Discussion 3- Exe Proj

 Chapter 3. Project Selection and Portfolio Management Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What are the keys to successful project portfolio management? What are some of the key difficulties in successfully implementing portfolio management practices?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

 Text

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pearson

Edition: 5TH 19

Homework

Sub: intro to data mining

 

Week 5 Homework

After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriately for the use case?  Why or why not?

In an APA7 formatted essay answer all questions above.  There should be headings to each of the questions above as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page). 

SE494 week 8

400 words and provide references 

Review the research paper on Methods for Evaluating Mobile Health Apps in this website,

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5748471/

And, answer the following questions

Question 1: What are methods for evaluating health mobile apps?

Question 2 : Download and compare the following two Mobile Health Apps  based on Content .

Spok  Mobile App  vs PatientTouch System Mobile App. Both apps are available for free download

Robotics, AI and Building Apps

1. Assignment 1

Chapter 10

Discussion Question 1: Based on the current state of art of robotics applications, which industries are most likely to embrace robotics? Why?

Discussion Question 2: Watch the following video: https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on the impact of AI on future jobs. What are your takeaways from the video? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs? Write a report.

Exercise 1: Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.

Exercise 7: Conduct research to identify the most recent developments in self-driving cars. Write a report.

Chapter 11

Discussion Question 1: Explain why it is useful to describe group work in terms of the time/space framework.

Discussion Question 2: Describe the kinds of support that groupware can provide to decision makers.

Discussion Question 3: Explain why most groupware is deployed today over the web.

Discussion Question 4: Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

Exercise 4: Compare Simon’s four-phase decision-making model to the steps in using GDSS. Write a report.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

2. Portfolio Assignment

Discuss a current business process in a specific industry (The current business process itself and the industry in which the business process is utilized).

After explaining the current situation, take the current learning from the course and:

1. Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

2. Note the pros and cons of the technology selected.

3. Note various factors the business should consider prior to deploying the new technology

The above submission should be 3 pages in length.  Remember the total length does not include the APA-approved cover page or the references.  There should be at least three APA-approved references to support your work. Please refer to Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

3. Assignment: Building APPS

Using the industry where you currently work or have worked before, write a 3-page proposal recommending your choice between Android or iOS. From a user and developer’s perspective, which would you recommend to your company and why?

Your assignment must follow these formatting requirements:

  • Please provide 3 – 5 peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.

Service Models

Compare and contrast the following service models:  Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Technical product descriptions may be used as references for this submission however they may account for no more than half of the total references.

The requirements for your paper are:

• Describe the service models SaaS, IaaS, Paas, including:

o An example of each

o The pros and cons associated with each model

• Explain the similarities and differences between the three models

• APA formatted including title page, reference page, and in-text citations.

Modify the Week Three Java

  

Modify the Week Three Java™ application using Java™ NetBeans™ IDE to meet these additional and changed business requirements:

The application will now compare the total annual compensation of at least two salespersons.

It will calculate the additional amount of sales that each salesperson must achieve to match or exceed the higher of the two earners.

The application should ask for the name of each salesperson being compared.

The Java™ application should also meet these technical requirements:

The application should have at least one class, in addition to the application’s controlling class.

The source code must demonstrate the use of Array or ArrayList.

There should be proper documentation in the source code.

Define the concept of a shared responsibility model in cloud security.

   

Write 2- to 3-page security design and approach brief in which you:

• Define the concept of a shared responsibility model in cloud security.

• Expound on why the shared responsibility model is unique to the cloud environment.

• List common security threats in the cloud environment that GTR would want to consider.

• List three security services.

• Explain how the security services would help mitigate threats. 

SECURITY POLICY & STANDARTS – 07

Part 1: Research BIA and BCP (0/1 completed)

Note: In this part of the lab, you will review internet resources on BIA and BCP in order to form a basis for their purpose and usage. Understanding the reason behind a business continuity management policy is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

  1. 1. In your browser, navigate to http://www.ready.gov/business/implementation/continuity and read the “Business Continuity Plan” article.
  2. 2. In your browser, navigate to http://www.ready.gov/business-impact-analysis and read the “Business Impact Analysis” article.
  3. 3. Write a brief summary of the information you found in the articles and websites. In your summary, describe what a BCP is and list the steps for developing a BCP.  Also, describe what a BIA is, how you conduct a BIA, and how the BIA is related to the BCP.

Part 2: Create a BCP Policy (0/9 completed)

Note: Conducting a BIA entails describing any mission-critical business functions and processes. The next step is to identify all threats and vulnerabilities. Once you have both of these deliverables, you can compare the findings with the organization’s existing policies. What stands out are the areas in your policies needing improvement.

BIAs are a reoccurring analysis, sometimes done once a year. BIAs are revisited because as a business and/or the market changes, the assets and processes deemed critical change. Moreover, recovery times might grow or tighten.

  1. 1. Review the following sample BIA template:

Business Function or ProcessBusiness Impact FactorIT Systems/Apps Infrastructure ImpactsRTO/RPOInternal and external voice communications with customers in real-time   Internal and external e-mail communications with customers via store and forward messaging   Domain Name System (DNS) server for internal and external Internet Protocol (IP) communications   Internet connectivity for e-mail and store-and-forward customer service   Self-service web site for customer access to information and personal account information   e-Commerce site for online customer purchases or scheduling 24x7x365   Payroll and human resources for employees   Real-time customer service via web site, e-mail, or telephone requires customer relationship management (CRM)   Network management and technical support   Marketing and events   Sales orders or customer/student registration   Remote branch office sales order entry to headquarters   Voice and e-mail communications to remote branches   Accounting and finance support: Accounts payable, Accounts receivable, etc.   

  1. 1. For each business function or process described above, assign a business impact factor of Critical, Major, Minor, or None.
  2. 2. For each business function or process described above, identify the IT systems and applications impacted by the business function (for example, determine what would be affected if the function or process failed).
  3. 3. Review the following metrics of the BCP policy definition:
    • Recovery Time Objective (RTO): Defines how quickly IT systems, servers, applications, and access to data services and processes must be operational following an incident, including recovery of applications and data and end-user access to those applications
    • Recovery Point Objective (RPO): Defines the point in time that marks the end of the period during which data can still be recovered using backups, journals, or transaction logs

Note: To best understand the difference between RTO and RPO, ask yourself these two questions:

  • If the data center blew up, how much time can pass before the business is doomed? That’s the RTO.
  • If the backups are failing, how far back can your backup losses go before business is ruined? That’s the RPO.
  1. 1. Review the following RTO and RPO metrics for the BIA:

CriticalRTO: 8 hoursRPO: 0 hoursMajorRTO: 24 hoursRPO: 8 hoursMinorRTO: 1 weekRPO: 3 daysNoneRTO: 1 monthRPO: 7 days

  1. 1. For each Business Function or Process, use the table above to assign an RTO/RPO according to the corresponding business impact factor.

Note: An important difference between RTO and RPO is the purpose behind each one. The RTO determines the business continuity management plan and how much money the business needs to resume operations. The RPO only affects the backup operations.

  1. 1. Create a business continuity plan policy for the fictional Bankwise Credit Union. In the plan, reference the RTO and RPO standards in the policy’s Standards section:

Bankwise Credit Union

Business Continuity Plan Policy

Policy Statement
Insert policy verbiage here.

Purpose/Objectives
Define the policy’s purpose and objectives. They should mirror the purpose/objectives of a business impact analysis (BIA).

Scope
Define this policy’s scope and whom it covers.

How to Gain Approval for Your Plan

The first step toward implementing your business continuity plan (BCP) lies in gaining executive management’s wholehearted support. You can’t wait to win this approval until after you’ve drawn up and presented your plan to management. You must make clear to management from the beginning the costs associated with any lasting disruptions to business and the pressing need for every business to have a BCP to protect itself.

To win executive management’s endorsement of your BCP, research the costs associated with business disruptions, the costs of implementing a business continuity plan, and the steps for continuity and recovery that are specific to your organization, and then use this data to strengthen the arguments for implementing your plan. Also, ask management what it is looking for. Understand the executives’ short- and long-term concerns and what concrete benefits they are looking for from a BCP. Find out as well how much they are willing and able to invest in such a plan. Remind them that while a BCP requires ongoing upgrades, which will also come with a price tag, to go without such a plan and its upgrades could result in even longer and far costlier business disruptions.

To win executive management support takes proper planning. Too many well-intentioned managers and consultants devote all their time to their plan’s presentation and not enough time consulting with management. Use information from your conversations with management to plan your approach, presentation materials, and time. Remember, you’ll likely get just one try at this.

Standards
Does this policy point to any hardware, software, or configuration standards? In this case, you need to reference the recovery time objectives (RTOs) and recovery point objectives (RPOs) as standards and metrics. List them here and explain the relationship of this policy to these standards.

Procedures
Explain how you intend to implement this policy across the entire organization.

Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.

Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

The C-level executives of the Bankwise Credit Union are confused about the differences between a business continuity policy and business continuity plan and how they work together. It is your job as CISO to create a document to explain these topics.

Use the internet to find further information on the differences between policies and plans in information security in general. Use this information to create a high-level explanation for C-level executives. Provide examples of real business continuity policies and how they could be useful in your organization.