read the full description of the final deliverable and the steps to completion.

MY SECTION IS ONLY ON STEP 9 “TRAINING & TECHNOLOGY” & STEP 10 “TEAM MANAGEMENT”)

For this project, you will work in a team where you will be creating a Narrated PowerPoint presentation on implementing virtual, multi-cultural, geographically distributed teams in your organization. You will prepare and conduct your presentation over the next 13 steps during which you will review data on types of teams, team roles, and team leadership. Before you get started, read the full description of the final deliverable and the Steps to Completion.

Begin your presentation by going to Step 1: Teammates and Organization.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 2.4: Consider and analyze information in context to the issue or problem.
  • 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
  • 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
  • 4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.
  • 4.3: Contribute to team projects, assignments, or organizational goals as an engaged member of a team.
  • 4.4: Demonstrate diversity and inclusiveness in a team setting.
  • 5.1: Develop constructive resolutions for ethical dilemmas based on application of ethical theories, principles and models.
  • 5.4: Resolve workplace conflicts using the optimal approaches and techniques for the situation and involved parties.
  • 8.2: Analyze an organization’s current technology capabilities and needs, identifying specific strengths and areas of weakness.
  • 9.1: Design organizational structure, systems and processes that support the strategic goals of the organization.
  • 11.1: Recommend strategic plan for the use of technology to meet the strategic goals of organization.
  • 13.1: Identify and analyze new opportunities.
  • 13.2: Create and implement new initiative or enterprise.

Step 1: Teammates and Organization

The first thing you need to do is introduce yourself. You’re all new to this team, so give everyone a little bit of background about yourself. Then review the following:

As a team, select an organization to work with.

To do this, first review your individual organizational analyses projects. Then, as a team, decide if one of your organizations might be a good choice for Project 4. If none of the team members’ organizations seem to be a good fit for this project, identify and agree on a possible alternative to submit to your professor for approval.

After you have a good idea of the scope of work, discuss with your instructor any limiting factors you may encounter as you work on this project.

Step 2: Team Agreement and Project Work Plan

The next step is to complete a team agreement template and project work plan (creating a project plan). These are especially important because you (a) are a new team and (b) will be geographically distributed yourselves.

Submit your project plan and work plan to your instructor for review and feedback.

Step 3: Team Types and Principles/Guidelines

The next step is to determine the type of team (types of teams) that would make the most sense, given the mission and goals of your organization. After picking the team type, create a set of general team principles or guidelines that should be useful for a virtual team. Provide rationales for both.

Step 4: Challenges, Solutions, Recommendations

Knowing that you just made recommendations about team types and objectives, it’s time to think through challenges and solutions to your recommendations. You and your teammates decide on the following course of action:

  • Given your recommendations in Step 3, identify and analyze challenges that are likely to arise in coordinating the work of these geographically dispersed teams (in Paris, Tokyo, Honolulu, and on the East Coast of the United States).
  • Analyze the available options for ensuring successful operations in light of these challenges.
  • Determine whether utilizing a follow-the-sun model makes sense for the team’s tasks and objectives or whether there is an alternative way of managing the team’s project work that would be more appropriate.
  • Based on your analysis, develop, propose, and defend a recommendation about how to organize and manage work flow to leverage the capacity of teams located in multiple time zones.

Step 5: Team Composition

It’s time to start looking at the teams themselves and thinking about how they should be composed.

Keep the following preferences in mind as you make recommendations about team composition:

  • Recommend ideal team size, team composition, and team roles, based on your organization’s needs.
  • Analyze options for handling team leadership.
  • Identify the team leadership model best suited for your organization and provide a rationale for your explanation.

Step 6: Team Member Personality Assessments

After your team has decided on team composition, the next step is to learn how personality assessments coupled with follow-up training and development (including coaching and mentoring) can enable successful teams.

