Cloud computing solution for the below attached document organization

a. For your Cloud Computing Final Project, complete a case study to provide a practical reference to help enterprise Information Technology (IT) and business decision-makers adopt cloud computing to solve business challenges. The case study provides a way to evaluate the market from the point of view of your organization to select a cloud architecture and an implementation approach through the use of house staff, cloud vendor(s), or both. An organization is expected to have any or all of the Cloud Computing models, depending on its needs for speed of execution, available resources, data protection and security needs, and an array of other reasons. Based on your case study, choose the most efficient cloud service and deployment model for your organization. As the organization’s consultant, provide accurate guidance to decision-makers on the selection of cloud service and deployment models. Take into consideration the organization’s size, IT Infrastructure, and other needs. Follow the Step-by-Step Cloud Computing Prescriptive Series to guarantee a successful cloud deployment from the perspective of the cloud service consumer. During the Intersession, you completed steps 1-7 of your project for review. Use the feedback from the intersession assignments as you write your final analysis. Additionally, add steps 8-10 to your final analysis.Step-by-Step Cloud Computing Prescriptive Series:

  1. Assemble your team
  2. Develop a business case and an enterprise cloud strategy
  3. Select cloud deployment model(s)
  4. Select cloud service model(s)
  5. Determine who will develop, test, and deploy the cloud services
  6. Develop governance policies and service agreements
  7. Assess and resolve security and privacy issues
  8. Integrate with existing enterprise services
  9. Develop a proof-of-concept (POC) before moving to production
  10. Manage the cloud environment

Your written case study analysis must be at least 5 pages and follow proper APA format. Be sure to thoroughly address all of the items listed above, including steps 8-10.

b. Prepare a presentation on your Cloud Computing Final Project case study. Your presentation must be:

  • at least 12 slides, not including the title or reference slides;
  • between 5-10 minutes in length; and
  • engaging and provide a thorough review and summary of all components of your written case study.

Slides must be concise and uncluttered. Use various graphic and visual enhancements when appropriate. Provide APA-style citations for any references and images used.

well writing

Topic: Why Writing Well Matters 

  • In your first paragraph, consider that you are an employer seeking to hire someone. There are only two applicants and their IT skills and credentials seem equal, but one has sent a resume and cover letter with many grammar errors and an informal style that seems inappropriate. You have decided to hire the person whose application materials were well written. Justify why this was an appropriate decision, and what could happen if an employee consistently makes errors.
  • In your second paragraph, write about your comfort level and experiences in writing in a formal style.

Preview the document

Research Essay

Essay 3 – Research Essay Assignment – Conspiracy Theories! Typed Draft Due Friday, March 26 at 11:00 am

  • Due Friday by 11am
  • Points 100
  • Submitting a file upload (Turnitin enabled)

Essay 3 Conspiracy Theories 1111.pdfPreview the document 

Research Essay Assignment – Conspiracy Theories!

For this assignment, you will research a popular conspiracy theory. These theories have not been proven due to their lack of concrete evidence, which is why they are still considered a theory. Your task is to select a popular conspiracy theory, provide background information on the theory, research the reasons behind the theory and then provide either the flaw(s) or the reason(s) why they are true!

To put it simply, a conspiracy theory is an alternative explanation to an event. In order for a conspiracy theory to first begin, there has to be some lack of evidence or something that may not make sense. Unfortunately, what makes it a conspiracy and not reality is the lack of hard evidence. This is why it’s difficult to prove a conspiracy theory.

These are important questions when looking at any conspiracy theory:

  • Does it make sense and/or is it reasonable?
  • Is there enough evidence to support the theory?
  • Does the conspiracy theory actually explain what happened?

Process:

  • Select your conspiracy theory.
  • Begin researching the theory.
  • EITHER Find reasons/sources to support the theory OR find three reasons/sources to discount the theory.
  • Begin the rough draft of your essay.

Expectations:

  • Your essay should be a minimum of three (3) pages and a maximum of five (5).
  • Your essay should have an introduction, at least three body paragraphs and a conclusion.
  • Your introduction must have a thesis statement that indicates a clear, reason(s) for your theory.
  • Double-space your essay
  • Type out your essay
  • Write in third person
  • Include a captivating title
  • Indent each paragraph
  • Keep paragraphs balanced (include the approximate number of sentences in each)
  • ALL sources needed to be cited accordingly to MLA or APA style

CHECK OUT THESE YOUTUBE VIDEOS TO HELP YOU GET STARTED

Why We Love Conspiracy Theories (And Why They Are So Popular Today)

https://www.youtube.com/watch?v=C0ojY3c8KWY (Links to an external site.)

25 Conspiracy Theories That Actually Ended Up Being True

https://www.youtube.com/watch?v=i3ZzokgIcgQ (Links to an external site.)

HERE ARE SOME POSSIBLE TOPIC IDEAS

9/11

The earth is flat

The moon doesn’t exist

Electronic banking is being used by the government to steal people’s identities

The AIDS virus is an artificial disease

The FDA is withholding a cure for cancer or AIDS

Michael Jackson is still alive

Vaccinations cause Autism

Global Warming has been invented and is not real

Illuminati

To successfully complete this assignment, your essay must include at least five outside sources of research information pertaining to your specific conspiracy theory. You must cite or quote from three of these sources.

