Topic:: Cloud migration and data security as key indicator in e-commerce and business success
Identify top 5 journals related that topic and write 150 words about each one.
No plagiarism
Topic:: Cloud migration and data security as key indicator in e-commerce and business success
Identify top 5 journals related that topic and write 150 words about each one.
No plagiarism
Please be sure to answer all of the questions above in the initial post.
/**
* COSC 1436
* EL Centro
* Week 15
* Cell Phone Class
*
* This CLASS does not need to change
*
*/
import java.util.ArrayList;
import java.util.Arrays;
public class CellPhone {
// Attributes
private final ArrayList AVAILABLE_BATTERY_TYPES = new ArrayList<>(
Arrays.asList("NiCd", "NiMH", "Lo-ion", "Li-pol"));
private ArrayList favoritePhoneNumbers = new ArrayList();
private String cellProvider = "AT&T";
private String batteryType = null;
private boolean isFlipPhone = false;
private boolean hasInternational = false;
// Methods
public ArrayList getFavoritePhoneNumbers() {
return favoritePhoneNumbers;
}
public void addAFavoritePhoneNumber(Long phoneNumber) {
this.favoritePhoneNumbers.add(phoneNumber);
}
public void deleteAFavoritePhoneNumber(int phoneNumber) {
this.favoritePhoneNumbers.remove(phoneNumber);
}
public String getCellProvider() {
return cellProvider;
}
public void setCellProvider(String cellProvider) {
this.cellProvider = cellProvider;
}
public String getBatteryType() {
return batteryType;
}
/**
* Validates battery type
* @param batteryType
* @return
*/
public boolean setBatteryType(String batteryType) {
if (AVAILABLE_BATTERY_TYPES.contains(batteryType)) {
this.batteryType = batteryType;
return true;
}
return false;
}
public boolean isFlipPhone() {
return isFlipPhone;
}
public void setFlipPhone(boolean isFlipPhone) {
this.isFlipPhone = isFlipPhone;
}
public boolean isHasInternational() {
return hasInternational;
}
public void setHasInternational(boolean hasInternational) {
this.hasInternational = hasInternational;
}
public ArrayList getAVAILABLE_BATTERY_TYPES() {
return AVAILABLE_BATTERY_TYPES;
}
public boolean isValidBatteryType() {
return batteryType != null;
}
@Override
public String toString() {
StringBuilder builder = new StringBuilder();
builder.append("CellPhone [favoritePhoneNumbers=");
builder.append(favoritePhoneNumbers);
builder.append(", cellProvider=");
builder.append(cellProvider);
builder.append(", batteryType=");
builder.append(batteryType);
builder.append(", isFlipPhone=");
builder.append(isFlipPhone);
builder.append(", hasInternational=");
builder.append(hasInternational);
builder.append(", valid battery type=");
builder.append(isValidBatteryType());
builder.append("]");
return builder.toString();
}
}
Create a new Java Project for this assignment.
Copy the provided class CellPhone into your default package area.
Deliverables include the SmartPhone.java and TestPhone.java files.
There is no defined constructors in the CellPhone class so the super() method does not need to be addressed.
write a paper of one and a half EACH question
Prepare a 3 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.
Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-page essay, you must include an APA-style title page and reference page.
select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage.
Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization.
• Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges.
• Solution: Describe the organization’s Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due.
Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
The body of the paper should be 4 – 5 pages in length.
The Title and Reference pages do not count towards the page count requirements.
Some useful references
https://www.cs.umd.edu/~samir/498/Amazon-Recommendations.pdf
http://cs229.stanford.edu/proj2017/final-reports/5230053.pdf
https://cloud.google.com/blog/products/gcp/how-a-japanese-cucumber-farmer-is-using-deep-learning-and-tensorflow
https://data-flair.training/blogs/data-science-at-netflix/
Plagirisim report must
1. Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it
Topics related to the final project: numpy, pandas, matplotlib.
If your boss asked you to create a database that integrated logical design best practices, what are the three most important features you would integrate in your end solution? Remember to not only just state them, but explain why and show examples. Don’t repeat the same examples of others. That constitutes cheating.
Instructions
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
https://resources.workable.com/email-usage-policy-template
https://www.sans.org/security-resources/policies/general/pdf/email-policy
https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref
https://www.techrepublic.com/article/download-our-wireless-policy-template/