main discussion

 

Discuss the differences as well as the advantages and disadvantages of IaaS, SaaS, and PaaS. Otherwise, you may include an implementation of each such as Salesforce or AWS with details on their services. 
You must post at least twice during the week on at least  two different days to get full credit. Your posts should add to the conversation with relevant information. Just agreeing with you classmates or similar responses will not receive any credit. 
I am not looking for long posts. Eight or so sentences for each post of  ORIGNAL writing will suffice. I do not want see paragraph after paragraph of copied material. Your post will be checked by SafAssign for similarity. 
If you use references they  MUST include in text citations where the information is used. If the information is a direct quote from a source it  MUST be in parentheses. Otherwise you are at risk of plagiarism. However, you do not have to use the APA Edition 6 format (template with fonts, heading, etc.) in the discussions.
Ignorance of APA Edition 6 citing and referencing is not acceptable in graduate level work. If you do not use it you may be accused of plagiarism. If you have not done so please familiarize yourself with it now. There are numerous sources under the “Start Here” tab.
Please DO NOT submit your posts as attachments in the discussion area. All writing need to be in the discussion area.

Access Control Discussion

Evaluate a qualitative risk assessment framework versus a quantitative risk assessment framework with specific examples (e.g., FAIR, NIST, etc.).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

Understanding RSA

In this project assignment, you will create a program with any high-level programming

languages as you prefer (e.g. Java/C++/Python/Go …) to implement a simplified

version of RSA cryptosystems. To complete this project, you may follow the steps

listed below (demonstrated in Java code) to guide yourself through the difficulties .

Step I Key-gen: distinguish a prime number (20 pts)

The generation of RSA’s public/private keys depends on finding two large prime

numbers, thus our program should be able to tell if a given number is a prime number

or not. For simplicity, we define both prime numbers p and q within range 0 < p, q <

10,000,000 so that a 64 bits primitive type (e.g. long in Java) should be sufficient

to handle most arithmetics calculations involved.

Therefore, your first step is to implement a method that takes such a number in range

as input and output a boolean type value to indicate whether it’s a prime number:

Cloud SLA

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Computer science

-Explain Normalization and De-Normalization.
-What are the different types of Normalization? -What is BCNF? 
-What is SQL?
-How many SQL statements are used? Define them.

research

 

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios:

THE SUBJECT: Texas Department of Criminal Justice

Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)

Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations

Scenario C: A campaign group looking to influence the debate about the ending of capital punishment

Website reference: Executed Offenders dataset

Assignment Link: http://book.visualisingdata.com/chapter/chapter-3

Technology Entrepreneurship

Que:1 

Discuss the types of decisions related to each element of the marketing program for delivering a value proposition and positioning it correctly in the minds of the target customer.

Que:2 

Discuss this statement: Collins and Hansen (2011) argue that good results in successful businesses are produced through a combination of paranoia, discipline, and creativity.

Collins, M. and Hansen, J. (2011) Great by Choice. New York: Harper Business.

Que:3

Read the attached case study and write 2 and a half-page summary analysis and answer the Case Study Questions.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition

E-Mail Forensics

 Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?