Part 6 – Plan for Business Data and Analytics

 

You are the Vice President of Information Technology at a small, growing business. You have been tasked with developing a plan for maintaining databases for storage of business data and use in business analytics. 

Using the work from Weeks 1-5, create a 20-minute presentation (10-12 slides) to explain your Database Management Plan. Ensure you:  

  • Provide an overview of how databases can be used in a company to store and extract information. 
  • Distinguish how organizational data can be used in the most effective way through developing a database. 
  • Compare how structured and unstructured data are used for data analytics, including concepts like Cloud and Hadoop. 
  • Evaluate and assist company decision makers in understanding the importance of database administration and data governance in relation to building scalable and robust applications. 
  • List the benefits of data administration compared to database administration.  
  • Propose an effective data governance program. 
  • Recommend how individual team roles can contribute to finding ways to build in ongoing monitoring; all roles have an interest in database quality and recovery. 
  • Summarize how your plan will assist the company in overall effectiveness, including the value of analytic results, such as data visualization and finding and applying patterns. 

Your goal is to convince them that by implementing your Database Management Plan, the organization will be able to deliver effective, reliable data management support to meet business needs.

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic.

 

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic. Your final project will consist of a 12 minutes, 12 slide powerpoint presentation that you will present at residency and a 1 page single spaced summary and an annotated reference list as described below all of which will be submitted in Week 15. 

You must also respond to two of your peers’ proposals. Help them make a better, more focused, and more interesting presentation. 

Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source.

HomeWork

Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. (Information Technology and Organizational Learning)

The above submission should be one-page in length and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

Which antivirus you should choose to protect your device and data?

Antivirus Software is a Software that is used to prevent detect and remove the virus from your device and keep protected you important data from anti-malware, viruses, and malware. There are many antivirus software available in the market such as McAfee antivirus, Kaspersky antivirus software, Avast antivirus, Norton Antivirus software, and many more but most of the user’s use only Norton Antivirus Software because this is in the market since 1991. and become a trustable brand. Nowadays 80% of users are using this software because it provides one of the services and it is very easy to use. So as per Expert choice you should go for Norton antivirus to keep secure your data and device from viruses, malware, and trojan. You can download this software online from the official website www.norton.com/setup OR you can buy it also from your local market store but after that, you have to visit at norton.com/setup to install it on your device and you have to enter Norton product key also without the product key it can not be install. https://nortonproductkey.com/

week 6

 In order to prevent common web-based attacks such as cross-site scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injections, organizations need the right tools to detect and prevent these issues before code goes to production. Both Dynamic Application Security Testing (DAST) and Static application security testing (SAST) tools are often integrated into an organization’s CI/CD pipeline to scan for vulnerabilities. For this week’s assignment, discuss the differences between DAST and SAST. Include any pros and cons for each type, how organizations can benefit, examples of what issues can be found, and any specific tools in your response. Your assignment should be 2-3 pages in length, with two or more references in APA Format cited in your response. 

Final project..

 

For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages.There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.

Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 3  pages in length.

The Title and Reference pages do not count towards the page count requirements.

Discussion: The concept of 3-F Method

Data science

Course: Data Science & Big Data Analy

Due Date – 5 hours

Discussion Question: 3-F Method

The concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.

Prof. Guidelines 

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the University Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Books and Resources 

L. Zhao, Y. Huang, Y. Wang and J. Liu, “Analysis on the Demand of Top Talent Introduction in Big Data and Cloud Computing Field in China Based on 3-F Method,” 2017 Portland International Conference on Management of Engineering and Technology (PICMET), Portland, OR, 2017,  pp. 1-3. https://doi.org/10.23919/PICMET.2017.8125463

Saiki, S., Fukuyasu, N., Ichikawa, K., Kanda, T., Nakamura, M., Matsumoto, S., Yoshida, S., & Kusumoto, S. (2018). A Study of Practical Education Program on AI, Big Data, and Cloud Computing through Development of Automatic Ordering System. 2018 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), Big Data, Cloud Computing, Data Science & Engineering (BCD), 2018 IEEE International Conference on, BCD, 31–36. https://doi.org/10.1109/BCD2018.2018.00013

Required Text

“APA Format” 

https://academicwriter.apa.org/6/ 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Emerging Threats -5

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.