Discussion 2 HRM

You are responsible for planning and conducting diversity training for your organization. List and explain a minimum of three topics that you would include in the training and explain your rationale.

APA format 300 words and intent citations and at-least 2 peer reviewed articles as references.

Graph Algorithm Assignment

Graphs (Help! Really challenging assignment. Would appreciate any bit of help!)

Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file. Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made into a function, it should be if you plan on using the logic again.

Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.

As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.

Submission Goals

(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.
The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)

(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.
(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.

(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.

graph.py

graph = dict()

graph[‘A’] = [‘B’, ‘C’]

graph[‘B’] = [‘E’,’C’, ‘A’]

graph[‘C’] = [‘A’, ‘B’, ‘E’,’F’]

graph[‘E’] = [‘B’, ‘C’]

graph[‘F’] = [‘C’]

matrix_elements = sorted(graph.keys())

cols = rows = len(matrix_elements)  

adjacency_matrix = [[0 for x in range(rows)] for y in range(cols)]

edges_list = []

for key in matrix_elements:

    for neighbor in graph[key]:

       edges_list.append((key,neighbor))

print(edges_list)

for edge in edges_list:

        index_of_first_vertex = matrix_elements.index(edge[0])

        index_of_second_vertex = matrix_elements.index(edge[1])

        adjacency_matrix[index_of_first_vertex][index_of_second_vertex] = 1

println(adjacency_matrix)

WutherHeightsFamilyTree.docx

The Extended Families of Wuther Heights (Modified):

Family 1

Patrick Earnshaw (M) {id: 001}

Hannah Earnshaw (F) {id: 002}

Relationship: Married

Children:

Catherine Earnshaw (F) {id: 003}

Hindley Earnshaw (M) {id: 004}

Family 2

Andrew Linton (M) {id: 005}

Dolores Linton (F) {id: 006}

Relationship: Divorced

Children:

Isabella Linton (F) {id: 007}

Edgar Linton (M) {id: 008}

            Heathcliff Linton (M) [Adopted] {id: 009}

Family 3

            Hindley Earnshaw (M) {id: 004}

            Frances Byler (M) {id: 010}

            Relationship: Married

            Children:

                        Hareton Earnshaw (M) [Adopted] {id: 011}

Family 4

            Catherine Earnshaw (F) {id: 003}

            Edgar Linton (M) {id: 008}

            Relationship: Married

            Children:

                        Cathy Linton (F) {id: 012}

Family 5

            Isabella Linton (F) {id: 007}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 6

            Heathcliff Linton (M) {id: 009}

            Children:

                        Linton Heathcliff (M) {id: 013}

Family 7

            Hareton Earnshaw (M) {id: 011}

            Cathy Linton (F) {id: 012}

            Relationship: Married

Family 8

            Cathy Linton (F) {id: 012}

            Linton Heathcliff (M) {id: 013}

            Relationship: Divorced

casestudy

Please add proper introduction and support the already existing content with a good example in the description.Also help to add proper citations and provide 7 APA references.

response required project

Please readh the below project proposal post and provide two responses in 75 to 100 words

Post#1

 

Cloud computing is the service availability of the computer system, especially cloud storage, without direct active management by the user. The term is generally used to describe data centers available to users over the Internet. Cloud computing offers a variety of benefits but it has some Vulnerabilities also. There are some Possible Vulnerabilities are mentioned like: Data Breaches, Targeted Attack, Simple Human Errors, Application Vulnerabilities, Poor Security Policies, Natural Disasters, Simple Human Errors, Hard Drive Failures, Power Failures, Malware Infection, Weak Network Architecture, Insecure Network Protocol, Vulnerable Application, Vulnerable Systems and APIs, Weak API Credentials, Key Management, Operating System Bugs, Hypervisor Bugs, Unlatched Software. “Many cloud computing providers such as Google, Microsoft, Yahoo, IBM and Amazon are moving towards adoption of cloud technology leading to a considerable escalation in the usage of various cloud services” (Birje, 2017).

