Discussion forum on chapter readings

  Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

Chapter-10: Overcoming Showstoppers: Ten Implementation Challenges

 Chapter 10 introduced ten blockchain implementation obstacles. 

Discussion:

1.choose two obstacles from those discussed in chapter 10, then describe them and how they could disrupt blockchain acceptance. 

2.Also, describe how you would overcome each of these obstacles. 

3.Then think of three questions you’d like to ask other students. The questions should be taken from material you read in Chapter 10 . You’re not trying to test each other, but you are trying to start a discussion. 

Write 500 words paper

200-250 words discussion

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.

Intel Monopoly

After reading the section titled “Dominant Microprocessor Company Intel Adapts to Next Trend” and the article titled “2018-2019 Intel Corporate Responsibility Report: Creating Value through Transparency,” complete a list of reasons how a single firm like Intel comes to dominate some markets. Although this assignment allows you to create a list, you must follow the APA style of writing and include research to support your list and place this information in your reference section.

Why do you think Intel is a Monopoly ?

Apply: Configuring and Deploying a Private Cloud with System Center

 

Assignment Content

  1. The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

    Using the links provided, research at least 2 of the following codes of ethics:

Discussion 5 Cryptography

 

Question: Analyze the structure of advanced encryption standards and why it makes it so strong.  

  -You must use at least one scholarly resource.

  -Every discussion posting must be properly APA formatted.

– No Plagiarism

– 400 Words

-References 

EH week13 DB

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?

350 words needed

https://www.youtube.com/watch?v=H_X6IP1-NDc

https://www.youtube.com/watch?v=D3yrk4TaIQQ

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Enterprise Risk Management

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Big Data Visualization tools

Several Big Data Visualization tools have been evaluated in this week’s paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Explain, define, or analyze the topic in detail

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Review of the Journal

Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet of things: Vulnerabilities, threats,  intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments  pertaining to other approaches to testing their hypothesis (logical  follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

Disuccsion

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service

APA format-250 words