new tech bus leaders

 

1.What is the difference between a thin client, desktop, and workstation computer?

 

What are types of enterprise storage? Describe each in detail and explain why an organization would choose one over another?

 

Why is virtualization critical to the modern business enterprise?

 

There are three types of system software. What are they? Given an example for each type. 

 

What is the difference between Windows, Mac OS, Linux OS, Chrome OS, Android OS, and Unix OS?

 Why is data cleansing an important part of operational maturity and sustainability in the enterprise? 

 

What is Database as a Service? What are four advantages?

 

Explain Leavitt’s Diamond Model and its relationship with enterprise computing/systems?

 What is the difference between WiFi, Bluetooth, and NFC? 

 

Describe four (4) types of IoT applications and their degrees of sensing/action?

 How do data scientist play a role in managing large data sets and BI data collections? 

 What is self-service analytics? What is it appropriate to use such a technique? 

 What is the difference between B2B, B2C, C2C, and G2C in e-commerce/m-commerce? 

Cloud Incident

Topic:  Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.   

Follow up your discussion with a recent article discussing a company who has begun utilizing a cloud environment and what challenges they may face.  Make sure to cite the article.

Week 04 Research Paper

 

Week 4 Written Assignment

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 4 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

discussion7

1.Examine Alexa’s skill in ordering drinks from Starbucks – they are?

2.Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa.

Discussion 4

 

Preamble

In August of 1997, a Swiss couple, John 52 years old and Buntham 26 years old Graben Stetter, were arrested at the Hilton in Buffalo, New York, and accused of smuggling thousands of computerized pictures of children having sex into the United States. The couple were alleged by authorities to have sold wholesale amounts of child pornography through the internet and carried with them thousands of electronic files of child pornography to the United States from their Swiss home.

Allegations

  1. The couple were unproven to have agreed over the internet to sell child pornography to the United States (US) Customs agents posing as local US porn shop owners.
  2. The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. According to reports, one CD-ROM had over 7,000 images.
  3. The couple were further alleged to have their 2-year-old daughter, traveling with them at the time of the arrest, who is also a victim.
  4. Authorities professed that photographs of the 2-year old daughter are on the CD-ROMs the parent were distributing.

Mitigation

Criminal’s MO is a learned behavior that continue to grow, develop, and advance tirelessly as the perpetrators turn out to be more experienced, sophisticated, and confident in the operation. Digital imaging technology and the internet allegedly help to unearth Swiss couple; John and Bentham’s prevailing MO, with intent of producing, marketing, and distributing child pornography materials to counterparts, and vulnerable innocent citizens of the world community.

          Underground communications, seizure of 250 CD-ROMs and arrest of the Swiss couple was made possible by efficient use of computer and internet technologies. The couple were targeting international buying communities, secured agreement to sell and distribute illicit materials. Furthermore, the illicit items were alleged to have been digitized for transport, ease of storage, and ease of duplication as soon as the couple arrive in the United States. Emergence of computer and internet technologies helped digital forensic investigation in process.

Questions

The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator. Provide all-inclusive description on the importance of computer and the internet technologies.

The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. Provide comprehensive narrative on how to approach the Swiss couple with only allegation; yet, not officially charged.

Assignment

1)  Discussion #1: Explain the relationship among data mining, text mining, and sentiment analysis.

 
2)Discussion #2: In your own words, define text mining, and discuss its most popular applications. 

3)  What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Mainframes

  • How do data transmission errors affect your perception of each? In other words, does the possibility of error influence your decision regarding which would be better?
  • What other factors would affect a company’s choice?

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.

HackerView Vulnerability Assessment

 Prepare answers according to the questions given in this week’s homework document.  The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment”  I have attached a sample assignment as a guide and a pdf that need to be followed. 

I have to submit this assignment on 11/5 2020 at 11:00 pm EST