Faster Computing was impressed with your presentation. The company is

 

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:

  • How will security be implemented in the Linux systems—both workstations and servers?
     
  • End users have expressed some concern about completing their  day-to-day tasks on Linux. How would activities such as web browsing  work? How would they work with their previous Microsoft Office files?
     
  • The current Windows administrators are unsure about administering  Linux systems. How are common tasks, such as process monitoring and  management, handled in Linux? How does logging work? Do we have event  logs like we do in Windows?
     
  • Some folks in IT raised questions about the Linux flavor that was  recommended. They would like to see comparisons between your  recommendation and a couple of other popular options. What makes your  recommendation the best option?
     
  • How does software installation work on Linux? Can we use existing Windows software?
     
  • How can Linux work together with the systems that will continue to  run Windows? How will we share files between the different system types?
     

The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Template

  

<insert date>

Go2Linux, Inc.

<Student Name>

<Address>

<Opening Salutation>

<Purpose of Communication/Introduction> 

Provide a brief summary of your recommendation

of a specific version of Linux. Explain how your choice meets the business need of Faster 

Computing, Inc.

<REMOVE> The bold text questions below represent the specifics you need to focus on. For 

each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 

assignment you will provide technical details for Information Technology personnel. <REMOVE>

<REMOVE>Any example Linux commands should be properly displayed (e.g., in lower case) 

and any acronyms explained on first use (e.g., Secure Shell (SSH)).

·

How will you implement security in the Linux systems?

o

<Edit as needed> Start by outlining how you plan to migrate the existing Windows 

Servers to Linux. Ho

w will users authenticate? What technologies will be used? What 

kind of access controls will be used?

<Edit as needed>

o

<Edit as needed> Will you recommend simple authentication mechanisms or employ 

multiple factors? For passwords, what policy(ies) will you recommend? <Edit as 

needed>

o

<Edit as needed> How will you handle data-at-rest and data-in-transit? <Edit as 

needed>

o

<Edit as needed> How will you enforce software installations and control which 

applications may run on the network? <Edit as needed>

·

End users have expressed some concern about completing their day-to-day tasks on 

Linux. How would activities such as email/web browsing work? How would they work 

with their previous Microsoft Office files?

o

<Edit as needed> There are several ways to address the use of existing applications. 

Conduct research to determine the available options. <Edit as needed>

o

<Edit as needed> For web browsing, you should provide at least 2 alternatives and 

consider the impact to initial configuration (bookmarks, extensions, plugins) <Edit as 

needed>

o

<Edit as needed> For Microsoft Office, provide a full discussion on how users will 

continue to open/edit/save office docs in the Linux environment. You should provide at 

least 2 alternatives. <Edit as needed>

·

The current Windows administrators are unsure about administering Linux systems. How

are common tasks, such as process monitoring and management, handled in Linux? 

How does logging work? Do we have event logs like we do in Windows?

o

<Edit as needed> Discuss your logging and monitoring approach in this section. You 

should include the location of specific Linux log files. <Edit as needed>

<insert logo, if desired>

o

<Edit as needed> Discuss how admins can manage processes. It may be helpful to 

compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 

stop processes, including the corresponding commands. <Edit as needed>

·

Some folks in IT raised questions about the Linux flavor that was recommended. They 

would like to see comparisons between your recommendation and a couple of other 

popular options. What makes your recommendation the best option?

o

<Edit as needed> <Enter distro here> <Edit as needed>

o

<Edit as needed> The key differentiator is … <Edit as needed>

·

How does software installation work on Linux? Can we use existing Windows software?

o

<Edit as needed> Discuss a Linux package management specific to your distro. How will

you automate updates? <Edit as needed>

o

<Edit as needed> Discuss how specific Windows applications can be installed and used,

if at all. <Edit as needed>

·

How can Linux work together with the systems that will continue to run Windows? How 

will we share files between the different system types?

o

<Edit as needed> Discuss how file and printer sharing will work. Will the users need to 

do anything “different”? What underlying technology will need to be implemented? <Edit 

as needed>

<Closing/Conclusion of Communication>

Warm regards,

<Student Name>

Go2Linux

Linux Deployment Manager

References

<These example citations use IEEE style. Ask your instructor for clarification on the style

to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 

Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm

l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 

Encryption. [Accessed December 1, 2019]. 

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 

Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 

December 6, 2019].

… and so on …

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions