Need 2 Page document with proper APA formatting and citations, references and No plagiarism

Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Telecomm Network Security, Firewalls and VPNs ) have been applied, or could be applied, in a practical manner to your current work environment (software developer in Financial industry). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

linux virtualization

For this assignment you will research the performance specifications of commonly used disks as well as the impact of configurations such as RAID etc on those performance characteristics.   You will also research the common storage performance needs of server operating systems and applications and see how this compares to the performance characteristics you found for common systems. Be sure to detail how you the information you gathered would impact your decisions on implementing a disk.   Highlight in your response how you think these items can be resolved and what needs to be kept in consideration when designing a virtualized system. Your submission needs to be in one of the following formats .doc, .docx, .pdf or .odf

Research Project: Portfolio Project

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussions 3

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 3 & 4  (Jamsa, 2013).Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Machine Learning Iris

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.

Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.

Personal Essay

The purpose of the Personal Statement is for you to share more about your past experiences and to discuss how these experiences have contributed to your personal and professional growth. It allows the applicant the opportunity to explain to the admission committee the distinct qualities and commitment they can bring to the Columbia Engineering community.

A few topics that you may want to address in your Personal Statement include:

·  Describe the reasons you are interested in this program and discuss any relevant past experience.

·  If you have relevant work or research experience, please indicate how it helped you decide on your career path.

·  What are your post-graduation plans or career goals?

·  What do you hope to gain from this program?

·  What about this program excites you?

·  If there are any special circumstances that need to be brought to the attention of the Admission Committee, please include that information.

Instructions

We recommend that your Personal Statement be 250 – 500 words. If possible, the following format is preferred:

·  All margins should be at least one inch, and the left and right margins should be equal.

·  Text should be double spaced.

·  The preferred fonts are 10-point Arial or 12-point Times New Roman; however, any legible serif or sans-serif standard font may be used. Do not use script or ornamental fonts. 

·  Your name should appear in the Header or Footer of every page.

It is integral to the admissions process that you write and submit this Personal Statement on your own. 

Inputs are attached below

Discussion 13

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 14  (Jamsa, 2013).Chapter 14 topics:

  • Define and describe the mobile web.
  • Describe the different generations of cell phones.
  • Describe how smartphones differ from ordinary cell phones.
  • Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.
  • Describe how web pages differ from apps and how apps differ from widgets.
  • Discuss why developers say that HTML5 will drive mobile solutions.
  • Describe some development best practices for designing solutions for the mobile cloud.

Chapter 15 topics:

  • Define corporate governance.
  • Discuss the events that led up to the need for increased corporate governance.
  • Define business strategy. List five possible business strategies.
  • Discuss the purpose of the Capability Maturity Model.
  • Define auditing.
  • Define internal control and provide an example of control.
  • Discuss the role Sarbanes/Oxley has played with respect to corporate governance.
  • Define IT governance.
  • List factors one should consider with respect to governing the cloud.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Incident Response Cloud

 

Discuss in 500 words or more the best practices for incident response in the cloud.

Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format.