You and your team should do the following:

  • A good place to start is to review the readings you did for Project 1 on personality characteristics (assessments) and discuss with your team how various combinations of personalities might affect team development or team dynamics.
  • Identify some team assessments the team should take.
  • Explain why and how these assessments will help team members:
    • manage disagreements
    • limit harmful conflict
    • build swift trust
    • prevent free ridership
    • make timely decisions
    • complete assigned work
    • qualify as a high-performing team

Consider the possible things your client organization might do to limit challenges associated with likely personality and other differences among team members.

Step 7: Country Cultural Differences

The next challenge to tackle is cultural differences. With this merger, members of your virtual teams will be French, Japanese, and American, and you have to make some suggestions about how to navigate the cultural differences and preferences among members of these three nationalities. This resource on country cultural differences provides guidance about how to proceed with this important component of your team project.

After reading the resources on country cultural differences:

  • Identify potential sources of concern about having company operations in different locations around the world.
  • Make and defend recommendations about the optimal approach to prepare for culturally-derived orientations and preferences among team members.

Step 8: Group Decision-Making Processes

One thing you’ve come to realize since you started working on this project is the importance of having good mechanisms in place to make decisions as a group. Research and compile a list of specific resources for brainstorming and other decision-making processes.

Step 9: Training and Technology Needs

After reading up on how to make decisions as a group, your next step will be to identify training opportunities. To identify those opportunities, complete the following tasks:

  • Identify optimal information and communication technology (ICT) (team communication/collaborations) to facilitate communication, collaboration, and decision-making.
  • Identify necessary training for virtual teams and consider the pros and cons of the CEO’s preference to conduct the team training online rather than with a preliminary face-to-face meeting.
  • Include a cost-benefit analysis that helps the CEO understand the pros and cons of her preference for virtual teams. Refer to the Michel and Oliverio (2007) article on cost-benefit analysis you read when working on Project 2.

Step 10: Team Management

Finally, after completing all the previous steps, you should have some recommendations for team management, one of the most important elements of any work team.

  • Identify and analyze the options for managing these geographically dispersed multinational and multicultural virtual teams.
  • Prepare recommendations that will help the CEO make the best decision about how to do this.

Step 11: Other Advantages and Challenges

You’re nearly done with this project, but after surveying your results, you and your teammates agree that you have to address one last issue: cost, though important, shouldn’t be the only determining factor in the decision to implement virtual teams.

  • Identify other advantages and challenges the organization is likely to confront when making this strategic change to virtual, cross-site, global teams.

Step 12: Final Deliverable: Team Narrated PowerPoint presentation

Post your final team narrated PowerPoint presentation as response to a new thread you create titled “Final Team Project” in your team’s study group. Your professor will post general feedback in your study group and, for privacy reasons, post individual grades in the Assignment folder.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 2.4: Consider and analyze information in context to the issue or problem.
  • 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
  • 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
  • 4.2: Demonstrate the ability to plan and execute a project, articulating clear objectives and goals for the team.
  • 4.3: Contribute to team projects, assignments, or organizational goals as an engaged member of a team.
  • 4.4: Demonstrate diversity and inclusiveness in a team setting.
  • 5.1: Develop constructive resolutions for ethical dilemmas based on application of ethical theories, principles and models.
  • 5.4: Resolve workplace conflicts using the optimal approaches and techniques for the situation and involved parties.
  • 8.2: Analyze an organization’s current technology capabilities and needs, identifying specific strengths and areas of weakness.
  • 9.1: Design organizational structure, systems and processes that support the strategic goals of the organization.
  • 11.1: Recommend strategic plan for the use of technology to meet the strategic goals of organization.
  • 13.1: Identify and analyze new opportunities.
  • 13.2: Create and implement new initiative or enterprise.

Step 13: Confidential Individual Team Assessment

Now that you’ve completed your PowerPoint presentation, your final step is to complete confidential assessments on each team member using this form. The purpose of this assessment, and the feedback you may receive from it, to help you and your teammates further develop the skills you’ll need to be effective contributors to team projects in the future.

Submit your team assessment to instructor.

