technology

  1. Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic.  For leadership students, leadership or leadership styles would be too broad.  You could, however, compare leader and followers perceptions of leadership styles in private four year institutions.These are examples).  
  2. What is the cited problem? The problem you want to address has to come from the literature, and be cited, who are saying there are problems.
  3. What is the population you would like to address?

Discussion

TS834 Course Wiki  Chapter 7 Discretion

Wikis for Learning and Collaboration

A wiki is a collaborative web site that collects and organizes content, created and revised by its users. The most well-known example is Wikipedia. Wikis are a way to grow a knowledge base around a particular content area, be it best practices in a particular field or how to use a specific piece of hardware/software. A hallmark of Web 2.0 is that it improves as more people use it and this approach underlies wiki-based learning. It is based on the idea that within any enterprise, a great deal of knowledge exists among the members. Sharing this knowledge and information can raise the organization’s intelligence level, be it a university, an association, a corporation or club.

How basic discretion steps can help in countermeasures?

Conduct your own research and post a short relevant summary of your findings. ( Post current information, not older than five years ). Use not more than three (3) references.

You must provide AT LEAST 2 substantive comments on other student’s views.

BI

 1. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

2. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

 3. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product 

4.  Discuss the difficulties in measuring the intelligence of machines. 

week 12

 

his week’s journal articles focus on the digital retail sector and  how it is constantly growing each year. The case study/article reviews  the top four digital retail company’s financial performance. After  reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.     
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are  new in the market, note what you think they would have to do to obtain  market share based on what you’ve learned this week.     
    1. In response specifically list at least three key factors that  would influence the success of the digital retail company, please be  specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

requirnments:

 

The paper should meet the following requirements:

· 5-7 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

Discussion

Instructions

Write 1 thread of at least 300 words  on topic below and reply of at least 150 words to thread below.

Topic

The need for network security grows each and every day. What biblical  principles can you think of that could realistically decrease this need?  If you cannot think of a single principle, then what biblical principle  would you identify as guiding your responsibilities as a network  security manager? Your thread must include: an introduction  statement/paragraph, body paragraph(s), and a conclusion  statement/paragraph.

Reply to thread below of at least 150 words.

As a network security manager, you may be  responsible for many employees. The job may be more managerial than  technical. As a network security manager, you may have many  responsibilities. Troubleshooting issues, monitoring potential threats,  and providing secure passwords to users are just some of the important  work you will have to do. Delegating actions to others is very  important, making sure that the task goes to the most knowledgeable of  IT’s. Security managers must stay on top of their game like medical  doctors. If new procedures emerge such as computing trends and security  protocols, you will be responsible in implementing them in a timely  fashion. Maintaining the company’s network infrastructure is vital.  Installing security hardware and software, scanning networks for  security threats are also on your list of to-dos’. Some managers may  even develop data encryption methods and programs to protect information  and privacy.

A biblical principle that would guide  me in performing my duties would be integrity. Integrity is the quality  of being honest and having strong moral principles; moral uprightness,  the state of being whole and undivided. As a security manager you are  privy to confidential information, network protocols and system  operations. You may be tempted to steal information for money, you may  even be tempted to create malicious software such as ransomware that can  financially stun an organization. Staying honest in a world that sees  cyber-crimes as a lucrative business is challenging; However, with the  strength of God anything is possible. Proverbs 10:9 Whoever walks in  integrity walks securely, but he who makes his ways crooked will be  found out (ESV).

In conclusion being a network security  manager is very challenging. There are many obstacles and roadblocks  standing in your path. The difference between a security manager and a  hacker is integrity, the ability to do right even when wrong is more  profitable. The Bible is the absolute truth it can guide us in the  darkest of times. Rely on your faith of God and you will be successful  at anything you do.

Summary and Chart

 

Assignment Content

  1. Phoenix Fine Electronics would like you to brief them on your system recommendation.

    Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business. Cite at least two sources within your chart. Compare the following information:

    • Elements of the system
    • How the system would support management
    • How the system would create a successful partnership between the business and IT
    • Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at the 12-point font, and single-spaced. 

      Include the following in your summary:

    • An overview of the business needs and desired outcomes
    • The system comparison chart (from above)
    • Your system recommendation
    • The scope of the project
    • References

Phd: Research paper

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet the following requirements:

• Be 5 pages in length, not including the required cover page and reference page.

Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. 

• Use In-text citation. 

** Please include Grammarly score card screenshot at the end of the paper.

*** Please have a look at the attached grading ruberic.

Wk-3

  

Assignment 1

What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Refer to Chapter 5 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

List and briefly describe the nine-step process in conducting a neural network project.

Refer to Chapter 6 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Physical Security

 Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization 

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience