Analyzing data

Where does data analysis begin?

The collection of data is not the onset of data analysis projects. A data analysis project begins with a purpose, problem, and research questions.

Find one scholarly research paper with an excellent example of:

  • Problem statement
  • Research questions

The example shall relate to a practical, real-world work environment in the information technology field. After finding the research, discuss the following:

  • What makes this example excellent in the topics that initiate a data analysis project?
  • What relates this example to a practical, real-world work environment in the information technology field?
  • Do the research questions meet the criteria defined in the lecture in week one?
  • What is the generalizability of this research?

Writing across the Curriculum

 

Please follow the instructions for Writing Across The Curriculum 

1. Pick any topic related to Discrete Structures or Discrete Mathematics (ex: Data Science, Bit Coin (Block Chain), Cryptography, Q-bits (Quantum Computing), Graph & Trees, Analysis of Algorithm Efficiency, Set Theory, (Surface Web vs Deep Web vs Dark Web), Artificial Intelligence, Machine Learning, Deep Learning, etc.

2. Write 2 to 3 pages of report on the selected topic. 

  • First paragraph – Do an introduction about the topic.
  • Second paragraph – What are the problem(s)?
  • Third paragraph – What are the soulution(s)? (ex: application in real world, etc.)
  • Fourth paragraph – Your conclusion about the topic.
  • Fifth – Give citation or references in APA format.

NOTE: Your paper should have double space, free from grammar and spelling mistakes.

Reflection of Information Governance Course in a practical manner to current work environment(theories and knowledge could be applied to an employment opportunity)

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from the Information Governance course. 

Demonstrate a connection to the current work environment. If not employed, demonstrate a connection to your desired work environment. 

should NOT, provide an overview of the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Strategic Plans

Describe how a strategic plan for information technology can differ across organizations. 

Provide a real-world example. 

  1. In your first paragraph describe how a strategic plan for information technology can differ across organizations. Use examples in your description.
  2. In your second paragraph, use the example in the posting and discuss how an information technology strategic plan for a global company may differ than for a national (US) company.
  3. In the third paragraph, provide a real-world example, based upon the examples used in the first post.

Practical Connection

Course: InfoTech Import in Strat Plan

Job Title: Software Developer

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

cc-17

 

Write a brief reflection on this Cloud Computing and on how it will aid your professional career and development.

  • How will this  Cloud Computing impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this  Cloud Computing prepare you for further studies related to your chosen Software career?

project management system

  

The textbook states, “Kanban is not a software methodology or a project management system.” Do you agree with this statement? State reasons for your agreement or disagreement. Conclude by describing Kanban. 

Connect your post to the assigned reading from Week 7. You will not see other's postings until you post your first one, and importantly, you need to reply to at least two of your peer's postings.  This medium is instrumental in gaining an understanding through peer sharing.
·        Prepare your initial post (a minimum of 250 to 300 words) response by Wednesday at 11:59 p.m. ET, and provide a minimum of two peer responses (a minimum of 150 words for each) by Sunday at 11:59 p.m. ET.
·        Be sure your posts make substantive contributions. A substantive post will explain or analyze the topic in detail, ask a thoughtful question about the topic, or share a relevant personal experience or additional resources concerning the discussion topic.
·        Cite current credible references and format your posts according to the APA style (Harici bir siteye bağlantılar.).

Analyzing and Visualizing Data

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work. Checkout Chapter 3 “Formulating Your Brief” from the attachment. 

Answer Needed in APA 7 format with in-text citations and References with 500 + Words.

Question to Answer is:
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

Need Response 2 to below discussion cloud myths

Please read the below discussion post and provide response in 75 to 100 words

Post#1

 

Cloud security plays an important role in every field like business and personal world. With a large number of benefits it has some myths also. Cloud security is solely the cloud provider’s responsibility: a standard misconception is that the cloud provider automatically takes care of all the safety needs of the customer’s data and process while in the cloud. Password policies, release management for software patches, management of user roles, security training of staff, and data management policies are all responsibilities of the purchasers and a minimum of as critical because the security is done by the general public cloud provider. While users are hardening internal security, don’t assume that cloud provider backs up data and will be able to restore it just in case of a security breach. It is instrumental and important that users simply implement a backup solution that backs up data that’s hosted on the cloud to an onsite backup or to a different cloud provider. In addition, in case of a security breach, user will get to restore data from backups. “There is indeed a good case to make for fair taxation and that uneven effective tax rates can distort competition and lead to smaller tax revenues” (Bauer, 2018).

