MKT 455 A 1

Submit a two to three pages article summary on The Samsung Group.  Samsung Group is a South Korean multinational conglomerate headquartered in Samsung Town, Seoul. It includes many affiliated businesses, most of them united under the Samsung brand, and is the largest South Korean chaebol.

You should start with searching for an article and then complete your article summary by going through following 3 steps: 

Step (1) is to find an article.  Your article must come from a reputable source. Among many reputable sources for you to look for Samsung articles, one of them could be a weekly magazine The Economist.  The following two articles are examples of this well-known company:

  • The Economist, January 15, 2005, pp. 64–66; Moon Ihlwan, “Samsung’s Rise in Digital TV”
  • The Economist, February 9, 2008, p. 71; Cliff Edwards, “Samsung: Rethinking the Printer Business”

Step (2) is to introduce the following four pieces of information in the first paragraph of your article summary so that readers would know what to expect:

  • source origin (i.e., The Economist),
  • Issue or date of that article published (i.e., January 15, 2005),
  • author name (i.e., Moon Ihlwan),
  • article title (i.e., “Samsung’s Rise in Digital TV)

Step (3) is to reference your article at the end of your article summary; either providing a link to that article or providing that article as an attachment to your article summary.  Your instructor will read your article before grading your article summary.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Note:  You are required to use IGU’s learning resources such as university’s digital library and online resources.  There are three online library systems:

Access to IGU’s EBSCO Library:

Go to: http://search.ebscohost.com (Links to an external site.) (Links to an external site.)

User Name: ns147028main

Password: iglobal2020@

Access to LIRN(which contains both ProQuest and Gale databases):

Go to: http://www.lirn.net (Links to an external site.) (Links to an external site.)

User Name: 34314

Password: firstpanda47

Access to OPAC (Online Public Access Catalog):

Go to:  http://opac.libraryworld.com (Links to an external site.) (Links to an external site.)

User Name: iGlobal Library

Password: U11iGuLRc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Please confirm/show your use of these resources with your instructor.

steganography

 Research the assigned topic to your team and write a 20-page report. Your report must contain an abstract, introduction, body contents (subheadings), evaluation, conclusion, references. The report should be APA compliant (double-spaced, spelling, grammar, references & word formatting). Make sure to upload your report at the discussion section for the residency.
 

 Hints for your slides: Excellent visuals for the topic; background, graphics, and text complement the presentation and are congruent with the message of the presentation. Excellent notes (note view) are included or voice-over was used for details of presentations. Transitions are used between slides and animations are used on individual slides.   

spring boot framework

Write a spring boot APIs that each serve a given BIAN Service Domain. The data that the APIs

exposed are sourced from Systems of Record to produce a realtime feed through Kafka. Our APIs are

either written on top of Kafka topics directly using Event Sourcing or we use the traditional approach

of sinking our data from Kafka to a database and write our API on top of the databases.

The purpose of this challenge is to have you work through a problem where the expectation is for you

to produce an API. We have specifically opted to make the problem statement as generic as possible

to allow you to:

The ONLY requirement is that this API MUST BE WRITTEN USING THE SPRING BOOT

FRAMEWORK.

Problem Statement

The Data Feeds

Let’s assume you have the two following data feeds:

Feed 1: The balances

This is a data feed, where each event represents a single balance update for a given account.

A single record looks like this

{“accountNumber”: “abc”, “lastUpdateTimestamp”: “2020-01-01T01:02:03.8Z”, “balance”: 89.1}

Feed 2: The transactions

This is a data feed representing transactions that are occuring. Each record will be a single transaction

at the bank. Keep in mind that there are two types of transactions: 1. DEPOSIT and 2. WITHDRAW.

A single record looks like this

For a DEPOSIT:

{“accountNumber”: “abc”, “transactionTs”: “2020-01-03T01:02:03.8Z”, “type”: “DEPOSIT”, “amount”: 89.1}

Or a WITHDRAW

{“accountNumber”: “abc”, “transactionTs”: “2020-01-03T01:02:03.8Z”, “type”: “WITHDRAW”, “amount”: 89.1}

The API [ the actual meat of the assignment 😉 ]

Please write an API that can serve the following queries:

1. Given an accountNumber, return the latest balance.

2. Given an accountNumber and a time range such as: Today, Last 7 days, last Month and the

more general case of a range between date X and date Y. For example, I should be able to ask for all

my transactions between January 8th, 2019 and November 28th, 2020.

3. Repeat 2, but filter for type. I.E. Show me transactions with type WITHDRAW.

Some hints:

1. Make sure that any technical choice you are making is backed up by good reasoning. Meaning,

if you decide to go with event sourcing? Why? If you choose to use a noSQL datbase? Why?

2. Make reasonable assumptions about the problem. If any extra detail is left out, just ride the

wave and make assumptions. There are no wrong answers here.

Discussion Reply!!! About 50 words

 

Choose  a networking troubleshooting approach; there are some examples in the  text. Feel free to cover another that is not listed in the text, as long  as it is a suitable network troubleshooting approach.

