Cloud Computing, SaaS, and Business Systems Roles

1. Describe cloud computing as well as its benefits and disadvantages. Explain three cloud-based solutions for individuals and three cloud-based solutions for businesses. 

The answer must be 300-350 words. A minimum of two scholarly journal articles are required. Apply APA 7th edition style (including headings, in-text citations, and references).

Textbook for reference Q1 and Q2

Title: Cloud Computing 

ISBN: 9781284248203 

Authors: Dr. Kris Jamsa 

Publisher: Jones & Bartlett Learning 

Publication Date: July 14, 2022

2. Software as a service (SaaS) as a solution model that allows users to use a web browser to access software in the cloud. Prepare a research paper that defines and discusses software as a service. Explain the advantages and disadvantages of the software as a service. 

Companies leverage SaaS solutions to eliminate the need to house and administer an equivalent on-premise solution. Salesforce.com was one of the companies to leverage the power of the cloud. Discuss the features Salesforce.com provides that are well suited for companies large and small and why the Salesforce solution was well suited for the cloud. 

The paper should be approximately 5 pages long, not including the title and reference pages. Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.

3. Research a scholarly paper or professional video on “Business Systems Roles” and reflect on the following: 

What is the difference between a Systems analyst, a Business Analyst, a Data Analyst, and super-users, and what other ‘people’ roles deal with business systems?

This paper must be between 250-300 words. You must provide at least 2 APA references for your resource and corresponding in-text citations. Also, provide the referenced resource URL/DOI in the APA reference.

Textbook for reference

Title: Systems Analysis and Design, Global Edition 

ISBN: ISBN: 13: 978-0-13-478555-4 

Authors: Kenneth E. Kendall, Julie E Kendall 

Publication Date: 2019-11-25 

Edition: 10th ED

D1

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use Google Scholar to find these types of articles.
Once you find the article, you will read it and write a review of it.  This is considered a research article review.
Your paper should meet these requirements: 

6pages APA format 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 10 Assignment – Contingency Plan

Scenario

KION Group is a global material handling Equipment Company based  in Germany. Forklift trucks and warehouse automation equipment are the  company’s main products. KION Group needs to prepare for the prevailing  computer incidents of today and tomorrow. An organization can assist in  developing a computer incident response team (CIRT) plan for a number of  computer-based safety incidents.

This assignment will discuss a CIRT plan, which is often used as a  contingency plan for the KION Group. A system administrator noticed  yesterday that several of the file servers at HQ were responding very  slowly. The KION Group headquarters (HQ) handles all incidents so that  the plan will have its roots at HQ.

Like the latest IBM Threat Intelligence Index, read a recent  article to gather information on current threats and remember to  leverage the BCP and DRP you generated for the organization last week.

Instructions

Write a 5–6 page paper in which you:

  1. Describe the purpose and primary elements of a CIRT plan.
  2. Discuss the relationship between a CIRT plan and risk management.
  3. Discuss the five Ws (who, what, where, when, and why) found in a  CIRT plan in regard to the incident given in the above scenario.
  4. Explain how KION Group can leverage its BCP and DRP to develop and support its CIRT plan.
  5. Explain how you think threats will evolve to impact KION Group  in the future and how the CIRT plan should be updated to combat them.
  6. Discuss at least five best practices to follow when creating a CIRT plan.
  7. Use at least two quality resources in this assignment. 

The specific course learning outcome associated with this assignment is:

  • Develop a contingency plan for the sample organizations to include: business continuity, disaster recovery, and incident response.

Data component and Bayes Classifiers

Assignment 1

Please note a system that you work with frequently that has a major data component.  Note the type of data, how the data is managed and maintained, and any other important factors regarding the data in the system.

250 words. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design, Second Edition. Sage, 2019.

Assignment 2

Chapter 4

  1. What are the various types of classifiers?
  2. What is a rule-based classifier?
  3. What is the difference between nearest neighbor and naïve Bayes classifiers?
  4. What is logistic regression?

The assignment should be 100-150 words. There must be APA formatted references (and APA in-text citations) to support the thoughts in the post.

Textbook: Introduction to Data Mining 

ISBN: 9780133128901 

Discussion: Biometrics and Global Identity

The convenience and availability of cloud services has seen a dramatic increase in business functionality being shifted from local servers to the cloud. Even our biometrics may be stored in the cloud.Assume your employer has signed up with a global authentication provider that stores user fingerprints in the users’ global identity accounts. Users can then use their biometric fingerprint from the cloud service to access websites rather than storing the fingerprint locally on their mobile device or computer.In theory, if an attacker gains access to your fingerprints (whether stored locally or in the cloud), they could compromise any of your online accounts that accept your fingerprints.Answer the following question(s):

  1. Is the storage of biometric data safer locally or in the cloud? Why?
  2. If an attacker has your fingerprints, could multifactor authentication (MFA) still prevent the attacker from gaining access to your accounts? Why or why not?

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.