Discussion

 After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

Big Data Analytics

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements: 

Be approximately four pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Assignment 6

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 11 and 12.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 11 and 12 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Search to find and possibly test some applications of artificial intelligence and ES. Consider a fictional or real organizational work environment for which you are currently part of or what to be part of and think about a decision-making problem that requires some expertise (but is not too complicated) for this type of work environment. Based on research, experience and or understanding of this work environment, identify the problems that are supported or can potentially be supported by rule-based systems. Some possible example areas could include, and is not limited to, selection of suppliers, selection of a new employee, job assignment, computer selection, market contact method selection, determination of admission into graduate school and or specific ones more suited to the established work environment based on experience and or desire.
  2. How does knowledge management support decision-making? Identify products or systems on the Web that help organizations accomplish knowledge management. Start with brint.com and knowledgemanagement.com. Try one out and report your findings and learning experience.
  3. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

EH week15 p15

Hello,

i need this paper by 12/16 afternoon.

Strictly No plagiarism please use your own words.

300 words

In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Denial of Service attack

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    1000 words 

Python Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

Discussion

 

Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

mad discussion

  

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(9), 195. Retrieved from https://doi.org/10.3390/fi11090195

Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?