Business intelligence Week 1

 

Create a discussion thread (with your name) and answer the following question:

Discussion 2 (Chapter 2): Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

advantages and disadvantages of having interactivity in data visualizations?

Q 1: What are the advantages and disadvantages of having interactivity in data visualizations?  Provide at least three advantages and three disadvantages.  Why do you consider each an advantage and disadvantage? – 1-2pages.

Q2: For this discussion, please use your weekly readings to compose a response to the following prompt/question(s):

 

Graph 2 (You must select a different graph than one that you have previously discussed)

 

Select a data presentation from chapter 6 of the text (Grey Section).

 

Answer the following:

 

What is the visual that you selected?

What is the purpose of the visual?

What kind of data should be compiled in the selected visual?

What kinds of data should not be compiled in the selected visual?

How can you avoid making the visual misleading? – 1-2 pages.

Research project on OAuth

Research about “OAuth” and provide the following. It must consist of:

1. 5 sources annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

threat modeling and simulations

  

In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

· Minimum 700 words

  Paper should be developed in accordance to APA

· Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

technology

  1. Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic.  For leadership students, leadership or leadership styles would be too broad.  You could, however, compare leader and followers perceptions of leadership styles in private four year institutions.These are examples).  
  2. What is the cited problem? The problem you want to address has to come from the literature, and be cited, who are saying there are problems.
  3. What is the population you would like to address?

Discussion

TS834 Course Wiki  Chapter 7 Discretion

Wikis for Learning and Collaboration

A wiki is a collaborative web site that collects and organizes content, created and revised by its users. The most well-known example is Wikipedia. Wikis are a way to grow a knowledge base around a particular content area, be it best practices in a particular field or how to use a specific piece of hardware/software. A hallmark of Web 2.0 is that it improves as more people use it and this approach underlies wiki-based learning. It is based on the idea that within any enterprise, a great deal of knowledge exists among the members. Sharing this knowledge and information can raise the organization’s intelligence level, be it a university, an association, a corporation or club.

How basic discretion steps can help in countermeasures?

Conduct your own research and post a short relevant summary of your findings. ( Post current information, not older than five years ). Use not more than three (3) references.

You must provide AT LEAST 2 substantive comments on other student’s views.

BI

 1. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

2. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

 3. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product 

4.  Discuss the difficulties in measuring the intelligence of machines. 

week 12

 

his week’s journal articles focus on the digital retail sector and  how it is constantly growing each year. The case study/article reviews  the top four digital retail company’s financial performance. After  reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.     
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are  new in the market, note what you think they would have to do to obtain  market share based on what you’ve learned this week.     
    1. In response specifically list at least three key factors that  would influence the success of the digital retail company, please be  specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

requirnments:

 

The paper should meet the following requirements:

· 5-7 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

Discussion

Instructions

Write 1 thread of at least 300 words  on topic below and reply of at least 150 words to thread below.

Topic

The need for network security grows each and every day. What biblical  principles can you think of that could realistically decrease this need?  If you cannot think of a single principle, then what biblical principle  would you identify as guiding your responsibilities as a network  security manager? Your thread must include: an introduction  statement/paragraph, body paragraph(s), and a conclusion  statement/paragraph.

Reply to thread below of at least 150 words.

As a network security manager, you may be  responsible for many employees. The job may be more managerial than  technical. As a network security manager, you may have many  responsibilities. Troubleshooting issues, monitoring potential threats,  and providing secure passwords to users are just some of the important  work you will have to do. Delegating actions to others is very  important, making sure that the task goes to the most knowledgeable of  IT’s. Security managers must stay on top of their game like medical  doctors. If new procedures emerge such as computing trends and security  protocols, you will be responsible in implementing them in a timely  fashion. Maintaining the company’s network infrastructure is vital.  Installing security hardware and software, scanning networks for  security threats are also on your list of to-dos’. Some managers may  even develop data encryption methods and programs to protect information  and privacy.

A biblical principle that would guide  me in performing my duties would be integrity. Integrity is the quality  of being honest and having strong moral principles; moral uprightness,  the state of being whole and undivided. As a security manager you are  privy to confidential information, network protocols and system  operations. You may be tempted to steal information for money, you may  even be tempted to create malicious software such as ransomware that can  financially stun an organization. Staying honest in a world that sees  cyber-crimes as a lucrative business is challenging; However, with the  strength of God anything is possible. Proverbs 10:9 Whoever walks in  integrity walks securely, but he who makes his ways crooked will be  found out (ESV).

In conclusion being a network security  manager is very challenging. There are many obstacles and roadblocks  standing in your path. The difference between a security manager and a  hacker is integrity, the ability to do right even when wrong is more  profitable. The Bible is the absolute truth it can guide us in the  darkest of times. Rely on your faith of God and you will be successful  at anything you do.