6/1 Devotional

  1. Getting started – One might think that the Bible has nothing to say regarding business planning, but the opposite is true. In Luke 14:28, Jesus suggests, “For which of you, desiring to build a tower, does not first sit down and count the cost, whether he has enough to complete it?” (English Standard Version). Indeed, Jesus said in Matthew 6:34 that we should consider planning in the short-term as well: “Therefore do not be anxious about tomorrow, for tomorrow will be anxious for itself. Sufficient for the day is its own trouble.” The two perspectives complement each other. The long-term is not ignored; we are just told not to worry ourselves. We should focus on both time frames as we make strategic short- and long-term plans, but we should avoid worrying. That comes from prayer, as Philippians 4:6 admonishes that we “not be anxious, but in everything by prayer and supplication with thanksgiving let your requests be made known to God.” Think about it—we can place our concerns and worries on God, and he will provide. 
  2. Review the material in the “Getting Started” mentioned above, and read Luke 14:28, Matthew 6:34, and Philippians 4:6.
  3. Be sure to address the following prompts in your paper:
    1. What cares or struggles are you currently experiencing? What steps can you take this week to give these cares and concerns to God?
    2. What changes can you make in your professional life to help you continually release concerns and cares about work to God?
  4. Your paper should be at least 250 words in length.

Project management ……99999

 Please review the attached RFP for instructions regarding the group project. The REQS document will give you detailed system requirements which you may consider incorporating into your prototype. 

The Internet and Dev-Ops

Overview

DevOps at our organization Acme Inc. is a nightmare. Using the example of “Hell Month” on Page 24 of The Practice of System and Network Administration, describe how the solution could be used to improve cybersecurity in an internet-connected world.

Instructions

Write a one-page or two-page double spaced paper describing how improved dev-ops can improve cybersecurity. Be sure to call out examples from recent months where things have failed or succeeded using good or bad dev-ops. (Example: Microsoft’s and Apple’s recent upgrades that caused major user issues.)  

Aligned Objectives

  • Identify methods of protecting servers and services on the Internet
  • Discuss the different types of web services typically run in Cyberspace  
  • Identify different cyber threats and how previous topics can prevent issues

Criteria

Write a one-page or two-page double spaced paper describing how improved DevOps can improve cybersecurity. Be sure to call out examples from recent months where things have failed or succeeded using good or bad dev-ops. (Example: Microsoft’s and Apple’s recent upgrades that caused major user issues.)

python

1)  (35 points) Consider a corpus that contain five documents in Table 1. Using python is fine for this question. In case you use Python for this question, submit your python code too.

Doc1

Decide which attribute the decision tree algorithm would choose.

Doc2

A decision tree is a classification algorithm that is widely used in machine learning. 

Doc3

Making a decision to put a tree is very difficult due to lack of power for the decision

Doc4

Language decision varies from person to person and time to time.

Doc5

Decision trees are different from binary trees or binary search trees.

a)  Build a term-document matrix based on raw count of each term for the corpus in Table 1 after removing stopwords and lemmatizing sentences. Use only noun and verb to build a term-document matrix.

b)  Build a term-document matrix based on tf-idf of each term for the corpus in Table 1 after removing stopwords and lemmatizing sentences. Use only noun and verb to build a term-document matrix.

Show the procedure how you calculated tf-idf.

(Use stopwords provided by NLTK given here: 

{‘of’, ‘against’, ‘ll’, ‘they’, ‘aren’, ‘our’, ‘that’, ‘shouldn’, ‘only’, ‘shan’, ‘o’, “isn’t”, ‘been’, “weren’t”, “you’ve”, ‘myself’, ‘as’, ‘once’, ‘my’, ‘both’, ‘too’, ‘be’, ‘should’, ‘hadn’, ‘in’, ‘does’, “you’ll”, ‘during’, ‘herself’, ‘will’, ‘any’, ‘was’, ‘how’, ‘which’, “didn’t”, ‘but’, ‘had’, ‘more’, ‘needn’, ‘further’, ‘whom’, ‘mustn’, ‘no’, ‘did’, “aren’t”, ‘or’, ‘on’, ‘down’, ‘them’, ‘to’, ‘same’, “shouldn’t”, “should’ve”, “mightn’t”, “it’s”, ‘between’, ‘before’, ‘he’, ‘here’, “hadn’t”, ‘have’, ‘if’, “you’re”, ‘haven’, ‘under’, ‘nor’, ‘t’, ‘can’, ‘re’, ‘it’, ‘y’, ‘where’, ‘then’, ‘she’, ‘own’, ‘hers’, ‘is’, ‘isn’, ‘each’, ‘don’, ‘now’, ‘by’, ‘than’, “hasn’t”, ‘his’, ‘who’, ‘above’, ‘this’, “mustn’t”, ‘their’, “couldn’t”, ‘there’, ‘couldn’, ‘over’, “you’d”, ‘m’, ‘doing’, ‘when’, ‘into’, ‘i’, ‘other’, ‘a’, ‘ours’, ‘because’, ‘we’, ‘an’, ‘weren’, ‘most’, ‘for’, ‘wasn’, “won’t”, ‘up’, “shan’t”, ‘while’, ‘your’, ‘am’, ‘through’, ‘after’, “don’t”, ‘theirs’, ‘ain’, ‘him’, ‘having’, ‘until’, ‘those’, ‘yourself’, ‘off’, ‘just’, ‘below’, ‘didn’, “wouldn’t”, “that’ll”, ‘out’, ‘mightn’, ‘ma’, ‘wouldn’, ‘such’, ‘won’, ‘all’, ‘the’, ‘has’, ‘ourselves’, ‘doesn’, ‘some’, ‘few’, ‘these’, ‘and’, “needn’t”, “doesn’t”, ‘what’, ‘with’, ‘very’, ‘himself’, ‘do’, ‘again’, ‘d’, ‘yours’, ‘are’, “wasn’t”, ‘not’, ‘being’, ‘were’, ‘from’, ‘me’, ‘ve’, ‘why’, ‘itself’, ‘s’, ‘so’, ‘hasn’, ‘her’, “she’s”, ‘you’, “haven’t”, ‘themselves’, ‘its’, ‘at’, ‘yourselves’, ‘about’}

discussion

Why should a company shift to cloud computing? What would be the advantages and disadvantages? 

Current Events and Trend Reports: CBI & the Musk Neuralink

 

Current Events and Trend Reports: CBI & the Musk Neuralink

Elon Musk cofounded Neuralink in 2016. He noted his goal is to create a chip that could enable a “brain-computer interface.” On Tuesday 9th, Musk and various senior staffers at Neuralink presented the company’s ambition to design a chip capable of being implanted in the human brain that could receive and transmit signals to the organ. According to Musk, the company has already had some success — with monkeys. Here is what we know thus far:

  • Elon Musk’s neurotechnology company, Neuralink, has pulled back the veil on its ambitions to implant chips in people’s brains.
  • During a Q&A session at a live presentation on Tuesday, Musk surprised his Neuralink colleagues by announcing that the firm had tested its technology on monkeys with some success.
  • Musk said “a monkey has been able to control a computer with its brain,” though he did not elaborate further on what this involved.
  • Neuralink’s president, Max Hodak, said that he wished the company didn’t have to experiment on animals but that it’s a necessary “step in the process.”

Research Internet and reputable information sources to examine the impact of this current event. Summarize your findings and write at least a one-page word document. In your report you will also need to address and respond to the following questions:

  1. From your point do you think CBI is a natural evolution in our Digital Transformation? Why or why not?
  2. Examine and evaluate the social impact in terms of human behavior and interactions with such technology? Try to list the pros and cons and note the winners and losers 
  3. Knowing that every technology will lead to the creation of more technology, what would envision as the most likely next technology that will come as a result of using Neuralink?

PS; please see attached picture for screenshot

Discussion: ITS-833: Information Governance – Data Cleansing and De-Duplication

Discussion Week 1 – Data Cleansing and De-Duplication

Word count: 300+ words

Organizations are struggling to reduce and right-size their information footprint, using data governance techniques like data cleansing and de-duplication. Why is this effort necessary?  Briefly explain and support your readings, using APA-style citations.

  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post

Textbook:

For this assignment, please read chapters 2,3,4, and 5 from the below textbook.

Textbook Chapter 2 – Information Governance, IT Governance, Data Governance: What’s the Difference?
Textbook Chapter 3 – Information Governance Principles
Textbook: Chapter 4 – Information Risk Planning and Management
Textbook: Chapter 5 – Strategic Planning and Best Practices for Information Governance

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

HW

 

Select one of the topics below:

  • Autonomic computing
  • Cloud computing
  • Grid computing
  • Nanotechnology
  • N-tier client/server architectures
  • On-demand computing
  • Service-oriented architecture (SOA)
  • Storage area networks (SANs)
  • Virtualization

Write a research paper on the real-world application of the chosen technology. Your paper should include the type of organization(s) that benefits most from this technology. Elaborate on what business problem the technology solves. Also, how does it help the organization achieve one or more of the following:

  • Achieve operational excellence through higher levels of efficiency and productivity
  • Create new products, services, and business models
  • Raise revenue and profits while lowering costs by increasing customer and supplier intimacy
  • Improve decision making for managers and employees
  • Increase competitive advantages
  • Ensure survival caused by business environment changes

Note:

  1. Follow assignment instructions.
  2. Follow proper APA format guidelines.
  3. Write a minimum of five full pages.