For this assignment, you are assuming the role of senior IT manager. Reynolds Tool & Die has decided on a set of competitive advantages it would like to pursue. The company has asked you to provide a 2-page executive summary outlining how you believe the company can leverage IT to achieve as many of these advantages as possible.
Assignment5
Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement? Please submit your report using the attached MS Office Word template, which is in APA 7 format.
PLEASE USE THE ATTACHED TEMPLATE
security policy
security policy
Discussion 6 – Info Tech Import Plan Response to peers
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
week 12
Explain the purpose and functions of a command center.
You must use at least one peer-reviewed scholarly article properly cited in APA format.
Data Mining Project
Project: Need it in 20 hours
You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.
Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.
Introduction
History of Tool [Discuss the benefits and limitations]
Review of the Data [What are you reviewing?]
Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References (minimum of 2 – each must be cited at least once (of course)).
Ensure you adhere to APA7
Types of Data Analytic Tools
https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations
R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options
Examples of Dataset
Discussion : Need in 12 hours:
This week, I want you to post the particular data analytics tool that you used for the midterm project. Provide the benefits and limitations of the tool.
Replies and Explanation: Need in 2 days
You need to make the initial post and also respond to two of your peers. You’ll also need to go back and do the midterm project and explain why no one told me it wasn’t available :o|
Please include the Data Analytic Vendor Name and URL. It will also be helpful to list the pricing and trial options.
Reflection R1
Submit a 5 page paper (APA style) detailing the how Blockchain technology can be implemented to reduce ad fraud and cost while meeting consumers’ increasing expectation for excellent customer service?
Sources :
- PDF attached
- “What Blockchain Could Mean for Marketing” https://hbr.org/2018/05/what-blockchain-could-mean-for-marketing
- A Clearer Picture http://c2claritymedia.com/wp-content/uploads/accountability-transparency-in-media-today.pdf
- Competitive Info: Digital Ad Fraud To Hit $22B By 2020 http://www.insideradio.com/free/competitive-info-digital-ad-fraud-to-hit-b-by/article_6d3c6608-a815-11e7-9e40-bbd2e6133207.html
- Are You Ready to Meet Customer Expectations in 2018? http://fieldservicenews.com/ready-meet-customer-expectations-2018/
6-2 Application Assignment: Online Fraud
Specifically the following critical elements must be addressed:
1. Analyze a recent news headline of a retail chain that has been breached recently.
2. Assess the cause of the retail chain breach.
3. Determine steps that can be taken moving forward to resolve the breach.
Guidelines for Submission: Your paper must be submitted as a two- to three-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least two sources cited in APA format
Three Required Headers:
Breach Analysis
Cause
Resolution
The majority of online fraud occurs through electronic communication. We receive emails daily that represent some type of phishing scheme or web spoofing, which can be deleted with a simple click of the delete button. But what happens when your personal information has been stolen through a third-party vendor’s technical error while you made a purchase from your local retail store, who stores your credit card and personal information within a remote database?
Research a recent news headline of a retail chain that has been breached recently and analyze the scenario. What caused the issue? What steps can be taken moving forward to resolve the issue? Use research and specific examples to support your resolution recommendations.
paper 6
What is Backpropagation and how does it work?
Cloud computing 9
Continuing on the same path to learning more about the AWS platform, you will revisit the AWS training to start and complete AWS Cloud Practitioner Essentials (Second Edition): AWS Architecture module.
It will take approximately 30 minutes. Once complete, return to Week 9 discussion and (a.) tell us what you learned that you found interesting about the content. (b.) Discuss how these services work together and finally,