annotated bibliography

Topic:: Cloud migration and data security as key indicator in e-commerce and business success

Identify top 5 journals related that topic and write 150 words about each one.

No plagiarism 

OR_Discussion_2

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

java





/**

* COSC 1436

* EL Centro

* Week 15

* Cell Phone Class

*

* This CLASS does not need to change

*

*/

import java.util.ArrayList;

import java.util.Arrays;



public class CellPhone {

// Attributes

private final ArrayList AVAILABLE_BATTERY_TYPES = new ArrayList<>(

Arrays.asList("NiCd", "NiMH", "Lo-ion", "Li-pol"));

private ArrayList favoritePhoneNumbers = new ArrayList();



private String cellProvider = "AT&T";

private String batteryType = null;

private boolean isFlipPhone = false;

private boolean hasInternational = false;



// Methods

public ArrayList getFavoritePhoneNumbers() {

return favoritePhoneNumbers;

}



public void addAFavoritePhoneNumber(Long phoneNumber) {

this.favoritePhoneNumbers.add(phoneNumber);

}



public void deleteAFavoritePhoneNumber(int phoneNumber) {

this.favoritePhoneNumbers.remove(phoneNumber);

}



public String getCellProvider() {

return cellProvider;

}



public void setCellProvider(String cellProvider) {

this.cellProvider = cellProvider;

}



public String getBatteryType() {

return batteryType;

}



/**

* Validates battery type

* @param batteryType

* @return

*/

public boolean setBatteryType(String batteryType) {

if (AVAILABLE_BATTERY_TYPES.contains(batteryType)) {

this.batteryType = batteryType;

return true;

}

return false;

}



public boolean isFlipPhone() {

return isFlipPhone;

}



public void setFlipPhone(boolean isFlipPhone) {

this.isFlipPhone = isFlipPhone;

}



public boolean isHasInternational() {

return hasInternational;

}



public void setHasInternational(boolean hasInternational) {

this.hasInternational = hasInternational;

}



public ArrayList getAVAILABLE_BATTERY_TYPES() {

return AVAILABLE_BATTERY_TYPES;

}



public boolean isValidBatteryType() {

return batteryType != null;

}



@Override

public String toString() {

StringBuilder builder = new StringBuilder();

builder.append("CellPhone [favoritePhoneNumbers=");

builder.append(favoritePhoneNumbers);

builder.append(", cellProvider=");

builder.append(cellProvider);

builder.append(", batteryType=");

builder.append(batteryType);

builder.append(", isFlipPhone=");

builder.append(isFlipPhone);

builder.append(", hasInternational=");

builder.append(hasInternational);

builder.append(", valid battery type=");

builder.append(isValidBatteryType());

builder.append("]");

return builder.toString();

}



}

Create a new Java Project for this assignment.

       Copy the provided class CellPhone into your default package area.

  1. Create a new class called SmartPhone that extends CellPhone. Add the following attributes:

    1. boolean – hasGPS. 
    2. boolean – hasWIFI. 
    3. String OSVersion.   Default to “Windows 10 Mobile”;
    4. long internalMemoryStorageCapacity – Default to 16_000_000_000L;
    5. Generate the setters and getters and toString() method.
  2. Create a new class called TestPhone that includes a main() method.
  3. Inside the main() method of TestPhone, do the following: 
    1. Create an instance of CellPhone. Set all the following attributes to values of your choosing: (Call all the setters with values) 
      1. cell provider
      2. isFlipPhone
      3. hasInternational
      4. batteryType
      5. Add 2 favorite phone numbers
    2. Display the CellPhone toString results.
    3. Create an instance of SmartPhone. Set the following attributes to values of your choosing: 
      1. hasGPS
      2. hasWIFI
      3. OSVersion 
      4. cell Provider
      5. isFlipPhone
      6. hasInternational
      7. batteryType
      8. Add 1 favorite phone number
    4. Display the SmartPhone toString results.

Deliverables include the SmartPhone.java and TestPhone.java files.

There is no defined constructors in the CellPhone class so the super() method does not need to be addressed.

project 7

write a paper of one and a half EACH question 

  1. Conduct research on the future directions for external storage technologies.
  2. Compile a list of the various flash memory devices available today on the market. Include key features and approximate prices for each type

cryptocurrencies

Prepare a 3 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-page essay, you must include an APA-style title page and reference page.

Data mining real world

 select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.

Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.

• Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.

• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage  Data Mining to overcome their challenges.

• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and  Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.

Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

The body of the paper should be 4 – 5 pages in length.

The Title and Reference pages do not count towards the page count requirements.

Some useful references

https://www.cs.umd.edu/~samir/498/Amazon-Recommendations.pdf
http://cs229.stanford.edu/proj2017/final-reports/5230053.pdf
https://cloud.google.com/blog/products/gcp/how-a-japanese-cucumber-farmer-is-using-deep-learning-and-tensorflow
https://data-flair.training/blogs/data-science-at-netflix/

Plagirisim report must

W3. Discussion

1. Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it

Logical Database Design

 If your boss asked you to create a  database that integrated logical design best practices, what are the  three most important features you would integrate in your end solution?  Remember to not only just state them, but explain why and show examples.  Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

Cyber project

  

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/