I need help on communication homework

Watch: THE CORPORATION and answer the following questions:

  1. Today the corporation is described how? Compared to what other powerful institutions historically?
  2. Why is the 14th amendment significant here?
  3. How do externalities benefit corporations and impact others?
  4. Whose face is on the clothing labels shown being made in sweat shops?
  5. According to the technical definition and the description in the film, are corporations psychopathic?
  6. What comparison does Noam Chomsky make between the institution of slavery and the corporation?
  7. Who is the real “minority?”
  8. For the corporate world was 9/11 good or bad?
  9. What does “privatization” mean?
  10. Who owns “happy birthday?”
  11. What is the “Nag Factor?”
  12. How is “perception management” designed to work?
  13. How does Naomi Klein describe what “branding” really is?
  14. Is falsifying news illegal?

Watch: Park Avenue: money, power and the American dream – Why Poverty? and answer the following questions:

  1. Describe this documentary’s version of Monopoly. What is this version meant to convey?
  2. Is the U.S. upwardly mobile?
  3. What has happened to income inequality over the last 30 years?
  4. What is a “lobbyist?”
  5. Who are the Koch brothers?
  6. What is said about the tax rates for the rich and big corporations? What is the impact of this on society?
  7. Do poor people pay taxes?

American revolution, history assignment help

tart by watching the first part of an award-winning PBS video — Liberty: The American Revolution

It is 53 minutes long (no commercials!) and can be watched by clicking HERE (Links to an external site.)

Once the video screen has appeared, the video will soon begin. Be patient. 

As you watch the video, question everything. Many of the events mentioned in it are treated by Foner, but in many cases there is a difference of emphasis and interpretation. Be alert also to what is left out of the video. All selection is interpretation. Omissions sometimes speak louder than what is selected.

As you view it, keep the following questions in mind and answer them for this forum assignment. At all times, compare what you see in the video with the version of this period in your textbook:

  1. What reasons are given in the video for the intensification of the conflict between Great Britain and the 13 colonies? Give several reasons, not one or two. Complex historical events are never monocausal. Next, why couldn’t these differences be resolved?
  2. Classify these reasons: are they long or short-term? Are the culprits humans, institutions, deep-lying economic trends and expectations? How well do these reasons in the video agree with what Foner states in the textbook? Where do they part company, and why?
  3. This video, as the host says at the start, is about Power. Using the video and the textbook, what was the power due and appropriate for government in the period from 1763 to 1783 and what powers were not appropriate or “illegal”?  What was the proper role of government? In answering this question, answer it from the point of view of the following groups of colonists: 1.) to a rich Virginian planter 2.) a free black man working the wharves of New York City? 3.) a New England farmer? 4.) a Philadelphia merchant whose ships carried rum from Barbados to the colonies and Europe. Speculate on what their answers would be to these questions given your reading of Foner. Eric Foner gives you the context for this period — essential information. Give the possible answers these figures would make given the situation they found themselves in, identifying them and discussing at some length why they probably viewed the situation as they did. Use the textbook as well to create your answer.

finally reflection paper, management homework help

Hey my friend

Cite ONLY FROM THIS BOOK ( Getting to Yes – Negotiating Agreement Without Giving In by Roger Fisher and William Ury (any edition)

this is a reflection paper from the course that i’m taking right now, and this is the book that we used on it i want you to follow the instructions attached I also attached sample of my writing that you should follow the style of it. in some questions you are asked to write my personal opinion or to use my own words or my approach to negotiating or my negotiation behaviors that i avoided in the past and the new behaviors that i adopted. i attached my conflict management style questionnaire and what is my dominant style so that gives you an idea who am I and how i think so you can write and thinks like me please read and understand all the instructions and all files attached and follow it

I need 5 pages double space

dude please make it good as always and simple

Statistics Calculations, statistics homework help

Create a 10-item dataset that is interval or ratio in scale of measurement (for example, height in inches of 10 people, hours of sleep, scores on their statistics quiz, et cetera). Use SPSS or hand calculations to calculate the mean and standard deviation.
Create a second 10-item dataset that is nominal in scale of measurement (for example, color of 10 cars, favorite sports teams, favorite restaurants, et cetera). What is the mode?
Why does scale of measurement matter in determination of which measures of central tendency and variability are appropriate? What struck you as interesting about the two datasets?
Cite materials used.

