Systems Architecture

 

When we talk about the IoT – the Internet of Things you can think of machine to machine communications where data is collection and communicated. Examples could be wearables, car interfaces with smartphone, home devices such as security systems, manufacturing machine communications, health care, transportation, etc.

Research IoT applications. Complete a 2-3-page paper with an abstract and conclusion in APA format (plus cover sheet and reference page) that discusses:

 Select an application of the technology and discuss the following:

·       The IoT platform

·       Data management and streaming

·       Application considerations with connectivity, gaps, handling interruptions, business, and industry requirements.

·       The IoT infrastructure

·       Security issues and methods for protection (include any security breach events for your application)

·       Any cloud solutions such as data storage, processing, analysis, and remote device management.

Specific questions or items to address:

Select an application of the technology and discuss the following:

·       The IoT platform

·       Data management and streaming

·       Application considerations with connectivity, gaps, handling interruptions, business, and industry requirements.

·       The IoT infrastructure

·       Security issues and methods for protection (include any security breach events for your application)

Any cloud solutions such as data storage, processing, analysis, and remote device management.

Journal Article Assignment

I need a 4to8 pages summary about the article uploaded in which there will be a link in which there will be an article, I will be attaching a screenshot about the requirements. The other pdf file is the article which u need to work on.

Search and Sort

Write a Java application that performs the following task:

  1. Create an int array (you can declare the values yourself, or use the Random feature in java to create this array)
  2. Sort the data.
  3. Prompt user to input an integer from the keyboard
  4. Search for the user input value in the array created in step 1 using a simple linear search.
  5. Display a message whether the user input has been found in the  array, at what position, and how many steps the program required to  search for the data value.
  6. Search for the user input value in the array created in step 1 using another (hopefully more efficient) search algorithm.
  7. Display a message whether the user input has been found in the  array, at what position, and how many steps the program required to  search for the data value.

After you are done with this program, submit the source code along with the screen shot of your program.

Understand and implement different search and sort algorithms.

Advance Database ER

1.Construct an E-R diagram for a hospital with a set of patients and a set of patients and a set of medical doctors. Associate with each patient a log of the various tests and examination conducted

Please use a ER diagram tool for this problem such as MySQL workbench design tool, creatly,LucidChart

3.1 Data Gathering Instrument

 

Data Gathering Instrument

Task: Create one (1) instrument that could be used to gather data for your mock dissertation topic. The instrument should be designed to be exactly how it would be deployed to collect data. Since instrumentation usually goes through several steps of field testing, for purposes of this assignment you can submit a deployment-ready draft of your instrument without field testing it. Be sure the instrument collects data appropriately to measure your research question.  If your study will not use an instrument to collect data because your data is archival and already exists, you will discuss your process for data retrieval.

See the examples linked here:

* Likert Scale Survey: (Attachment:  Teacher Burnout Survey_M – Google Forms.docx)  

 * Interview Protocol:  (Attachment:  Successful_Learning_Interview_Protocol_Final_Draft.docx)

*  Observation Protocol:  (Attachment:  Dissertation Classroom Observation Instrument.docx  )

Discussions

1) We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references and do your usual critical review of at least 2 other students’ posts.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic

2)Your readings in Chapter 9 this week, as well as the handout discussing the risk companies face over unstructured data raises concerns that need to be addressed when a company uses social media. 

With your industry in mind, identify and discuss these concerns and address how this can be effectively handled. Support with references and do your usual critical review of at least 2 other students’ posts.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Part B: Cruisin Fusion Contest

Now that the Cruisin’ Fusion website is up and running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter their first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:

  • Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?

  • Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?

  • Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.

Note: The title page and reference page do not count toward the assignment length requirement.

Final PPT

 

Here are some good tips to follow and some things to avoid when putting together MS Power Point presentations:

https://www.ncsl.org/legislators-staff/legislative-staff/legislative-staff-coordinating-committee/tips-for-making-effective-powerpoint-presentations.aspx

The presentation should:

  • Include AT LEAST 12 slides; a cover slide, an agenda slide, a closing slide, and a references slide as the slide slide in the deck are included in this number.
  • Include speaker’s notes below each slide (think of these as notecards you would look at when presenting your slides – discussing in more detail each of the points you’ve made on the slides
  • Follow the power point rule of 5 to 7 (no more than 5-7 bullet points per slide and no more than 5-7 words per bullet point). This is a guideline but gets to the point that slides should NOT have every word that you’re going to say on them. They should be concise and high level – you will talk about each point in more detail when you present your slide deck.