Cloud computing Assignments

 

Literature Review (7 pages)

You will submit a draft of the literature review portion of your research paper. The literature review will form the main body of your final research paper. This will be where you provide a synthesis of the articles you have found related to your topic. When writing a literature review, you should include or consider the following:

  • An introduction and a conclusion
  • Avoid direct quotes.
  • Organize by topic or theme rather than by author
  • Use headings
  • Show relationships and consider the flow of ideas

Discuss BPaaS. Consider how business processes as services can increase the threat surface.

  In 500 words or more 

Most of us are familiar with SaaS, PaaS, IaaS, etc. Discuss BPaaS. Consider how business processes as services can increase the threat surface.

 Write in essay format, not in bulleted, numbered, or another list format.  Cite your sources. Do not copy.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

Network Management

Instructions:

Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).

–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.

–The minimum requirements are as follows:

—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.

—At least one site must have a connection to the Internet.

—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.

—At least one switch at each site that creates a LAN of at least two PCs.

—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.

—One site must have at least one server.

—Appropriate cabling and connectivity between the two sites.

—Labeling to make the drawing professional.

–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).

Part Two:

-The minimum requirements are as follows:

—An executive summary of the implementation plan

—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)

—Other recommended network management or monitoring applications/techniques recommended

—At least 10 recommended scorecards and/or metrics for monitored circuits and devices

—A list of which network devices will be monitored

—Security recommendations

—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring

—Labeling to make the drawing professional

DS wh-13

  

Bitcoin Forecasting with RNN

Write a paper on forecasting Bitcoin with RNN Techniques

In your whitepaper

  1. Provide an overview of forecasting
  2. Explains the merits of LSTM for forecasting
  3. Uses Kera to perform LSTM forecasting on the bitcoin data
  4. Compare LSTM vs ARIMA models for Bitcoin forecasting (optional)
  5. Write your conclusions and references

References –

https://colab.research.google.com/github/paulgureghian/Google_Colab_Notebooks/blob/master/Bitcoin_Price_Prediction.ipynb

https://www.kaggle.com/humamfauzi/btc-price-prediction-using-lstm

 

Write atleast 4 pages in APA format.

No plagiarism.

On time delivery.

Case study

 

Why do you believe schedule issues often cause the most conflicts on projects? 

Why is it difficult to use project management software well? 

Discuss three suggestions for improving IT project quality

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 
Content Folder

Cloud Computing

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic.