HR Blockchain

1. Based on your readings, do worldwide executives believe blockchain has the potential to radically change the future of organizations? You are required to cite this week’s assigned readings in your paper. 

 paper 500 words: Introduction, Question 1, Conclusion, References.

Reference

From the Internet: Use the Link to Access the Article.  Note that when you hit the link for the required reading it will take you a web page and you will need to click on Explore Full Report to see the full reading assignment. This option is located on the bottom left hand part of the screen. Please read the full report.

1. Pawczuk, L., Massey, R., & Holdowsky, J. (2019). Deloitte’s 2019 global Blockchain survey: Blockchain gets down to business. Deloitte Insights. Retrieved September 5, 2019 from https://www2.deloitte.com/us/en/insights/topics/understanding-blockchain-potential/global-blockchain-survey.html?id=us:2ps:3bi:confidence:eng:cons:32019:nonem:na:pgYdRMoB:1141606406:77378219758056:bb:Blockchain:Blockchain_Survey_BMM:nb

Executive practical connection Assignment

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Activity 7- Strategy Applied in PM

  1. Read the Case “Introducing Scrum at P2P – PART A & PART B” at the end of the chapter 16 and response to the following questions:

    Kendra Hua had worked for six years as a software engineer in the IT department at Point 2 Point (P2P), a large freight moving company. She liked her job and the people she worked with. While she did some maintenance work, she worked primarily on projects, usually full time. Her work covered a wide range of projects including system upgrades, inventory control, GPS tracking, billing, and customer databases. These projects were typically able to meet project requirements but were consistently late. Within the IT department it was common practice for a betting pool to emerge regarding completion dates. The rule of thumb was to take the original schedule and multiply it by 1.5 and start guessing from then on.
    (Rest of case not shown due to length.)
    PART A

    1. How well is Scrum working?
    2. What are the issues confronting the Big Foot project?
    3. Assume you are Kendra. What would you want to say at the retrospective? How would you say it?
    4. What improvements or changes need to be made?
    5. PART B
    6. How would you assess P2P’s effort at introducing Scrum
    7. What challenges does an organization face when adopting an Agile approach like Scrum?
    8. What could P2P have done to enhance success?

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

Reflection: Honoring Rev. Dr. MLK Jr.

Celebrating his life and his legacy: 

Read each quote below and complete the reflection activity in no more than 300 words: Word document, double-spaced. 

Dr. King quotations:

  1. “If you can’t fly, run. If you can’t run, walk. If you can’t walk, crawl. But, by all means, keep moving.”
  2. “There comes a time when one must take a position that is neither safe, nor politic, nor popular, but he must take it because conscience tells him it is right.”
  3. “The ultimate measure of a man is not where he stands in moments of comfort and convenience, but where he stands at times of challenge and controversy.”
  4. “I have decided to stick to love. . . . Hate is too great a burden to bear.”
  5. “Let no man pull you so low as to hate him.”

Reflection activity:

Complete a written reflection (no more than 300 words) on your favorite quote above:

  1. Identify which quote you are reflecting on.
  2. Why is it your favorite one, and what does it mean to you?
  3. Does the quote inspire you or remind you of something?

Database Course Discussion

 

Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.

Original Question:   As your study in this course draws to a close, it is important to reflect on new levels of understanding, skills, and knowledge that you developed as a result of your efforts throughout this course. It is particularly important to reflect on the course outcomes (what you were intended to learn in this course). 

Peer Response:  

I learned a lot during this course in regard to databases and how there is a process to optimize them to work the most efficiently.  This started with relational algebra and how it is the theoretical foundation that database management programming languages are built on and how at the base level it is intended to work.  Then transitioning to relational modeling and database design and how this essential builds the blueprint for the database needed based on the business rules of the company it is being built for.  The modeling process helps the designer to figure out how many tables are needed based on the attributes and how they relate to each other.  This leads us to normalizing which is basically scrutinizing and removing the dependencies of the attributes to the primary keys and making as many separate tables as needed to accomplish this.  The normalizing process is the key to eliminating data redundancies, multiple locations for similar data to update, and other anomalies that may occur when running queries on the database. 

The most enjoyable part of this class for me was actually writing “select, from, where” statements, creating tables, and populating the tables with data in SQL Live.  Also, running multiple different queries on the database to understand how you can isolate and pull only the specific data you are looking for.

 

Business intelligence-14hr

Discussion Questions;Chapter6

  1. What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
  2. List and briefly explain different learning paradigms/methods in AI.
  3. What is representation learning, and how does it relate to machine learning and deep learning?
  4. List and briefly describe the most commonly used ANN activation functions.
  5. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Exercise

4. Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

Discussion; Chapter 5

  1. What is an artificial neural network and for what types of problems can it be used?
  2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
  3. What are the most common ANN architectures? For what types of problems can they be used?
  4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
  5. What are SVM? How do they work?

Exercise;

6. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet;

Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

All the answers should be on APA format. Original

Java Programming

This project consists of three tasks. The goal is to explore how to design various class through encap-

sulation, inheritance, composition, and polymorphism, to examine how to create GUI applications

using JavaFX. Glance at What to Submit” when you start working on a task so that you know

what information to provide from each task.

Submission Example

CSCI428-project-XX

CSCI428-project-XX.doc

Task1

Person.java

Date.java

Address.java

ExistingPerson.java

AddressBook.java

Data.txt

Task1XX.java

Task2

task2aXX.java

task2bXX.java

README.txt

What to Submit

1. One doc le CSCI428-project-XX.doc” including the text source code and screenshots of the

outputs of all programs. Please replace XX with your rst name and last name. You can

copy/paste the text source code from Eclipse,IntelliJIDEA, or other IDEs into the doc le.

Hopefully, based on the screen snapshots of the output, you can show that your programs

passed tests and were well.

ET Wk12 -s

Research paper —- 5 full pages 

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

 

Read Course Textbook: Chapter 16

Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699. https://doi.org/10.1007/s10207-017-0382-0

 Requirements:

  • Be approximately 5 full  pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles and are PEER REVIEWED to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.