INT 2682

  

– write and submit a lab report  of a minimum of 3 pages on what you learned in the lab, with screenshots and analysis of the following labs in testout. Please follow the attach instructions.

devops

Using DevOps tools such as GIT & GIT HUB, Docker, Jenkins

Need Roles and Responsibilities

Need to implement DevOps tools such as GIT & GIT HUB, Docker, Jenkins, Need Steps for the same

 Microservices Architecture, 

3 Micro applications 

One Front end User panel, Angular4 Project 

All the data is served from REST using 2 SpringBoot Applications 

One SpringBoot application for usernamangement 

One SpringBoot application for report generation 

Entire Admin Panel is made of Spring MVC 

In this project, we used REST publishing and consuming. 

Third party REST api was used to get general Aircraft data using trail number. 

  

We used 3 micro services, one for Angular user Front end, and one for another SpringMVC with springboot for admin module, third one being springboot application publishing REST Api which are used by first 2 micro services. For REST API documentation we used Swagger2, swagger-ui.html to display html documentation of the api. 

We used Hibernate as JPA implementation for Data Access layer. 

For REST API authentication we used OAuth2 , where 2 tokens are created when u pass username and password for the first time. For all other api calls u pass the authentication token.0

Discussion 5-2 (Database)

250 words+

For database management systems, there are a lot of different design such as Centralized databaseDistributed databasePersonal databaseEnd-user databaseCommercial databaseNoSQL databaseOperational databaseRelational databaseCloud databaseObject-oriented databaseGraph oriented database, and etc. 

Are there any relations between different systems? How to integrate multi-different systems?

Unit Assignment 10 cybersecurity 500 words

 I need turnitin.com report.

Thanks

NOTE: Unit 10 has an Assignment and a Lab. Each will be submitted to their individual Dropbox.

Unit 10 Assignment: Cybersecurity Threats Now and in the Future

Outcomes addressed in this activity:

Unit Outcome:

  • Explain the future of computers and cybersecurity.

Course Outcome:

IT104-5: Explain current cybersecurity threats and the future of cybersecurity.

Purpose

To remain current in your discipline, you will have to continually review and learn about what might be taking place in the future that will impact the cybersecurity arena. This Assignment will allow you to research possible future cybersecurity considerations in several areas.

Assignment Instructions

Using the Reading, the library, and Internet research, answer or explain the following in a minimum 500-word paper that covers the following and includes three or more APA style references:

Discuss security issues with ubiquitous data, mobile devices, and cybersecurity considerations.

Explain the cybersecurity implications of cloud computing.

What would be the cybersecurity implications of quantum computing?

Note: Papers not meeting the minimum 500-word length requirement will not be accepted.

Assignment Requirements

Answers contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors.

For assistance with APA requirements, review the resources in the Academic Tools section of the course. Also, review the Policy on plagiarism. If you have any questions, please contact your professor.

dv wk 4

There are various languages, some are better for data visualization than others.  Please review the basics of Python, SAS, R, and SQL.  What are the qualities of each language regarding data visualization (select at least two to compare and contrast)?  What are the pros and cons of each regarding data visualization (select at least two to compare and contrast)?

Construct the C code needed to design this embedded system.

 An embedded system is used to generate a PWM signal through an overflow interrupt signal from  timer/counter 0. This system uses the ATmega32 microcontroller running a clock frequency of 8MHz and  a prescaler equals to 64. The output signal has a frequency of 5 Hz at pin 1 from port B. Construct the  C code needed to design this embedded system. Include all the required calculations. 

Apply: Risk Register

 

Assignment Content

  1. Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

IG WK4

 2 pages

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper (https://www.homeworkmarket.com/questions/ig-wk3) , discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.