Need Response 2 to below discussion-IT cloud

Please read the below discussion and provide the response in 75 to 100 words for each discussion post

Post1#

 

The education industry has been selected for this discussion. The clouding technology trend is increasing in the modern world. Companies prefer the use of cloud computing technology for saving their data and services and all the work performed on a day to day basis. But, when we look forward to the use of this technology in the education industry, in higher educational institutions there are some risks and confusion associated with it. The decision making of technology is on the basis of three main factors. If technology is able to meet those requirements then it is good to use otherwise it requires some changes. The three main factors are data security, customization, and lastly financial ties. These are well explained below:

            Data security and control: the decision-makers hesitate with the use of cloud computing technology as the data security and control is provided to them via on-premises computer systems structure and server rooms. From these rooms, the decision-makers can save, edit, or delete the data very easily without the requirement of the extra efforts. When a service is provided by a third party then it is always considered as it can be breached and the staff can lose control over it. The person using technology has to share the access key as the same space would have used but the whole college staff and students are also allowed to save on it to make the data secure. Companies like Microsoft spend $1billion on data security. “Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent” (Chaudhary, 2018).

Customization: the customization of cloud computing technology is very difficult. The staff members are less prone to changes and thus feel happy to use old methods. The companies producing clouding technology have considered one and developed SaaS but everywhere demand is different depending upon the structure of the institution. The old traditional way of decision making is much cheaper and time-saving in comparison to cloud computing technology. “A systematic review of these heterogeneous contributions, which provide a coherent taxonomy, can be considered interesting for HEIs to identify opportunities to use CC in its own context” (Qasem, 2019).

Financials: the cloud computing is a cost-consuming technology that disturbs the financial structure of the company when they think fit. The main decision that institutes have to take is about deciding the use of information that is already saved in the servers. The institutes decide the usage of cloud technology when they suffer from the lack of storage of large amounts of data. The movement of such data is very difficult. There can be compatibility issues also which institutes might suffer from the service provider companies. “With these inclusions, the model is appropriate and relevant in explaining users’ adoption and usage behavior of social media” (Dumpit, 2017).

Post2#

 

The public cloud provides many advantages over on-site virtualization, including cost savings, fast deployments, increased efficiency, scalability and flexibility, or the ability to shift budgets from capital spending to operational spending. Every organization has its own reason to dump VMware to the cloud, but few can disagree. 
In terms of cloud, higher education is also a long way behind other sectors. But slowly but surely the tide turns, and further institutions move from the cloud to the cloud. Globally, organizations are also under financial pressure but little money is available to build new and established programs. Therefore, cloud computing is mostly an understanding framework for enabling new services without needing significant hardware , software and infrastructure investments.

It’s more the cloud hype and confusion that generated a certain amount of fear, ambiguity, and doubt and thus slowed progress. Some vendors also use interchangeably the words “hosted solution” and “SaaS,” contributing to misunderstanding between institutions. Moreover, not all suppliers have done great work to show to organizations that they are more capable of handling the service than they can. The concept of cloud and the advantages it can offer for organisations to move forward must be clarified clearly by providers.
While only a few factors prevent the adoption of on-demand model delivery for business applications , it is necessary for vendors to consider and build strategies for overcoming these factors:

Institutions are concerned about security and lack of control:
“Institutions have long been familiar with the on-premise delivery model for most applications, because it is the legacy of software and because of their need to have control over their data and information” (Johal, 2015).
The reasons for institutional respect for hosts or SaaS delivery models are most frequently stated. The greatest obstacle in implementing on-demand applications has therefore emerged to resolve corporate security issues. Vendors deliver solutions through protected data centres, often using numerous firewalls and backup procedures to guarantee that data and information are never lost. Many suppliers possess the ability to hire data protection specialists, although most institutions do not.

Institutions with unique needs may have concerns about flexibility:
The ability to adjust company applications on demand to suit individual institutional needs is still obvious. Institutions have specific processes and specifications that technology vendors must meet. As many of these criteria have already been addressed by some vendors, the performance today is primarily determined by the ability of a vendor to provide better quality and reliability at lower cost. That’s where SaaS joins. A request service can help an institution provide students and faculty with better experience and save time , money and energy.
“Some institutions may argue that it reduces the freedom and flexibility to customize the application to meet their specific needs. However, it would be wise for institutions to avoid customization because it is costly to maintain, and institutions hardly ever see a return on investment (ROI)” (Johal, 2015).

Large investments have already been made in on-premise delivery models:
On-demand offerings continue to be relatively new on the technology market , particularly among higher education vendors. Some vendors like Salesforce.com have a strong reputation and all types of software solutions have a SaaS option. But several institutions are also reluctant to adapt to on-demand models. In the past, early technology adopters have made substantial investments in its on-site data centers and IT infrastructure due to the lack of distribution options available.

Case paper: Best practices for operational excellence

 

Case Paper: Best practices for operational excellence

Continuing your work with your organization, for week 5 research best practices for operational excellence based on the course readings. In your paper for this week include the following:

– Identify and justify 2 specific recommendations you have for the organization
– Provide an outline for a change management plan to implement your 2 recommendations
– Discuss your plan for working with the people who will be involved or impacted by your recommendations
– Conclude with your thoughts on the expected benefits or outcomes after implementing your recommended changes

Write your responses to these questions in a 2-3 page APA-formatted paper (not including the cover page or references page). Use the APA template provided in the course. Use unique in-text headings for each question–do not re-state the questions as the headings. Support your responses with citations in your paper that match the references provided.

BI_Assignment_3

Discussion: 
1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.
2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
4. What are the most common metrics that make for analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education,
climate to public safety. Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site.
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
 

Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
 

Emerging threats_3.2

Discussion:

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

At least two scholarly sources should be used in the initial discussion thread.

Note: Answer should be minimum of 300 words

Qu

1. 250 words:   Meals on Wheels Organization

write a one-page paper discussing the challenges the organization (Meals on Wheels) had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2: 250 words:

What are FOUR (4) differences between descriptive and Predictive categories of Data Mining.  Provide your response in no less than 250 words. Each difference discussed must be clearly stated before describing them in the proceeding paragraph.

Requirement

Your response must be written in no less than 250 word, using  properly formatted APA in-text citation and scholarly reference support all your assumptions and or quotations

3. 250 words:

 Using different scholarly or peer-review articles involving data mining, describe THREE (3) note worthy application or usage of “data mining” in the real world. Support each usage with examples for each use. All response must be in your own words and citation provided to support your response. Use proper grammar and in-text citation. 

fake news

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format. 

MIS 504 Introduction to Information Systems

  

Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. You are expected to prepare a research project (e.g. 400/500 words) about malicious programs (e.g. Shamoon), and the damage being caused to public and private sectors in Saudi Arabia, if any. 

Purpose: The assignment is to promote awareness of various security threats, and to develop a better understanding of how enterprises/business firms improve their security environment via the establishment of a framework for security and control. 

Assignment Guideline:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing.