1. Response One
a. I agree that published deployment method does not install the software but instead is meant to allow the ability for the software to be installed. I also admit that it is intended to pave a way for the implementation of the software in environments where it could be used and not necessarily being required.
b. As for the case of Assigned deployment, it is not clear on how the administrator attains assignment of privileges. Who are the real users to be assigned the rights to access the designated software? Is the software installed on the server or do they run on the client machine? Because either way, both the server and the users have access to the software.
c. It is very true that when upgrading one software version to another such as Office 2010 and Office 2013, issues are bound to arise ranging from compatibility to communication and even permanent paralysis of operations on files. For instance, a file may not be accessible at all only because you’ve changed the version that was used to create it (Jordan, 2007).
2. Response Two.
a. I agree that different management has different approaches towards administrator and privacy regulation policies in their organizations. Even though this is the case, what is the boundary between Account Policy and Local Policy? Both of them appear to be dealing strictly with the users. (Panek, 2015).
b. Finally, I agree that IT professionals can realize better and more accurate results if they properly study the policies of the organization and take the time to configure the settings as outlined in the plan. This is because if the policy followed accurately, no loopholes are created.
References
Jordan, L. (2007). Project Management with dotProject Implement, Configure, Customize, and Maintain your DotProject Installation. Birmingham: Packt Pub.
Panek, W. (2015). MCSA Windows Server 2012 R2: Configuring advanced services study guide (exam 70-412) .