These may include book chapters, articles taken from books, magazine articles, journal articles, newspaper articles, reviews, or internet website information.

Your essay must contain the following elements:

A clear thesis statement located in your introduction and supported throughout the paper.

Correct MLA or APA citations for all quotations, paraphrases, or summaries.

Pitfalls:

Using another person’s work without giving them credit.

Presenting a list of facts rather than organizing your material into a single, coherent essay.

Format:

Your paper, appropriately titled, should be between three and four typed pages, double-spaced, in a 12-point font. Include the word count at the top of the page.

Please put your name, the title of the course and index number, and the date on the top left-hand corner of the first page. Your title should be centered on the first page below your name, and you should begin your text one line below your title. 

Ethics

 What is your opinion of the recent controversy over government monitoring of citizens’ phone and email communications?  Consider: Should a line be drawn on further invasions of privacy? 

Need help with Two Research Discussion Boards

You have to read the attached file to understanding. Please go over the attached file. It will explain you what Authentication is for first discussion board. You also have to read that file to understand what’s Access Control and Authorization is for Second Discussion board. That attached file will help to understand the concept behind this discussion board.

 1. First Discussion Board 

Authentication Discussion

  • Information Systems need strong security controls to ensure users and data are protected to meet the CIA Triad. The security requirements listed in FIPS 200 (Minimum Security Requirements for Federal Information and Information Systems) include Identification and Authentication. Systems users, processes/applications, and devices must be identified and verified prior to their access to organizational resources.  
  • Authentication is the verification of credentials to confirm the user or other entity is valid. Verification of systems users and processes delegated by users is essential as well as limiting functions and actions a user is permitted to perform within the system. Research best practices and approaches to properly authenticate a user for access to a system resource. Select at least two specific techniques(e.g. password authentication, two factor authentication, biometrics,…) and describe the technique along with the strengths and limitations. Respond to other student posts providing additional insights, feedback and/or examples as applicable. 

2. Second Discussion board:

Access Control and Authorization Discussion

Describe access control mechanisms in place to protect files on an enterprise system. Specifically, drill down to permissions associated with read, write, modify, delete, or change ownership as applicable. Consider how roles and groups may enhance the administration and enforcement of access control policies. 

Engage with at least one other colleague by responding to their posts with additional information, feedback and examples as applicable.

Prolog Puzzle Project

Please read the following instructions and make sure you can finish it on time. And note the puzzles you choose in coding. And it must be tested in this way:

check :-
   solution(S), solve(S),
   aggregate_all(count, (solve(_T)), Count), format(“Found ~w solutions~n”, [Count]),
   Count=1. 

Overview

The “funniest” way I can think of to practice logic programming is to use it to solve a logic puzzle. A logic puzzle is typically presented as a mystery and list of clues that can be used to infer facts such as “who done it”.

For this assignment, we will use the Printable Logic Puzzles (Links to an external site.) website to find two puzzles to solve. One will be a “challenging” puzzle and the other will be a “Very Hard” puzzle.

For this assignment, you will write all of the clues as rules in a prolog program.

Your prolog file must obey the following format:

  1. The name of the prolog files must be ‘challenging.pl’ and ‘veryhard.pl’
  2. Your prolog file must provide a url/1 fact to get the URL of the puzzle being solced.
  3. Your prolog file must also provide a solution/1 fact with the correct solution hardcoded in. You will get the correct solution from the Printable Logic Puzzles (Links to an external site.) website.
  4. Your prolog file must provide a solve/1 rule that uses the clues to find one, and only one, table that is the solution.
  5. Your puzzle must have a series of clueX(T) rules that are satisfied whenever the solution in T is consistent with clue X.
  6. Your puzzle must include the check rule as follows:
check :- solution(S), solve(S), aggregate_all(count, (solve(_T)), Count), format("Found ~w solutions~n", [Count]), Count=1. 

To receive credit, your puzzle must find one, and only one, solution to the puzzle.

Your assignment will be checked by running swipl in the docker container as follows:

swipl -q -g check -g halt challenging.pl 

or

swipl -q -g check -g halt veryhard.pl 

which will use your solve and solution predicates to make sure you find exactly one solution and that it is the correct solution.

You can, of course, work on your solution using SWISH (Links to an external site.) in which case you may want to also use their table rendering plugin (Links to an external site.) to display your solution. Once you have a solution, however, you should confirm that it runs properly in the container. This may mean commenting out the part where you load the plugin.

Checking Your Solution

make check

or

make check-challenging
make check-veryhard

All of these MUST pass before you submit the assignment.

New Testament and Transformational Leadership

  

Part A: Profile a leader from the New Testament, evaluating the leader via at least one leadership theory. Include citations for current event reference.

Part B: Transformational Leadership

Former Pepsico CEO, Indra Nooyi is known for her transformational leadership style. She is foremost the most innovator in restructuring and diversifying the PepsiCo Beverage Industry. 

Click the link to view the Indra Nooyi’s video. List the transformative attributes of Indra Nooyi. How does Indra’s leadership style compare to your present-day leadership behaviors?

Research paper Big data (with 5-6 pages with APA format)

 While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.