Soc 308 W3 Racial & Ethnic Groups Assignment

Final Paper Proposal and Outline

To
prepare for your Final Paper, review the Final Paper instructions in
Week Five. The paper must be formatted according to APA style and
include a title and a reference page. For information regarding APA
samples and tutorials, visit the Ashford Writing Center, within the
Learning Resources tab on the left navigation toolbar.

There are two parts to this assignment—a proposal and an outline. See
the instructions below for details on what those parts should include:

Proposal
The proposal should be on a separate page from the outline, and it
should consist of one or two paragraphs that describe the society
selected for your paper. This society must be a nation other than the
U.S. that has large ethnic groups within it. In the proposal, you must
explain why you believe this is an appropriate society for your Final
Paper.

Outline
Using the sample below as a guide, provide an outline for your Final Paper. The outline should be in basic APA outline format.

Select a particular country and analyze the ethnic stratification within
that society. For this paper, you must focus on ethnic stratification
and conflict, including evidence of prejudice and discrimination. In
addition to a description of the selected society and its ethnic groups,
your paper should include an analysis of similarities and differences
the society’s ethnic stratification system as compared to the United
States.

You may select one of the countries on the CIA World Factbook website for comparison to the United States in terms of the ethnic stratification system.

The following information should be included in your timeline

  1. Title
  2. Describe the selected country’s society, focusing on ethnic groups, stratification, and conflict.
  3. Provide examples of the ethnic problems in that society, including evidence of prejudice and discrimination.
  4. Discuss what the experts say about ethnic problems (or ethnic harmony) in the selected country’s society.
  5. Compare the selected country’s society society in the United
    States. Evaluate similarities and differences related to ethnic groups,
    stratification, and conflict, using specific examples gathered in your
    research.
  6. Conclude with reflections and thoughts about ethnic groups and the societies in which we live.

References
Provide at least five of the seven sources that you plan to include in
the Final Paper. No fewer than three of the sources that you list in
this assignment must be from the Ashford University Library.

While the following example can be modified to suit your needs, this outline is likely to result in a high quality Final Paper:

Title of Paper

  1. Selected Country
    1. Description of country
    2. Ethnic groups in country
    3. Ethnic stratification system in country
  2. Ethnic Problems or Harmony
    1. Prejudice and discrimination
    1. Examples of ethnic problems
    2. Consequences of discrimination for ethnic group members
    3. Examples of consequences
  1. Research on Ethnicity in Selected Country
    1. Experts on ethnic problems in selected country
    2. Findings of studies on ethnic discrimination in selected country
  2. Comparison with the United States
    1. Ethnic groups in the United States
    2. Ethnic stratification system in the United States
    3. Ethnic conflict and discrimination in the United States
    4. Similarities between selected country and the United States
      • Similarity among ethnic groups
      • Similarity in ethnic stratification
      • Similarity in terms of ethnic conflict
      • Examples of the similarity garnered from research
    5. Differences between selected country and the United States
      • Differences among ethnic groups in selected country and the U.S.
      • Differences in ethnic stratification systems
      • Differences in ethnic conflict in selected country and the U.S.
      • Examples of differences garnered from research
  3. Conclusion

An analytic essay response to a superhero comic.

Write a detailed, analytic response to one of the superhero comics in class, include an opinion/argument expressed in a secondary source from class. In the essay, construct an argument that synthesizes both the analysis of primary source (again, superhero comics) and the analysis of secondary source. There should be no other sources referenced than the one primary source and one secondary choice from the list in class. I’m thinking to write the response essay about “Ms. Marvel: No Normal” comic. And the file I uploaded is the secondary source from my class. The essay must be at least 750 words. It dues on May 25th.

