BIG DATA & ANALYTICS

  

BIG DATA & ANALYTICS – MapReduceGiven the dataset provided:
– Create a MapReduce job to compute the number of times each bike station ran out of bikes. Sort the stations by decreasing number of ran outs.
Note: A bike station is ran out of bikes if:
status == 0 and bikes_available == 0See attached for full description and relevant files.

enterprise content managment

Key Assignment

Part 1: Enterprise Content Management and Data Governance Policies and Procedures Manual ( 25–30 total pages)

In the last few weeks, you have prepared the foundation for the enterprise content management manual by writing the Project Outline and Content Requirements, Implementation Life Cycle, Information Infrastructure Evaluation, Information Infrastructure Improvements, and Data Governance Evaluation sections. The final step in developing the enterprise content management manual is to document the changes that are necessary to improve the governance in the areas of data quality, data management, data policies, business process management, and risk management. In addition, you will prepare an implementation plan for the ECM and data governance policies and procedures you have defined. You will also further refine the document to produce the final version for the project. Updates may be based on peer and instructor feedback.

The following are the project deliverables:

  • Update the Enterprise Content Management and Data Governance Policies and Procedures Manual title page with a new date and project name.
  • Update the previously completed sections based on instructor feedback.
  • Data Governance Improvements
    • Data Quality
      • Document the changes that are necessary to improve the governance currently in place related to data quality in the organization.
    • Data Management
      • Document the changes that are necessary to improve the governance currently in place related to data management in the organization.
    • Data Policies Management
      • Document the changes that are necessary to improve the governance currently in place related to data policies in the organization.
    • Business Processes
      • Document the changes that are necessary to improve the governance currently in place related to business processes in the organization.
    • Risk Management
      • Document the changes that are necessary to improve the governance currently in place related to risk management in the organization.
  • Implementation Plan
    • Define the team required for the implementation of the ECM and data governance policies and procedures.
    • Identify the key tasks required for implementation, including time and resource requirements.
    • Assign key tasks to implementation team members.
    • Develop a project timeline.
    • Establish key implementation milestones.

Complete the Enterprise Content Management and Data Governance Policies and Procedures Manual final version, by doing the following:

  • Review the entire document for any changes and improvements you would like to make.
  • Ensure that this final version of the document is sufficiently detailed to meet the requirements of the assignment.
  • Any previous instructor feedback should be addressed with appropriate changes.
  • Be sure to update your table of contents before submission.
  • Name the document “yourname_IT621_IP5.docx.”

Worked Example

Please refer to the Worked Example below for an example of this assignment based on the Problem-Based Learning Scenario. The worked example is not intended to be a complete example of the assignment but will illustrate the basic concepts required for completion of the assignment and can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific and should reflect your own approach to the assignment rather than just following the same outline provided in the worked example.

Note that the worked example includes material from previous worked examples. The new material will be found under the Week 5 sections of the Table of Contents.

The worked example is provided here to help with this assignment.

Part 2: Argumentation PowerPoint (5 slide, excluding Title and References slides)

Envision that you now have to present your solution to your client. You need to make a formal presentation to a group of stakeholders, and you need to be prepared to answer their questions. As a final step in the project, you will create a PowerPoint presentation in which you provide the following:

  • In the Notes pages of each slide and based on the context of the information on that slide, provide a narrative of 2–3 paragraphs of your rationale for the data governance improvements that you are recommending.
  • On each slide, identify the evidence that you have to support the argument(s).
  • All sources used to support your argument and solution should be cited both in-text (on slide or in Notes section) and on a References slide in APA format.
  • Name the document “yourname_IT621_IP5.pptx.”

Operational Planning and policy Management.

  

Written Assignment #1 – Apple’s Strategy 

Refer to Assurance of Learning Exercise #1 (Apple) in Chapter One of your Thompson (2022) text. Read “Apple Inc: Exemplifying a Successful Strategy” in Illustration Capsule 1.1.

Incorporate our course (Thompson text) work for the week and Develop your analysis by responding to the following questions:

  • Does      Apple’s strategy seem to set it apart from rivals?

  • Does      the strategy seem to be keyed to a cost-based advantage, differentiating      features, serving the unique needs of a niche, or some combination of      these? Explain why?

  • What is      there about Apple’s strategy that can lead to sustainable competitive      advantage?

  • Your      analysis should be 500 words.

  • Incorporate      a minimum of at least our course Thompson 2022 Text and one      non-course scholarly/peer-reviewed sources in your paper to support      your analysis.

  • All      written assignments must be formatted ini APA, and include a coverage      page, introductory and concluding paragraphs, reference page, and proper      in-text citations using APA guidelines.

Business Intelligence Chatbots, FB, weChat.

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia.

Answer above questions in APA format, plagiarism-free, Times New Roman Font, 12 Font Size, with 6 Latest References, In-Text Citations must for every paragraph, atleast 1250+ words i.e 5+ pages excluding Title, and Reference pages..

Computer system

 

identify the most appropriate computer systems architecture for a specific type of business (you might need to project out 1-2 years for what the business will ultimately need). Follow these steps to complete your CLA 2 assignment:

  1. Identify a business.
  2. What data structures are needed to support this business? (Examples, databases, Web presence/apps, etc.)
  3. What types of data are recommended for use with each data structure object? 
  4. Which classes contain which data structures, and what methods should you use?
  5. What data storage approaches would be appropriate?
     

Cybersecurity

 

Discuss application security, select four antivirus products, one of which is a free product, and compare their features. Create a table that lists the features. How do they compare with the AV software you currently use? Which would you recommend to others? Why?

Now, analyze how secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make note of any hardware locks, proximity readers, video surveillance, fencing, etc. Then look at the hardware security around the hosts themselves. What are the strengths? What are the weaknesses? What recommendations would you make for improving host security?

Write a one-page paper on the anti-virus comparison, and the analysis of the physical security at your school or workplace.

Research Paper – ITS-631: Operational Excellence

Information Technology and Organizational Learning Assignment:

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges which are present in the digital era. Will things get better or more complicated as time goes on?  Explain. What are some methods to assimilate new generations into the workforce and get them thinking about competitive advantage?

The above submission should be two pages in length and adhere to APA formatting standards.

**Remember the APA cover page and the references do not count towards the page length

**at least two scholarly or practitioner sources

Note: plagiarism check required, APA7 format, include References, within 8hrs

SECURE CLOUD ARCHITECTURE

Pink Sky  Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.   

Here are the current databases under Pink Sky   Datacenter  (on-premises).

Databases for customers to reach 

Database 1: Movie Soundtracks

Database 2: Videos

Database 3: Pictures

Databases for Employees (workforce members) to reach 

Database 4: HR

Database 5: Payroll

Database 6: Heath insurance 

Please address the Pink Sky   Entertainment Company manager’s expectations and requirements.

Question 1: Pink Sky Entertainment products  ( Databases  1, 2, and 3) will be moved to the cloud:  How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud?  The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.

Question 2: Pink Sky   Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and  Pictures)  by having only one account. Pink Sky   Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files.  They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?

Question 3: Pink Sky  Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky   Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?