Cloud Computing and Digital Forensics

Review in 500 words or more the video below called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

History of Cryptography

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page

Java – Process Synchronization

In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data. 

Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5. 

Database Storage

 

In Weeks 1-5, you will be working on gathering information in a Database Management Plan that will culminate in Week 6 in a 20-minute presentation (10-12 slides) to explain how to staff and run the organization’s database administration.  

The presentation will provide recommendations to an organization regarding how to develop a plan for the maintenance of databases that store business data and use in business analytics. 

Create 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:   

  • Assess the best way to organize data into your database.
  • Distinguish how organizational data can be used in the most effective way through developing a database.
  • Describe the relationship model and conceptual design to be used.  

Submit your assignment.

Lamport clock

Note: This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points. Part 1: In a two-phase, total-order multicast system, messages are sent in the following sequence from node S to G1 and G2. G1 and G2 are the members of the group. 1. S sends m1 to G1 2. S sends m1 to G2 3. S sends m2 to G2 4. S sends m2 to G1 Use the basic implementation of the Lamport clock. The clock s at each node start at: S: 4, G1: 6, G2: 1 Show the exchange of messages and their acknowledgments in a clock diagram using the basic implementation of Lamport’s clock. In which order and at what times are m1 and m2 delivered? Part 2. Draw a state diagram of Maekawa’s voting algorithm on the slide “Maekawa’s algorithm” in the “Distributed mutual exclusion” slide set. Note that the state diagram is from the point of view of any one of the nodes, called “this” node below. The state diagram cannot show the states of other nodes. i) Start with the basic case where “this” node wants the lock, gets it, and then releases it, and no other node wants the lock at the same time. In this case, “this” node goes through all the states in this order: Released and not voted Wanted and not voted Wanted and voted Held and voted Released and voted (Back to) Released and not voted Events are: acquire for when “this” node wants the lock release for when “this” node gives up the lock. 8/7/20 3:01 PM 15 request_received, reply_received, and release_received when a message from any node arrives at “this” node. The state diagram is similar the one of Ricart and Agrawala’s state machine (in the Distributed Mutual Exclusion PowerPoint deck) but has more states. *** If you do part i) more or less correctly, you will earn most of the points. *** ii) The complete solution includes the situations where “this” node votes on requests from other nodes. The states are the same as above, but there are additional transitions and actions. Use the “Maekawa scenario” slide in the Distributed Mutual Exclusion slide set, or Fig. D-10 in the Study Guide. Warning: There is an incorrect solution for this problem on the Web. It has extra, incorrect states. Part 3 (100 points): Summarize the course in your own words in an essay of 5-6 pages or so. Feel free to reuse any relevant DB posts as well as Unit 3 IP, but please correct any errors found. Edit it all into one paper that reads nicely from top to bottom and is styled according to APA. Include at a minimum: • How threads and safe objects interact. This can be in general or based on Ada or Java. • Entity-life modeling: the idea of finding event-sequence models of the domain and map them onto thread architectures in the software. Deadlock prevention. • The use of logical clocks for communication and/or for distributed mutual exclusion.  

short answer

 

“Heuristics and Analytics”  Please respond to the following:

  • The ideal method of evaluation products involves volunteers. However, sometimes this is not feasible (i.e., product time constraint, too expensive, etc). This where experts who are knowledgeable about interaction design, needs, and typical behavior of users come into the picture. Choose a random product that you use daily and speculate on how a heuristic evaluation would be performed on that product. Provide a rationale for your response.
  • Social media websites, such as Facebook, Twitter, and e-Commerce giant Amazon, use some form of Web analytics. Speculate on the Web analytic tool that you believe is most commonly used. Justify your response.

Wroting parposal

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. 
Brevity and being concise are important as this analysis is intended to be a brief summation of the research.
Each abstract must therefore consist of the following in this order:
1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
2. Author Qualifications – name and qualification of each author conducting the research
3. Research Concern – one paragraph summary of the reason for the overall research topic

JA2

Students are required to answer the following questions.

  1. What are some of the drawbacks to greed?
  2. How can you combat greed is your own personal / business life?
  3. Is there a way to help others deal with greed?
  4. Ego, greed, or misguided thinking, which is the toughest to combat in your life? In the workplace?
  5. Can you think of other issues that might lead to unethical behavior?
  6. Does culture really care about greed, ego, or misguided thinking? Does it care about ethical behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

Homework

Question is regarding IT Management & Digital Transformation In the Business. On the HW 10 just do part 1 and part 2. Just answer to the question, keep it simple, straight forward.