Cloud Computing

Topic :Cloud computing infrastructure and cloud security 

In security research, there are three specific areas such as trusted computing, information-centric security, and privacy-preserving models.

Cloud Security protects the data from leakage, theft, disaster, and deletion. With the help of tokenization, VPNs, and firewalls, we can secure our data. Cloud Security is a vast topic and we can use it for more research. The number of organizations using cloud services is increasing. There are some security measures, which will help to implement the cloud security-

Accessibility

Integrity

Confidentiality

Topic: Cloud computing infrastructure and cloud security: 

Abstract:

Background of the problem

Outline of the problem

Research questions minimum three 

Literature review: 4 pages 

Methodology – 1 page

Conclusion

use APA 7th edition only for references

Discussion: Global Technology

Deadline: 5 hours

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

Books/Reference paper

Textbook, Chapter 1 & 2: Olsen, S., & National Academy of Engineering (U.S.). (2011). Global Technology : Changes and Implications: Summary of a Forum. Washington, D.C.: National Academies Press. (Included through library subscription)

Scherz, C., Hahn, J., & Ladikas, M. (2019). Technology Assessment in a Globalized World. Management Systems in Production Engineering, 27(3), 149.

technology assessment in a globalized world – Sciendo

https://content.sciendo.com › 27 › 3 › article-p149

Lynn, L., & Salzman, H. (2007). The Real Global Technology Challenge. Change, 39(4), 8. 

https://rucore.libraries.rutgers.edu/rutgers-lib/45958/PDF/1/play/

APA Format

https://academicwriter.apa.org/6/ 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Pract connection

How Cloud services are helpful in utility sector. 

The document should be of min 400 to 500 words with references(Optional).

Two C program

 In Problems 2, you will be reading input from a file; use the fscanf() function to do so. When reading input from a file, you do not need to verify its validity. You can assume that it has the expected type and the expected value(s). In Problem 1, you will be reading input from stdin; input verification requirements for Problem 2 are described therein. 

In each of the three problems in this lab, you will be required to declare and define certain functions. Doing so is essential: code that compiles and runs correctly, but does not implement all the required functions will not receive full credit. You are also welcome to implement additional functions. While this is not required, it can make your code easier to write. 

And you should not use any functions from the C standard library, except for those functions that are declared in the file , such as printf (or fprintf), scanf (or fscanf), fopen, fclose, etc. In Problem 1, you can also use the functions rand and srand declared in and the function time declared in    

Intro to Data Mining

You will need to ensure to use proper APA citations with any content that is not your own work.

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

Statement of Purpose needed

  

Statement of Purpose

Provide a statement of your educational background, experience, and preparation relevant to a graduate program in computer science, and specify your research and career goals.

The statement of purpose is a short essay introducing the applicant and his or her

interests, goals, and reasons for pursuing graduate study in history. Applicants may wish

to share a draft of their statement with the individuals writing their letters of

recommendation. While every statement, like every prospective student, will be different,

applicants should devote special attention to the following items:

• Academic/Professional Background: Please give your academic credentials, with

degrees, dates, and relevant employment experience. You do not need to list every

job you have had, only those that bear directly on your desire to enter graduate

school.

• Motivations and Aims: Explain what motivates you to do graduate work in history

and what your goals are, both within the graduate program and after the

completion of your degree.

• Existing Expertise and Accomplishments in History: Discuss any areas of

expertise you may already have in your proposed area of interest. If you have

experience doing research, please describe the project and your work on it. If you

have any special talents or skills, such as a foreign language, please describe

them.

• Proposed Course of Study: Please identify planned major field and minor fields of

study.

• Other Relevant Experiences or Personal Qualities: Discuss any experiences or

personal attributes that may illuminate your commitment to the study of history

and to the successful completion of the graduate program.

Format: Your statement of purpose should be limited to no more than 750 words

(between 2 and 3 pages).

IT Proposal-Final Project 8-10 pages. MUST BE A+ WORK.

 

IT Proposal

For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.

As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario. 

Scenario

ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations. 

Include the following information in your IT Proposal.

  • Analyze the current information system in place at ABC Corp and its role in the current challenges identified.  
    • Describe the challenge(s) presented in the scenario and the impact of the challenge(s) to the organization. Include any potential data security issues that could occur as a result of the current information system.
  • Create an information system for implementation at ABC Corp that will solve the identified challenges.
    • Explain how the proposed information system solution will solve the problems.  Support your statements using the textbook and/or other credible sources.
    • Evaluate your proposed system and explain why the proposed solution is the best approach including issues of scalability, streamlining of operations, and cost effectiveness. Support your statements using the textbook and/or other credible sources.
    • Explain how the proposed information system solution will ensure data quality and security. Support your statements using the textbook and/or other credible sources.
  • Distinguish among the hardware components, operating systems, programming languages, programs, and applications your proposed solution will contain. 
    • Create a high-level diagram of the major elements that are required for implementing the solution.
  • Evaluate the systems development life cycle (SDLC) process as it relates to your proposed solution, and describe how you would implement it in the development.
    • Determine the approach you will use for implementing your proposed solution, by revising the SDLC diagram you created in Week Four.  Include the revised diagram in your proposal.

The IT Proposal

  • Must be eight to ten double-spaced pages (2,400 to 3,000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must use at least four credible industry sources, in addition to the course text. 
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style.

    **THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER