I Have programming questions to answer and I need to them to be answered right now!
Data mining real world
select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.
Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.
• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.
Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
The body of the paper should be 4 – 5 pages in length.
The Title and Reference pages do not count towards the page count requirements.
Some useful references
https://www.cs.umd.edu/~samir/498/Amazon-Recommendations.pdf
http://cs229.stanford.edu/proj2017/final-reports/5230053.pdf
https://cloud.google.com/blog/products/gcp/how-a-japanese-cucumber-farmer-is-using-deep-learning-and-tensorflow
https://data-flair.training/blogs/data-science-at-netflix/
Plagirisim report must
Week 2: Discussion: Data Visualization Workflow – Four Key Stages
In Chapter 2, the author talks about four key stages with regards to data visualization workflow. Select one key stage and expand on the author’s comments about the stage.
The name of the book to be used to write this Discussion is below,
Title: Data Visualisation
ISBN: 9781526468925
Authors: Andy Kirk
Publisher: SAGE Publications Limited
Publication Date: 2019-10-07
Edition: 2nd ED.
Lab 12 Flowcharting
- Follow the instructions in the Word document
- Download the “Flow Chart Assignment” file
- Flowchart the processes using Word and its available shapes
- You can view a tutorial for creating flowcharts here:https://www.youtube.com/watch?v=0VR7iBImDB4&feature=youtu.be
- Refer to figure 11-4 in your book for help on this assignment
- Use only the symbols listed on figure 11-4
- Upload the finished flow charts to Canvas for grading
BigData wk11
While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public. Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.
—275 words
Resources:
1. Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live
2. Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live
Data Science and Big Data
While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research. Pick one of the following for your Research paper.: Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world. The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined. New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data. More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics. Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years. Your paper should meet the following requirements: • Be approximately 3-5 pages in length, not including the required cover page and reference page. • Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. • Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. The UC Library is a great place to find resources.
OE W 1 D
Describe how IT (Information Technology) /IS (Information Systems) can be used to resolve a management issue in your business organization. Please provide examples.
Week 2 Research Paper: Mastering Blockchain
- Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 4-5 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )
Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:- Be approximately three to four pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Cyber Law – assignment 1
Using a Microsoft Word document, please define:
· Internet/World Wide Web
· Transmission Control/Internet Protocol (TCP/IP)
· Packet
· Router
· Domain Name Service (DNS)
No word count specified. Please add references.
Security Architecture and Design
Respond to each question below. Remember to cover all aspects of the question.
1. Successful security architecture needs upper management to support effective security standards and protocols. However, there are possible disadvantages to upper management involvement. List and describe the tradeoffs in the business between rigorous security and delivering products to customers. Go beyond merely the automated solutions or the technical checks that can be done without much human support.
2. Examine how capturing, standardizing, applying patterns, and standard solutions help to increase efficiency and maintain delivery teams’ velocity. Provide at least 3 real-world examples which describe and examine how they provide the velocity. Do not simply provide a list of things teams can do but for each idea, define the idea and explain its relevance.
3. Schoenfield lists several components of a successful security architecture practice, such as broad support across the organization, recruitment, and training of security architects with the right kind of aptitude and interest, effective security requirements that enhance but do not slow down the innovation process, and finally, indicators that the security architecture team is being well utilized and adding value to project development. Describe what each of these components is and explain how each is relevant to security development. Include detail and examples.
TextBook: Schoenfield, Brook S.E. – Securing Systems: Applied Security Architecture and Threat Models, CRC Press, 2014 ISBN: 978-1-4822-3397-1
The Top questions should be covered from the concept of the below 13 chapters of Security Architecture and Design:
Chapter 1: Introduction
Chapter 2: The Art of Security Assessment
Chapter 3: Security Architecture of Systems
Chapter 4: Information Security Risk
Chapter 5: Prepare for Assessment
Chapter 6: eCommerce Website
Chapter 7: Enterprise Architecture
Chapter 8: Business Analytics
Chapter 9: Endpoint Anti-malware
Chapter 10: Mobile Security Software with Cloud Management
Chapter 11: Cloud Software as a Service (SaaS)
Chapter 12: Patterns and Governance Deliver Economies of Scale
Chapter 13: Building an Assessment Program