Discussion 15

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Dissertation

 Use the Chapter 3 document provided and develop an outline for your Chapter 3. Write the 1st paragraph for this document where you state your objectives and the research questions that will be addressed with the Research Design in Chapter 3 

Discussion Post-good regulatory compliance

 

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

APA references with citiaitons

Phases of an attack (cyber security)

 

If you will remember from Week 8 you have a new CEO. They are non-technical and came to your organization from a completely different market segment. This week you’ve been charged with helping them understand computer attacks. Your text lists four general phases of attacks. Explain these four phases to the CEO, including items in each phase the attacker would consider when performing that phase. Where appropriate include how social engineering can be used. Last, list what security controls can reduce the likelihood of success of each phase of the attack.

4 Phases of an attack :

Reconnaisance and Probing

Gaining Access

Maintaining Access 

Covering Your Tracks.

cloud computing

DDL  11/12

the first is 1-2 pages with pics

the second is 4-6 pages with pics

references more than 15

 Content: Proposed a [new] idea about cloud computing field, and designed experiments for verification 

Homework 55

Instructions are in the attached file Week 5 Lab Assignment 

Attached below . 

Please follow APA and NO PLAGARISM Thanks 

Also attached Power Point Presentations 3 copies , they are Chapters 12, 13 and 15 

8-1 Discussion: Freedom of Speech Online

 After reading about the idea of freedom of online speech, discuss the following: Should internet content be censored? Explain using examples. Should an internet provider be liable for the content that appears online? Why or why not? Use recent, relevant examples from the news to support your position. 

Web application using ReactJS

 

You are a graduating software engineer who is looking to apply to a few software engineering positions at various Fortune 500 companies. You decide to make a personal portfolio website that showcases some of your work so that you stand apart from the other applicants.

Using React, create a web application that has the following:

  1. A home page with a short description of yourself, what you are looking for in a position, and one project that you’ve worked on.
  2. A contact page with a text box and a submit button that shows a success message when the user submits a query.
  3. A navigation bar and footer.

You must use client side routing to handle page navigation.