federated architecture in cloud systems

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Emerging concepts that are using Big Data and Blockchain Technology

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a reference page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cybersecurity Planning

1. Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. 

Explain your answer (whether you believe all data should or should not be encrypted).

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

OLDM W 3 A

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:Provide a high-level overview/ summary of the case studyNote how constructive intentionality impacts innovation implementationsFind another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.100points

  Be sure to use the UC Library for scholarly research. Google Scholar isalso a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:3-5 pages in length (not including title page or references)APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.A minimum of five peer-reviewed journal articles.The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

https://journals.sagepub.com/stoken/rbtfl/A7USRO98JGM19GSLCVM1OQ/pdf/10.1177/0002716211420231

https://journals.sagepub.com/stoken/rbtfl/L2COO70RSYABFYGJ1VQTE5/pdf/10.1177/1548051811433358

https://journals.sagepub.com/stoken/rbtfl/2TRPQ0QSKS6CJVZ5R24WYP/pdf/10.2466/pr0.1995.76.2.483

https://journals.sagepub.com/stoken/rbtfl/PBITZSAGILBL5EWVKO5C7/pdf/10.2466/PR0.99.3.671-674

https://journals.sagepub.com/stoken/rbtfl/YDZC5SBFZYDFYK4V4Z4KSB/pdf/10.1177/2329488415598429

Week 5

 

Imagine you have just been promoted as the new CIO of your organization. The CEO has asked you to set standards for systems integrity, ethics, and vendor relations for the IT organization.

Complete the Standards Matrix (File Attached) to set standards for systems and people. Include three standards for each of the following:

  • System integrity
  • Ethical IT operations
  • Vendor relations

Include the following for each standard:

  • How the standard must be applied
  • How to ensure the standard is met (how it is measured)
  • What to do when the standard is not met
  • How to mitigate against future failures when a standard is not met

Cloud Vender Presentation

 

In this project, you will develop a detailed comparative analysis of  cloud vendors and their services. A comparative analysis provides an  item-by-item comparison of two or more alternatives, processes,  products, or systems. In this case, you will compare the pros/cons of  the cloud service providers in terms of security, ease of use, service  models, services/tools they provide, pricing, technical support, cloud  service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers.  Include their service models (i.e., SaaS, PaaS, IaaS),  services/tools/solutions (i.e., compute, storage, database, developer  tools, analytics tools, networking and content delivery, customer  engagement), pricing, accessibility, technical support for companies,  global infrastructure.
  • One to two slides on a recommended cloud service provider based on  the comparative analysis and the cloud vendor’s abilities to meet the  service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

   

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers,  client audiences, and management. By summarizing your results and  recommendations in an effective presentation, you are demonstrating how  you use your technical knowledge to convey your ideas to others in a  professional setting. Your ability to express recommendations to  decision makers with the right mix of technical detail in an accepted  format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Data Mining : Discussion Questions

Conduct research over the Internet and find an article the concentrates on statistical testing. 

Discuss approaches for producing valid results in data mining problems. 

Is there significance testing, and/or modeling of null and alternative distributions? How about statistical testing for association analysis? 

What about statistical testing for cluster analysis and/or anomaly detection?

APA format in 2 pages

No plagarism

Discussion

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber-attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.