Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings 

paper work (Application Security Course)

  

Assume that you are the security administrator at ABC corporation in charge of security policies. Your Job is to assure confidentiality, integrity, and availability of the information within ABC corporation. Although, there have been several data breaches to the organization because of lousy security policies, as determined through forensic investigation. Therefore, to assure IT security to ABC organization, your security team has been tasked to create a proposal on the steps that could be taken to mitigate the risk of data breach into ABC corporation’s IT infrastructure. Based on what you have learned from Week 1-7.   

Your Task

Create a proposal that will be present to the ABC corporation’s functional manager, detailing the steps that could be taken to mitigate the risk of the future data breach. 

Proposal Guidelines:

  1. Create the proposal using the Request for Proposal form      as attached.
  2. The proposal should not be more than 3-4 pages,      excluding the titled page.
  3. The proposal must conform to APA 6th edition writing      style. 
  4. The final paper is due on the 21st of June 2020.

Database Assignment

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

 

https://www.youtube.com/watch?v=h-9rHTLHJTY

https://www.youtube.com/watch?v=_jKylhJtPmI

https://www.youtube.com/watch?v=ciNHn38EyRc

Watch this video on the SQL Slammer worm

https://www.youtube.com/watch?v=Zbd4Vk9LO3g

Watch these videos on inference attacks

https://www.youtube.com/watch?v=Z9ZjtvcgOcs

https://www.youtube.com/watch?v=rrwUCOEJFJM

https://www.youtube.com/watch?v=dx-R_AFQsc0

paper

 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

300 words discussion

Discussion point: (300 Words Minimum)

Web Analytics is a valuable tool, it allows you to track mobile users, mobile websites and mobile applications whether or not the mobile device runs JavaScript. This is made possible by using a server-side code snippet on your mobile website.

Question: With the multi-millions of mobile users in the U.S. alone, is it a good business decision to track mobile users who visit your web site and why, please support your answer with examples? Please, include the following in your discussion post.

Compare and Contrast the business decision to track mobile users that visit your website.

Describe why this would be a good or bad decision for your company to pursue.

Cookies, what DO they DO?

In the world of Web analytics there is a debate revolving around cookies that never seems to be resolved or truly understood. Cookies are a very simple and well-established way to track visitors to your web site. However, their simplicity and transparency makes it very easy for users to turn off cookies or delete them from their computers. Cookie information is vital for web analytics because it identifies visitors, their referring source, and subsequent page view data. What is a business to do?!

The new Pokémon Go (https://nianticlabs.com/privacy/en/) has been released for Smartphones! It’s the latest craze or just crazy?! Check out the terms of service/privacy policy and this snippet on last week’s topic – cookies. Provide your analysis on the policy snippet or the entire policy itself. Pokémon Go! or Pokémon No! What do you decide?

cloud computing

Discuss Shared technology vulnerabilities in the cloud?

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Legal-v assignment

write an essay with 500 words minimum on addressing the applications and implications of a  Gramm–Leach–Bliley Act (GLBA) discussed in this course to the conduct of your duties as an Information Technology professional(devops engineer). Your essay should address the following.

  • a definition and overview of  Gramm–Leach–Bliley Act (GLBA)
  • consideration of the duties of an Information Technology professional(devops)
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers)