Discussion forum on Article readings

Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

This week’s reading introduced an overview of blockchain and its impact on business(see the attachment). 

Discussion:

 1.choose a use case from section III, and a risk for adoption from section IV. 

2.Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. 

3.Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion. 

Write one page document

Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?

Please a topic from the below list and create a one-page essay answering the question noted below. 

Please use at least one reference and ensure it’s in APA format  (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY  from any source (student or online source), rather rephrase the author’s  work and use in-text citations were necessary.

  • Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  • List and briefly describe the nine-step process in conducting a neural network project.
  • What is the main difference between classification and clustering? Explain using concrete examples.
  • What are the privacy issues with data mining? Do you think they are substantiated? 

R7

Please go through the attachment for assignment details.

Discussion

  

1.  500 words and ref

I. Which case study in the paper was most interesting to you and why?

II. Do you think that ERM is necessary in the contemporary organization and why?

2.  500 words and ref

What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

3.  500 words and ref

List and briefly describe the nine-step process in con-ducting a neural network project.

Cybersecurity

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Emerging Threats – Research paper

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

DNS failover and cloud failover.

 

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

cloud_computing

 Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)

Hint: SP 800-145 September 2011  The NIST Definition of Cloud Computing

write briefly on Cloud Computing Recommendations suggested by NIST .

Hint:  SP 800-146 May 2012  Cloud Computing Synopsis and Recommendations

What are the Key Security and Privacy Issues?

Hints:  SP 800-144 December 2011  Guidelines on Security and Privacy in Public Cloud Computing

 Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Emerging concepts & Tokenization

**RESEARCH PAPER**

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

Be approximately six to eight pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

Discussion data visualization

Why is it so important to know your data? Discuss some methods you would implement to better learn and understand your data. What are some advantages to your methods? What are some disadvantages?Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.