Business Intelligence

Discussion:  

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples. 

Exercise:

1. Go to microstrategy.com. Find information on the five styles of BI. Prepare a summary table for each style.

2. Find information about IBM Watson’s activities in the healthcare field. Write a report.  (limit to one page of analysis) 

 The above assignments should Include an APA cover page and a reference page. 

final project objective alignment

   attached – 

Because this project is a demonstration of the skills that you have learned throughout your time here at Herzing University, your project should have addressed each of the program outcomes. Describe, in detail, how your completed project meets each of these specific course outcomes. Each objective should be addressed in one or two complete paragraphs. 

1. Apply industry standards to the implementation and support of network systems and computer devices. 

2. Demonstrate the principles of information technology security. 

3. Express relevant information to technical and nontechnical audiences

4. Design secure network infrastructures for physical and virtual environments

5. Create information technology solutions based on business needs or requirements. 

Assignment

 Define and describe business continuity.

Define and describe disaster recovery.

Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both

3 pages APA format 

Security Architecture and Design solution as a diagram or diagrams with annotations

Length: Minimum of 900 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Corporate IT Security Audit Compliance

Que 1: 

In your own words, describe how HIPPA (compliance requirements) can impact the “Remote Access” domain of its infrastructure. How can such requirements be met? 

Que 2: 

 

Review the attached diagram.

What measures can be taken to protect web-server that provides an interface to system/applications?

Networking

1.How many valid host addresses are on the network 172.16.41.0/27? (2 points)

a. 65,534

b.30

c.14

d.254

and so on

please open attached file to see rest of the question

mid

 

You have been asked by management (manufacturing, healthcare, retail,  financial, and etc. ) to create a demo using a data analytic or BI  tool. It is your responsibility to download and produce outputs using  one of the tools. You will need to focus your results on the data set  you select.  

Ensure to address at least one topic covered in Chapters 1-5 with  the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations

R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Into to data mining

 submit your topic and references, in APA format of preliminary  references that you will use when completing your final semester  research paper. 

 

Provide the title of your term paper (note: you may change the  wording in the official title in the final version however, you cannot  change the topic once you select one)

Include an introduction on the topic

A minimum of 3-5 references in proper APA format