such information because of the ethical concerns and terms and conditions given to the clients. Besides, some companies fear letting government agencies access the cloud computing databases could lead to massive data losses and weaknesses targeted by other agencies, such as cybercriminals (Kumar & Saha, 2019).

3. AUDIENCE’S POSITION (the audience’s argument): What position does the audience have on the issue you chose? Note that audiences do not always spell out their positions. You will need to conduct research in newspapers, trade publications, and journals to collect the necessary information about your audience’s position. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The US government holds that crime is now increasing from the physical involvement of the offender in the cyber security  platforms. In this case, many cyber criminals and hackers target critical information from databases, including government secrets which become national security

(Kumar & Saha, 2019). Considering the increasing crimes on online platforms, the US government feels that getting access to some of the databases could help identify the crime trails that could
lead to the detection of crime in time and solving it. Therefore, if companies that have an affiliation of conducting business under the regulations of the United States have such information, then providing such access could help not only in preventing cybercrimes but also ensure that there are minimal data breaches hence data loss prevention and quick data recovery in case an incident has occurred.

4. AUDIENCE BIAS: What values and beliefs do your audience have that would create biases against your position? Remember that everyone involved in a controversy will have biases, so having them is not a sign of weakness. It just means you would need to consider those biases when writing to the audience. Use credible evidence to indicate the source of your information, integrate it
effectively and ethically, and cite it accurately.
The US government is neutral and sometimes biased toward providing consumer protections for US citizens. As a global security major partner, the US government also feels that having such access to some of the most protected frameworks in cloud technology used by some companies could help with international crime surveillance and prevent some of the terrorist attacks not only on the US and US citizens but also other areas around the world. Such intelligence could also help prevent data breaches; from this point of view, the main element is to protect consumers. In addition, the government portrays it to the public as its protector, which is the main aspect. However, this is biased as it does not address two main issues. First, there have been claims from data management companies that government data security protocols are not strong enough to prevent data loss because some rogue officers could get hold of sensitive data and leak it for their gain. Besides, some of the authorized persons could be targeted, and another cybercriminal using their credentials to access the systems, and such data could lead to data loss (Kumar & Saha, 2019). If data recovery becomes difficult and is in large volume, it could put the company in losses and loss of public trust while the government may not lose so much. The second issue is the ethical concerns of sharing data without the users approval, as outlined in most of the privacy and confidentiality contractual agreements by users. Therefore, giving the government such access could force the company to be in an ethical dilemma and risk losing data and a difficult

5. YOUR POSITION ON THE ISSUE: Identify and explain stance on this issue and why youyour disagree with the audience. THE FIRST SENTENCE OF YOUR RESPONSE WILL BE YOUR THESIS OR THE ANSWER TO YOUR RESEARCH QUESTION THAT YOU WILL SUPPORT WITH EVIDENCE.
Provide reasons for your position. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. Use the evidence to defend your position.

Companies should install strong frameworks and integrated data security management systems with strong firewalls to prevent data breaches and loss while enhancing recovery. For instance, strong security protocols in the cloud databases and computing technology should ecure the data to enhance its security with minimal loss, if any. However, access to the data should be highly restricted, especially to the user only, and the authorized individuals in the companies only. A secondary backup database is also critical to help in recovery in case of a technical hitch within the company (Franklin & Ravi, 2018). In this case, the government should not directly access the company‘s details (Alghofaili et al., 2021). However, suppose there is reason to believe there is a crime. In that case, such data can be provided by the company while hiding people’s personal information rather than allowing the security agency access, which could be a weakness. Therefore, the government should rather enhance the regulations around the responsibility of the companies and authorized individuals in guarding the data of users and that of the government by
using cloud technology as a way of consumer protection and recommending some of the safest protocols through evidence-based practices.

6. CONCESSION and COUNTERARGUMENT: Describe elements of your audience’s position that you sympathize with (concession) to acknowledge the counterarguments to your stance. Next,
refute what you can about the audience’s position with an evidence-based counterargument of your own. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately.
The government has a critical role in consumer protection and crime prevention as part of the cyber security issues. To this extent, getting access to some of the data could be critical in preventing serious terrorist attacks and cyber security crimes (Aljumah & Ahanger, 2020). However, it does not address how such access could be an extension of the security frameworks and address the weaknesses of leakage from the government’s end as a user. Furthermore, due to the dilemma, the government fails to address the ethical concerns of being given such access. Besides, such access does not directly address the government’s responsibility in data loss or recovery efforts, which makes it a weak position and approach compared to creating consumer protection legislation other than demanding access.

7. : What types of evidence would your audience expect to see in order to be persuaded EVIDENCE by your argument? Most audiences who hold decision-making authority over an issue are
sophisticated and knowledgeable. Think carefully about what it would take to persuade your audience to change its stance or at least agree to a compromise on the issue. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The evidence would include past incidences where access by the government led to leakages that affected not only the data security but also the reputation and losses to the company involved. In addition, some data losses and recovery problems include cases from government organizations, which could show how governments are, especially in some data security management (Arcserve, 2022).

8. Find two examples of an advocacy letter that includes cited sources GENRE: other than the one we went over in class. (Provide links to these examples or submit them along with your completed
worksheet). Describe how the authors establish their ethos or credibility to speak about the issue. Why would the target audience be interested in these authors? Next, describe the structure and format of the advocacy letter. How do that structure and format shape what the authors say and how they say it?

Advocacy Letter 1
https://www.researchgate.net/profile/Benjamin-Franklin-I/publication/329706513_A_Survey_on_Data_Recovery_Approaches_in_Cloud_Computing_Environment/links/5c175328299bf139c75e3145/A-Survey-on-Data-Recovery-Approaches-in-Cloud-Computing-Environment.pdf

Advocacy Letter 2
https://dl.acm.org/doi/abs/10.1145/3388922

END-PAGE REFLECTION
1. Describe any challenges you encountered in identifying a current and unresolved issue relevant to your field. What types of questions (inquiry) about the topic you chose did you use to identify
the issue? When researching the topic, there were no major issues. However, when it comes to finding advocacy letters, they were difficult to find.

2. Describe the process you used to identify an audience with a vested interest in this issue and  with whom you disagree.
The audience was selected by researching some of the decision making authorities in the US on data security then the CLOUD Act came up. This informed of the US’s position on access to data which could be a weakness of data losses.

3. Identify one thing you learned about your audience that will have the greatest impact on how you shape your argument.

I learned about the ethical dilemma between the US government’s security role and requiring access to data in solving crime as well as the company‘s responsibility of fulfilling confidentiality
and privacy ethical concerns of the data. Failure to include the End-Page Reflection results in an automatic 10-point deduction in
your essay. Make sure you include a works cited or reference page.

Write an essay on how the architecture more effectively adapts to the density of the modern-day cyber ecosystem, while at the same time encompassing the hybrid workplace.

Zero Trust Architecture

Write an essay on how the architecture more effectively adapts to the density of the modern-day cyber ecosystem, while at the same time encompassing the hybrid workplace.

Must have at least 5 valid sources no more than 3 years old. 90-95 percent original work not quoted or paraphrased. Page count does NOT include Title, Abstract, and Reference pages.

Describe how the authors establish their ethos or credibility to speak about the issue. Why would the target audience be interested in these authors? Describe the structure and format of the advocacy letter. How do that structure and format shape what the authors say and how they say it?

PROJECT 3B – ISSUE, AUDIENCE, AND GENRE ANALYSIS WORKSHEET INSTRUCTIONS

Enter your responses to the following questions directly on this Word document. Save the document using the following file name: LastNameAnalysis. Some questions will require more content to answer than others, but you should aim for two substantive paragraphs for each question. Make sure you cite your sources, and cite only sources your audience would respect. Your evidence should include information from at least one scholarly source.

QUESTIONS
NAME OF YOUR DISCIPLINE: Information technology YOUR refined and narrowed RESEARCH QUESTION: Which is the most efficient and safest method of data recovery and technique of data loss prevention in cloud computing?

1. : Describe THE ISSUE appropriately narrowed, current, and unresolved issue relevant to your field of study. Explain what caused this controversial issue to arise and why people disagree about how it should be resolved. Make sure it is either about to happen or is just getting underway, which means it has arisen as controversy within the last 12-18 months. Be specific. Do not choose overly broad issues that have been debated for a long time, such aslegalizing marijuana. Think much more narrowly, such as a piece of legislation at the specific federal or state level that has not yet been voted upon (e.g., how a specific state considering legalizing marijuana plans to negotiate the federal prohibition against its use). Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately.

The main issue identified is data loss in cloud computing. One of the most recent technologies is cloud technology and massive data storage in online platforms. Many companies rely on big data analytics to collect information from potential customers stored in cloud technology databases. However, some companies have not installed appropriate safety frameworks to ensure the data is safe. This has made cloud technology a target for many cyber criminals using the data for other crimes such as identity theft or blackmailing big organizations

(Kumar & Saha, 2019). In the end, the damage control could cost the company millions in paying the criminals and repairing the system. Some small companies may not have the capacity, and such
data breaches and losses have continued to be a major problem. Some people have proposed strong legislation targeting companies using cloud technology to solve the problem and ensure security. However, some claim that such measures through legislation are not enough as it only places the liability on the companies and agencies. Instead, getting strong data management systems that are integrated could be a more secure solution. This causes differences in the most effective strategies for preventing data loss and enhancing data recovery. In the recent past, there have been debates as to whether even the companies using cloud computing should allow enforcement agencies to access the data and if such access could increase the risk of data loss by the company, among other ethical concerns.

2. THE AUDIENCE: a primary audience who has direct influence over the Identify and describe issue you researched and analyzed in your annotated bibliography. Explain the audience’s vested interest (decision-making authority) in the issue and describe any current events or trends that may be currently affecting your audience’s interests. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The audience with a decision-making authority focused on is the US government. In 2018, the CLOUD (Clarifying Lawful Overseas Use of Data) Act was passed in the US and became law. The regulation indicates that law enforcement agencies have a right to access data from cloud computing technology for crime prevention for US citizens, US companies, and US-hosted corporations irrespective of the jurisdiction of the data‘s location. The US is especially vested in the issue because some of the frameworks have been difficult to access the information the government works on due to the data security firewall installed by some companies. Moreover, while requesting such data, most companies had a problem giving the government access to such information because of the ethical concerns and terms and conditions given to the clients. Besides, some companies fear letting government agencies access the cloud computing databases could lead to massive data losses and weaknesses targeted by other agencies, such as cybercriminals (Kumar & Saha, 2019).

3. AUDIENCE’S POSITION (the audience’s argument): What position does the audience have on the issue you chose? Note that audiences do not always spell out their positions. You will need to conduct research in newspapers, trade publications, and journals to collect the necessary information about your audience’s position. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The US government holds that crime is now increasing from the physical involvement of the offender in the cyber security  platforms. In this case, many cyber criminals and hackers target critical information from databases, including government secrets which become national security

(Kumar & Saha, 2019). Considering the increasing crimes on online platforms, the US government feels that getting access to some of the databases could help identify the crime trails that could
lead to the detection of crime in time and solving it. Therefore, if companies that have an affiliation of conducting business under the regulations of the United States have such information, then providing such access could help not only in preventing cybercrimes but also ensure that there are minimal data breaches hence data loss prevention and quick data recovery in case an incident has occurred.

