EH week 4

 Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.  

CRM Implementation plan

  

Assignment Content

  1.     In previous assignments, you have looked at how the different types of CRM practices and systems (operational, strategic, and analytical) help companies understand customers and customer-related data in order to make decisions so the company is successful.

    Purpose
    In this assignment, you consider the case of a company that doesn’t yet have a CRM and needs one. For that reason, you won’t be using the Case Report Resources. You will help evaluate a company’s needs, select a CRM, and determine how the company will implement. The implementation plan will identify risks and strategies to avoid those risks.

    Scenario
    Imagine you are a newly hired IS Manager for Engaged Teaching, a small non-profit organization that seeks to improve social, emotional and academic outcomes in schools. The organization has been operating for 20 years. It has a full-time staff of 6 people: a director, an office manager, a financial manager, a donor manager, a course leader, and an IS manager. The operating budget is $600,000 per year. The organization has collected contact information of donors and professionals who are interested in the organization’s mission along with some notes on types of contacts, amounts donated, and event attendance.

    The organization is seeking a CRM with the following:

    • Single place to hold contact information
    • Ability to pull records regarding donations by year, amount, number of times donations were made
    • Ability to note contacts made by various employees, attendance at events held by the organization, birthdays, and how each contact is related to other contacts
    • Maximum annual cost of $3,000
    • Easy navigation for employees with varying computer skills
    • There are 3 main places information is now located:
    • Notebooks
    • Sticky notes
    • Computer files, located on employee computers in the form of word documents, saved emails, and excel spreadsheets
    • Your task is to recommend a CRM and implementation plan for Engaged Teaching. The director has asked you to put together a presentation for the organization with your CRM and implementation plan recommendations.

      Assignment Instructions & Deliverables
      Prepare a 12- to 14-slide multimedia-rich presentation with speaker notes that presents your recommendation for which CRM should be used and the implementation best practices.

      Do the following:

    • Recommend a CRM currently available for use.
    • Provide a summary of what the CRM will provide and how it will address the organization needs.
    • Detail an implementation plan for the company. Include employee roles, timeframe, steps to full usage of CRM and cost—both for the CRM software and employee-related set up and maintenance.
    • Discuss how the CRM will assist the company.
    • Identify short-term and long-term risks.
    • Share CRM implementation challenges and solutions to challenges.
    • Record at least a 5-minute voiceover to accompany your presentation. Use the software of your choice, such as Sound Recorder or Audacity, to create your audio file and save as a MP3 or WAV file.
    • Include the assumptions, and cite any sources used in your research, including the textbook.
    • Submit your assignment.

Please read question in comment section

  

Need 300  words and APA format

Please watch this video link before assignment: https://www.youtube.com/watch?v=uOO4ClVUrkw&feature=youtu.be

choose a company and answer below questions.

Provide an example of a vertical or horizontal integration strategy that a firm applied it based on the reading from our Thompson text and the associated other material. How did the integration aid the company in building competitive advantage? Explain what the advantages and disadvantages of applying that integration strategy are in the context of the company and given our course work during the week.

Need Plagiarism report.

Piwik 300 words minimum

 

Your Topic: Piwik is a free open source web analytics tool that you can install on your own web server. At the main dashboard screen, conduct a site review of the working demo; explore the many metrics the tool offers. As a class discuss the following in your submission:

  • Describe your first impression of the main dashboard
  • Explain what you are seeing in the metrics displayed
  • Explain where you visited in the demo site and what was the most interesting tools you found and why
  • Describe how a tool of this sort will benefit a company large or small
  • Describe how JavaScript tags can benefit an organization in understanding the trends and patterns of the site visitors and customers.

 First, go to the link ( https://www.youtube.com/watch?feature=player_embedded&v=OslfF_EH81g ) and watch the video demonstration: 

Linux Implementation Proposal

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 

Create summary tables that address relevant factors related to COVID-19(Must need knowledge on visualizing tools like Tableau or R datasets)

Academic Research Team Project Paper

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

Analytic programing 4- Data Manipulation and Formatting

 

Because Eileen Dover, the CEO of Good For You! Bakery, began her business with limited background in data architecture, some historical data that was saved in legacy systems is in bad shape. For example, sales date information was entered haphazardly, in different formats; sometimes sales amounts included a dollar sign and cents to the right of the decimal, and sometimes they didn’t; and the alphanumeric code she initially used to designate products is confusing to her new managers.

Ms. Dover wants to ensure that she can move data from her legacy system to SAS®. She had one of her new IT people produce a pipe-delimited data file in .txt format. He was not able to do much data validation/cleaning on his end, and Ms. Dover wants to know if this crucial step can be completed in SAS®. She wants you to do the following:

  1. Import the legacy data file (Week 4 Assignment Data) into SAS®. (Note that if you look at the .txt file using a text editing program such as Notepad, you can see anomalies in the data; for example, dates and dollar amounts are represented in different formats.)
  2. Create a report that:
  3. Lists sales, by month, with subtotals and a grand total
  4. Interprets all dates correctly and displays them in the same format
  5. Interprets all dollar values correctly and displays them in the format $99
  6. Add comments to the SAS® code to explain what each section of the code does, so that your team can apply similar to logic to cleaning/validating other data files.

Follow the instructions in the Week 4 Assignment Instructions document to complete this assignment. You will be using the Week 4 Assignment Data file to complete this assignment.

Submit your SAS® program.

Answer the following questions in 2-3 pages

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Organizational Security and Privacy

 Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats.