SlideShare a Scribd company logo
1 of 35
Case Study—PART 1—Jurisdictional Declaration
Criteria
Levels of Achievement
Content
(70%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not Present
Total
Economic Development Location
18.5 to 20 points:
Location is clearly delineated, fully meeting assignment
standards.
16.5 to 18 points:
Meets most of the assignment standards.
1 to 16 points:
Location needs further specification before the student may
proceed.
0 points
Not present
Action Research Statement of Work Understood and Signed
13.5 to 15 points:
Template completed.
12.5 to 13 points:
Template partially completed.
1 to 12 points:
Student Modified Template
0 points
Not present
Structure (30%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not present
Total
Formatting, Spelling, and Grammar
13.5 to 15 points:
No spelling or grammar errors
12.5 to 13 points:
1-2 spelling and/or
grammar errors
1 to 12 points:
3-4 spelling and/or
grammar errors
0 points
Not present
Professor Comments:
Total:
/50
Running head: NETWORK DESCRIPTION 1
NETWORK DESCRIPTION 6
NETWORK DESCRIPTION
Institution Affiliation
Student Name
Date
HEALTH-COP COMPANY
Network and Workflow Description
Data mining is a complex process that involves several
activities undertaken sequentially for the entire process to be
successful. As such, there are specific protocols that must be
followed in data mining. The desired goals and objectives are
the guiding principles upon which the type of data to be
analyzed is identified. The main goal for Health-Cop is to
establish links between diet composition and health issues.
More specifically, the company will focus on analysis of data
from various health facilities, websites, databases and health
journals. The analysis is intended to provide new forms of data
that can be interpreted to give meaningful patterns. To facilitate
the process of data mining, there are several aspects that must
be considered such as: statistics, clustering of data, rules of
association, data classification, visualization and the decision
tree.
Network Description
Health Cop company will set up is network system using both
the windows and Linux based operating system. The company
will have 10 desktop computers and 5 portable computers. The
10 desktop computers will be connected together via a metered
Wi-Fi service. The desktops will be the main engine of the
company. All the desktops will be configured with an algorithm
that constantly searches for specific keywords from various
databases. The portables computers will be connected to the
internet via modems. A modem is much safer since it limits the
connectivity to only the device being used. Internet connectivity
via modem is facilitated through local area networks (LAN),
through to the service providers, (Cui, et.al., 2016). Multiple
firewalls are set up within the company networks to sort out
undesired data traffic from the local network on the computer
devices.
The most suitable firewall for the network would be a layer 3
open systems interconnection (OSI) model, which guarantees
maximum security to the local network systems, (Greenberg,
et.al., 2016). This type of models is well designed to suit
communication within several computers in a standard network
system. The network router will generate IP addresses whose
packets will be used to launch communication between the
computers used. All the data mined through configured search
engine will be relayed to the devices whose IP addresses are
saved in the network. Since all computers will be assigns
specific IP addresses, resource sharing and data transfer will be
effectively done via the network systems.
The network architecture will be designed with two firewalls
configured into a two firewall demilitarized zone (DMZ). The
DMZ is located on a neutral level that serves as the linkage and
contact point between Health-Cop network systems and the
internet. This is very crucial for maintaining maximum network
security. This kind of security protocol also ensures that
company networks are not exposed to any threat that may be
launched via internet. Health-cop’s domain name servers will
remain secured and thus the process of translating IP addresses
will be much effective. Interpretation and translation of IP
addresses by the company DNS servers facilitates retrieval of
data from the internet.
The switch devices have been incorporated in the network
architecture since Health-cop networks will be configured on
the Windows server system. Since the system is configured with
layer 3 OSI, enterprise level uses must be used for the process
of packet routing to be successfully executed, (Shatri, et.al.,
2017). This facilitates the transfer of data packets to different
computers in the company system. Switches are much better
compared to hubs in a network because they only relay data
packets to a specific MAC address destination. Windows server
system also requires routers to be installed and configured in
the system to facilitate the application of virtual private
network (VPN) devices.
Figure 1 Network Architecture
The network incorporates a backbone to host the two switches
that have been designed in the network system. The backbone
also facilitates effective communication between multiple
devices operating within the Health-Cop network systems.
Work flow
The first stage of the data mining process will be data
collection. The search algorithms will be configured to detect
certain key words from the databases analyzed. The collected
data will then be stored on the network and into the computer
drives. Once the data is stored on the data, the data will be
subjected to screening and cleansing procedures on the network
systems. Afterwards, the data will be classified according to
different clusters and patterns identified through the analysis,
(Adamuz-Hinojosa, et.al., 2018).
Figure 2Network diagram
The analytics will also involve regression predictions and
outlier identification procedures. Finally, the data will be sorted
and the relevant data sent to the network optimization unit
while the irrelevant data will be directed back to the regression
n analysis. The relevant data will be interpreted in the network
optimization units and used to create patterns that explain the
links between a certain dietary behavior with a specific lifestyle
disease.
In conclusion, the company’s network is designed to source for
voluptuous data from various internet sources, databases and the
cloud, and come up with relevant patterns that would be used to
facilitate data analysis and reporting. The entire process must
follow the outlined protocol for success to be achieved.
References
Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P.,
Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018).
Automated network service scaling in nfv: Concepts,
mechanisms and scaling workflow. IEEE Communications
Magazine, 56(7), 162-169.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets
software-defined networking: SDN for big data and big data for
SDN. IEEE network, 30(1), 58-65.
Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta,
S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039.
Washington, DC: U.S. Patent and Trademark Office.
Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in-
the-loop architecture with MATLAB/Simulink and QuaRC for
rapid prototyping of CMAC neural network controller for ball-
and-beam plant. In 2017 40th International Convention on
Information and Communication Technology, Electronics and
Microelectronics (MIPRO) (pp. 1201-1206). IEEE.
Cloud Computing
Cloud Computing
Institution Affiliation
Student Name
Date:
Health-cop company is a start -up company will offer data
analytics services to various companies. The company helps
heath facilities through proper service delivery to their clients
through support of data analysis. The company aims at
improving its services through the adoption of innovative
technologies. In a review, the company aims at implementing a
cloud platform to act as data heaven that will support for data
storage as well as predictive data analysis. The company intends
to use the software as a service approach in the cloud computing
environment (Tsai, Bai, & Huang, 2014). Fetching of data will
be performed through the support of the internet of things. This
paper will, therefore, seek to identify how the company intends
to use the cloud platform in its operations.
Goals and Objectives
The company aims to be a leading provider of predictive
data analytics services across the united states. In its goal to
become a diverse company in its service providence, the
company aims at earning profits from its wide range of services
it offers. The main aim is to provide organizations with data
handling support. In this view, the company aims at providing
real-time streams of data analytics. The software as a service
platform will enable the company to have accessibility from
many places in the nation (Khoshafian, 2016). In its mandate,
the organization aims to provide the safest and the most
dependable data facilities that the clients can have confidence
in. The company aims at providing scheduled as well as random
reports on the various predictive data analysis dockets it is
tasked with. The company provides for this intending to provide
a robust structure that will enable its client organization to
perform health information analysis that will enable them to
attain a competitive advantage in privately owned hospitals.
Content Security Policy
Considering the fact that Health-cop company intends to
use a cloud platform in data storage and handling as well as
offering support for data analytics, there will be a need to have
a policy that will ensure the security of data. The expected
security is enabled through the website that will be used to
access data from the cloud platform. The content security
policy will help in detection as well as prevention of certain
types of attacks that target cloud platforms (Patil, & Frederik,
2016). A content security policy will be capable of efficiently
handling forms of attacks such as cross-site scripting, browser
hijacking, form jacking as well as ad injecting. The company
plans to have a regularly updated inventory of the first- and
third-party domains, lists of whitelisted domains and a method
of alerting violations of the content security policy. The
company also aims to have a regular update of the policy in
order to ensure that it meets data security standards.
Organizational Structure
Health-cop Company is headed by a chief executive officer
who is in charge of coordinating different departments in the
organization. In his mandate, the chief executive officer is in
charge of fostering a good relationship between the company
and the target client companies. Through his influence, he
makes approval of innovative technology such as the current
impending cloud computing platform. Under the chief
executive officer, lies a business manager and a functional
manager. The business manager ensures that the company is
strategically positioned to perform business (Goetsch, & Davis,
2014). The functional manager coordinates activities that lay
down the structure of the business. He is in charge of
coordinating information technology issues. The three top
bosses are mandated to sit in board meetings that discuss the
reports of the business. There are other supervisors who are I
charge of other smaller departments in the company.
Target Market
The company target all the health facilities across in the state.
The intention of targeting these companies is that they are in a
position to purchase the data storage and analytics plans the
company offers. The company will provide the predictive data
analysis services to companies that are in need to perform
digitized and more efficient market analysis (Liu, 2014). The
idea is to enable these companies to identify market niches as
well as to attain competitive advantages. The company will
target these companies through specialized plans that will
enable favourable conditions that are economically viable.
Market Niche
With the many chronic diseases in the country, health
organizations are increasingly having the need to predict the
prevalence of these diseases. Health-cop services will provide
the much-needed reports to health facilities. These will help
health facilities draw plans on how to curb as well as prevent
diseases.
Budget Estimation
With the infrastructure that comes with the cloud
computing platform, it is will be necessary to have a special
room where architectural equipment will be placed. The cost of
building a physically secure room will be incurred. There will
also be a cost incurred in buying a domain that will be used to
access cloud resources. A server will also be procured in order
to support the large network of organizations that will be linked
to the company’s cloud platform. Installing the technology will
also require an investment in financial resources in acquiring
skilled personnel to install and maintain the cloud platform. In
addition, training of human resource personnel in the company
will incur some cost.
Conclusion
A review of current marketing trends in many
organizations indicates that data handling an analysis are key
components of every organization. Every organization strives to
ensure that they can grasp market requirements that gives them
a niche in the market. For these reasons, Health-cop Company’s
cloud computing project fits the market requirements of data
handling and analysis.
References
Goetsch, D. L., & Davis, S. B. (2014). Quality management for
organizational excellence. Upper Saddle River, NJ: Pearson.
Khoshafian, S. (2016). Service oriented enterprises. Auerbach
Publications.
Liu, Y. (2014). Big data and predictive business analytics. The
Journal of Business Forecasting, 33(4), 40.
Patil, K., & Frederik, B. (2016). A Measurement Study of the
Content Security Policy on Real-World Applications. IJ
Network Security, 18(2), 383-392.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service
(SaaS): perspectives and challenges. Science China Information
Sciences, 57(5), 1-15.
Running head: NETWORK DESCRIPTION 1
NETWORK DESCRIPTION 6
NETWORK DESCRIPTION
Institution Affiliation Iglobal University
Student Name Krishna Chaithanya Arabati
Date 8/13/2019
HEALTH-COP COMPANY
Network and Workflow Description
Data mining is a complex process that involves several
activities undertaken sequentially for the entire process to be
successful. As such, there are specific protocols that must be
followed in data mining. The desired goals and objectives are
the guiding principles upon which the type of data to be
analyzed is identified. The main goal for Health-Cop is to
establish links between diet composition and health issues.
More specifically, the company will focus on analysis of data
from various health facilities, websites, databases and health
journals. The analysis is intended to provide new forms of data
that can be interpreted to give meaningful patterns. To facilitate
the process of data mining, there are several aspects that must
be considered such as: statistics, clustering of data, rules of
association, data classification, visualization and the decision
tree.
Network Description
Health Cop company will set up is network system using both
the windows and Linux based operating system. The company
will have 10 desktop computers and 5 portable computers. The
10 desktop computers will be connected together via a metered
Wi-Fi service. The desktops will be the main engine of the
company. All the desktops will be configured with an algorithm
that constantly searches for specific keywords from various
databases. The portables computers will be connected to the
internet via modems. A modem is much safer since it limits the
connectivity to only the device being used. Internet connectivity
via modem is facilitated through local area networks (LAN),
through to the service providers, (Cui, et.al., 2016). Multiple
firewalls are set up within the company networks to sort out
undesired data traffic from the local network on the computer
devices. Comment by Mark O'Connell: ? Comment by
Mark O'Connell: Think you mean Wifi??
The most suitable firewall for the network would be a layer 3
open systems interconnection (OSI) model, which guarantees
maximum security to the local network systems, (Greenberg,
et.al., 2016). This type of models is well designed to suit
communication within several computers in a standard network
system. The network router will generate IP addresses whose
packets will be used to launch communication between the
computers used. All the data mined through configured search
engine will be relayed to the devices whose IP addresses are
saved in the network. Since all computers will be assignsed
specific IP addresses, resource sharing and data transfer will be
effectively done via the network systems. Comment by
Mark O'Connell: ? routers don’t “generate” IP addresses. Not
sure what you mean.Comment by Mark O'Connell: No. The
Windows OS has the TCP/IP that generates packets Comment by
Mark O'Connell: What devices? What is transferring data to
what? Comment by Mark O'Connell: I’m getting lost here
The network architecture will be designed with two firewalls
configured into a two firewall demilitarized zone (DMZ). The
DMZ is located on a neutral level that serves as the linkage and
contact point between Health-Cop network systems and the
internet. This is very crucial for maintaining maximum network
security. This kind of security protocol also ensures that
company networks are not less exposed vulnerable to any threat
that may be launched via internet. Health-cop’s domain name
servers will remain secured and thus the process of translating
IP addresses will be much effective. Interpretation and
translation of IP addresses by the company DNS servers
facilitates retrieval of data from the internet. Comment by
Mark O'Connell: vulnerable Comment by Mark O'Connell: If
you only have laptops you are probably using regional DNS
servers outside your network from Windows on your PCs
The switch devices have been incorporated in the network
architecture since Health-cop networks will be configured on
the Windows server system. Since the system is configured with
layer 3 OSI, enterprise level uses must be used for the process
of packet routing to be successfully executed, (Shatri, et.al.,
2017). This facilitates the transfer of data packets to different
computers in the company system. Switches are much better
compared to hubs in a network because they only relay data
packets to a specific MAC address destination. Windows server
system also requires routers to be installed and configured in
the system to facilitate the application of virtual private
network (VPN) devices. Comment by Mark O'Connell: ?
