Identity and Access Management

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.   Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats. 

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Week 4 – Assignment 4

  

1. Explain the relationship among data mining, text mining,

and sentiment analysis.

2. In your own words, define text mining, and discuss its

most popular applications.

3. What does it mean to induce structure into text-based

data? Discuss the alternative ways of inducing structure

into them.

4. What is the role of NLP in text mining? Discuss the capabilities

and limitations of NLP in the context of text mining.

Go to teradatauniversitynetwork.com and find the case

study named “eBay Analytics.” Read the case carefully and

extend your understanding of it by searching the Internet

for additional information, and answer the case questions.

Go to kdnuggets.com. Explore the sections on applications

as well as software. Find names of at least three

additional packages for data mining and text mining.

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Enterprise Risk management

 

Chapter 3 presented the approach Mars, Incorporated used to implement ERM, and chapter 5 presented the University of California Health System’s ERM development. In what ways are the two organization’s approaches to ERM similar? How do they differ? Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.  

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe in what ways the two organization’s approaches to ERM are similar. Also, explain how they differ. Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.

B) Select AT LEAST 3 other students’ threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly. However, I would much rather simply read your words.

discussion

After completion of the week 3 assignment, please briefly describe and explain your recommendations for the manager in the assignment.  What tool or tools did you recommend and why?  In order to receive full credit, you must comment on two other classmates posts.

DFTT week7 db

 

Hello,

i need this paper by 06/25 afternoon.

Strictly No plagiarism please use your own words.

You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Post between 200 and 300 words.

Strictly No plagiarism 

Social media analytics discussion

https://www.youtube.com/watch?v=hgWie9dnssU&feature=youtu.be

watch the video and research more using the internet about social media analytics.

First,  try to come up with your own predictions and also add overall your reflection on what you learned about Social Media Analytics after watching this video.

The discussion should contain an introduction about social media analytics, answer to the below questions 

1) how data plays a key role in social media and how companies are using the data.

2) How come liking a picture of curly fries could be the indication of how smart you are (part of the above video)?

Finally, the perspective on social media with two references in APA format. 

Come with a 350 words discussion. 

5s week 2 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

national security culture

 If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?