Practical Connection Assignment

Need a reflection on how your courses and internship relate to your dissertation topic. 

My Research Topic: Impacts of Data Mining on Relational Database Management System Centric Business Environment

and my job roles are below.

——————–

Requirement:

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.

Assignment:  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.  

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

———————————

 Project Roles and Responsibilities:

Involved in the Requirement Gathering from the client. Understanding the existing application and the associated business process to visualize the end output/application.

Responsible for Maintains and enhances existing services, applications, and platforms including, but not limited to, bug fixes, feature enhancements, and performance tuning.

Extensive experience of all the phases of software development life cycle (SDLC) especially in Designing,      Configuring, Developing, Testing, Managing and monitoring Integration and      SOA solutions using TIBCO Business Works, Tibco Designer,      TIBCO Adapters, TIBCO Administrator, and TIBCO Business Works      Container Edition.

Responsible for user management, system, and domain monitoring and management using TIBCO Hawk and TIBCO Administrator.

Using Emerging Threats and Countermeasures      Principles we manage the corporate information and user information by      Implementing the roles and controls for Privacy and security of the information. 

Building big data middleware streaming capabilities to properly do the required feature engineering on data, thus modifying data to be capable enough to pump into machine learning algorithms.

Implementation of risk management to assess,      manage, monitor risk in the end-to-end project when it goes to live.

Integrating with the frameworks, distributed computing framework for big data including its Machine Learning      Capability, to build highly optimized machine models on huge volume and wide dimensional data to forecast the potential bookings to include promotional offers.

Designed and developed complex interfaces using      Tibco BW 5.x/6.x and BW container Edition.

Expertise in using various TIBCO Business Works palettes like JMS/EMS, Java, JDBC,      File, HTTP, SOAP, Service, XML, WSDL, and General activities.

Enterprise Security (400 – 600 word)

 

Find an article from the past 90 days that talks about a security incident within a company. Complete the following:

  • Describe the incident.
  • What was the impact of this security breach?
  • What gap or gaps may have been in the enterprise security plan that may have enabled this incident to occur?
  • How would you modify the plan to prevent this from happening again?

6/4 PPT

  1. Using your responses to the 6.3 Discussion, prepare a short PowerPoint presentation as an executive summary of your observations that could be presented to your management team.
  2. Prepare your PowerPoint based on the following outline:
    1. Provide an introduction to your presentation.
    2. Prepare at least one slide that shows the (a) mission or vision of the organization, and (b) information technology response to meeting that mission or vision.
    3. Provide a slide that demonstrates a strength in the current IT strategy.
    4. Provide a slide that discusses one weakness you see in the current IT strategy.
    5. Prepare at least one slide that provides your recommendations or suggestions for improvement.
    6. Provide a conclusion to your presentation that summarizes your points.
  3. Your presentation should be a minimum of six slides (10). Keep your points to no more than four bullets per slide. You may use any acceptable background for your presentation. You may wish to stay with the templates provided by the presentation software you are using (use previously used template, 5/4 Presentation).
  4. Be sure to use good presentation skills, and check your grammar.

RP

 Research paper on Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. 

Mobile Application Design

 

In your paper, you will develop design prototypes for the login and main menu screens for both the consumer and provider mobile application THS. In addition, you will analyze the key data types that will be used by end users to populate these screens. You will also discuss the components of the overall IT architecture necessary to facilitate the deployment of mobile application technology for THS consumers and providers.

In your paper,

  • Develop three to four mobile application screens representing the login and main menu end user screens for consumers of THS.
  • Develop three to six mobile application screens representing the login, main menu, and patient results review end user screens for prescribing providers (doctors, nurse practitioners) of THS.
  • Articulate the content of each mobile application screen for both the consumer and prescribing providers in detail.
  • Critique the consumer mobile application screen designs according to the eight elements of an easy-to-learn-and-use interface . For each of the eight elements, state why your design meets the criteria.
  • Critique the provider mobile application screen designs according to the eight elements of use validation rules. Provide a minimum of four specific examples of how you will validate providers’ actions in the mobile design.
  • Summarize the top four priority items in the technology application testing plan that you will develop for the applications testing professional who is testing your mobile applications prototypes for the consumers and providers at THS.

The Milestone 2: Login Screen Designs Mobile Applications paper

  • Must be 10 to 12 double-spaced pages in length (not including title and references pages) and formatted according to APA Style 
    • utilize either Microsoft PowerPoint or Microsoft Word (Shapes) functionality to generate the login and main menu end user screens. These screen pictures should be included in the body of the paper and referenced as figures utilizing APA Style guidelines.
  • Must include a separate title page with the following:
    • Title of paper

Bitcoin Pyramid Schemes Wreak Havoc on Brazil's 'New Egypt'

 opening sentence and your thesis statement!

powerpoint only 9 slides

1 objective summary 

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template.

complete literature review : It consists of Introduction, literature review and analysis 

Semester Project Final Submission

This will be the last submission of your Semester Project.

You are expected to have a final draft of the project handed in. The security policy should be complete in all aspects.

attachment: -case  project rubric

                    – example paper

Discussion(Physical Security)

 

Question: Discuss the LEED certification process.

Fully address the question(s) in this discussion; provide a valid rationale or a citation for your choices.

The initial post should be at least 350 words in length.

*** References

***No Plagiarism

*** APA7 Format