Project papers

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

Research information about two current data mining projects being conducted.

  • What are possible benefits that these projects offer?
  • What are criticisms of the projects?
  • What techniques could be implemented to improve on the criticisms?

Due: Check Course Schedule for due date.

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Inferential Statistics in Decision-making

Do your research on statistical  research methods and choose one article that used statistical qualitative research method. Review the article and write a report following  the steps below:

 1. Be approximately 3-5 pages in length, not including the required cover page and reference page.

2. Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

At least the article must be peer-reviewed, full-text article that used quantitative research methods from scholarly journals.

Note: When reading an article use the PECO to analyze the paper:

· P – Population being study, techniques used in the paper, E – Exposure (what), C – Control(how), 

O- outcome

Tasks

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Product Idea and Search Engines/Electronic Marketing. 

After reviewing the assigned reading materials, complete the following activities:

1.  You will develop a product service idea.

      A. Describe the product/service including the benefits of using the product/service

      B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Need Response 2 to below discussion

Please read the below discussion posts and provide the response in 75 to 100 words

Post#1:

 

A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained. The SLA should include not only an outline of the services to be provided and their expected service levels, but also metrics by which the services are measured, the duties and responsibilities of every party, the remedies or penalties for breach, and a protocol for adding and removing metrics. Now we have discussed 5 features of cloud SLA. “Based  on  policy  guidance,  autonomic  system  keep  the  system stable  in  unpredictable  conditions  and  adapt  quickly  in  new environmental  conditions  like  software,  hardware  failures” (Singh, Chana, & Buyya, 2017).

Uptime: Some cloud providers will offer lower uptime than what they can actually achieve just to give themselves some breathing space in the event of a data incident. This may be adequate for some businesses that can handle a brief loss in productivity, but for healthcare providers and government agencies that need immediate access to data, it is still considered inadequate (Zhao, et.al., 2016).

 Data Protection: Data protection processes, such as backup and disaster recovery, should be addressed in any SLA. The agreement should detail what each party is responsible for, acceptable performance parameters, which applications and services are covered, monitoring procedures and a schedule for remediation of outages whether by power outage, natural disaster, human error, or malware.

Exporting Data: Some cloud providers make it easy to migrate your data into their cloud, but charge large sums of money to return it to you—or they return it to you in an unusable format (we call this the Hotel California effect). So, you want to be sure you’re able to exit the contract if you need to and that there are no fees associated with doing so (or that they are minimal). You should also negotiate the export of your data in a predefined format (CSV, XLS, XML etc.). If you don’t have a skilled IT team that can make the export easy, you might also make it a condition that the provider assists you in the export. Finally, because some contracts require a notice of non-renewal within a certain period, make sure you understand the time period and if it seems unreasonable, try to talk it down or eliminate it altogether. “One of the main green cloud computing strategies used for the reduction of energy consumption consists in maximizing the utilization of a number of physical machines (PMs) and turning off or suspending unused servers” (Malekloo,, et. al.,2018).

Scalability: Many SLAs are designed to meet the needs of the customer at the time of signing, but we all know organizations can change dramatically in size over time. Make sure the SLA details intervals for reviewing a contract so that if your organization grows larger, your cloud capacity can grow with it and if your organization happens to grow smaller, you’ll want the option to reduce capacity; no sense it paying for unused capacity.

Data Location: Although cloud computing is all about the ease of accessing your data anytime, anywhere, it’s ultimately housed somewhere. Some providers may scatter your data across multiple locations, or house it overseas. Knowing where data physically resides is key when it comes to matters of compliance. “A Service Level Agreement (SLA) can be used to address these concerns, increasing trust in the purchased services through the clear description of the guarantees offered by the provider to the subscribers” (De Carvalho, et. al., 2017).

Post#2:

 

The agreement entered between the cloud service provider companies and the client or the user of the clouding service is cloud service level agreement (SLA). This is a type of a commitment that is signed between the service provider companies and the users of the clouding services. The agreement defines the different aspects of the services and responsibilities that are agreed on mutually between the service user and the service provider. It can between two or more parties. The agreement happened between the parties has many components which are defined from starting of the service till the termination of the agreement. Service level agreements helps in proper monitoring of the services in cloud computing. These define the quality of the service the company must provide to the customers till the end of the service agreement.

SLA is responsible for setting the security system required for management of the clouding space and free from intruders and vulnerabilities and also explains well about the backup plan the company has already set to prevent the data loss of any of the customers for the failure of the performances. There are many challenges associated with the clouding services which both provider and user face. SLA defines the terms and conditions which are agreed upon by both the parties for provisioning and consuming of the clouding service. SLA clearly defines and sets the expectations for both the parties. For the purpose of the development of an effective SLA, there are certain criteria which are needed to be established between both the provider and the user of the service. “Although there are many energy-aware resource management solutions for Cloud data centers, existing approaches focus on minimizing energy consumption while ignoring the SLA violation at the time of virtual machine (VM) deployment” (Zhou, 2018).

1) Cloud hardware and software: the cloud service provider must use all the essential hardware and the software devices required for providing the services effectively to the customers potentially. The agreement must include the hardware devices that the company would be using to provide the services. When the company knows the equipments and the software specifications of the hardware devices then it becomes easy for the providers to build the cloud construction environment and teach staff about it. “Resource overbooking is one way to reduce the usage of active hosts and networks by placing more requests to the same amount of resources” (Son, 2017).

2) Customer Responsibility: the clouding responsibility is not solely hold by the provider companies but it is shared between the user and the provider both. The provider companies should well explain about the roles and responsibilities of the users before entering into an agreement.

3) Disaster recovery and backup: the service provider companies should be well equipped with a disaster recovery plan so that there is not any kind of data loss of any customer. The system must be updated with automatic backup technology and must be mentioned about its use and blueprint into the agreement. This will make the user satisfied about the data saved in the clouding space provided by the service provider companies.

4) Data Ownership: the service level agreement must clearly specify the ownership status of the data to make everything clear and transparent between the user and the service provider and avoid any kind of future conflicts.

5) Availability: the service level agreement must clearly specify the provider’s promised availabilities. The network and the service must be same throughout the agreement and must not break in between the agreement. The promises made should be accomplished upto 99.99% successfully. “As SLAs are critical for cloud deployments and wider adoption of cloud services, the management of SLAs in cloud and IoT has thus become an important and essential aspect” (Mubeen, 2017).

CC W 3 D

 Select from the following list Six (6) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 3 & 4  (Jamsa, 2013).Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics.

 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

final Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.

cloud compuiting professional reflection

 

Write a brief reflection on this course and on how it will aid your professional career and development in 300 words.

  • How will this course impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this course prepare you for further studies related to your chosen professional career?

Organ Leader and Decision Making

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Legal Reg, Compliance, Invest

For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.