Imoprtance of strategic IT planning 7

Discussion: Virtualization

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Note: Answer should be a minimum of 300 words and APA format

BI Week 13 Assignment

Questions for Discussion

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Exercise Question

1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

12. Research the role of chatbots in helping patients with dementia.

16. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

When submitting work, be sure to include an APA cover page and include  at least two APA formatted references (and APA in-text citations) to  support the work this week.
All work must be original (not copied from any source). 

Questions

 1. 500 words:

Chapter 9 Cluster Analysis

Answer the following questions in a point by point fashion.  NOT an essay. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

  1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not to be desirable?
  2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.
  3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
  4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
  5. Explain the difference between likelihood and probability.
  6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Requirement: 

Provide a question and Answer Paper with six (6) Questions specifically answered one after the other 

You must use properly formatted APA in-text citations and scholarly references. NO Copying and Pasting from the Internet or other past student paper. There is no redo for plagiarism. 

2. 250 Words:

 

Consider the mean of a cluster of objects from a binary transaction data set.

1. What are the minimum and maximum values of the components of the mean?

2. What is the interpretation of components of the cluster mean?

3. Which components most accurately characterize the objects in the cluster?

Please clearly LIST your response out to all THREE (3) questions and ensure to cite the specific article with the binary transaction of data set. I will be examing this for myself and other students should verify this as well. Provide the Author, YYYY  and specific page number, with any content brought into the discussion.

Cloud Computing and Digital Forensics

1.) Discuss  500 words or more discuss why Security as a Service is a good investment.

Use at least four sources.  Use the  Research Databases available from the Danforth Library  as your first choice. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) In 200-300 words Explain how cookies can show that a user has visited a site if that user’s history has been deleted. Use your own words.

Cloud Computing Discussion 11

  

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?