Reflection (R1)

Submit a 5 page paper (APA style) detailing the how Blockchain technology can be implemented to reduce ad fraud and cost while meeting consumers’ increasing expectation for excellent customer service?

CSIA 485 Discussion

Division chiefs, program managers, and other senior staff members working in CISO organizations frequently find themselves needing to stay current on technologies while, at the same time, leading and managing segments of the IT security program and assigned staff. Attending conferences is one way that these senior level personnel can learn about new technologies, tactics, techniques, and practices which can be adopted by an enterprise. Over the course of two or three days, a busy manager or executive can attend a large number of briefings while also developing business relationships by networking with others in the field.

Find an IT Security or Cybersecurity conference that will be offered in the next six months and research the types of presentations and workshops which will be offered. Research the costs associated with attendance (conference fees, meals, lodging, travel). The conference venue must be within the continental United States. The conference itself should be one that you are interested in and would attend if the funding were made available.

Write up a travel request which includes a summary of the conference, a justification which explains the benefits of attendance (many conferences will provide a template), and an estimate for the costs that includes the following categories: conference or workshop fees, meals, lodging, travel. Format your travel request as a 1 – 1/2 page business memorandum (no more than 7 paragraphs) addressed to the Padgett-Beale CISO.

Your travel request should include links (URLs) for the conference and venue (including the hotel where you would stay). If meals are included in the conference fee then you should state that and not include those meals in your estimate. Use this GSA website to obtain estimates for meals that are not included in the conference fees: https://www.gsa.gov/travel/plan-book/per-diem-rates

Discussion

 

  • How does network cost of ownership (aka real TCO) differ from total cost of ownership? 
  • Which is the most useful measure of network costs from the point of view of the network manager? Why?

Data visualization

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work.

1. Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

2. Please provide a summary as to whether you agree/disagree with their advantages/disadvantages.

– apa

– 2pages

– no plagiarism

– 2 references

Reference
Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

computer science

 explain the following

1. Build confidence with mock technical interview preparation and whiteboard challenges, get connected with top employers, and navigate your job search from end-to-end with a dedicated career coach. 

 2. Showcase your coding and collaboration skills to potential employers, creating full-stack web applications that leverage modern programming languages, frameworks, and tools. 

Contracting & Service Level Agreements

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Data incident

Pick a data incident in the news; it can be one of the well-known or smaller incidents(Zoom would be great).   Create a plan to show how you would respond and describe some risk-mitigating items that if they were in place may have stopped this incident. (3-4 pages)