Cloud Vender Presentation

 

In this project, you will develop a detailed comparative analysis of  cloud vendors and their services. A comparative analysis provides an  item-by-item comparison of two or more alternatives, processes,  products, or systems. In this case, you will compare the pros/cons of  the cloud service providers in terms of security, ease of use, service  models, services/tools they provide, pricing, technical support, cloud  service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers.  Include their service models (i.e., SaaS, PaaS, IaaS),  services/tools/solutions (i.e., compute, storage, database, developer  tools, analytics tools, networking and content delivery, customer  engagement), pricing, accessibility, technical support for companies,  global infrastructure.
  • One to two slides on a recommended cloud service provider based on  the comparative analysis and the cloud vendor’s abilities to meet the  service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

   

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers,  client audiences, and management. By summarizing your results and  recommendations in an effective presentation, you are demonstrating how  you use your technical knowledge to convey your ideas to others in a  professional setting. Your ability to express recommendations to  decision makers with the right mix of technical detail in an accepted  format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

The assignment is to conduct research based on the information below, using R. After analyzing the data in R, document the research and findings in a research paper in APA 7 format.

 Topic: Stack Overflow hosts an annual survey for developers. The study for 2019 includes almost 90,000 respondents (Stack Overflow, n.d.a).  

 Problem: Surveys usually contain instructions for participants that direct them to answer to the best of their ability. Inherently, this expectation of honest answers equates to consistent responses. Inconsistency can arise in a variety of ways, how one person interprets the question, versus the next, is one example. Another example is when the answers are multiple-choice, and more than one or none of the choices are appropriate to that respondent. In the study by Stack Overflow (n.d.b), respondents answered questions about employment and employment-related questions inconsistently. Modeling the survey results can present new insight into these inconsistencies 

 Question: Using a neural network and a random forest model and the Stack Overflow (n.d.b) data, will the survey responses to employment, developer status, and coding as a hobbyist, along with the answers to an open-source sharing question provide sufficient information to predict how the participant responded to the question about their student status? 

for data use file attached 

Remote Access Method Evaluation

  • Explore and assess different remote access solutions.

Assignment Requirements

Discuss which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:

  • Identification, authentication, and authorization
  • Cost, scalability, reliability, and interoperability

You need to write 500 words APA for this assignment, add minimum of two scholarly references 

Measuring Progress and Requirements

 

Measuring progress and requirements in a project can be completed through performance testing. As you review the results, it leads to ways to maintain the project progress. In this week’s assignment you will develop requirements that need measurable results through performance testing. Review the scenario and complete the activity below.

The Recreation and Wellness Intranet Project team is working hard to ensure that the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows that the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.

Complete the following in a Microsoft Word document.

Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case.

Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.

Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials.

Submit your assignment. 

Research Paper: Enterprise Risk Management( 4-6 papers)

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

 

Data architecture and security must evolve in parallel, evaluate this statement and support your statements with a real-life example 

Your response should be 250-300 words. Respond to two postings provided by your classmates.

Manual Code Review

 

For this assignment, I want to someone to help me to do by using Notepad++ or other text editors that can nicely format source code.

I gotta get a Download file, Java source code  Assignment 6.1 zip file. The zip file contains a number of source code files from the WebGoat project. My task is to manually read the code line-by-line and identify the blocks of code that contain a known vulnerability from the OWASP Top 10 list.

and Prepare a simple report based on OWASP Findings Report Guide and I wanna get the report in a PDF format to the assignment dropbox below.

Computer science

-Explain Normalization and De-Normalization.
-What are the different types of Normalization? -What is BCNF? 
-What is SQL?
-How many SQL statements are used? Define them.