Paper

Discussion Question #1: Discuss the difficulties in measuring the intelligence of machines.

Exercise #4: In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI? View the video and summarize the advice given to the major issue discussed.

Exercise #5: Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at https://www.youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Exercise #15: Explore the AI-related products and services of Nuance Inc. (nuance.com) Explore the Dragon voice recognition product. Write a report. (limit to one page of analysis for exercise 15).

short answer

 

Please respond to the following:

  • A web service is a software component that resides on a web server. Give at least two examples of when to use a web service. Explain why you think using a web service is required in those situations.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. 

Air force missile

For this assignment, you will also need to read the 2 papers that are saved as:

15 sept-lights-out.pdf and 15 sept-HPEM.pdf, which can be found on Canvasor at the links:

https://breakingdefense.com/2012/10/new-air-force-missile-turns-out-lights-with-raytheon-microwave-t/

https://defensesystems.com/articles/2017/10/18/air-force-hpem.aspx

2.Read the 2 articles about Raytheon’s new missile.  What does this missile do?  Explain very clearly.[4 pts]

3.From an Information Systems standpoint, explain the impact of what this means, i.e. if this missile was actually used, what is the impact to any and all information systems –impact to anything else??  Give this deep thought and be VERY complete! [8 pts]

4.Does this concern you? (Think hard about this before you answer!)   How?  STRONGLY Support your answer with specific examples of your concerns or likewise be very supportive of why this does NOT concern you.[8 pts]

5.Next, research SDI (Strategic Defense Initiative) or “Star Wars”, which was a President Reagan term and initiative.  What is this(be very clear)?  Could this help the current (potential use of EMPs) situation?  Explain thoroughly.[8 pts]

6.Lastly, imagine that you have been hired to protect your company against these Raytheon missiles.  What options do you have?  Be very clear and thorough.Think through ALLpossibilities. (feel free to be creative!))[8 pts]

Not to exceed two pages.

innovation

Watch this video about Joseph Shumpeter’s concept of Creative Destruction https://www.youtube.com/watch?v=Ns_92Tdmkhc . For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources.Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. 

Write 500 words in essay format not in bulleted, numbered or other list format. 

Data mining

   Part1) What are the privacy issues with data mining? Do you think they are substantiated? 

   225 Words + 2 References

   Part2) 

   a) Define data mining. Why are there many names and definitions for data mining?

   b) What are the main reasons for the recent popularity of data mining?

   c) Discuss what an organization should consider before making a decision to purchase data mining software.

   d) Distinguish data mining from other analytical tools and techniques.

   e) Discuss the main data mining methods. What are the fundamental differences among them?

   Min 180 words answer for each question in part 2.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.
    4000 words