Comment by Mark O'Connell: What? Enterprise uses must
be used… Comment by Mark O'Connell: Not sure what you’re
getting at with this Layer 3 OSI issue. Layer 3 devices use
focused IP routing whereas Layer 2 device are in broadcast
mode to all devices on the network. Your network is tiny.
Figure 1 Network Architecture
The network incorporates a backbone to host the two switches
that have been designed in the network system. The backbone
also facilitates effective communication between multiple
devices operating within the Health-Cop network systems.
Work flow
The first stage of the data mining process will be data
collection. The search algorithms will be configured to detect
certain key words from the databases analyzed. The collected
data will then be stored on the network and into the computer
drives. Once the data is stored on the data, the data will be
subjected to screening and cleansing procedures on the network
systems. Afterwards, the data will be classified according to
different clusters and patterns identified through the analysis,
(Adamuz-Hinojosa, et.al., 2018). Comment by Mark
O'Connell: ? I assume when a Keyword is found – some volume
of data gets extracted from the databases being searched
Comment by Mark O'Connell: What? “Once the data is
stored on the data…”
Figure 2Network diagram
The analytics will also involve regression predictions and
outlier identification procedures. Finally, the data will be sorted
and the relevant data sent to the network optimization unit
while the irrelevant data will be directed back to the regression
n analysis. The relevant data will be interpreted in the network
optimization units and used to create patterns that explain the
links between a certain dietary behavior with a specific lifestyle
disease. Comment by Mark O'Connell: Regression analysis in
order to make predictions Comment by Mark O'Connell: What?
Makes no sense Comment by Mark O'Connell: excellent
In conclusion, the company’s network is designed to
source for voluptuous data from various internet sources,
databases and the cloud, and come up with relevant patterns that
would be used to facilitate data analysis and reporting. The
entire process must follow the outlined protocol for success to
be achieved. Comment by Mark O'Connell: WRONG WORD
References
Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P.,
Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018).
Automated network service scaling in nfv: Concepts,
mechanisms and scaling workflow. IEEE Communications
Magazine, 56(7), 162-169.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets
software-defined networking: SDN for big data and big data for
SDN. IEEE network, 30(1), 58-65.
Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta,
S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039.
Washington, DC: U.S. Patent and Trademark Office.
Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in-
the-loop architecture with MATLAB/Simulink and QuaRC for
rapid prototyping of CMAC neural network controller for ball-
and-beam plant. In 2017 40th International Convention on
Information and Communication Technology, Electronics and
Microelectronics (MIPRO) (pp. 1201-1206). IEEE.
CLOUD COMPUTING
CLOUD COMPUTING
Cloud Computing
Institution Affiliation
Student Name Krishna Chaithanya Arabati
Date 07/27/2019
Oxram Llimited is a multinational company that offers
data analytics services to various companies. The company
helps business enterprises to earn competitive advantage
through support of data analysis. Over the years, the company
has always relied on manual frameworks for data analysis.
Collection of data has always relied on manual data collection,
a review of available hardcopy documents as well as making
observations through a human workforce. The company aims at
improving its services through the adoption of innovative
technologies. In a review, the company aims at implementing a
cloud platform to act as data heaven that will support for data
storage as well as analysis. The company intends to use the
software as a service approach in the cloud computing
environment (Tsai, Bai, & Huang, 2014). Fetching of data will
be performed through the support of the internet of things. This
paper will, therefore, seek to identify how the company intends
to use the cloud platform in its operations. Comment by
Mark O'Connell: Wrong. A start-up Comment by Mark
O'Connell: ? Comment by Mark O'Connell: no
Goals and Objectives
The company aims to be a leading provider of data
analytics services across the world. In its goal to become a
diverse company in its service providence, the company aims at
earning profits from its wide range of services it offers. The
main aim is to provide organizations with data handling
support. In this view, the company aims at providing real-time
streams of data analytics. The software as a service platform
will enable the company to have accessibility from many places
in the world (Khoshafian, 2016). In its mandate, the
organization aims to provide the safest and the most dependable
data facilities that the clients can have confidence in. The
company aims at providing scheduled as well as random reports
on the various data analysis dockets it is tasked with. The
company provides for this intending to provide a robust
structure that will enable its client organization to perform
market analysis that will enable them to attain a competitive
advantage. Comment by Mark O'Connell: ? Comment by
Mark O'Connell: What business are you in?
Who is your customer?
What do you sell? Comment by Mark O'Connell: Is that your
business? “Data handling support”? Comment by Mark
O'Connell: So you are a facilities-provider??
Content Security Policy
Considering the fact that Oxram limited intends to use a
cloud platform in data storage and handling, there will be a
need to have a policy that will ensure the security of data. The
expected security is enabled through the website that will be
used to access data from the cloud platform. The content
security policy will help in detection as well as prevention of
certain types of attacks that target cloud platforms (Patil, &
Frederik, 2016). A content security policy will be capable of
efficiently handling forms of attacks such as cross-site
scripting, browser hijacking, form jacking as well as ad
injecting. The company plans to have a regularly updated
inventory of the first- and third-party domains, lists of
whitelisted domains and a method of alerting violations of the
content security policy. The company also aims to have a
regular update of the policy in order to ensure that it meets data
security standards. Comment by Mark O'Connell: I’m
confused.
Your proposal is to use someone’s cloud services, so you can
provide basically data-storage for your customers. Is that right?
Organizational Structure
Oxram Company is headed by a chief executive officer
who is in charge of coordinating different departments in the
organization. In his mandate, the chief executive officer is in
charge of fostering a good relationship between the company
and the target client companies. Through his influence, he
makes approval of innovative technology such as the current
impending cloud computing platform. Under the chief
executive officer, lies a business manager and a functional
manager. The business manager ensures that the company is
strategically positioned to perform business (Goetsch, & Davis,
2014). The functional manager coordinates activities that lay
down the structure of the business. He is in charge of
coordinating information technology issues. The three top
bosses are mandated to sit in board meetings that discuss the
reports of the business. There are other supervisors who are I
charge of other smaller departments in the company.
Target Market
The company target all business-oriented companies across the
globe. The intention of targeting these companies is that they
are in a position to purchase the data storage and analytics plans
the company offers. The company will provide the data analysis
services to companies that are in need to perform digitized and
more efficient market analysis (Liu, 2014). The idea is to enable
these companies to identify market niches as well as to attain
competitive advantages. The company will target these
companies through specialized plans that will enable favourable
conditions that are economically viable. Comment by
Mark O'Connell: No
Pick a niche area
Budget Estimation
With the infrastructure that comes with the cloud
computing platform, it is will be necessary to have a special
room where architectural equipment will be placed. The cost of
building a physically secure room will be incurred. There will
also be a cost incurred in buying a domain that will be used to
access cloud resources. A server will also be procured in order
to support the large network of organizations that will be linked
to the company’s cloud platform. Installing the technology will
also require an investment in financial resources in acquiring
skilled personnel to install and maintain the cloud platform. In
addition, training of human resource personnel in the company
will incur some cost.
Conclusion Comment by Mark O'Connell: You missed the
point of this assignmenrt
A review of current marketing trends in many
organizations indicates that data handling an analysis are key
components of every organization. Every organization strives to
ensure that they can grasp market requirements that gives them
a niche in the market. For these reasons, Oxram Company’s
cloud computing project fits the market requirements of data
handling and analysis.
References
Goetsch, D. L., & Davis, S. B. (2014). Quality management for
organizational excellence. Upper Saddle River, NJ: pearson.
Khoshafian, S. (2016). Service oriented enterprises. Auerbach
Publications.
Liu, Y. (2014). Big data and predictive business analytics. The
Journal of Business Forecasting, 33(4), 40.
Patil, K., & Frederik, B. (2016). A Measurement Study of the
Content Security Policy on Real-World Applications. IJ
Network Security, 18(2), 383-392.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service
(SaaS): perspectives and challenges. Science China Information
Sciences, 57(5), 1-15.
Running head: INFORMATION SECURITY 1
INFORMATION SECURITY 3
Information Security
Name
Institutional Affiliation
Information Security
Introduction
Information security is defined as the means by which data
in computer systems are protected. The protection will ensure
that the confidentiality, integrity, and availability of the data is
maintained. Regardless, the proposal of the organization is that
it is to provide data analytics services to various companies in
the health sector. By taking advantage of emerging technologies
such as cloud computing the company will not only be able to
offer its services at competitive rates but will also be able to
improve overall performance whilst ensuring data security
(Peltier, 2016). Cloud computing, in general, refers to the
delivery of computer resources from applications to data centers
such as those that will be owned by the company. The basis of
this strategy is to have easily available and secured data over
the internet. Moreover, it has also been identified that the cloud
service to be used is Software as a service (SaaS) (Peltier,
2016). It is the use of an application that is run by a distant
computer on the cloud via a browser or internet-based
application. By understanding this basis of operations, it will
better demonstrate how information security will be attained.
Reasoning
The SaaS approach was selected for numerous reasons
among them, its high flexibility and attractive nature to the
clients. Additionally, by simplifying its installation and overall
utilization, it eliminates security vulnerabilities. With security
as its core value, the SaaS approach to cloud computing offered
eliminates control over the hardware by the client (McCoy &
Perlis, 2018). This approach is necessary for numerous reasons
among them is the fact that having the hardware within the
organization it will make it vulnerable to outside attacks, human
error, and malicious employee activities all of which can result
in data loss. This realization was after a study conducted by
Accense, an analytical company, during the period of 2009 and
2014, the number of cyberattacks increased drastically (McCoy
& Perlis, 2018). According to their figures, the numbers rose
from a total of just over 3 million attacks per year to over 42
million attacks. For example, in 2017, the total number of data
breaches cost companies an approximate of $3.6 million
(McCoy & Perlis, 2018). With the figure expected to be
significantly higher in 2019, the best approach to limiting
cyberattacks and overall data breaches is by employing SaaS
cloud services.
SaaS and Information Security
The strategy of using SaaS is advantageous because it allows
numerous features to be included. This allows for the automated
implementation of security measures while data is being stored
or extracted from the database. Among the features present are
transit protection between the client and the service. This
security measure is critical as some forms of cyber-attack target
data while they are in transit to the storage areas over the
internet (Rittinghouse & Ransome, 2017). By using complex
encryption algorithms, the data if intercepted during
transmission will be useless to the hacker without the
decryption key. Secondly, all user accounts will have mandatory
authentication processes that will further secure the accounts of
the application users. This will limit unauthorized access to the
application; this strategy will be needed for any data to be
transferred, added, destroyed or manipulated (Rittinghouse &
Ransome, 2017). The healthcare sector in 2017 was the most
affected industry with relation to cyberattacks, by automating
their security measures, future attacks can be limited.
The SaaS approach also allows for auditing or logging of
activities, the objective of this security approach is to maintain
accountability. By reviewing the activities of the users,
malicious employees can be easily identified and the necessary
disciplinary action implemented (Rittinghouse & Ransome,
2017). Finally, the SaaS platform will allow for the utilization
of already available cloud computing security protocols further
ensuring the safety of the data uploaded as well as the
information stored. An example of the security measure in
place include protection against DDoS and access regulation to
prevent unexpected interceptions.
Data Valuing
When valuing the company and its data, the main area of focus
was the market niche it was targeting. Technology is evolving at
a rapid rate and this is especially recognizable in the healthcare
industry. The majority of modern healthcare institutions have
migrated from the legacy system and embraced electronic health
records (Chang, Kuo, & Ramachandran, 2016). It is the digital
format of medical records mandated by the HITECH (Health
Information Technology for Economic and Clinical Health) Act.
This act is then enforced by the ARRA (American Recovery and
Reinvestment Act) of 2009 (Chang, Kuo, & Ramachandran,
2016). Nevertheless, the value collected and stored will have to
undergo processes that will not only allow it to be verified but
also screened to be classified in different clusters. The process
allows for network optimization to be achieved thereby allowing
for faster processing and storing of data collected from the
client’s end. Moreover, the patterns used by the client’s in
accessing as well as transmitting data are analyzed for better
operations of the service (Chang, Kuo, & Ramachandran, 2016).
Conclusion
Big data is the future for all industries as it offers the needed
insight and understanding of operations thereby allowing for
cloud computing services to progress their services. This is
demonstrated by the approach that is adopted by Health Cop.
The company will be sampling data with the main objective of
improving the network and overall system.
References
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud
computing adoption framework: A security framework for
business clouds. Future Generation Computer Systems, 57, 24-
41.
McCoy, T. H., & Perlis, R. H. (2018). Temporal trends and
characteristics of reportable health data breaches, 2010-2017.
Jama, 320(12), 1282-1284.
Peltier, T. R. (2016). Information Security Policies, Procedures,
and Standards: guidelines for effective information security
management. Auerbach Publications.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing:
implementation, management, and security. CRC press.
Running head: BIG DATA APPROACH
6
BIG DATA APPROACH
Big Data Approach
Student's name Krishna Chaithanya Arabati
Professor's name Mark O conell
Institution IGLOBAL UNIVERSITY
Course Title MSIT 681 Capstone
Date:08/03/2019
As a result of the enormous amount of data required for
analysis, big data approach has become a necessity for health-
oriented organizations. This approach enables the companies to
perform analysis in a systematic way from data repositories.
The structure of storing data in a dataset is also an important
aspect. The approach offers better statistical power through the
tools it provides to organizations (Chen, Mao, & Liu, 2014).
The approach seeks to solve challenges about handling large
amounts of data. The challenges range from data analysis,
storage, capture, visualization as well as information privacy.
This paper will, therefore, seek to discuss the big data approach,
the origin of big data, methods of storing the data as well as the
format of the database that will be used.
Use of semi-custom applications.
Use of semi-custom applications will form a basis for the
handling big data. This technique will employ machine learning
and artificial intelligence. Use of artificial intelligence and
machine learning will significantly add value to the
organization by providing platforms for handling big data in an
efficient manner (Li, Li, Wang, Zhu, & Li, 2019). This
technique will help in shaping the data analytics mindset at the
Health-cop company. Customized applications will help the
company convert model-based recommendations of treatment
into actual insights that can be used in treatment of diabetes.
Comment by Mark O'Connell: So you’re going to write
these applications then ….right??
The rationale for using semi-customized applications
According to the prevailing circumstances at Health-cop
company, a semi-customized application would suit the
organization in a better way. Semi customized applications take
relatively short development time. Therefore, it takes a very
short time to deploy these applications. When a semi-
customized application is well constructed, they it offersoffer
stability by offering great reliability levels as well as more
resilience (Eapen, & Peterson, 2015). Semi-custom applications
are more flexible offering great service through an extended
lifetime, adaptability as well as their scalability. Lastly, semi-
customized applications offer better quality. Their package
components have robust performance levels. Moreover, they
offer high-quality standards due to their applicability in many
environments.
Source of Big Data
According to statistics by the world health organization,
the prevalence of diabetes disease is about 9% in the Uunites
sStates of America. Considering these statistics, this number of
people is large. Going further to consider the daily data required
to be fetched each day in monitoring this disease in each
patient, the data collected each day is enormous. The cloud
platform will offer daily data collection from patients through
the use of artificial intelligence in collaboration of sensor-based
networks (Aazam, et al, 2014). The internet of things will
provide support for the collection of data through miniaturized
sensors. These miniaturized sensors will then be controlled
through artificial intelligence. Since the cloud platform uses the
software as a service technique. Each patient in the Health-cop
database will have their portals that they can access services
from any environment. Machine learning techniques will help in
identifying patients that require urgent help. Considering all
these actions that are performed on the cloud platform, big data
will be generated as a result. Comment by Mark O'Connell:
Wow. Looking forward to that explanation! Comment by
Mark O'Connell: This is not a complete sentence.
Storage of Data
From the proposed architectures of data storage done
before, data storage will be handled through cloud storage
facilities. The company aims to implement a cloud data
repository. The cloud platform will provide one to many
replications. One to many replications will provide data
reliability as a failure of one storage node will not affect the
operations in the company. It will also help in consolidating
data from all remote locations, therefore, enabling an analysis
of data at a central point (Jiang, et al, 2014). Storage will
depend on high-speed transmissions of data from the patient's
local location to the cloud storage. This will enable continuous
synchronization of data in the database and therefore enabling
data in the database to be up to date. This will enhance its
reliability and therefore giving a clear reflection of analytics.
Storage in the database will also be supported by high-speed
data acceleration. Cloud storage will enable the semi-
customized data-intensive health support application to collect
data from the sensor sources and pass it over to the cloud
(Sookhak, 2015). Data obtained will be stored by using data
segmentation methods. Several segments that will range
according to the type of diabetes disease on is suffering from
will be enhanced. This will enable easier querying and
analyzing data from the database. Comment by Mark
O'Connell: Hadoop?? Comment by Mark O'Connell: Hmmm
ok…how do you get your hands on this data?
Database Formats
Modern technologies have come up with formats that enable
easier storage of biodata. Among the formats, is the Next
Generation Sequencing. Health cop company intends to use this
database format due to its suitability to storing biodata
(Banerjee, & Sheth, 2017). Additionally, the database format is
of an advantage as it will help in providing useful data mining
techniques as well as machine learning techniques that will help
in inputting data into specific data types and formats. The main
agenda towards choosing this format is to enable Health-cop
company store and analyze the data more efficiently
Conclusion
Considering the factors in play at the Health-cop company,
semi-custom applications will help the company achieve its
objectives in handling big data. The Next-generation sequencing
database format will enable the company to store biodata more
efficiently.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014,
January). Cloud of Things: Integrating the Internet of Things
and cloud computing and the issues involved. In Proceedings of
2014 11th International Bhurban Conference on Applied
Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-
18th January 2014 (pp. 414-419). IEEE.
Banerjee, T., & Sheth, A. (2017). Iot quality control for data
and application needs. IEEE Intelligent Systems, 32(2), 68-73.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey.
Mobile networks and applications, 19(2), 171-209.
Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health
applications facilitate meaningful behaviour change?: time for
answers. Jama, 314(12), 1236-1237.
Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014).
An IoT-oriented data storage framework in the cloud computing
platform. IEEE Transactions on Industrial Informatics, 10(2),
1443-1451.
Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019).
Semicustomized Design Framework of Container
Accommodation for Migrant Construction Workers. Journal of
Construction Engineering and Management, 145(4), 04019014.
Sookhak, M. (2015). Dynamic remote data auditing for securing
big data storage in cloud computing (Doctoral dissertation,
University of Malaya).
Running head: BIG DATA APPROACH
6
BIG DATA APPROACH
Big Data Approach
Student's name
Professor's name
Institution
Course Title
Date:
As a result of the enormous amount of data required for
analysis, big data approach has become a necessity for health-
oriented organizations. This approach enables the companies to
perform analysis in a systematic way from data repositories.
The structure of storing data in a dataset is also an important
aspect. The approach offers better statistical power through the
tools it provides to organizations (Chen, Mao, & Liu, 2014).
The approach seeks to solve challenges about handling large
amounts of data. The challenges range from data analysis,
storage, capture, visualization as well as information privacy.
This paper will, therefore, seek to discuss the big data approach,
the origin of big data, methods of storing the data as well as the
format of the database that will be used.
Use of semi-custom applications.
Use of semi-custom applications will form a basis for the
handling big data. This technique will employ machine learning
and artificial intelligence. Use of artificial and machine
learning will significantly add value to the organization by
providing platforms for handling big data in an efficient manner
(Li, Li, Wang, Zhu, & Li, 2019). This technique will help in
shaping the data analytics mindset at the Health-cop company.
