overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Research paper

 

Select any 1 topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

 

 

Research paper basics: 

  • 8 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 

Assigment

 

Writing Assignment – WK 5

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.

 

Week 5 – Discussion

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why?

 

Week 5 Assignment

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

Business Requirement Document

The CEO and CIO have accepted your recommendations for implementing an EDMS for the Hollywood Organic Co-op’s five sites. They have requested that you develop a business requirements document (BRD) that details the requirements and design for an enterprise EDMS.

Begin working on the information that must be included in the final business requirements document due in Week 6.

Write a 2- to 3-page requirements document draft that addresses creating a new EDMS to be used by your company to store and track all e-documents.

Identify the types of e-documents and other content that can be created (e.g., letters, spreadsheets, reports, or paper images).

For each type of e-document, provide an example e-document that may exist in the Hollywood Organic Co-op organization.

Define the key personnel within the Hollywood Organic Co-op organization who require access to the EDMS.

Describe appropriate logical access controls for the EDMS based on the roles within the organization who require access to each type of e-document.

Note: You may format this assignment in a bulleted list, document table, or other method of your choice in a Microsoft® Word document. A narrative or formal paper is not required.

DS w-11

Tensorflow and XGBoost

Write a paper on analyzing the MNIST data set with XGBoost, Keras and Tensorflow

    

Section 1 introduction to the MNIST dataset  

http://yann.lecun.com/exdb/mnist/

https://en.wikipedia.org/wiki/MNIST_database 

  

Section 2 Apply XGBoost to the MNIST dataset

https://www.kaggle.com/idv2005/simple-xgboost-for-mnist 

Section 3 Apply Keras & Tensorflow to the MNIST dataset

https://www.kaggle.com/ritupande/self-tutorial-deep-learning-using-keras/data 

https://colab.research.google.com/drive/1iTGGKIfxRRrhWpQQUqHdfVMrfqkdE0un 

https://colab.research.google.com/github/tensorflow/tpu/blob/master/tools/colab/keras_mnist_tpu.ipynb

write in 3 pages and in APA format. 

on time delivery.

plagiarism free.

Discussion

Many data science, analyst, and technology professionals have encountered regular expressions at some point. This esoteric, miniature language is used for matching complex text patterns, and looks mysterious and intimidating at first. However, regular expressions (also called “regex”) are a powerful tool that only require a small time investment to learn. They are almost ubiquitously supported wherever there is data.

What are regular expressions? Why are regular expressions useful? How would you use regular expressions in data visualizations?

Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

Need Practicum Assignment on this subject

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of stud 

victims of cyber breachers

company that has been victims of cyber breachers withing the past three years. 

 COMPANY is FACEBOOK

Include the following headings in your paper:

  1. Company Name—type of company—brief history—Industry—Customers (consumer, business, or both)
  2. Name of the exploit
  3. How the exploit was caused