Linux Implementation Proposal: Client Response Memo

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Need assignment help for this question?
If you need assistance with writing your essay, we are ready to help you!

Order Now

Template
  

Go2Linux, Inc.

 
Provide a brief summary of your recommendation
of a specific version of Linux. Explain how your choice meets the business need of Faster 
Computing, Inc.
The bold text questions below represent the specifics you need to focus on. For 
each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 
assignment you will provide technical details for Information Technology personnel.
Any example Linux commands should be properly displayed (e.g., in lower case) 
and any acronyms explained on first use (e.g., Secure Shell (SSH)).
·
How will you implement security in the Linux systems?
o
Start by outlining how you plan to migrate the existing Windows 
Servers to Linux. Ho
w will users authenticate? What technologies will be used? What 
kind of access controls will be used?

o
Will you recommend simple authentication mechanisms or employ 
multiple factors? For passwords, what policy(ies) will you recommend?
o
How will you handle data-at-rest and data-in-transit?
o
How will you enforce software installations and control which 
applications may run on the network?
·
End users have expressed some concern about completing their day-to-day tasks on 
Linux. How would activities such as email/web browsing work? How would they work 
with their previous Microsoft Office files?
o
There are several ways to address the use of existing applications. 
Conduct research to determine the available options.
o
For web browsing, you should provide at least 2 alternatives and 
consider the impact to initial configuration (bookmarks, extensions, plugins)
o
For Microsoft Office, provide a full discussion on how users will 
continue to open/edit/save office docs in the Linux environment. You should provide at 
least 2 alternatives.
·
The current Windows administrators are unsure about administering Linux systems. How
are common tasks, such as process monitoring and management, handled in Linux? 
How does logging work? Do we have event logs like we do in Windows?
o
Discuss your logging and monitoring approach in this section. You 
should include the location of specific Linux log files.

o
Discuss how admins can manage processes. It may be helpful to 
compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 
stop processes, including the corresponding commands.
·
Some folks in IT raised questions about the Linux flavor that was recommended. They 
would like to see comparisons between your recommendation and a couple of other 
popular options. What makes your recommendation the best option?
o

o
The key differentiator is …
·
How does software installation work on Linux? Can we use existing Windows software?
o
Discuss a Linux package management specific to your distro. How will
you automate updates?
o
Discuss how specific Windows applications can be installed and used,
if at all.
·
How can Linux work together with the systems that will continue to run Windows? How 
will we share files between the different system types?
o
Discuss how file and printer sharing will work. Will the users need to 
do anything “different”? What underlying technology will need to be implemented?

Warm regards,

Go2Linux
Linux Deployment Manager
References

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 
Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm
l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 
Encryption. [Accessed December 1, 2019]. 
[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 
Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 
December 6, 2019].
… and so on …