Customized applications will help the company convert model-
based recommendations of treatment into actual insights that
can be used in treatment of diabetes.
The rationale for using semi-customized applications
According to the prevailing circumstances at Health-cop
company, a semi-customized application would suit the
organization in a better way. Semi customized applications take
relatively short development time. Therefore, it takes a very
short time to deploy these applications. When a semi-
customized application is well constructed, they offer stability
by offering great reliability levels as well as more resilience
(Eapen, & Peterson, 2015). Semi-custom applications are more
flexible offering great service through an extended lifetime,
adaptability as well as their scalability. Lastly, semi-customized
applications offer better quality. Their package components
have robust performance levels. Moreover, they offer high-
quality standards due to their applicability in many
environments.
Source of Big Data
According to statistics by the world health organization,
the prevalence of diabetes disease is about 9% in the unites
states of America. Considering these statistics, this number of
people is large. Going further to consider the daily data required
to be fetched each day in monitoring disease in each patient, the
data collected each day is enormous. The cloud platform will
offer daily data collection from patients through the use of
artificial intelligence in collaboration of sensor-based networks
(Aazam, et al, 2014). The internet of things will provide support
for the collection of data through miniaturized sensors. These
miniaturized sensors will then be controlled through artificial
intelligence. Since the cloud platform uses the software as a
service technique. Each patient in the Health-cop database will
have their portals that they can access services from any
environment. Machine learning techniques will help in
identifying patients that require urgent help. Considering all
these actions that are performed on the cloud platform, big data
will be generated as a result.
Storage of Data
From the proposed architectures of data storage done
before, data storage will be handled through cloud storage
facilities. The company aims to implement a cloud data
repository. The cloud platform will provide one to many
replications. One to many replications will provide data
reliability as a failure of one storage node will not affect the
operations in the company. It will also help in consolidating
data from all remote locations, therefore, enabling an analysis
of data at a central point (Jiang, et al, 2014). Storage will
depend on high-speed transmissions of data from the patient's
local location to the cloud storage. This will enable continuous
synchronization of data in the database and therefore enabling
data in the database to be up to date. This will enhance its
reliability and therefore giving a clear reflection of analytics.
Storage in the database will also be supported by high-speed
data acceleration. Cloud storage will enable the semi-
customized data-intensive health support application to collect
data from the sensor sources and pass it over to the cloud
(Sookhak, 2015). Data obtained will be stored by using data
segmentation methods. Several segments that will range
according to the type of diabetes disease on is suffering from
will be enhanced. This will enable easier querying and
analyzing data from the database.
Database Formats
Modern technologies have come up with formats that enable
easier storage of biodata. Among the formats, is the Next
Generation Sequencing. Health cop company intends to use this
database format due to its suitability to storing biodata
(Banerjee, & Sheth, 2017). Additionally, the database format is
of an advantage as it will help in providing useful data mining
techniques as well as machine learning techniques that will help
in inputting data into specific data types and formats. The main
agenda towards choosing this format is to enable Health-cop
company store and analyze the data more efficiently
Conclusion
Considering the factors in play at the Health-cop company,
semi-custom applications will help the company achieve its
objectives in handling big data. The Next-generation sequencing
database format will enable the company to store biodata more
efficiently.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014,
January). Cloud of Things: Integrating the Internet of Things
and cloud computing and the issues involved. In Proceedings of
2014 11th International Bhurban Conference on Applied
Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-
18th January 2014 (pp. 414-419). IEEE.
Banerjee, T., & Sheth, A. (2017). Iot quality control for data
and application needs. IEEE Intelligent Systems, 32(2), 68-73.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey.
Mobile networks and applications, 19(2), 171-209.
Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health
applications facilitate meaningful behaviour change?: time for
answers. Jama, 314(12), 1236-1237.
Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014).
An IoT-oriented data storage framework in the cloud computing
platform. IEEE Transactions on Industrial Informatics, 10(2),
1443-1451.
Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019).
Semicustomized Design Framework of Container
Accommodation for Migrant Construction Workers. Journal of
Construction Engineering and Management, 145(4), 04019014.
Sookhak, M. (2015). Dynamic remote data auditing for securing
big data storage in cloud computing (Doctoral dissertation,
University of Malaya).
Running head: PROJECT PROPOSAL 1
PROJECT PROPOSAL 4
PROJECT PROPOSAL
Institution Affiliation
Student Name
Data
Start-up Proposal: HEALTH-COP COMPANY
Predicting When and Where Lifestyle & Dietetic Related Health
Issues Are Most Likely to Occur.
Introduction
Health-cop company is a data mining company that predicts
health trends and possible illnesses that could be witnessed in
the near future. The company will mainly focus on data mining
and analytics to establish links between diet composition and
health issues in society, (Larose, 2015). The data to be used in
the predictive analytics will mainly be obtained from hospital
databases, nutrition and dietetics websites, health journals as
well as information shared through social media platforms.
Health-cop company intends to predict such issues before they
can become tough to manage.
Goals & Objectives
The main goal is to become a leader in health predictive
analytics in the health sector, improve the level of preparedness
for various health issues, and earn a profit from running the
business. Health-cop’s main objective is to identify certain
lifestyle and dietetic related illnesses that are most likely to be
experienced within a certain region in the near future. The
company will analyze purchases from food stores and groceries
and also analyze the various meals ordered for from various
food joints. The company also aims at providing consolidated
reports on diet composition of various people from various
regions based on data obtained from websites and social media
platforms.
Organizational Structure
The company will be headed by a chief executive officer who
will be in charge of overseeing all operations. A seven-member
board of directors will be selected among data analytics
professionals to undertake the duties of policy formulation and
implementation. Health-cop will have a data mining division,
analytics division, IT department, as well as a human resource
and customer relations departments; each headed by a
departmental manager. An independent division to deal with
business modeling and statistical database creation will receive
data from the analytics division. This division will create
various projections that will be used to make predictions about
specific illnesses.
Target Market
The company targets to sell its information to health
departments at various levels of governments. The company will
also provide its analysis to various hospitals for an agreed fee.
Health-cop will also sell its findings to private health care
institutions especially nutritionists and pharmaceutical
organizations. The existing competitors in the market offer
predictive analytics for chronic diseases unrelated to dietetics,
(Sepah, et.al., 2015). Health-cop will majorly focus on lifestyle
and dietetics related illnesses that are easily preventable thus
the company will be unique in the market. The major illnesses
that the company will analyze and report on are diabetics,
obesity, and osteoporosis.
Budgetary Estimation
The start-up will require planning and preparation finances to
facilitate sufficient research before launching the company.
Costs will also be incurred to secure strategically positioned
premises for the company. Acquisition of digital equipment
such as computers and network cables as well as the installation
of internet services will require sufficient funding, (Shah, et.al.,
2018). Other operational expenses that are expected include
salaries and wages for the company’s staff and marketing of the
company and its services in the market.
Conclusion
In recent years, lifestyle-related illnesses have become an issue
for many people in the world, (Peirson, et.al., 2015). The main
factors that contribute to the increased incidence of such
illnesses are changes in lifestyle and dietary behavior. The
reported cases of diabetes, obesity, and osteoporosis have
significantly shot up in recent times. This can all be attributed
to the changes in diet behavior. A preventive analytical
algorithm would be most suitable to manage these illnesses. A
computer algorithm programmed to analyze what is being
consumed in various regions and link the food substance to a
certain lifestyle-related disease would be very important,
(Razzak, et.al., 2019). This would facilitate early detection and
application of preventive measures.
References
Larose, D. T. (2015). Data mining and predictive analytics.
John Wiley & Sons.
Peirson, L., Fitzpatrick-Lewis, D., Morrison, K., Ciliska, D.,
Kenny, M., Ali, M. U., & Raina, P. (2015). Prevention of
overweight and obesity in children and youth: a systematic
review and meta-analysis. CMAJ open, 3(1), E23.
Razzak, M. I., Imran, M., & Xu, G. (2019). Big data analytics
for preventive medicine. Neural Computing and Applications, 1-
35.
Sepah, S. C., Jiang, L., & Peters, A. L. (2015). Long-term
outcomes of a Web-based diabetes prevention program: 2-year
results of a single-arm longitudinal study. Journal of medical
Internet research, 17(4), e92.
Shah, N. D., Sternberg, E. W., & Kent, D. M. (2018). Big data
and predictive analytics: recalibrating
expectations. Jama, 320(1), 27-28.

More Related Content

Similar to Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx

HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHappiest Minds Technologies
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
 
Cloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdfCloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdfkalai75
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
F233842
F233842F233842
F233842irjes
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxjeanettehully
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud securitycsandit
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONScscpconf
 
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docxPart 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docxherbertwilson5999
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)Shahbaz Anjam
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data AnalyticsRICHARD AMUOK
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek outiaemedu
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 

Similar to Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx (20)

HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
 
Cloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdfCloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdf
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
F233842
F233842F233842
F233842
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud security
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
 
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docxPart 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
Part 1.pdf__MACOSX._Part 1.pdfPart 2.pdf__M.docx
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek out
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 

More from keturahhazelhurst

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docxketurahhazelhurst
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docxketurahhazelhurst
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docxketurahhazelhurst
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docxketurahhazelhurst
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docxketurahhazelhurst
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docxketurahhazelhurst
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docxketurahhazelhurst
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docxketurahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docxketurahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docxketurahhazelhurst
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docxketurahhazelhurst
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docxketurahhazelhurst
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docxketurahhazelhurst
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docxketurahhazelhurst
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docxketurahhazelhurst
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docxketurahhazelhurst
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docxketurahhazelhurst
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docxketurahhazelhurst
 

More from keturahhazelhurst (20)

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx

  • 1. Case Study—PART 1—Jurisdictional Declaration Criteria Levels of Achievement Content (70%) Advanced 92-100% Proficient 84-91% Developing 1-83% Not Present Total Economic Development Location 18.5 to 20 points: Location is clearly delineated, fully meeting assignment standards. 16.5 to 18 points: Meets most of the assignment standards. 1 to 16 points: Location needs further specification before the student may proceed. 0 points Not present Action Research Statement of Work Understood and Signed 13.5 to 15 points: Template completed. 12.5 to 13 points: Template partially completed. 1 to 12 points: Student Modified Template
  • 2. 0 points Not present Structure (30%) Advanced 92-100% Proficient 84-91% Developing 1-83% Not present Total Formatting, Spelling, and Grammar 13.5 to 15 points: No spelling or grammar errors 12.5 to 13 points: 1-2 spelling and/or grammar errors 1 to 12 points: 3-4 spelling and/or grammar errors 0 points Not present Professor Comments: Total: /50 Running head: NETWORK DESCRIPTION 1
  • 3. NETWORK DESCRIPTION 6 NETWORK DESCRIPTION Institution Affiliation Student Name Date HEALTH-COP COMPANY Network and Workflow Description Data mining is a complex process that involves several activities undertaken sequentially for the entire process to be successful. As such, there are specific protocols that must be followed in data mining. The desired goals and objectives are the guiding principles upon which the type of data to be analyzed is identified. The main goal for Health-Cop is to establish links between diet composition and health issues. More specifically, the company will focus on analysis of data from various health facilities, websites, databases and health journals. The analysis is intended to provide new forms of data that can be interpreted to give meaningful patterns. To facilitate the process of data mining, there are several aspects that must be considered such as: statistics, clustering of data, rules of association, data classification, visualization and the decision tree.
  • 4. Network Description Health Cop company will set up is network system using both the windows and Linux based operating system. The company will have 10 desktop computers and 5 portable computers. The 10 desktop computers will be connected together via a metered Wi-Fi service. The desktops will be the main engine of the company. All the desktops will be configured with an algorithm that constantly searches for specific keywords from various databases. The portables computers will be connected to the internet via modems. A modem is much safer since it limits the connectivity to only the device being used. Internet connectivity via modem is facilitated through local area networks (LAN), through to the service providers, (Cui, et.al., 2016). Multiple firewalls are set up within the company networks to sort out undesired data traffic from the local network on the computer devices. The most suitable firewall for the network would be a layer 3 open systems interconnection (OSI) model, which guarantees maximum security to the local network systems, (Greenberg, et.al., 2016). This type of models is well designed to suit communication within several computers in a standard network system. The network router will generate IP addresses whose packets will be used to launch communication between the computers used. All the data mined through configured search engine will be relayed to the devices whose IP addresses are saved in the network. Since all computers will be assigns specific IP addresses, resource sharing and data transfer will be effectively done via the network systems. The network architecture will be designed with two firewalls configured into a two firewall demilitarized zone (DMZ). The DMZ is located on a neutral level that serves as the linkage and contact point between Health-Cop network systems and the internet. This is very crucial for maintaining maximum network security. This kind of security protocol also ensures that company networks are not exposed to any threat that may be launched via internet. Health-cop’s domain name servers will
  • 5. remain secured and thus the process of translating IP addresses will be much effective. Interpretation and translation of IP addresses by the company DNS servers facilitates retrieval of data from the internet. The switch devices have been incorporated in the network architecture since Health-cop networks will be configured on the Windows server system. Since the system is configured with layer 3 OSI, enterprise level uses must be used for the process of packet routing to be successfully executed, (Shatri, et.al., 2017). This facilitates the transfer of data packets to different computers in the company system. Switches are much better compared to hubs in a network because they only relay data packets to a specific MAC address destination. Windows server system also requires routers to be installed and configured in the system to facilitate the application of virtual private network (VPN) devices. Figure 1 Network Architecture The network incorporates a backbone to host the two switches that have been designed in the network system. The backbone also facilitates effective communication between multiple devices operating within the Health-Cop network systems. Work flow The first stage of the data mining process will be data collection. The search algorithms will be configured to detect certain key words from the databases analyzed. The collected data will then be stored on the network and into the computer drives. Once the data is stored on the data, the data will be subjected to screening and cleansing procedures on the network systems. Afterwards, the data will be classified according to different clusters and patterns identified through the analysis,
  • 6. (Adamuz-Hinojosa, et.al., 2018). Figure 2Network diagram The analytics will also involve regression predictions and outlier identification procedures. Finally, the data will be sorted and the relevant data sent to the network optimization unit while the irrelevant data will be directed back to the regression n analysis. The relevant data will be interpreted in the network optimization units and used to create patterns that explain the links between a certain dietary behavior with a specific lifestyle disease. In conclusion, the company’s network is designed to source for voluptuous data from various internet sources, databases and the cloud, and come up with relevant patterns that would be used to facilitate data analysis and reporting. The entire process must follow the outlined protocol for success to be achieved. References Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P., Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018). Automated network service scaling in nfv: Concepts, mechanisms and scaling workflow. IEEE Communications Magazine, 56(7), 162-169. Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE network, 30(1), 58-65. Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta, S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039. Washington, DC: U.S. Patent and Trademark Office. Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in- the-loop architecture with MATLAB/Simulink and QuaRC for rapid prototyping of CMAC neural network controller for ball- and-beam plant. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1201-1206). IEEE.