Don’t get to manage the cloud: many people believe that since the cloud infrastructure is usually basically just a managed service, that the safety of the services is additionally managed. Many cloud based systems are left inadvertently unsecured because the customer doesn’t know that they have to try to something to secure them, as they assume that the provider has done what an in-house staff would traditionally have done by default. Cloud security requires an equivalent discipline for security of any data center. Cloud data centers are as resilient as any, but the weakness comes if the policies, processes and tools aren’t regularly monitored by the IT operations staff responsible (Determann, 2016).

Ignore BYOD and be more secure: not supporting and implementing a BYOD policy does not mean an enterprise will be less at risk of a data breach, SVP of cloud and hosting sales. The BYOD movement is here to stay. Some experts recommend deploying a mobile content management (MCM) solution, as protecting the data will be what ultimately defines business’ security and compliance requirements. “Despite the Australian Federal Government’s ‘cloud-first’ strategy and policies, and the Queensland State Government’s ‘digital-first’ strategy, cloud services adoption at local government level has been limited—largely due to data security concerns” (Ali, Shrestha, Chatfield, & Murray, 2020). Cloud data isn’t saved on mobile devices: I still hear people speaking about cloud deployment as if using this service means users are not saving any enterprise data on mobile devices, which this might make device data protection a moot point. Apps that are connecting to devices are always caching data, which cached data is stored on your employees’ mobile devices. This data can be breached and hacked and therefore must be protected.

Single tenant systems are more secured than multi-tenant: Multitenant systems ensure that software updates, including security patches, are applied to all customers simultaneously. With single-tenant systems, software vendors are required to update individual customers’ virtual machines. Cloud security provides an additional level of security to the network and protects data of personal and professional network (Martinez, Cano, & Vilajosana, 2020). Multi-tenant systems are safer than single tenant: there are not any absolutes in cloud security. The complete opposite statement regarding cloud tenancy also can be viewed as a myth. “Blockchain is an eccentric technology, at the same time, the most vaunted, least understood and most disrupting technology of the current era” (Chitranshi, & Chawla, 2020).

Post#2

 

Cloud computing is one of the most innovative development in the field of computer science. Cloud computing although covers variety of services but software as a service, platform as a service and infrastructure as a service are the three most widely used and known. However the list contains many other such as function as a service, backend as a service and container as a service and the designer, developer and related professionals use the service as per need. “While moving towards the concept of on-demand service, resource pooling, shifting everything on the distributive environment, security is the major obstacle for this new dreamed vision of computing capability” (Singh, 2016).

The outside view of the cloud IT infrastructure looks simple and easily understandable but the background of it is very complex and requires efficient knowledge about the cloud to deal with the complex infrastructure. With the advances in technology the demand for serverless function and facility increases. Organizations move from on-site to the cloud and while doing so the security is compromised and not given enough attention which results in a decline in the security of the cloud service. Cloud security tools use various steps like access control, permission control, audit, authorities, etc.

“Cloud computing enables cost-effective and scalable growth of IT services that can enhance government services” (Ali, 2020). Those who are well aware of cloud service and have proper knowledge about the same don’t indulge in any myths but those who lack information make false statements about the cloud which it gets known as the cloud security myths. The major myth is that the cloud is not secure and the reason why people believe in this myth is because of the cases of cloud compromise and attack. After taking appropriate measures and implementation security tools along with the security management from the provider side it can be stated that the cloud is secure. Some people on the other hand believe that the cloud is perfectly secure, which is again a false myth. No security tool or precaution can guarantee perfect security in any case.

Another myth states that on-site organization is more secure than the cloud, however depends upon the security steps taken on-premise and on cloud both. When moving to the cloud, special care needs to be taken to ensure the information is secure from any attack. Cloud service providers are the organizations that indulge in providing the concerned cloud service to those who sign for it. Cloud service providers are many in number and have their headquarters based in different locations thus the statement that all cloud service providers are the same is a false myth. Lack of knowledge about cloud computing and fake statements being made by people has resulted in cloud security myths. “Trust is another security issue in the cloud, the establishment of trust might become a  key establishment of the better relationship among the users and service provider in the cloud computing” (Seemakurti, n.d.).

Implementation

This week, you will continue building the components of your business requirements document for Hollywood Organic Co-op. In the previous weeks, you have identified the types of data, standards, and policies required for a new EDMS. This week, you determine how to electronically move data around in an EDMS and determine the physical and environmental security requirements.

Write a 2- to 3-page evaluation of the implementation of physical and environmental controls for the new EDMS. Include the following:

How to control access to a document at each stage of its life cycle

How to move documents within the organization as team members contribute to document creation, review, approval, publication, and disposition

Physical and environmental security controls that must be implemented to protect the data and systems for Hollywood Organic Co-op’s five locations, including for the identification, authentication, and restriction of users to authorized functions and data.

Format citations according to APA guidelines.