According to CompTia, the troubleshooting methodology is as follows;

  1. Identify the problem
  2. Establish a theory of probable cause
  3. Test the theory to determine the cause
  4. Establish a plan of action to resolve the problem and implement the solution
  5. Verify full system functionality, and, if applicable, implement preventive measures
  6. Document findings, actions and outcomes

In my experience, I usually try to identify all of the components in a  signal path, pick a halfway point, and test for the correct signal  there. If I get correct results, I move backwards until I don’t. Then I  know which component is faulty. Once I know which component is faulty, I  begin diagnosis and work towards resolution. Typically, it involves a  great deal of research on open source intelligence sites,  trial-and-error, and sometimes I just have to replace the component.  This is something I learned while repairing helicopters in the Army, but  the theory is the same for just about anything that needs repairs. The  biggest take-away that has guided me towards faster repairs is this: my  problem is not unique. Someone has experienced it before and knows the  answer. Someone has also posted that solution somewhere, I just have to  spend the time to look for it.

Why did you choose this networking troubleshooting approach?  

I chose that approach from years of experience, and many failures  that I learned from those failures. It is easy to get frustrated or  overwhelmed when a problem is in front of you and you don’t know the  next step to resolve it. There is always a solution out there, and  someone knows that answer. Although this is not directly related to  networking, the theory of troubleshooting is the same. I was informed  that the drain pipe to my kitchen sink was damaged and water was leaking  into my crawl space. I called a plumber, who quoted me $3.5k to repair  it. I decided that it was time for me to learn basic plumbing. I went  underneath my house, looked at the problem, took pictures of every angle  I could, went online, researched basic plumbing techniques, then went  to a plumbing store to get some advice. I brought him a six pack and he  shared his wisdom. Then he filled my cart with everything I would need  to fix the problem and showed me how to do it. An hour and a half later,  and $14.35 later, the pipe was fixed. I didn’t realize it at the time,  but I was following CompTia’s troubleshooting methodology (maybe not  step 6).

Take your networking troubleshooting approach and apply it to  the issue you chose. Summarize the steps you would take to troubleshoot  the issue. 

Choosing an issue; cannot connect get on the internet. I chose that  issue because it happened to several computers I was managing today.  First, I was alerted about the issue, so I researched to find out  exactly the extent of it. Is it everyone? Is it post-wide? Is it  DISA-wide? It turned out to be just our building. Knowing that other  buildings had network and that everyone in our building did not  eliminated several possible problems. I knew it had nothing to do with  the individual machines or their configuration, and I knew that there  was a chance I could re-establish network connectivity. The only  elements between the laptops and the post-wide network devices were the  modem, router, switch, and patch. I went into the server room and  noticed that the lights on the switch weren’t blinking like they usually  did. I called the Network Enterprise Center and had them reach out to  that switch (I don’t have admin rights on garrison level network  devices) and they were able to reset the switch. It turns out that a  power outage the night before reset the switch and it lost  authentication. I then verified that everyone in the building had  network access. I had to fill out a few forms with the NEC after all of  that was done. 

Reference:

Garn, D. M. (2022, October 5). Use a Troubleshooting Methodology for More Efficient IT Support. Default. https://www.comptia.org/blog/troubleshooting-methodology

It472 week 6 discussion

DQ6: A useful tool to clearly depict the interrelationship between process and data
models is the CRUD matrix. The CRUD (create, read, update, delete) matrix is a
table that depicts how the system’s processes use the data within the system. It is
helpful to develop the CRUD matrix on the basis of the logical process and data
models and then revise it later in the design phase. The matrix also provides important
information for program specifications, because it shows exactly how data are
created and used by the major processes in the system.

  • Explain how use case descriptions and UML diagrams work together to define functional requirements?  
  • What are the differences between the logical and physical Entity Relationship Diagram (ERD)?
  • What are the two most important factors in determining the type of data storage format that should be adopted for a system? Why are these factors so important?

Game Development(Game Engine)

(Game Engine) I need like 3 slide. I don’t need the slide for writing my name which I will do it my self.

My topic is Game development where Game Engine is the priority. I need 3 slides with the images 

Activity 5- Strategy Applied in PM

  1. Read the Case “The Blue Skye Project” at the end of the chapter 10 and response to the following questions:
    Garth Hudson was a 29-year-old graduate of Eastern State University (ESU) with a B.S. degree in management information systems. After graduation he worked for seven years at Bluegrass Systems in Louisville, Kentucky. While at ESU he worked part time for an oceanography professor, Ahmet Green, creating a customized database for a research project he was conducting. Green was recently appointed director of Eastern Oceanography Institute (EOI), and Hudson was confident that this prior experience was instrumental in his getting the job as information services (IS) director at the Institute. Although he took a significant pay cut, he jumped at the opportunity to return to his alma mater. His job at Bluegrass Systems had been very demanding. The long hours and extensive traveling had created tension in his marriage. He was looking forward to a normal job with reasonable hours. Besides, Jenna, his wife, would be busy pursuing her MBA at Eastern State University. While at Bluegrass, Hudson worked on a wide range of IS projects. He was confident that he had the requisite technical expertise to excel at his new job.
    (Rest of case not shown due to length.)

    1. If you were Hudson, how would you respond to the director
    2. What mistakes did Hudson make?
    3. What are the lessons to be learned from this case?

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

week discussion due 5/19

 

The three major types of malicious activities that organizations and information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.

 

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.
  • Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.

discussion

 

Describe your project and why you chose it. (needs to use the same project subject as in previous work) 

Discussion Parameters

Initial post response: Your posts should be of substance that address the topic. The initial response should be a minimum of 150 words. Use APA format for any quotations or citations you use to support your answer.