IT PROJECT

 Conduct Internet research and identify an established process improvement strategy. Explain the strategy and describe what you feel are its biggest strengths.(75words)

 Describe what you think are the two most important aspects of leading a successful IT project. Provide examples to justify your selections. (75words) 

Cloud Incident

Topic:  Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.   

Follow up your discussion with a recent article discussing a company who has begun utilizing a cloud environment and what challenges they may face.  Make sure to cite the article.

Discussion

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

Team managment dis 5

 

Discussion Conflict with Teams and Individual Creativity

Part One: Conflict

List and briefly define the three types of team conflict discussed in the textbook. Chapter 8 in my text. 

Describe a conflict from your work team (What type was it?  What was it about?  How was it resolved?) 

Part Two: Creativity

List and define the three creativity measurements from the textbook. 

How can team conflict lead to team creativity?  

Need 350 word content along with references.

Facial Expression Recognition

Write a final paper on Facial Expression Recognition with including these topics.

Introduction

History

Types of comparisons in Facial Recognition

Components of Face Recognition

How Face Recognition Works

Face Recognition Techniques

Popular Face Recognition Algorithms

Databases

Advantages and Disadvantages

Sample of Devices

Conclusions

DAta mining week 8 assignment

Imagine a Clustering problem where the educational researchers would like to find clusters of students (group of students) who have similar correlation patterns when it comes to correlation of their GPA vs Income of their parents. And you are hired as the Data Scientist to do this job. 

What kind of Objective Function would you design?

Why?

Please use your own reasoning and explain in details.