Data breaches are a major issue in cloud computing. Because some attackers and unauthorized web sides try to steals data without user permission. It is only because of poor services. It allows us to enter an unauthorized network in the source network and steals private data. Hackers are easily found the data in private services also. Cloud computing runs software, the software has vulnerabilities and tries to exploit those vulnerabilities. In cloud computing, Consumers have reduced visibility and control. When transitioning assets/operations to the cloud, organizations lose some visibility and control over the operations. When users are using external cloud services, then it becomes the responsibility of some of the policies.

The main issue in cloud computing is lost Stored DataData stored in the cloud can be lost for reasons other than malicious software attacks. Accidental deletion of data by the cloud service provider or a physical disaster, such as a fire or earthquake, can lead to the permanent loss of customer data. The burden of avoiding data loss does not fall on the provider’s shoulders. The employee of the organization encrypts its data before uploading it to the cloud but loses the encryption key, the data will be lost.

            Increase Cyber security Risk is due to a lack of understanding. Organizations transfer the data into the cloud often without understanding the full scope of doing so, the security measures used by the cloud computing services, and responsible to provide security measures. Employees or user decides to use cloud services without fully understanding how those services must be secured. “Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization” (Pietro & Lombardi, 2018).

Many organizations operating in the cloud in every service when already know about the cyber security risk. Cloud computing service failure, because the customers do not understand the security, depends on which points and meetings. The organization chooses cloud service as security that should be awarded by all threats also and update all the employees and users as well and should be followed all the steps for security. “With cloud computing emerging as the latest technological advancement, it also brings various unexplored threats which raise critical security questions about data security on the cloud” (Bhattacharya, 2017).

Post#2

 

Net neutrality defines the principles of the internet for the service provider companies that they must treat all types of internet communications equally. The companies must not charge for the different internet services differently which can be defined on the basis of user content, types of the types of equipment used, destination, and the source address. With the presence of net neutrality, internet service provider companies may not charge money for some specific content or service, slower down the internet connection, or intentionally block some of the internet content to charge extra for the service. When net neutrality was not present, internet service provider companies would charge the customers for various tiers of services and intentionally block some of the websites and services used by the users. “The most basic definition of net neutrality is to prohibit payments from content providers to internet service providers; this situation we refer to as a one-sided pricing model, in contrast with a two-sided pricing model in which such payments are permitted” (Greenstein, 2016).

Net neutrality applies to cloud computing also as this also a service that is provided by the service provider companies. The rules of net neutrality that applies to cloud computing are:

The service provider company provides software as a service that cannot restrict or block the access of the users to cloud computing and storage services. The service provider companies providing software as a service cannot differentiate between its customers taking the same service from the company. They cannot favor one customer in the areas such as accessibility, storage capacity, storage elasticity, responsiveness, and many other types of services provided by the companies to the users. The service provider companies cannot provide special services at selective offers to some of the specific customers who have opted for the same services at the same expense. “The interpretation is that if a cloud platform is owned by the Internet access provider, the cloud is just a part of the network and under the NN regulation” (Kantola, 2019).

Net neutrality helps in determining the efficiency of cloud technology. It helps in managing the provider’s service to be provided to customers equally worldwide when they are paying equal in every term. Net neutrality helps in maintain the clouding services and upgrades the response time for every company equally. The small businesses that are using cloud computing services to become big and compete with the big giants are treated equally in terms of clouding space and software as a service. “One of the “fathers” of the Internet, Vincent Cerf (who, with Robert Kahn, developed the TCP/IP protocols, used in the early days of ARPANET, the Internet’s precursor, and which are still used today) pointed out in his Communications of the ACM column that “the Internet has always been open,” and “what we should not and must not tolerate is the arbitrary shutting down of pathways that can link together our increasingly global societies” (Austin, 2018). Net neutrality affects clouding technology as the security of the data saved is hampered. When the company integrates cloud into their existing company, it requires a proper assessment of the resources and business needs to develop a cloud security strategy. There is also a view that the security technology is already developed in a way that net neutrality won’t affect the working in the clouding technology but it will define the guidelines of the service provider and the user of the services (Austin. 2018).

Organizational Goals vs. Information Technology Planning

  1. In your first paragraph discuss the importance of alignment between organizational goals and information technology planning

2. In your second paragraph to another student, discuss how an organization’s current information systems and information technology impacts planning for strategic purposes.

3. In your third paragraph, explain how and why having an information technology strategic plan is critical to an organization’s sustainability.