**Reserved for Prof Washington Watson**

Discussion 1

1. First, analyze all four reviewers and, for each reviewer, write at least one summary sentence describing what the review says about the acting in the film.  In addition, for each reviewer, quote the reviewer at least one time to demonstrate the sentiment he or she expresses about the acting.

Ann Hornaday- 

Summary statement:

Quote from this reviewer to support the summary statement:

Rex Reed-

Summary statement:

Quote from this reviewer to support the summary statement:

Benjamin Lee-

Summary statement:

Quote from this reviewer to support the summary statement:

 Anthony Lane –

Summary statement:

Quote from this reviewer to support the summary statement:

2. Then, write three or four short paragraphs that synthesize all four reviewers and the points they make on the acting in the film.  Remember, when synthesizing, you don’t simply list what each author says about the topic.  You write about the issue of acting in the film and integrate the points of all four reviewers into that analysis.

You could group authors into categories, if possible.  For example, consider the reviewers that tend to praise the acting and write about them in a paragraph or two.  Then consider the reviewers that did not like the acting and write about them in a paragraph or two.  Following this analysis, you might write a concluding paragraph that summarizes all four reviewers’ views on the acting.

These are the four articles:




Discussion 2

This discussion thread is designed to help you see how a synthesis of sources essay, or literature review, is organized. 

Please download the article, “Beyond Frequency: Perceived Realism and the CSI Effect,” by Evelyn Maeder and Richard Corbett.  The article is available in the e-reserves of your class.

On pages 84-85, the authors provide an introduction to the research study they conducted.   You can read this section if you would like to.  However, for this discussion thread, please read from page 85 “(“The CSI effect defined”) to page 94 (up to the section entitled “Method”).

Then answer the following questions:

1. In the first section (“The CSI effect defined”), do the authors ever give you their opinion on the CSI effect?  How do they support their definition and their expansion on the definition?  How many different sources do they cite in this section?

2. From pages 86-88, the authors discuss lawyers, police officers, judges, and community members.  In this section, do the authors ever give you their opinion on any of the issues discussed?

3.  Examine the section entitled “Verdicts” (pp. 90-92).  How do the results from the study by Shelton et al. differ from the results of the study by Kim, Barak, and Shelton?   How do the results of the study by Baskin and Sommers differ from the results of other studies?

4. As a result of having read this article, please write a few sentences about what you might have learned about a) synthesizing sources or b) the CSI effect.

You need to respond to the following two posts. These are classmates, SO BE CORDIAL AND NON CONFRONTATIONAL in your response.

First author’s name is Kimberly:

Firewalls are a network security system that blocks unauthorized access to a personal or business computer. Firewalls are a first layer defense to your network with the added ability to filter certain traffic at your discretion (Northrup, N/A). Think of putting a lock on your door and giving certain people a key.

As stated, without using a firewall the company loses about $250,000 a year from successful hacking’s. Now lets say that the company does decide to implement the 10 firewalls  for a total cost of $80,000 and an additional $15,000 a year for maintenance. For the first year they would be saving of $155,000. For the course of five years they would be spending $235,000, where as if they did not have a firewall in place the company would have a loss of $1,250,000.

Without a firewall, the company could not only lose money, but also potential clients, as well as sensitive company/client information. A perfect example would be the case of 2014 Sony hack. Sony ended up paying close to $10 million dollars in a class action lawsuit to include $2 million dollars in legal fees (Raymond, 2015). All because of their negligence when came to their network security. 


Northrup, T., (N/A). Firewalls. Retrieved February 16, 2017 from https://technet.microsoft.com/en-us/library/cc700820.aspx 

Raymond, N. (2015, Oct 20). Sony to pay up to $8 million in “interview” hacking lawsuit. Retrieved February 16, 2017 from http://www.reuters.com/article/us-sony-cyberattack-lawsuit-idUSKCN0SE2JI20151020

Second author’s name is Brandon:

There are quite a few advantages that a firewall offers a network. A firewall is not an actual wall but a figurative wall in the sense that it’s a way to block unwanted access to your network and its devices. Firewalls are useful in homes and in businesses. While in the home setting, personal things can become vulnerable to attack, businesses have a lot more potential for losing important information or causing significant downtime.

Based on the information provided, if a company ends up losing around $250,000 a year since they have no firewall installed, they can definitely have a savings with 10 firewalls installed. For the first year, you would be spending $80,000 for the 10 firewalls and then $15,000 for the maintenance. Taking that amount away from the regular $250,000 lost each year, you end up with a savings of $155,000. If there were no firewalls installed for the next five years, the estimated amount of loss would be $1.25 million. Using firewalls for the next five years would cost the company $235,000, $125,000 for the first three years since it only is good for that duration of time along with the cost of maintenance, and then another $110,000 for another three years of firewall life and then only $30,000 for maintenance since it’s only 2 years instead of 3. With all of that in mind, the company would end up saving $1,015,000 for the next 5 years.

There are a couple of considerations in addition to finances when contemplating a firewall. We all know that viruses and other forms of malware, can cause havoc on all kinds of different levels, though those aren’t necessarily the only threats to the network. With the proper knowledge and access, someone could access secure files on a company’s network and distribute them. Any business, home user or organization should definitely take advantage of using a firewall.

I would definitely recommend for Iverness Investments to invest in a firewall. You would have the option to hire someone in-house to monitor it and keep it secure or you would have to seek the help of an outside company to monitor it. As the referenced article says, emails are also a piece of information that could be compromised. Especially in this technological age, a firewall for the network is almost imperative.


Firewalls: Protecting your business from unwanted intruders. (n.d.). Retrieved February 17, 2017, from http://blogs.cisco.com/smallbusiness/firewalls_protecting_your_business_from_unwanted_intruders

Third author is Tanisha:

Usability is one of the top priorities in relation to IT architecture.  Usability is the “degree of ease with which products such as software and Web applications can be used to achieve required goals effectively and efficiently.”   Ensuring that your targeted audience expectations are addressed and that they are satisfied helps determine between a successful site and a borderline one.  When analyzing usability three principals are the focus:  Iterative focus on the user and the task (how easy is it to use, learn, and navigate the system), Iterative design (visually is it appealing to the eye not overcrowded and too busy), Realistic measurement (are your expectations qualitative or quantitative and how/what is it being compared to).  Smashing Magazine published an article regarding the usability of Craigslist website.  In the article they explored the pros and cons of the website including the current simplicity and need to update the login process.  Check out the article and determine if you agree or disagree https://www.smashingmagazine.com/2009/03/redesigning-craigslist-with-focus-on-usability/ .  This just solidifies how usability is an imperative aspect of the IT architecture. 

What is Usability? – Definition from Techopedia. (n.d.). Retrieved February 15, 2017, from https://www.techopedia.com/definition/4919/usability

Usability analysis and design. (n.d.). Retrieved February 15, 2017, from https://www-935.ibm.com/services/us/en/it-services/usability-analysis-and-design.html

Snell, S. (2016, December 12). Redesigning Craigslist With Focus On Usability – Smashing Magazine. Retrieved February 15, 2017, from https://www.smashingmagazine.com/2009/03/redesigning-craigslist-with-focus-on-usability/

Fourth Author is Kimberly:

calability is the ability for a machine, network, or infrastructure to grow within its own environment like adding a stronger engine to your car instead of replacing it. A perfect example would be the new windows server 2016. Server 2012 supports nearly twice the logical processor support of its predecessor, Server 2012. As well as 12 times the virtual memory. If you already have a Server 2012 environment, upgrading to Server 2016 would substantially bolster you current IT infrastructure(ie scaling)( Microsoft, 2016). Your current virtual hosts could handle a considerably larger number of machines on the network with minimal costs to upgrade your current hardware. This is scalability by definition, instead of throwing away your previous and likely costly initial investment, you simply add to your current investment to increase your return.


Microsoft Windows. (2016, August 25). Windows Server scalability and more!. Retrieved February 16, 2017 from https://blogs.technet.microsoft.com/windowsserver/2016/08/25/windows-server-scalability-and-more/

“Get 15% discount on your first 3 orders with us”
Use the following coupon

Order Now