4. AUDIENCE BIAS: What values and beliefs do your audience have that would create biases against your position? Remember that everyone involved in a controversy will have biases, so having them is not a sign of weakness. It just means you would need to consider those biases when writing to the audience. Use credible evidence to indicate the source of your information, integrate it
effectively and ethically, and cite it accurately.
The US government is neutral and sometimes biased toward providing consumer protections for US citizens. As a global security major partner, the US government also feels that having such access to some of the most protected frameworks in cloud technology used by some companies could help with international crime surveillance and prevent some of the terrorist attacks not only on the US and US citizens but also other areas around the world. Such intelligence could also help prevent data breaches; from this point of view, the main element is to protect consumers. In addition, the government portrays it to the public as its protector, which is the main aspect. However, this is biased as it does not address two main issues. First, there have been claims from data management companies that government data security protocols are not strong enough to prevent data loss because some rogue officers could get hold of sensitive data and leak it for their gain. Besides, some of the authorized persons could be targeted, and another cybercriminal using their credentials to access the systems, and such data could lead to data loss (Kumar & Saha, 2019). If data recovery becomes difficult and is in large volume, it could put the company in losses and loss of public trust while the government may not lose so much. The second issue is the ethical concerns of sharing data without the users approval, as outlined in most of the privacy and confidentiality contractual agreements by users. Therefore, giving the government such access could force the company to be in an ethical dilemma and risk losing data and a difficult

5. YOUR POSITION ON THE ISSUE: Identify and explain stance on this issue and why youyour disagree with the audience. THE FIRST SENTENCE OF YOUR RESPONSE WILL BE YOUR THESIS OR THE ANSWER TO YOUR RESEARCH QUESTION THAT YOU WILL SUPPORT WITH EVIDENCE.
Provide reasons for your position. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. Use the evidence to defend your position.

Companies should install strong frameworks and integrated data security management systems with strong firewalls to prevent data breaches and loss while enhancing recovery. For instance, strong security protocols in the cloud databases and computing technology should ecure the data to enhance its security with minimal loss, if any. However, access to the data should be highly restricted, especially to the user only, and the authorized individuals in the companies only. A secondary backup database is also critical to help in recovery in case of a technical hitch within the company (Franklin & Ravi, 2018). In this case, the government should not directly access the company‘s details (Alghofaili et al., 2021). However, suppose there is reason to believe there is a crime. In that case, such data can be provided by the company while hiding people’s personal information rather than allowing the security agency access, which could be a weakness. Therefore, the government should rather enhance the regulations around the responsibility of the companies and authorized individuals in guarding the data of users and that of the government by
using cloud technology as a way of consumer protection and recommending some of the safest protocols through evidence-based practices.

6. CONCESSION and COUNTERARGUMENT: Describe elements of your audience’s position that you sympathize with (concession) to acknowledge the counterarguments to your stance. Next,
refute what you can about the audience’s position with an evidence-based counterargument of your own. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately.
The government has a critical role in consumer protection and crime prevention as part of the cyber security issues. To this extent, getting access to some of the data could be critical in preventing serious terrorist attacks and cyber security crimes (Aljumah & Ahanger, 2020). However, it does not address how such access could be an extension of the security frameworks and address the weaknesses of leakage from the government’s end as a user. Furthermore, due to the dilemma, the government fails to address the ethical concerns of being given such access. Besides, such access does not directly address the government’s responsibility in data loss or recovery efforts, which makes it a weak position and approach compared to creating consumer protection legislation other than demanding access.

7. : What types of evidence would your audience expect to see in order to be persuaded EVIDENCE by your argument? Most audiences who hold decision-making authority over an issue are
sophisticated and knowledgeable. Think carefully about what it would take to persuade your audience to change its stance or at least agree to a compromise on the issue. Use credible evidence to indicate the source of your information, integrate it effectively and ethically, and cite it accurately. The evidence would include past incidences where access by the government led to leakages that affected not only the data security but also the reputation and losses to the company involved. In addition, some data losses and recovery problems include cases from government organizations, which could show how governments are, especially in some data security management (Arcserve, 2022).

8. Find two examples of an advocacy letter that includes cited sources GENRE: other than the one we went over in class. (Provide links to these examples or submit them along with your completed
worksheet). Describe how the authors establish their ethos or credibility to speak about the issue. Why would the target audience be interested in these authors? Next, describe the structure and format of the advocacy letter. How do that structure and format shape what the authors say and how they say it?

