Cloud Vender Presentation

 

In this project, you will develop a detailed comparative analysis of  cloud vendors and their services. A comparative analysis provides an  item-by-item comparison of two or more alternatives, processes,  products, or systems. In this case, you will compare the pros/cons of  the cloud service providers in terms of security, ease of use, service  models, services/tools they provide, pricing, technical support, cloud  service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers.  Include their service models (i.e., SaaS, PaaS, IaaS),  services/tools/solutions (i.e., compute, storage, database, developer  tools, analytics tools, networking and content delivery, customer  engagement), pricing, accessibility, technical support for companies,  global infrastructure.
  • One to two slides on a recommended cloud service provider based on  the comparative analysis and the cloud vendor’s abilities to meet the  service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

   

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers,  client audiences, and management. By summarizing your results and  recommendations in an effective presentation, you are demonstrating how  you use your technical knowledge to convey your ideas to others in a  professional setting. Your ability to express recommendations to  decision makers with the right mix of technical detail in an accepted  format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Data Mining : Discussion Questions

Conduct research over the Internet and find an article the concentrates on statistical testing. 

Discuss approaches for producing valid results in data mining problems. 

Is there significance testing, and/or modeling of null and alternative distributions? How about statistical testing for association analysis? 

What about statistical testing for cluster analysis and/or anomaly detection?

APA format in 2 pages

No plagarism

Discussion

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber-attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.  

Apache Pig Hadoop Assignment2

Do online research and find out one case study where Apache Pig was used to solve a particular problem.

Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.

Must:

1)Atleast 2 Technical diagrams to explain the solution. own diagrams please, not from internet.

2) Maximum one page for business problem and 3 pages of technical solution.

3) No plagiarism.

Music and the Self

Go through your library of music (or find a song that fits this assignment) and identify a song that best symbolizes you, based on either the lyrics or the music.  Upload a copy of the song and write a page about your selection. Describe why this music symbolizes you. Discuss the characteristics of the music or lyrics that provide a glimpse into your attitudes and values, as well as a vehicle for self-expression. 

Write a minimum of 300 words, double-spaced. 

Research paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

DAta mining week 7 assignment

Give an example of a case where you would assign higher cost to False Negative (FN) then False Positive (FP)

(it has to be an example other than the ones I mention in the presentation or video)

Submit your answer as an paragraph here. 

Dr. Oner

paper2

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.