Cloud Based Storage

Jamsa (2013) listed four advantages and two disadvantages of cloud-based database solutions. List each as a Level 1 Heading and explain IN YOUR OWN words, how each affects the success of organizations.

The following requirements should be met:

  • Minimum 500 words
  • Use Jamsa (2013) as your only source
  • Use proper APA 7 formatting

Cloud Computing

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class.

membership policy

    

This project gives you the opportunity to review what you’ve learned throughout the semester and present a range of topics in the form of a policy that describes how participants can join your business network, and the benefits of doing so. The overall purpose of your policy should be to create interest in your business network and its applications, along with a description of the onboarding process and ongoing benefits to members. 

Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network. Your policy should be no less than 1000 words and no more than 1500 words. The document you submit should in Microsoft Word format (.doc or .docx) and be named using the following criteria: 

BLCN532_SECTION_STUDENTID_LASTNAME_FIRSTNAME_Project.docx 

  • SECTION is the section number of your current course (2 digits)
     
  • STUDENTID is your student ID number (with leading zeros)
     
  • LASTNAME is your last name
     
  • FIRSTNAME is your first name
    Your policy should include the following:
     
  1. 1)  Purpose statement of the Letter of Credit business network
     
  2. 2)  Description of the current (base) network (participants and functionality)
     
  3. 3)  Brief description of upcoming features in the next quarterly release. (Be creative, but
    realistic here. Think about what the existing Letter of Credit application does, and what features you’d like to add that would increase the application’s usefulness and value. Analyzing current functionality and determining which features would best meet business needs will be a big part of assessing this assignment.)
     
  4. 4)  Description of application upgrade process that may impact application availability and member business processes. (i.e. How does the business network organization plan to deploy new software features without causing substantial service interrruptions?)
     
  5. 5)  List of rights and benefits for participants (how does each member benefit and what data/services are available for each member)
     
  6. 6)  Membership requirements for new members (minimum security requirements, approval process, decision making rules and authorities, minimum required agreements that new members must accept and agree to)
     
  7. 7)  Description of fees for participation and service access
     

  

  1. 8)  Minimum member resource contributions to the business network
     
  2. 9)  Process for ending participation in the business network
     

10) Process for resolving disputes, including appealing the outcome of a resolved dispute. 11) Course of action to initiate an application for membership 

Background content for items 1 and 2 will come from your text. Other items will be a combination of content from your text and extrapolation based on what you’ve learned this semester. Pay careful attention to #3. That one requires that you carefully consider how enhancing the application can help it better align with member (and prospective member) business goals. The purpose of this project is to digest the material you’ve learned throughout this semester into a white paper that could be used to recruit potential business network members, as well as provide details of the rights and responsibilities of business network members. 

Your policy document should present a clear and concise description of the benefits of being a business network member, why blockchain technology provides superior benefits to solutions based on other technologies, and the onboarding process and expectations once membership is approved. The overall goal is to give you an opportunity to demonstrate that you understand how this example blockchain technology use case implementation aligns with existing, and prospective, member business goals. 

Your paper must be in APA format, including citations and references, but I’m not particularly concerned with the specific format you select for the paper’s body. 

Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Physical Security Controls

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Flow Chart/Pseudocode

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Discussion

 After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

GGPLOT

Make a ggplot that consists of a scatter plot using geom_point() with position = “jitter”  and data points are grouped

IT Proposal-Final Project 8-10 pages. MUST BE A+ WORK.

 

IT Proposal

For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.

As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario. 

Scenario

ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations. 

Include the following information in your IT Proposal.

  • Analyze the current information system in place at ABC Corp and its role in the current challenges identified.  
    • Describe the challenge(s) presented in the scenario and the impact of the challenge(s) to the organization. Include any potential data security issues that could occur as a result of the current information system.
  • Create an information system for implementation at ABC Corp that will solve the identified challenges.
    • Explain how the proposed information system solution will solve the problems.  Support your statements using the textbook and/or other credible sources.
    • Evaluate your proposed system and explain why the proposed solution is the best approach including issues of scalability, streamlining of operations, and cost effectiveness. Support your statements using the textbook and/or other credible sources.
    • Explain how the proposed information system solution will ensure data quality and security. Support your statements using the textbook and/or other credible sources.
  • Distinguish among the hardware components, operating systems, programming languages, programs, and applications your proposed solution will contain. 
    • Create a high-level diagram of the major elements that are required for implementing the solution.
  • Evaluate the systems development life cycle (SDLC) process as it relates to your proposed solution, and describe how you would implement it in the development.
    • Determine the approach you will use for implementing your proposed solution, by revising the SDLC diagram you created in Week Four.  Include the revised diagram in your proposal.

The IT Proposal

  • Must be eight to ten double-spaced pages (2,400 to 3,000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must use at least four credible industry sources, in addition to the course text. 
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style.

    **THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER