Need help in homework IOT

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cc-13

 Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework. 

R language Assignment and discussion

 

Assignment:

Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!

Screen shot 1: Arithmetic Operations

assign a value of 144 to x

assign a value of 6 to y

add x and y

subtract y from x

multiply x times y

divide x by y

find the square root of x

Screen shot 2: Operations on vectors

create a vector (afc) and assign values 2,6,3

create a vector (nfc) and assign values 6,4,2

add afc and nfc

Screen shot 3: Recycle Rule for adding and subtracting vectors

assign values 2,1,8,3 to vector x

assign values 9,4 to vector y

add x to y

notice the warning message – use the Recycle Rule for adding vectors; then

add x to y and show results

subtract 1 from x – apply the Recycle Rule for subtracting vectors; then

subtract y from x and show results

Screen shot 4: Create an S3 Class Object

create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.

name the class as “graduate student”

Save the screen shots as a MS Word document (*.docx).

Discussion:

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical

programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences,

explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Requirements: as per question

Paper work

 For the final project, you will be conducting a forensics investigation using one of the following items: 

 

  1. A smartphone
  2. A network (ideally, a wireless network)

 

You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

Week  3 – Prepare a two-page paper (double-spaced) that describes the device  or system you will investigate and the intended tool you plan to use to  conduct your forensics investigation. The interim paper should be in the  form of an Executive Summary. Be sure to provide references in APA  format.

Week 3 Assignment- BI

HOw this course useful in  my job duties 

1)Business intelligence , 

2)Data mining ,

3) Digital forenic , 

4)Operational excellence, 

5)Block chain development, 

6)organizational leader & Decision making

Job duties 

1)Monitoring and managing performance of ESX/ESXi 5.5, 6.0 ,6.5,6.7 servers and virtual machines.

2)VMware horizon view 7 administration desktop pools, user allocation recompose VDI’s and Snapshot Image creation.

3)Decommission and commission Windows 2008R2/ 2012R2/2016 Servers and Windows 7/10 VDI’s in VMware and SCVMM Hyper-V Environmen

4)Monitoring and managing performance of VMware Realize Operation (VRops)/VcenterOrchestratorVmware and SCVMM Hyper-v Environemnt

5)Provides operational support for SCCM environment, storage and servers 

6)Installing Symantec SSL certificates and CA certificates on Windows 2008 R2/2012R2/2016 servers

7)Deploys Windows Servers 2008R2/2012 R2/2016 and Virtual desktops windows 7/windows 10 with SCCM OSD image using PXE boot

8)Build, manage and administration of VMware ESX server infrastructure in Multisite/multi Datacenter environments

9)Various team and end-users to troubleshoot and resolve issues

please  take one job duites and take on  subject and please  right on that topic 

for example   if you choose.   my first  job dutie.  and.  if you choose subjedct  Business intelligence ,  how my first job duties is useful  in this subject brief explanation  

Cloud computing

Discuss the role Sarbanes/Oxley has played with respect to corporate governance.

two page, one scholarly reference.

Discussion 7 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

json and ajax

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words.

research paper

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.