Block Chain Development final paper

  

This final project gives you the opportunity to review what you’ve learned throughout the semester and present a range of topics in the form of a policy that describes how participants can join your business network, and the benefits of doing so. The overall purpose of your policy should be to create interest in your business network and its applications, along with a description of the onboarding process and ongoing benefits to members. Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network. Your policy should be no less than 1000 words and no more than 1500 words. 

Your policy should include the following: 

· Purpose statement of the Letter of Credit business network 

· Description of the current (base) network (participants and functionality)

· Brief description of upcoming features in the next quarterly release. (Be creative, but realistic here. Think about what the existing Letter of Credit application does, and what features you’d like to add that would increase the application’s usefulness and value. Analyzing current functionality and determining which features would best meet business needs will be a big part of assessing this assignment.) 

· Description of the application upgrade process that may impact application availability and member business processes. (i.e. How does the business network organization plan to deploy new software features without causing substantial service interrruptions?)

· List of rights and benefits for participants (how does each member benefit and what data/services are available for each member) 

· Membership requirements for new members (minimum security requirements, approval process, decision making rules and authorities, minimum required agreements that new members must accept and agree to) 

· Description of fees for participation and service access 

· Minimum member resource contributions to the business network 

· Process for ending participation in the business network 

· Process for resolving disputes, including appealing the outcome of a resolved dispute. 

· Course of action to initiate an application for membership 

Background content for items 1 and 2 will come from your text. Other items will be a combination of content from your text and extrapolation based on what you’ve learned this semester. Pay careful attention to #3. That one requires that you carefully consider how enhancing the application can help it better align with member (and prospective member) business goals. The purpose of this project is to digest the material you’ve learned throughout this semester into a white paper that could be used to recruit potential business network members, as well as provide details of the rights and responsibilities of business network members. 

Your policy document should present a clear and concise description of the benefits of being a business network member, why blockchain technology provides superior benefits to solutions based on other technologies, and the onboarding process and expectations once membership is approved. The overall goal is to give you an opportunity to demonstrate that you understand how this example blockchain technology use case implementation aligns with existing, and prospective, member business goals. Your paper must be in APA format, including citations and references, but I’m not particularly concerned with the specific format you select for the paper’s body. 

Security Architecture & design

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples.  include at least two references.

Minimum of 600 words

simple, no plagiarism, due by 11/08/2020 1:30 PM EST

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Response to peers

Please write a post for the four documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

homework computer

Submitting Files – Lab Utilities:

Objective of the activity

After becoming familiar with the elements of an information system and with the Windows operating system, students will perform activities with utility programs.

Instructions

What are we going to do?

After reviewing the material and accessing the tutorials, students will carry out the following activities:

“Disk cleanup”

Defragment your computer’s hard drive

Customize the “Desktop”

Create on your computer a “folder” with the name PRO1101 which in turn has four “folders”

How are you going to do?

In a Word document, paste the screenshots that show:

the “Disk cleanup” process.

the process of defragmenting your computer’s hard drive.

the personalized “Desktop” with a photo of your favorite pet.

The creation of the folders and subfolders created on your computer (documents). The main folder should be named PRO1101. Within this folder you must create the following subfolders:

Introduction and literature

MS Power Point

MS Word

MS Excel

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund)

Submit a single document from a word processor that contains the screenshots of the exercises performed:

“Disk cleanup”

Defragmentation of your computer’s hard drive.

Personalized “Desktop” with the photo of your favorite pet.

Hierarchy of folders and subfolders created on your computer (documents).

Save the document with the name Practical Utility Programs. Include your name when saving the document eg Utility Programs – Gadiel

5s week 2 assignment BS

in 300 words

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Include references, do not copy paste.

BSA5

 

Project rollout begins after a project has been implemented, tested, and judged stable and functional enough to be moved into production. The project rollout process comprises of specific steps that must be scheduled carefully to enable the project to hit production deadlines and meet business expectations.

For this assignment you will create an implementation project plan that outlines the steps involved in implementing your project. This document is sometimes called a work-back schedule because you begin with the date that your project needs to go live, and then work back from there to determine what needs to be done when.

You will also conduct a post-mortem on the work you have submitted to date. Post-mortem (from the Latin for “after death,”), when referred to it in a business context is the analysis of a project’s process and results conducted by key project stakeholders after the project has been moved into production, which means it’s functionally complete. The goal of a post-mortem is to identify what went right and what went wrong post-implementation so that project managers can apply these lessons learned to future projects.

For this assignment, you will need to do three things:

  1. Complete a work-back schedule that presents the steps involved in implementing your project.
  2. Conduct a post-mortem on the work you have submitted to date in this course.
  3. Update your project documents based on the results of your post-mortem.

Review the Project Implementation Plan Example.

Create a project implementation plan for your project based on the example document. You may use Microsoft® Word or other software (such as Microsoft® Project) to create your project implementation plan.

Download and complete the Post-Mortem template based on your experiences completing the course project over the last five weeks.

Revise the project documents you have submitted so far in the course based on your completed post-mortem.

Submit your project implementation plan, post-mortem, and updated project documents.

Digital Forensics

1/2.  

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

2/2.

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case? 

MIN 300 WORDS FOR EACH QUESTION (1&2). PLEASE MAKE SURE NO PLAGIARISM.

Articlee writing

 WEB-BASED CASE STUDY, THE FUTURE OF LIFE INSTITUTE.  Read the case and answer all questions

Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What other concerns should the public bear in mind as the technological revolution advances?

Sources:  Future of Life Institute.  http://futureoflife.org

Format: APA,
word count: 500 minimum