Advocacy Letter 1
https://www.researchgate.net/profile/Benjamin-Franklin-I/publication/329706513_A_Survey_on_Data_Recovery_Approaches_in_Cloud_Computing_Environment/links/5c175328299bf139c75e3145/A-Survey-on-Data-Recovery-Approaches-in-Cloud-Computing-Environment.pdf

Advocacy Letter 2
https://dl.acm.org/doi/abs/10.1145/3388922

END-PAGE REFLECTION
1. Describe any challenges you encountered in identifying a current and unresolved issue relevant to your field. What types of questions (inquiry) about the topic you chose did you use to identify
the issue? When researching the topic, there were no major issues. However, when it comes to finding advocacy letters, they were difficult to find.

2. Describe the process you used to identify an audience with a vested interest in this issue and  with whom you disagree.
The audience was selected by researching some of the decision making authorities in the US on data security then the CLOUD Act came up. This informed of the US’s position on access to data which could be a weakness of data losses.

3. Identify one thing you learned about your audience that will have the greatest impact on how you shape your argument.

I learned about the ethical dilemma between the US government’s security role and requiring access to data in solving crime as well as the company‘s responsibility of fulfilling confidentiality
and privacy ethical concerns of the data. Failure to include the End-Page Reflection results in an automatic 10-point deduction in
your essay. Make sure you include a works cited or reference page.

Describe three specific decisions you made to shape the writing of this essay to your audience and in the advocacy letter genre. Identify one or two places in your final essay where a reader could see evidence of these decisions. Explain how your essay contributes to a scholarly or professional conversation about the issue you chose. Does your argument address a gap in that conversation, bring a new solution to it, raise new questions about it, or add something else that enabled you to “join” this conversation?

RESEARCHED ARGUMENT/ADVOCACY LETTER

OVERVIEW

In this assignment, you will present a stance on an issue where there is a difference of opinion. Your task is to persuade your audience, an audience with substantial influence over the issue and who is resistant to your stance, to agree with your position or at least consider a compromise.

 

Your work on the Annotated Bibliography, as well as the Issue, Audience, and Genre Analysis, required you to find a current unresolved issue in your field, establish your stance on it, and identify and research an audience with a vested interest in the issue (decision-making authority) who is opposed to your position (in part or in total). This project is the cumulation of the work you did in Projects 2 and 3!

 

Armed with the facts and informed opinions you have compiled, it’s now time to write a persuasive, researched argument about that issue, tailor it to your audience’s expectations, and present your argument in a specific genre, the advocacy letter, appropriate for appealing to a resistant audience.

 

By the time you finish this assignment, you should have a piece of writing that it timely enough to send to your audience.

ASSIGNMENT

Write an evidence-based argument to your audience defending your stance and proposing a plan of action the audience should take. Your argument should be presented in the advocacy letter genre.

 

AUDIENCE: You must write with an awareness of the audience you chose. You have already researched and analyzed that audience, and now you must tailor your word choice, evidence, and tone to the expectations of that audience.

 

EVIDENCE: This is a researched academic argument, so you must use evidence from at least two scholarly articles. Your other sources should come from the most reputable sources you can find. You cannot cite general encyclopedias, dictionaries (unless they are specialized dictionaries), or popular magazines and websites (About.com, TIME Magazine, U. S. News & World Report, etc.). You will be writing to sophisticated audiences who will be persuaded only if you use highly credible evidence. Introduce and synthesize the evidence you provide. Work with primary sources as much as you can.

 

GENRE: You will be writing to persuade your audience to accept your proposed response or solution. One of the ways writers present such arguments is through the genre of the advocacy letter. The final version of your essay should be comply with the formatting and length conventions of this genre. Note how advocacy letters position the writer’s ethos. You will need to do this as well.

