Please read question in below comment section

 300 words.

Consider your own company or one that you know well. What are the strategically relevant factors for the industry and your company within this macro-environment? What strategic moves are rivals likely to make and why? What factors are driving changes in this industry and why? Keeping in mind the role that interpreting environmental factors will play in analyzing a case, what do you see as the most important external data you would want this organization to have in any strategic planning process, and why? How does this discussion board relate to our coursework this week? Be specific.

3 quotes are required, and they must be enclosed in quotation marks and cited in-line by referring to your reference list.  

No plagiarism / Need references and should be clickable.

Linked Inventory Management

 CS 2336 PROJECT 3 – Linked Inventory Management Project Due: 11/04 by 11:59 PM KEY ITEMS: Key items are marked in red. Failure to include or complete key items will incur additional deductions as noted beside the item. Submission: • The file containing main must be named Main.java. (-5 points) • The project files must be in packages that start with LinkedInventoryManagement.* (-5 points) • All project deliverables are to be submitted in eLearning until further notice o Zip the contents of the src directory into a single zipped file o Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.) (-5 points) o Add your project’s presentation link in the comments section in eLearning • Programs must compile and run with Java SE 13. • Each student is responsible for developing unit test cases to ensure their program works as expected. • Type your name and netID in the comments at the top of all files submitted. (-5 points) Objectives: • Create a modular code solution with multi-packages • Use the Singleton pattern to create and manage the Scanner object • Create and manipulate a multi-directional LinkedList in Java • Use Java Generics to create generic classes and methods • Implement and use the Comparable interface Problem: A small electronics company has hired you to write an application to manage their inventory. The company requested a role-based access control (RBAC) to increase the security around using the new application. The company also requested that the application menu must be flexible enough to allow adding new menu items to the menu with minimal changes. This includes re-ordering the menu items and making changes to the description of a menu item without having to change the code. Security: The company has suggested to start the application by asking the user for a username and password to ensure that the user is authorized to access the application. There are two types of users at this company, managers and employees. If managers log on to the application, they will see all options on the menu list. If employees log on to the application, they will see a limited set of options on the menu list. User information is stored in Users.dat file, which may or may not exist at the start of the program. A super user “admin” with password “admin” has already been hardcoded in the program to allow for the initial setup and the creation of other users. The Users.dat file contains the FirstName, LastName, Username (case insensitive), HashedPassword and a flag to indicate whether a user is a manager or not. The file is comma separated and it is formatted as follows: Joe, Last, jlast, 58c536ed8facc2c2a293a18a48e3e120, true Sam,, sone, 2c2a293a18a48e3e12058c536ed8facc, false Jane, Best, jbest, 293a18a48e3e12052058c536ed8facc2c, false Application Menu: The menu of the application is dynamically loaded and displayed to the user only after the user successfully logs on. The menu items will be loaded from file “MenuList.dat”, which may or may not exist at the start of the application. If the file doesn’t exist, the application should show at least an Exit menu item as default. The file will contain all menu items details, including the name of the command that will be executed when the menu item is selected. The file may contain duplicate menu items. Your program should detect this by checking the command name as a key to compare menu items and prevent showing duplicates in the menu. If a menu item is marked as restricted (Boolean flag), only managers can see that item. The file contains the following comma separated fields, Description, a Boolean flag to indicate if the option is restricted to managers only, and the name of the menu command that will be executed when the option is chosen. The order and option number of a menu item may change depending on how they are listed in the file. The Exit option will always be listed last and it will not be in the file. Below is a sample of how the MenuList.dat file looks like: Add User, true, AddUserCommand Delete User, true, DeleteUserCommand Change Password, false, ChangePasswordCommand Add New Product, true, AddProductCommand *Note: The command name of each menu item must match the name of the class that you will create in the code (See AddProductCommand class in the code for example). Inventory: The inventory consists of multiple products of type Product stored in class ProductCatalog. The ProductCatalog is responsible of all inventory operations that add, remove, find and update a product. When printing a product information, the product retail price should be calculated and displayed as well. Retail price = (cost + (margin * cost/100)). A list of functions has been added to this class in the provided code template. You must implement all listed functions. The inventory products will be saved in file Inventory.dat, which may or may not exist when the program first starts. The file will contain the product unique id (int), product name (string), cost (double), quantity (int) and margin (int, integer that represents margin percentage). Your program must prevent the user from inserting duplicate products by checking existing products using the product name (ignore case) as a comparison key. The Inventory.dat file is comma separated and formatted as follows: 3424, Smart Watch, 20.45, 23, 80 65454, Flat Screen TV, 465.98, 15, 35 435, Computer Monitor, 123.54, 84, 43 Data Structure: The MenuList and ProductCatalog classes must use a custom LinkedList that you will create instead of using an ArrayList. The nodes in this list must be multi-directional to facilitate moving from current node to next node and from current node to previous node if needed. This custom linked list must be named InventoryLinkedList, must be generic, and must contain at least the following methods: – public InventoryLinkedList(E[] elements) //Constructor – public E GetFirst() //Get the first element in the list – public E GetLast() //Get the last element in the list – public void Insert(int index, E element) //Inserts element e at the specified index – public E Remove(int index) //Remove the element at the specified index – public String toString() //Return formatted elements information – public boolean Contains(E element) //Check if list contains the element – public E SetElement(int index, E element) //Set the element at the specified index – public E GetElement(int index) //Get the element at the specified index – public Integer GetLength() //Returns the number of elements in the list Output Format: Enter username: some username Enter password: some password //Repeat prompts until user is authenticated OR show error and option to exit. Invalid username or password! Press enter to continue or “Exit” to exit: Enter username: some username Enter password: some password Welcome Firstname LastName! Inventory Management System Menu //This is the header of the MenuList // The order and option number of a menu item may change depending on how they are listed in the MenuList.dat file. The Exit option will always be listed last and it will not be in the MenuList.dat file. 1- Add user 2- Remove user 3- Change password 4- Add new product 5- Update product information 6- Delete product 7- Display product information 8- Display inventory 9- Exit Enter your selection: 7 Enter product name: sMaRt wAtCh Id Name Cost Quantity Retail ———————————————————— 3424 Smart Watch $20.45 23 $36.81 Type “Next” or “Previous” to display next/previous product, press enter to return: next Id Name Cost Quantity Retail ———————————————————— 65454 Flat Screen TV $465.98 15 $629.07 Type “Next” or “Previous” to display next/previous product, press enter to return: next End of products list… //Displayed if no more products in the list Type “Next” or “Previous” to display next/previous product, press enter to return: //Enter //Repeat the menu after each command is executed.

Legal-g assignement

write an essay with 500 words minimum on addressing the applications and implications of a  Gramm–Leach–Bliley Act (GLBA) discussed in this course to the conduct of your duties as an Information Technology professional(order management – payment module). Your essay should address the following.

  • a definition and overview of  Gramm–Leach–Bliley Act (GLBA)
  • consideration of the duties of an Information Technology professional(order management – payment module)
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers) 

Response Required Discussion cloud DBA

Please read the below two discussion posts and provide the response for each discussion in 75 to 100 words.

 Post#1

Nowadays, there are numerous advancements in technology. As a result, the traditional workplace has gradually transformed with home offices and virtual workplaces where employees can hold meetings using video teleconferencing tools and communicate through email and other applications such as Slack (Montrief, et al., 2020). This makes the cloud more busy which brings up the need for improved cloud security.

            Generally, in a public cloud, there exists a shared responsibility between the user and the Cloud Service Provider (CSP). Due to the rise of cyber-related crimes over the years, security for things like data classification, network controls and physical security need clear owners. The division of such responsibilities is called shared responsibility model for cloud security. “According to Amazon Web Services (AWS), security responsibility is shared by both CSP and CSC and they called it as Shared Security Responsible Model” (Kumar, Raj, & Jelciana, 2018). “While client and endpoint protection, identity and access management and application level controls are a shared responsibility the responsibility resides largely with the client organization” (Lane, Shrestha, & Ali, 2017). However, the responsibilities may vary depending on the cloud service provider and the cloud environment the user is using to operate. Nevertheless, despite the cloud services used, the burden of protecting data lays upon the user.

            Normally, security is broken down into two broad categories: security of the cloud and security in the cloud. Security of the cloud is a section of the shared responsibility model handled by the cloud service provider. It comprises of hardware, host operating systems and physical security of the infrastructure. Most of these logistical challenges are offloaded when an organization moves its operations to the cloud. In contrast, security in the cloud is the security responsibility handled by the user. “The cloud service customer is responsible for securing and managing the applications that run in the cloud, the operating systems, data-at-rest, data-in-transit, policies and other responsibilities” (Bennett & Robertson, 2019). Since access to customer data remains the most critical component in cloud computing, it also determined the level of security in the cloud to be implemented by the customer.

            The customer is responsible for the following components. First, the customer is responsible for data security. While the provider is responsible for automatically encrypting data in transit and in storage, the customer is expected to configure file system encryption and protection of network traffic. Secondly, the customer is responsible for physical security of computers and other devices used to access the cloud. Thirdly, the customer is responsible for application security. Security of managed applications may be handles by cloud provider services, but the customer is responsible for configuring those services accurately and correctly. Fourthly, the customer is responsible for security hinges on identity and access management in on-premises computing. The cloud provider can implement authentication services but it’s the work of the customer to configure them. Finally, the customer is responsible for network security on-premises.

