ERM Approach

 Chapter 15 explains the City of Edmonton’s ERM process. Chapter 18 explained ERM and Bluewood Chocolates. Compare the two use cases and discuss similarities and differences (list in bulletin points for easy understanding). Do you agree with the approaches to implement an ERM and why? If you could change anything about the reasons to implement ERM in these case studies what would that be and why? Would you implement the same ERM approaches in your current organization (or future organization)? 

PLEC15

 

Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Access Control

Discuss the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Physical Database Design

   

Answer the following question:

As the modern database grows bigger and bigger, many organizations  are moving away from a relational store and looking towards  NoSQL design. There is a desperate need to consider storage and file  structure as part of physical design principles. If you were  implementing a new database system for an ERP or CRM that required a  minimum of 100 TB of storage per year, what would you consider as you  plan your physical design?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

Executive Summary

 

one- to two-page executive summary. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

Be sure to cite any sources you use.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.

bi2

  1. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers.  
2.  Explore the AI-related products and services of Nuance Inc. (nuance.com).
3.  Explore the Dragon voice recognition product.12:13watch the video and write paper on it. all together 1 paper should be good

security architecture risk assessment

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)

1. What does an assessor need to understand before she or he can perform an assessment?

2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

Anova Discussion

 

  1. How can you get a feel for whether or not there is a difference among several population means by examining the data?
  2. For what purpose is the F-test used?
  3. Describe a randomized block design.  How is this design different from an independent experimental design?