 

A modification to the advocacy letter is the substantive letter to a Member of Congress (MOC) or to a municipal, county, or state legislator.

 

STRUCTURE: Advocacy letters have a specific structure, but that structure still requires an introduction and thesis, body (background information, argument, and counterargument), and conclusion. Use good paragraphing techniques to help your audience move easily through your argument.

  • THESIS AND ARGUMENT: Since you are writing an argument, you will need an argumentative thesis that contains a claim and a reason. Your thesis must take a stand on the issue, provide reasons for your stance, and propose a solution your audience should take. The thesis is most often the answer to your research question.
  • COUNTERARGUMENT: In the body of your paper, you must also address the counterarguments to your position in order to persuade your audience. The counterargument should address the audience’s resistance, concerns, or opposition to your position and/or your suggested plan of action. Concede where necessary; refute where you can.

DOCUMENTATION STYLE: Use the documentation style appropriate for your academic discipline (MLA or APA). Note that many advocacy letters use bibliographic footnotes, which are also permissible.

END PAGE REFLECTION

  1. Describe three specific decisions you made to shape the writing of this essay to your audience and in the advocacy letter genre. Identify one or two places in your final essay where a reader could see evidence of these decisions.
  2. Explain how your essay contributes to a scholarly or professional conversation about the issue you chose. Does your argument address a gap in that conversation, bring a new solution to it, raise new questions about it, or add something else that enabled you to “join” this conversation?

This assignment, developed by the George Mason Composition Program, is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.)

Write an essay on how the architecture more effectively adapts to the density of the modern-day cyber ecosystem, while at the same time encompassing the hybrid workplace.

Zero Trust Architecture

Write an essay on how the architecture more effectively adapts to the density of the modern-day cyber ecosystem, while at the same time encompassing the hybrid workplace.

Must have at least 5 valid sources no more than 3 years old. 90-95 percent original work not quoted or paraphrased. Page count does NOT include Title, Abstract, and Reference pages.

Write an essay on how to obtain a responsible and challenging position with a progressive company where my work experience will have valuable application and utilization of my opportunity for advancement.

Azaria

OBJECTIVE

To obtain a responsible and challenging position with a progressive company where my work experience will have valuable application and utilization of my opportunity for advancement

 

SKILLS

  • Experienced in the field of customer service/ call center support
  • In-depth knowledge of inbound/outbound call procedures and problem solving methods.
  • Proficient in computer office package, MS word, MS access, MS excel, MS outlook.
  • Great ability of analyze the problem and identify the solution.
  • Typing speed approximately 60wpm and precise documentation
  • Very patient and solves all the queries and complaints on phone
  • Excellent communication skills both verbally and written

 

PROFESSIONAL EXPERIENCE

Tampa General Hospital

November 2016- December 2021

Telephone Operator

Team leader

January 2017 – December 2021

  • Taking inbound calls, directing call to guest rooms, staff, or department through the switchboard or systems.
  • Answering emergency calls for reporting and dispatching of severity levels and codes throughout the hospital. Code blue ,red etc

Scheduling on call physicians

Overhead paging throughout hospital

Answering service for TGMG clinic, Cancer center , Geriatric, Psychology

  • Multi- task skills to ensure the process is completed in a timely manner
  • Guest services
  • Insurance verification
  • Supervise over 30 representatives
  • monthly coaching calls

 

Credit Control, LLC

June 2016- September 2016

Operator

  • Making inbound calls
  • Notifying customers on their past due accounts
  • Verify customer information
  • Transferring calls

 

GC Services

June 2014 – May 2015

Call Center Agent for Verizon Wireless Credit Department

  • Retrieves and delivers records or documents
  • Answer inbound calls promptly and professionally
  • Adding international features at the customer’s request
  • Maintains and reviews customers account for any outstanding debt
  • Assist customers and representatives from Verizon Wireless store with running credit
  • Create forms to run customer’s credit to see how many lines customer may be eligible
  • Arranging payment arrangements and payments
  • Resolve customer complaints