Discussion

 

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

  • Begin with an description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
  • Draw from the assigned readings (and independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Big Data

In the URL’s Listed below, the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.

URL :

https://ieeexplore.ieee.org/document/8932815

https://ieeexplore.ieee.org/document/8125463

https://ieeexplore.ieee.org/document/8530688

https://www.sciencedirect.com/science/article/abs/pii/S0747563218304813?via%3Dihub

Cloud Computing week 4

Discussion Topic:  

Define and describe both SSO and IDaaS(Identity as a service).

Paper:  

For week 4, you will write a paper on SAML and FIDM. The following are the items to discuss in the paper:

  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitted as an attached MS Word document.

 

Required Reading

1. Jamsa – Chapter 5

2. Erl – Chapter 10 (Sections 10.5 through 10.8 Only)

References:

Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Peer-reviewed article pertaining to blockchain and finance

Find a peer-reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

[11:09 PM, 9/18/2020] RK: Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Writing Requirements for all Written Work:

References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with all submissions (even initial discussion posts)

Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write more than the minimum requirement of the word count assigned

As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Discussion

 

Investigate the costs of dumb terminals, network computers, minimally equipped personal computers, and top-of-the-line personal computers. 

Many equipment manufacturers and resellers are on the Web, so it is a good place to start looking.