Discussion

In the attached article,  Sultan, Mushtaq, & Abubakar (2019) outline several security concerns associated with the rise in IoT technology. What implications might these concerns present to the future of contract law and privacy liability? 

Hint*-Review the content in the textbook regarding contract issues with cloud computing security.

IOT Security Issues Via Blockchain: A Review Paper 

Final Research Project

  

Data Analysis and Data Mining

As more and more people are becoming connected over the internet and are also becoming more and more dependent to technology, the level of data that happens to be developed over time has been on a gradual rise since the internet and tech boom in 2002*. This sudden increase in data has resulted in various forms of data being developed. One of these forms is known as data analysis where as the other happens to be data mining. These two concepts can closely be assumed to relate, however, this is never the case since these two concepts happen to be rather different in a large number of ways.

For instance, data analysis happens to deal with the extraction, cleaning, transformation, remodeling, visual representation and grouping of data into information that can be consumed and used in making decision or coming up with a particular conclusion. Thus, this does point out that data analysis is mainly used for the main purpose of making sense of complex data that is yet to be processed into understandable information (Zaki & Meira, 2014). Data analysis also happens to be used in testing hypothesis, this results in placing data analysis in being used in statistics, mathematics as well as computer science based structures as a means of deriving a set of findings or conclusions from collected data. 

On the other hand, data mining does happen to follows some principles of data analysis and can be grouped under data mining, however, data mining happens to be the extensive exploration and evaluation of large amounts of data with the purpose of retrieving or identifying a hidden pattern in a large data set. Data mining is also used in developing machine learning and AI system models that happen to be used in conducting effective data analysis. data mining is also known as information discovery since it ends up looking at various sets of data and attaining a fixed finding from the data set presented (Zaki & Meira, 2014). Data mining is also used in a large structure of data that contains immense complexities since it does not require visualization as a result of its initial purpose of making data usable, that is, turning raw data into valuable information.

References

Zaki, M. J., & Meira, W. (2014). Data mining and analysis: fundamental concepts and 

algorithms. Cambridge University Press.

COM303 Week 1 Discussion 2

  

Choose one of the stereotypes iterated in the episode of 20/20 that you have heard in your own life. Give the stereotype, and who said it to whom. Was your reaction the same when you watched it on 20/20 as it was when you actually experienced the comment? How do you think the use of humor allows the Broadway show “Avenue Q” to tackle the issues of stereotyping and prejudice?  Is it effective?  Is there a better way to handle such things, in your opinion?

Task7

1. According to the vignette and based on your opinion, what are the challenges that the food industry is facing today?

2. How can analytics help businesses in the food industry to survive and thrive in this competitive marketplace? 

Note:The work must be formatted with the APA 6th edition style (double spaced and references indented accordingly). 

All citations and references must be in the hanging indent format with the first line flush to the left margin and all other lines indented.

You need to cite your sources in your discussion post both in-text and in a references section. Minimum 500 words. NO PLAGIARISM.

Important Paper

Term Paper: Digital Forensic Cases

Due Week 10 and worth 200 points

You have been asked to conduct research on a past forensic case to analyze how digital data was used to solve the case. Choose one of the following digital forensic cases: 

S. v. Doe (1983), Doe U.S. (1988), People Sanchez (1994),  Michelle Theer (2000), Scott Tyree (2002), Dennis Rader (2005), Corey Beantee Melton (2005), James Kent (2007), Brad Cooper (2008)

Using the Stayer Library or the Internet, search for the case notes and reports for the case and answer the following:

  1. Summarize the case, the pertinent actors, evidence, and facts. 
  2. Outline the specific digital evidence that was used in the case.
  3. Describe how the investigators found and documented the evidence, if any. 
  4. Describe the procedures and tool(s) used for acquiring potential evidence. 
  5. Describe the obstacles faced in the investigation.
  6. Outline the most significant improvement to digital forensic investigations/tools that assisted with efficiency and reliability. 
  7. Provide the links to two modern tools that could have assisted with the collection of evidence. 
  8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

OP Discussion #1

Course: Operational Excellence

My role: I am a software developer working in IT. Please write accordingly.

Here is a questionnaire for you to take on your “Influencing Style”. Provide feedback on how it relates to you and your style. How might you use your style with organization management? How does your style prepare you for operations strategy?

FTT-InfluencingSkillsFinder_v1.0.pdf(see attachment if you cannot open the link)

Your main post must be two to three substantive paragraphs (250+ total words) and include at least one APA-formatted external citation/reference. Please follow up with two subsequent replies to colleagues. Each reply should consist of a relevant paragraph containing 80 words or more.

Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings.

Data Security Assignment

 

Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf

https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/

write a python program

TASK 1:  Animated Sine Curve

Write a Python program one.py with PyOpenGL to display an animation of sine function y=Asin(x+B), satifying the following requirements:

  • The window application’s size is (600, 600), and its upper-left corner is at (250, 250) on the screen;
  • The window application’s title is Animated Sine Curve.
  • The ranges of x and y are [-4, 4] (x is in radians);
  • The amplitude A is a random float in [1, 2], and it is updated each time the window application restarts;
  • The phase shift B is a float; it is initialized as 0, and incremented by 0.01 each time the screen refreshes;
  • The two axes are drawn in white, with an arrow towards the positive direction at the end of each axis;
  • The sine curve is drawn in yellow.
  • Orthogonal projection is used in this task.

The following figure illustrates the expected window application.

TASK 2:  Clamped B-Spline

 Write a Python program two.py with PyOpenGL to display a clamped B-spline, satifying the following requirements:

  • The window application’s size is (550, 550), and its upper-left corner is at (150, 150) on the screen;
  • The window application’s title is Special B-Splines.
  • The program reads a text file named control-points.txt, including an x,y coordinate pair in each line as a control point, in the same folder;
  • Control points are drawn with size 4 in green.
  • Based on the control points, a clamped B-spline is drawn.
  • P(t)’s color, mixed by red and blue, depends on its curvature (R = curvature / 5, G = 0.0, B = 1 – curvature / 5);
  • Curvature is clipped by [0, 5].
  • Orthogonal projection is used in this task.

The following figure illustrates the expected window application, reading the sample control-points.txt provided.

TASK 3:  Hexagonal Pyramid

 Write a Python program three.py with PyOpenGL to display a 3D hexagonal pyramid, satifying the following requirements:

  • The window application’s size is (400, 400), and its upper-left corner is at (100, 100) on the screen;
  • The window application’s title is Hexagonal Pyramid.
  • The program reads a text file named pyramid-params.txt, including one line as x,y,z,H,R, in the same folder, where x, y and z are the coordinates of the top vertex v, H is the height, and R is the radius; we assume the top vertex v and the base centroid c are on the same vertical axis, and c is always under v; the distance between c and any base vertex vi is always R.
  • Based on the above information, a hexagonal pyramid is drawn.
  • All faces are randomly and differently colored, except for the base in white.
  • When the key R is pressed, the radis increases by 0.01 and the hexagonal pyramid is redrawn.
  • When the key H is pressed, the height decreases by 0.01 and the hexagonal pyramid is redrawn.
  • The hexagonal pyramid is static by default; When the key X, Y or Z is pressed, the hexagonal pyramid toggles between being static and rotating 1 degree/refresh along the corresponding axis (i.e., the key X corresponds to the x axis), taking c as the origin.
  • Perspective projection is used in this task (FoV is 90 degrees towards the y-axis; Camera looks at the origin and uses the y-axis direction as the up-vector).

The following figure illustrates the expected window application, reading the sample pyramid-params.txt provided.