Discussion: Risk and Return

the types of investments you’ll use for retirement planning purposes. The answer isn’t as easy as, “I’ll just contribute to my 401k.” You have options and YOU are ultimately responsible for your own financial success. A 401k is a great vehicle for retirement planning, but you get to make some choices about how you want your money invested within your 401k. Now, with that being said, the employer you have will dictate how many (and which specific) options you have for your 401k investments. On the other hand, some of you may start your own businesses or work for a company that doesn’t offer you a “match”. Others may find that you want something more than just your 401k for retirement.

What types of investments will you look for when you’re planning for retirement? How do you think your stock/bond split should be divided? What about risk versus reward — is it worth it to you to have a higher portion of your investments in stocks in order to attempt to earn more in the market?

This discussion is really intended to focus on your level of risk-taking at this stage in your life (and why!).

https://www.usatoday.com/story/money/personalfinan…

“Read the link first,Please”

Thank you,

Article Review. Please read the article carefully and be specific. 2 page

Article Review assignment

Value: 25 points

Task: Carefully read the assigned article.Take good notes while reading it.Reflect on the article, and identify in your own mind the marketing principles, models, concepts, and tools that we are covering in this course.

When you have all of that clear in your own mind, write a review of this article FROM A MARKETING MANAGERS PERSPECTIVE.What did the company do relative to the 3 C’s of situation assessment?What did the company do relative to the 4 P’s of marketing strategy?How successful were they in accomplishing their objectives?If you were in that company, WHAT WOULD YOU CHANGE?DO NOT just repeat back the article to me – yes, I already read it.I want to know your take on it.

My objective for this assignment is to get you to think like a Marketing Manager, not like a consumer.It is IRRELEVANT if you have ever used the company’s product.This is NOT about your personal experience.This is whether or not you can analytically assess the situation and strategies, using the vocabulary and tools you have learned.

This should be 2 pages, double spaced, and NO NEED for a cover page, or your name and student ID.I prefer to grade these anonymously, and Blackboard knows who you are.This is an INDIVIDUAL assignment – no comparing notes with other student.Definitely no plagiarism.You do not, and SHOULD NOT, need to go to the Internet for additional information.Just use what is in the article.If you make assumptions, clearly state them.

Module 3 Network Security Access Control

Each must be at least 150 Words

1) Module 3 Network Security Access Control

Restricted Access to the network devices is achieved through user authentication and authorization control which is responsible for identifying and authenticating different users to the network system. Authorization is the process of granting or denying specific access permissions to a protected resource. Restricting access to the devices on network is a very essential step for securing a network. Since network devices comprise of communication as well as computing equipment, compromising these can potentially bring down an entire network and its resources. An important aspect of network device security is access control and authorization. Many protocols have been developed to address these two requirements and enhance network security to higher levels.

2) Module 3 Network Security Protocols

Network security protocols are primarily designed to prevent any unauthorized user, application, service or device from accessing network data. This applies to virtually all data types regardless of the network medium used. Network security protocols generally implement cryptography and encryption techniques to secure the data so that it can only be decrypted with a special algorithm, logical key, mathematical formula and/or a combination of all of them. The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in cleartext, meaning that they are sent unencrypted and therefore able to be compromised. Because of the FTP shortcoming, Secure File Transfer Protocol (SFTP), Secure Hypertext Transfer Protocol (HTTPS) and Secure Socket Layer (SSL) have become more popular security protocols.


3) Module 3 Authentication vs Authorization

In previous courses i covered this topic before reinforce of these is essential to have a better understanding of security. The role authentication is when a system attempts to verify the credentials given basicly its user name and password but the process goes into the system to match the information to allow access. The role of authorization however is much different since it is the process of seeing if that person is authorized to view that information a example is Customer service bring up and trying to access accounting system which they would not be allowed and therefore denied access.


4) Module 3 Physical and Technical Access control


Computer security is often divided into three distinct master categories, commonly referred to as controls: Physical, Technical and Administrative.

These three broad categories define the main objectives of proper security implementation. Within these controls are sub-categories that further detail the controls and how to implement them.

