Use case

Implementation of AI in the business transaction of software monitoring

1.  Drivers

2.  Study details (One paragraph of each)

  a.  Provide a breakdown of the 5 W’s (Who, What, When, Where and Why)

3.  Recommendations & results

———-

Overview of the Use-Case:

In recent years, software applications have evolved to be more complex, dynamic, and distributed in nature. Our company houses a large number complex applications distributed across its ecosystem. Therefore, monitoring these applications have become a tedious, complex and costly task. Having a real time end-to-end business transaction monitoring solutions is very important, as this will help proactively identify any issues related to its services and expedite its resolution. 

Gartner defines Application Performance Monitoring (APM) as “a suite of monitoring software comprising digital experience monitoring (DEM), application discovery, tracing and diagnostics, and purpose-built artificial intelligence for IT operations”. APM is the practice of proactively monitoring the many aspects of an application environment in order to identify and mitigate issues before they become major problems.

Our goal in this use-case is to study how the company can leverage Artificial Intelligence (AI) in APM to detect abnormalities or future issues in business transaction and proactivity resolve them.

Case Study 3.1

 

Read the attached case study ” The Rise and Fall of Blackberry” and answer the case study questions.

Writing Requirements

  • 2-3 pages in length  (excluding the cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

Activity 5- Project Risk & Quality Mngt

#1. How important are a quality culture and a risk culture for effective organization management? 

#2. Discuss the relationship between quality management and customer satisfaction

  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Crime & Security

Answer each of these questions in a paragraph with at least five sentences in a word document. Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is there still any faith at all on the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hacktivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Operational excellence

 

  • How do you define operational excellence?  What factors are involved in achieving operational excellence?  Who (within an organization) is responsible for operational excellence and why is this important?

topic sentence

Organization:

Using the Organization templates that are provided in the Organization tab of the Assignment description, provide the outline for your paper here.

Cybersecurity Planning

Your Research Project on the “Evolution of Surveillance Technology and its Ethical Limitations”. It consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. 

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Reference used for Abstract

Smith, C.L & Brooks, D.J (2013). “Surveillance Technology”. Retrieved from https://www.sciencedirect.com/topics/computer-science/surveillance-technology

Mosneik, B (July 20, 2016). “The History of Video Surveillance”. Retrieved from https://kintronics.com/the-history-of-video-surveillance/

Peek, S (Feb 17, 2021). “Video Surveillance Laws by State”. Retrieved from https://www.businessnewsdaily.com/16000-video-surveillance-laws.html

Conkel, M & Runfelt, E.H. “A Look into the Future of Surveillance Technology”. Retrieved from https://www.americanbar.org/groups/litigation/committees/criminal/practice/2019/look-into-the-future-of-surveillance-technology/

O’Brien, M (Dec 18, 2019). “Why some cities and states ban facial recognition technology”. Retrieved from https://www.csmonitor.com/Technology/2019/1218/Why-some-cities-and-states-ban-facial-recognition-technology