Bad implementation of Database

Describe, in 350 words, an example of a very poorly implemented database that you’ve used or know that illustrates the potential for really messing things up. Explain an analysis of what might have caused the problems and potential solutions for them.

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

Data Science

How do you reconcile the “learning and experimentation” model of development-test-measure with developing relevant for on-time digital personalization?

Research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

Engaging recent (Past 5 years) scholarly research, outline and discuss the top 5 factors driving Information Security Governance today.

short answer

 

  • Differentiate between the Browser Object Model and the Document Object Model (DOM). Recommend three DOM methods that you believe are essential to an effective and efficient website.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Managerial Economics D-1

using the link below write the discussion 350 words

Free Markets Didn’t Create the Great Recession

Read the attached opinion piece where the author indicates that the Great Recession of 2009 was not caused by the Free Market, but was instead caused by US Government policies.   

Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology. 

2) 2 replies each 150 words

linux

1.  For this discussion topic you need to apply the things that you have read and come up areas of enterprise that docker would be most useful for. 

2. As you have learned from your reading Docker is available for many platforms and in many forms.  Your assignment is to research containerization solutions that are competitors to Docker and compare and contrast them.  You should find at least two competitors and investigate their features compare and contrast them and see where each of them have advantages. 

3. For this discussion topic you need to apply the things that you have learned throughout the course.  Consider all of the virtualization topics that have been covered and discuss how you see the role of virtualization moving forward in the enterprise. 

4. For this assignment you are going to research various orchestration options and evaluate them to see which ones you think would add value to a business.   You should as part of this assignment develop a method to objectively evaluate the platforms and the arrive at a conclusion using your method.  Make sure to justify the components of your decision making process while you explain them.  

5. you are expected to do research and post your findings on the pros and cons of cloud computing