Report on cloud computing

 Students will individually review one recent peer-reviewed published paper/article and also thoughtfully discuss the research papers content on the developments and technologies in Cloud Computing. Choose one topic that you are interested in, or discuss with the instructor if you have any questions.The assessment is based on the presentation and report rubrics. 

  • 30 points for report paper assessed
  • 20 points for the slides and presentation

I. Report paper (30 points): The main body of the paper should not exceed 5 pages.

  • Submit a 5-page report (double spaced, font size 10, single column, excluding cover and references) in a single PDF file.
  • Also submit a PDF file of the reference reviewed. 
  • The cover page includes assignment title on the particular reference, author info. For example,
    • Title: Review on (reference title here)
    • Author: student information
  • Introduce the topic/problem and related background knowledge, review the solution/approach/algorithm/example, and discuss your learning, analyses and conclusions.
  • May use additional references while discuss the topic
  • Use appropriate references and citations. Refer to the following links: https://pitt.libguides.com/citationhelp/ieee or https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf
  • This will not only review the reference, but also be a thoughtful discussion of the research paper content pertaining to cloud computing. 
  • Paper and article from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 
  • Avoid review/survey paper/article.

One example of reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.

 This article covers many subjects and expands more. II. Presentation (20 points)

  • The presentation will be scheduled at the class time in October.
  • The presentation content should align with the report.
  • Prepare a 8 minutes presentation, which will be followed by 4 minutes in class Q/A.
  • Make sure to rehearse presentation and prepare well so you can clearly communicate the topic and answer questions.

fault Injection Attack on Deep Neural Network – powerpoint

 You need to go through every detail of the paper and introduce the background, problem solved, methodology, and simulation result. Extract the detailed answers regard to these questions and put them in slides. make notes on the slides to read for recording. around an 8 minute presentation

Essentials Of Software Engineering

 

The design constraints imposed in the sorting system are:

A. programming language and algorithms.

B. security and other systems interaction.

C. platform and schedule.

D. usability and performance. 

Introduction to computer

Answer the following three questions in paragraph format: 75- 150-word count .

  1. What did you learn about excel that you didn’t know before?
  2. Explain what it means to be on the cell compared to being in a cell?
  1. What would you still like to learn about Microsoft Office? 

Cloud Technology

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.   Question: you will prepare your presentation for the Ballot Online executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.  Your presentation will include an executive summary along with the following steps: 

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

ethical hacking

 

You must choose one specific subject area to write your paper.  For example, ‘USB’ is not specific. ‘RFID’ is not specific. 3com USB vulnerabilities IS specific. RFID vulnerabilities in Credit Cards IS specific.

Once you have made your selection, using a minimum of 3 current sources (the textbooks cannot be a source) write a double spaced 3-5 page research APA format paper (a paper, not just a bullet list of response answers).  Note, your cover page, and your reference page, are not included in the 3-5 page requirement. You should have 3-5 pages of written text in addition to your cover page and reference pages. Use in-text citations when paraphrasing and quoting sources to avoid plagiarism. 
GoalIn your paper:1. At minimum, discuss three different vulnerabilities you found in your specific subject area research.2. Discuss how those vulnerabilities can be exploited3. Discuss available countermeasures for each vulnerability you mentioned.Your paper should start with an introduction or problem statement that clearly defines your specific subject and end with a conclusion regarding what your research found.
All sources used must be cited on the last page in a bibliography.  Proper grammar and sentence structure must be used for this formal paper. The cover page for your paper must contain your name, date, course, and instructor. The paper must be double-spaced, left-aligned.  Font should be a 10 or 12 point common font.  Do not misuse white-space as a filler; points will be deducted for not meeting the minimum requirements. Remember – APA format is required! 

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 Exp19_Excel_Ch12_Cap_Bulldog_Collectibles 

 Exp19 Excel Ch12 Cap Bulldog Collectibles 

 Excel Chapter 12 Captsone – Inventory 

  

Project Description:

You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.

     

Start Excel. Download   and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Delete the Inventory   Pick List and Bin Lookup worksheets.

 

Delete the INVENTORY   PICK LIST and BIN LOOKUP icons located respectively in cells E2 and F2. Then   Clear all existing Data Validation in the range A1:K15.

 

Delete the values in   the range B5:J15.

 

Record a macro named Sort, be sure to use   relative references. Ensure the macro sorts the data in the table in   ascending order based on SKU (column A). Stop the Macro Recorder and Save the   workbook as a Macro-Enabled Template.

 

Create a form control   button that spans the cell E2:E3. Assign the Sort macro and edit the button   text to Sort.

 

Use the VBA Editor to   create a new module.
 

  Type the following VBA code to create a custom Inventory Value function then   save and exit the VBA Editor (be sure to leave a blank line between each line   and before End Function):
 

Function InventoryValue (QTY, COST)
 

InventoryValue = QTY * COST
 

 

Click cell J5 and use   the newly created InventoryValue function to calculate the value of the   inventory for each item in column I.

 

Use the VBA Editor to   create a new module named ProtectWorkbook. Type the following VBA   statements to create the sub procedure (leave appropriate line spacing).
 

Sub ProtectWorkbook()
 

‘Protect workbook using the password eXploring
Worksheets(“Inventory List”).Protect   Password:=”eXploring”

 

Insert a new module   named UnprotectWorkbook. Type the following VBA   statements to create the sub procedure and then save and exit the VBA Editor   (leave appropriate line spacing).
 

Sub UnprotectWorkbook()
 

‘Unprotect workbook using the password eXploring
Worksheets(“Inventory List”).Unprotect Password:=”eXploring”

 

Insert a Form Control   Button spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook   macro to the newly created Control Button.

 

Insert a Form Control   Button spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

 

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

 

Insert the comment Count   of items in column C. in cell C3 (include the period).

 

Inspect the document   for private information and hidden properties. Save the file when prompted   then remove Document Properties and Personal Information, and Headers and   Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click Security,   and then click the check box to Remove personal information from this file on   save. Delete any headers or footers in the workbook.

 

Check the document   for accessibility issues. Use the Accessibility Checker pane to change the   cell styles to Normal in order to repair the issue.

 

Check the document   for compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

 

Insert a new   worksheet named Code.

 

Open the VBA Editor,   open Module 1, and copy the code. Paste the code in the Code worksheet   starting in cell A1. 

 

In the VBA Editor,   open Module 2, and copy the code. Paste the code in the Code worksheet   starting in cell A22. 

 

In the VBA Editor,   open the ProtectWorkbook, and copy the code. Paste the code in the Code   worksheet starting in cell A28. 

 

In the VBA Editor,   open the UnprotectWorkbook module, and copy the code. Paste the code in the   Code worksheet starting in cell A35. 

 

Close the VBA Editor   and save the workbook as an xlsx file (not Macro-Enabled).

 

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx.   Exit Excel. Submit the file as directed.

Portfolio Project

This week’s written activity is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper.

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). 

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.