What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?
BIG DATA & ANALYTICS
BIG DATA & ANALYTICS – MapReduceGiven the dataset provided:
– Create a MapReduce job to compute the number of times each bike station ran out of bikes. Sort the stations by decreasing number of ran outs.
Note: A bike station is ran out of bikes if:
status == 0 and bikes_available == 0See attached for full description and relevant files.
enterprise content managment
Key Assignment
Part 1: Enterprise Content Management and Data Governance Policies and Procedures Manual ( 25–30 total pages)
In the last few weeks, you have prepared the foundation for the enterprise content management manual by writing the Project Outline and Content Requirements, Implementation Life Cycle, Information Infrastructure Evaluation, Information Infrastructure Improvements, and Data Governance Evaluation sections. The final step in developing the enterprise content management manual is to document the changes that are necessary to improve the governance in the areas of data quality, data management, data policies, business process management, and risk management. In addition, you will prepare an implementation plan for the ECM and data governance policies and procedures you have defined. You will also further refine the document to produce the final version for the project. Updates may be based on peer and instructor feedback.
The following are the project deliverables:
- Update the Enterprise Content Management and Data Governance Policies and Procedures Manual title page with a new date and project name.
- Update the previously completed sections based on instructor feedback.
- Data Governance Improvements
- Data Quality
- Document the changes that are necessary to improve the governance currently in place related to data quality in the organization.
- Data Management
- Document the changes that are necessary to improve the governance currently in place related to data management in the organization.
- Data Policies Management
- Document the changes that are necessary to improve the governance currently in place related to data policies in the organization.
- Business Processes
- Document the changes that are necessary to improve the governance currently in place related to business processes in the organization.
- Risk Management
- Document the changes that are necessary to improve the governance currently in place related to risk management in the organization.
- Data Quality
- Implementation Plan
- Define the team required for the implementation of the ECM and data governance policies and procedures.
- Identify the key tasks required for implementation, including time and resource requirements.
- Assign key tasks to implementation team members.
- Develop a project timeline.
- Establish key implementation milestones.
Complete the Enterprise Content Management and Data Governance Policies and Procedures Manual final version, by doing the following:
- Review the entire document for any changes and improvements you would like to make.
- Ensure that this final version of the document is sufficiently detailed to meet the requirements of the assignment.
- Any previous instructor feedback should be addressed with appropriate changes.
- Be sure to update your table of contents before submission.
- Name the document “yourname_IT621_IP5.docx.”
Worked Example
Please refer to the Worked Example below for an example of this assignment based on the Problem-Based Learning Scenario. The worked example is not intended to be a complete example of the assignment but will illustrate the basic concepts required for completion of the assignment and can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific and should reflect your own approach to the assignment rather than just following the same outline provided in the worked example.
Note that the worked example includes material from previous worked examples. The new material will be found under the Week 5 sections of the Table of Contents.
The worked example is provided here to help with this assignment.
Part 2: Argumentation PowerPoint (5 slide, excluding Title and References slides)
Envision that you now have to present your solution to your client. You need to make a formal presentation to a group of stakeholders, and you need to be prepared to answer their questions. As a final step in the project, you will create a PowerPoint presentation in which you provide the following:
- In the Notes pages of each slide and based on the context of the information on that slide, provide a narrative of 2–3 paragraphs of your rationale for the data governance improvements that you are recommending.
- On each slide, identify the evidence that you have to support the argument(s).
- All sources used to support your argument and solution should be cited both in-text (on slide or in Notes section) and on a References slide in APA format.
- Name the document “yourname_IT621_IP5.pptx.”
Operational Planning and policy Management.
Written Assignment #1 – Apple’s Strategy
Refer to Assurance of Learning Exercise #1 (Apple) in Chapter One of your Thompson (2022) text. Read “Apple Inc: Exemplifying a Successful Strategy” in Illustration Capsule 1.1.
Incorporate our course (Thompson text) work for the week and Develop your analysis by responding to the following questions:
- Does Apple’s strategy seem to set it apart from rivals?
- Does the strategy seem to be keyed to a cost-based advantage, differentiating features, serving the unique needs of a niche, or some combination of these? Explain why?
- What is there about Apple’s strategy that can lead to sustainable competitive advantage?
- Your analysis should be 500 words.
- Incorporate a minimum of at least our course Thompson 2022 Text and one non-course scholarly/peer-reviewed sources in your paper to support your analysis.
- All written assignments must be formatted ini APA, and include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.
Business Intelligence Chatbots, FB, weChat.
1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
5. Research the role of chatbots in helping patients with dementia.
Answer above questions in APA format, plagiarism-free, Times New Roman Font, 12 Font Size, with 6 Latest References, In-Text Citations must for every paragraph, atleast 1250+ words i.e 5+ pages excluding Title, and Reference pages..
Computer system
identify the most appropriate computer systems architecture for a specific type of business (you might need to project out 1-2 years for what the business will ultimately need). Follow these steps to complete your CLA 2 assignment:
- Identify a business.
- What data structures are needed to support this business? (Examples, databases, Web presence/apps, etc.)
- What types of data are recommended for use with each data structure object?
- Which classes contain which data structures, and what methods should you use?
- What data storage approaches would be appropriate?
Cybersecurity
Discuss application security, select four antivirus products, one of which is a free product, and compare their features. Create a table that lists the features. How do they compare with the AV software you currently use? Which would you recommend to others? Why?
Now, analyze how secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make note of any hardware locks, proximity readers, video surveillance, fencing, etc. Then look at the hardware security around the hosts themselves. What are the strengths? What are the weaknesses? What recommendations would you make for improving host security?
Write a one-page paper on the anti-virus comparison, and the analysis of the physical security at your school or workplace.
Research Paper – ITS-631: Operational Excellence
Information Technology and Organizational Learning Assignment:
Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges which are present in the digital era. Will things get better or more complicated as time goes on? Explain. What are some methods to assimilate new generations into the workforce and get them thinking about competitive advantage?
The above submission should be two pages in length and adhere to APA formatting standards.
**Remember the APA cover page and the references do not count towards the page length
**at least two scholarly or practitioner sources
Note: plagiarism check required, APA7 format, include References, within 8hrs
SECURE CLOUD ARCHITECTURE
Pink Sky Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.
Here are the current databases under Pink Sky Datacenter (on-premises).
Databases for customers to reach
Database 1: Movie Soundtracks
Database 2: Videos
Database 3: Pictures
Databases for Employees (workforce members) to reach
Database 4: HR
Database 5: Payroll
Database 6: Heath insurance
Please address the Pink Sky Entertainment Company manager’s expectations and requirements.
Question 1: Pink Sky Entertainment products ( Databases 1, 2, and 3) will be moved to the cloud: How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud? The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.
Question 2: Pink Sky Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and Pictures) by having only one account. Pink Sky Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files. They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?
Question 3: Pink Sky Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?
