security architecture and design

 Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course (security architecture and design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not current working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.    

Information Governance discussion 5

Chapter 14 – From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. 

Q2: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

Chapter 13 – According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis.  When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).  

Q1: Please identify and clearly state what the difference is? 

comparison outline

 

Software engineering tools for soft computing: MATLAB, R Tool and DTREG.  Comparison should focus on how they are able to model neural networks.  Also, pick criteria that compares things they all have in common. 

PS: The outline should look like the sample attached

BSWA week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 300 of your own words.

Reference link:

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism