Big Data and Cloud Computing

Week 4 Research Paper: Big Data and the Internet of Things

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 1 discussion 2

Explain how corporate and IT initiatives may have similar goals and objectives. In your opinion, can IT governance be effective if IT goals and objectives differ from those of the corporation? Why or why not? Provide an example to support your view. 

Responses to peer ERM Discussion 3

Follow the latest APA 7 format.

Full references with link in hanging indent format.

Reply to two peer post which is in the attachement, 150-300 words each. Please add more intext citations. Follow the APA format. Complete by Sunday afternoon

The two substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Essay describing data engineering internship experience and how it will help my professional career

In a 4 – 6 page paper based on your internship course experience and the learning objectives achieved during the course, review your internship experience successes and challenges leading to growth. You should demonstrate in your paper a description of your professional portfolio and include any evidence of accomplishment and skill development or recognition that you have acquired this session and how it will contribute to your portfolio.

Provide at least two (2) peer-reviewed sources. If you have completed this CLA2 assignment in an internship course prior to this class, select new examples and sources to support your response. For questions, contact your instructor.

Profession: 

Data Engineer

** Developed applications to crunch historic click steam data and extract insights to develop item recommendation models

** Support A/B testing of models and analyze performance of each model

** Developed CI-CD infrastructure 

** Support migration to GCP cluster from private

** Adhoc analysis to provide performance metrics of models

computer assignment

nstructions

Download and install Easycpu ENIAC package on a Windows platform. It can be installed on a Windows VM.

https://sourceforge.net/projects/eniac/

Click , and point to the folder containt the assembly code fattoriable.eniac.
The program should be loaded in ASCII. If not, click the menu ,

, then . It should look as below.

Hexadecimal              ASCII
===========          ===== ===
200003                     JUMP 3
6                                6
1                                1
a02001                      LOAD @1
b88001                      STORE BX
c02002                      SUB @2
2b000c                      JZ 12
b88006                     STORE CX
f08001                      MUL BX
b88001                     STORE BX
a08006                     LOAD CX
200005                    JMP 5
10000                      HLT

Explanation:

(0) address starts at 0x2000, but PC=3 (address 0x2003)
(1) stack 1 (@1) has value 6
(2) stack 2 (@2) has value 1
(3) command load (0xa0) from 0x2001 to register AX (AX=6), PC=4 (address 0x2004)
(4) command store (0xb8) the value in 0x2001 to register BX at 0x8001 (BX=6), PC=5(address 0x2005)
(5) command substract (0xc0) the value 1 in 0x2002 from the register AX, PC=6 (address 0x2006)
(6) command jump (0x2b) to 0xC=12 if the result in AX is zero, PC=7 (address 0x2007)
(7) command store (0xb8) the value into register CX at 0x8006 (CX=5), PC=8 (address 0x2008)
(8) command mul (0xf0) the value of register AX by the value in register Bx at 0x8001, AX=5*6=30, PC=9 (address 0x2009)
(9) command store (0xb8) the value of register AX in register BX at 0x8001 (Bx=30),
PC=10 (address 0x200a)
(10) command load (0xa0) the value in register CX at 0x8006 to register AX (AX=CX=5),
PC=11 (address 0x200b)
(11) command jump (0x20) to address 0x5 (0x2005), PC=5 (address 0x2005)
(11) command halt (0x1) is exit. The program looped 6 times to exit.
When exit, AX=0, BX=720, CX=1, DX=0, PC=12,
CA = SI= OV = 0, ZE = EV = 1

Lab exercise:

Q1. Click menu , then select . Use this function to step through the assembly code.
After the statement in address 11 is first executed, what are the value of registers AX, BX, CX,
DX, and PC? Explain the function of AX, BX, CX, DX, and PC.
A1:

Q2. After statement 11 is first executed, what is the next statement to be executed? Can you tell
what is statements 5 through 11 is doing in a simple statement?
A2:

Q3: How many times the statements 5 through 11 were executed before the statement 12 is executed?
How can you tell, if you don’t step through it? Which register or memory location that you
can determine the value without stepping through all codes till exit?
A3:

Q4: Bonus: Conver the assembly code to any high-level language, such as C, C++, Java, Python.
A4:

3 Types of Data Visualization

 

Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Choose three of your favorite visualizations. Post a 3 – 5 sentence summary (for each) of why you chose the visualizations. What catches your attention? Are these visuals effective in presenting the provided data? If possible, explain what you would do to improve the visualization(s).

Explain the role of health education in health promotion. How is the nursing process used in developing health education? Describe a contemporary issue, local or global, that a family may experience today. What steps would the nurse take to address these

 Explain the role of health education in health promotion. How is the nursing process used in developing health education? Describe a contemporary issue, local or global, that a family may experience today. What steps would the nurse take to address these as part of a health education plan? 

Information Systems Architecture

 

Discuss how an information system’s architecture planning contributes to overall enterprise risk in the organizations. Research the following elements for a specific organization of your choosing: 

  • Platforms 
  • Networks 
  • Applications 
  • Databases 
  • Operating Systems 

How can risks can be eliminated? Note: You may choose to continue researching your chosen organization in this week’s individual assignment. 

Penetration testing

 Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

Please write between 200 and 300 words