The Physical control is the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of physical controls are:

  • Closed-circuit surveillance cameras
  • Motion or thermal alarm systems
  • Security guards
  • Picture IDs
  • Locked and dead-bolted steel doors

The Technical control uses technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as:

  • Smart cards
  • Encryption
  • Network authentication
  • Access control lists (ACLs)
  • File integrity auditing software

Administrative controls define the human factors of security. It involves all levels of personnel within an organization and determines which users have access to what resources and information by such means as:

* Training and awareness

  • Disaster preparedness and recovery plans
  • Personnel recruitment and separation strategies
  • Personnel registration and accounting

5) Lynda Common Ports Common Ports and Protocols ED

Hello everyone!

Video defines protocol as set of rules and procedures to communication.

Liberman speaks of two main transport layer protocols that all our networking protocols operates within. Such as TCP Transmission Control Protocol a connection oriented protocol that establishes connection between systems before communication thorough the use of a three way hand shake and results in reliable delivery.

UDP Transport Layer Protocol which stands for User Datagram Protocol no handshake in this connection it sends a short message that is considered unreliable connectionless.

Web Base protocols such as HTTPS, HTTP is for web content. HTTPS is the secure version of the web content or SSL . Operates on port 443.

HTTP operates on port 80

POP3 and IMAP both are use for receiving email form email server Difference POP3 allows for email to truly be retrieved and stored out on the client. Uses port 110

IMAP leaves the email out on the server. IMAP uses port 143

SMTP used for sending the email between email servers and uses port 25

FTP File Transfer Protocol operates on ports 20 and 21

FTPS is more secure uses port 989 and 990

RDP Remote Desktop Protocol uses port 3389

Telnet uses port 23

6) Discussion Question Protocols

Discuss the relationship between protocols and port numbers. Why is it important? Does a protocol have to use its well-known port

7) DQ Protocols and Port Numbers

A protocol number are used to configure firewalls, routers, and proxies. In an IP headers, the Protocol field identifies the service in the next higher level in the protocol stack to which data is passed. Protocol number is the value contained in the “protocol” field of an IPv4 header. It is used to identify the protocol. This is an 8 bit filed. In IPv6 this field is called “Next header” field. Each protocol service has a number. The following services have the following protocol number:

Internet Control Message Protocol (ICMP) – 1

Transmission Control Protocol (TCP) – 6

User Datagram Protocol (UDP) – 17

General Routing Encapsulation (PPTP data over GRE) – 47

Authentication Header (AH) IPSec – 51

Encapsulation Security Payload (ESP) IPSec – 50

Exterior Gateway Protocol (EGP) – 8

Gateway-Gateway Protocol (GGP) – 3

Host Monitoring Protocol (HMP) – 20

Internet Group Management Protocol (IGMP) – 88

MIT Remote Virtual Disk (RVD) – 66

OSPF Open Shortest Path First – 89

PARC Universal Packet Protocol (PUP) – 12

Reliable Datagram Protocol (RDP) – 27

Reservation Protocol (RSVP) QoS – 46

In TCP/IP, a port is software based end point in an Operating system. Each port is assigned a number. It is called port number. A port number can be 0 to 65535. There are UDP and TCP port numbers in the same range.

A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit. The port number is passed between client and server transport layers and physically between the transport layer and the Internet Protocol layer and forwarded on. Some services or processes have assigned permanent port numbers. These are known as well-known port numbers. Sometimes a port number is assigned temporarily from a range of assigned port numbers.

8) Learning Team Real World Threat

Hello Professor and Class,

My apologies if this is not the correct section to share this, but since this topic is titled “Real World Threat,” I thought it would be fitting. I follow a few journalism sites and just received a notification for an incident in which Equifax admitted that they were hit with a cyber attack in which information for 143 million customers was exposed. This is something that I find to be extremely alarming, possibly more so than other cyber attacks that I have read about. Equifax, Transunion, and Experian are organizations that have essentially some of the most intimate details about us, and are supposed to help with monitoring fraud for people. The fact that they have been breached in a sense kind of leaves me speechless. I am definitely going to be keeping an eye on this incident, as I would like to know if my information was part of the 143 million that was accessed, and what they plan on doing to try and prevent this from happening again.