            The cloud has various advantages such as scalability, elasticity and flexible prices. However, security is remains a critical business concern for many organizations (Xue & Xin, 2016). Regardless of which cloud service provider used, the customer will always be responsible for managing the customer data, analyzing workload, traffic and performance. When implementing cloud projects, customers need to identify and understand the risks associated with digitalization, public networks and outsourcing of infrastructure components. Shared responsibility in cloud computing depends on the agreement that the customer has with the cloud service provider. This is because there are specific tasks that can be logically handled by the customer while other duties are handles by the service provider such as ensuring physical access to the data center is restricted to authorized personnel’s only.

Post#2

 

Cloud offers variety of services and virtual machine to an organization at cost effective and is thus considered as one of the most innovative advances in technology. The ability to scale as well as stored and manage data increases by using cloud. Regulatory compliance states the modification and the steps that the organization should actively take to reach its goals. Good regulatory compliances needs to be maintained while moving to cloud so that any necessary precaution and post cloud changes can be made to the organization thus moving it closure to the goal and target. “There are straight-forward ways of modeling future ownership and the progression of value creation using a combination of capitalization table analysis and the venture capital method of valuation” (Sammut, 2020).

Protecting the crucial and sensitive data while moving to cloud is the major concern of the organization and database administrator is an intrinsic component of the authorization and control process towards regulatory compliance. DBA don’t necessarily need to know who can access the system but are necessary for database security and checking security breaches and attacks. DBA most importantly needs to know about the architecture of the cloud and the various components being actively used by the organization while moving to cloud. An understanding about the difference between on premises and cloud services including the computing stack is also a requirement for DBA. Along with that, the dba should also know how to utilize all the components of the cloud both from the point of view of administrator and developer. “While current Passive optical network (PON) standards can provide data transmission capacity of tens of Gbps, in the near future, the use of more wavelengths with rates higher than 10 Gb/s could see the overall capacity increase towards hundreds of Gbps” (Afraz, 2018).

DBA also plays the crucial role in managing the budget for the cloud database and thus should have the related information as well as knowledge about application design and impact of cloud database followed by the cost of impact. Studies suggest that it is not recommended to move all the data at once to cloud, at least not initially. The DBA thus needs to work for few days in the hybrid setting of cloud and on-premises arrangement. DBA should know the traditional skills to manage on premises activities and also the advanced skill to deal with the cloud activities and database. The initial movement of database to cloud should only include the crucial and the important effective data and thus DBA should use his understanding to decide what data should be moved to cloud followed by planning for the remaining data and deciding their time to move to cloud. Dba needs to be aware about each component of cloud, the organization services and the cloud services to maintain good regulatory compliance when moving to the cloud. “Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured” (Krishna, 2018).

IDM W 1 D

 Using search engines find two different recent (within 2 years) articles involving data mining. Describe the role of “data mining” in the story using your own words. 

Proof reading

Very urgent!

I have done writing this paper which is a scholarly paper, but I want to add more relevant content to the paper from the topics inside it, so the paper can be longer. It’s IEEE style. I want you to add about two more pages ( 4 columns ). 

First, read the paper, then add the relevant content and information.

Subject: Advanced Operating Systems DIScussion- 2

 Need discussion main post 500 

Subject: Advanced Operating Systems

Question:

The control of the serialization of memory management is difficult in a “Virtual Memory” and especially when “Virtual Machines” are included. Discuss how an operating system manages “computer memory in both single and multiple OS instances”. Add discussions about how some of the problems have been addressing including respective advantages and disadvantages.

Heap insertion time Data Structures and Algorithams project

 When looking for data structure projects, you want to encounter distinct problems being solved with creative approaches. One such unique research question concerns the average case insertion time for binary heap data structures. According to some online sources, it is constant time, while others imply that it is log(n) time. But Bollobas and Simon give a numerically-backed answer in their paper entitled, “Repeated random insertion into a priority queue.” First, they assume a scenario where you want to insert n elements into an empty heap. There can be ‘n!’ possible orders for the same. Then, they adopt the average cost approach to prove that the insertion time is bound by a constant of 1.7645. 5. Optimal treaps with priority-chang

Discussion

  

1.  500 words and ref

I. Which case study in the paper was most interesting to you and why?

II. Do you think that ERM is necessary in the contemporary organization and why?

2.  500 words and ref

What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

3.  500 words and ref

List and briefly describe the nine-step process in con-ducting a neural network project.

Major Cloud Service

  • Select one of these major cloud service models: IaaS, SaaS, or PaaS. Please respond to the following in a post of 700-1000 words:
  • Describe key issues when configuring and operating security for your selected cloud service model.
    • Be sure to support your response with examples based on your research and experience.
  • Provide a full citation and reference, formatted according to Strayer Writing Standards.