  • 7. Cloud Computing Cloud Computing Institution Affiliation Student Name Date: Health-cop company is a start -up company will offer data analytics services to various companies. The company helps heath facilities through proper service delivery to their clients through support of data analysis. The company aims at improving its services through the adoption of innovative technologies. In a review, the company aims at implementing a cloud platform to act as data heaven that will support for data storage as well as predictive data analysis. The company intends to use the software as a service approach in the cloud computing environment (Tsai, Bai, & Huang, 2014). Fetching of data will be performed through the support of the internet of things. This paper will, therefore, seek to identify how the company intends to use the cloud platform in its operations.
  • 8. Goals and Objectives The company aims to be a leading provider of predictive data analytics services across the united states. In its goal to become a diverse company in its service providence, the company aims at earning profits from its wide range of services it offers. The main aim is to provide organizations with data handling support. In this view, the company aims at providing real-time streams of data analytics. The software as a service platform will enable the company to have accessibility from many places in the nation (Khoshafian, 2016). In its mandate, the organization aims to provide the safest and the most dependable data facilities that the clients can have confidence in. The company aims at providing scheduled as well as random reports on the various predictive data analysis dockets it is tasked with. The company provides for this intending to provide a robust structure that will enable its client organization to perform health information analysis that will enable them to attain a competitive advantage in privately owned hospitals. Content Security Policy Considering the fact that Health-cop company intends to use a cloud platform in data storage and handling as well as offering support for data analytics, there will be a need to have a policy that will ensure the security of data. The expected security is enabled through the website that will be used to access data from the cloud platform. The content security policy will help in detection as well as prevention of certain types of attacks that target cloud platforms (Patil, & Frederik, 2016). A content security policy will be capable of efficiently handling forms of attacks such as cross-site scripting, browser hijacking, form jacking as well as ad injecting. The company plans to have a regularly updated inventory of the first- and third-party domains, lists of whitelisted domains and a method of alerting violations of the content security policy. The company also aims to have a regular update of the policy in order to ensure that it meets data security standards. Organizational Structure
  • 9. Health-cop Company is headed by a chief executive officer who is in charge of coordinating different departments in the organization. In his mandate, the chief executive officer is in charge of fostering a good relationship between the company and the target client companies. Through his influence, he makes approval of innovative technology such as the current impending cloud computing platform. Under the chief executive officer, lies a business manager and a functional manager. The business manager ensures that the company is strategically positioned to perform business (Goetsch, & Davis, 2014). The functional manager coordinates activities that lay down the structure of the business. He is in charge of coordinating information technology issues. The three top bosses are mandated to sit in board meetings that discuss the reports of the business. There are other supervisors who are I charge of other smaller departments in the company. Target Market The company target all the health facilities across in the state. The intention of targeting these companies is that they are in a position to purchase the data storage and analytics plans the company offers. The company will provide the predictive data analysis services to companies that are in need to perform digitized and more efficient market analysis (Liu, 2014). The idea is to enable these companies to identify market niches as well as to attain competitive advantages. The company will target these companies through specialized plans that will enable favourable conditions that are economically viable. Market Niche With the many chronic diseases in the country, health organizations are increasingly having the need to predict the prevalence of these diseases. Health-cop services will provide the much-needed reports to health facilities. These will help health facilities draw plans on how to curb as well as prevent diseases. Budget Estimation With the infrastructure that comes with the cloud
  • 10. computing platform, it is will be necessary to have a special room where architectural equipment will be placed. The cost of building a physically secure room will be incurred. There will also be a cost incurred in buying a domain that will be used to access cloud resources. A server will also be procured in order to support the large network of organizations that will be linked to the company’s cloud platform. Installing the technology will also require an investment in financial resources in acquiring skilled personnel to install and maintain the cloud platform. In addition, training of human resource personnel in the company will incur some cost. Conclusion A review of current marketing trends in many organizations indicates that data handling an analysis are key components of every organization. Every organization strives to ensure that they can grasp market requirements that gives them a niche in the market. For these reasons, Health-cop Company’s cloud computing project fits the market requirements of data handling and analysis. References Goetsch, D. L., & Davis, S. B. (2014). Quality management for organizational excellence. Upper Saddle River, NJ: Pearson. Khoshafian, S. (2016). Service oriented enterprises. Auerbach Publications. Liu, Y. (2014). Big data and predictive business analytics. The Journal of Business Forecasting, 33(4), 40. Patil, K., & Frederik, B. (2016). A Measurement Study of the Content Security Policy on Real-World Applications. IJ Network Security, 18(2), 383-392. Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service (SaaS): perspectives and challenges. Science China Information Sciences, 57(5), 1-15.
  • 11. Running head: NETWORK DESCRIPTION 1 NETWORK DESCRIPTION 6 NETWORK DESCRIPTION Institution Affiliation Iglobal University Student Name Krishna Chaithanya Arabati Date 8/13/2019 HEALTH-COP COMPANY Network and Workflow Description Data mining is a complex process that involves several activities undertaken sequentially for the entire process to be successful. As such, there are specific protocols that must be followed in data mining. The desired goals and objectives are the guiding principles upon which the type of data to be analyzed is identified. The main goal for Health-Cop is to establish links between diet composition and health issues. More specifically, the company will focus on analysis of data from various health facilities, websites, databases and health journals. The analysis is intended to provide new forms of data that can be interpreted to give meaningful patterns. To facilitate the process of data mining, there are several aspects that must be considered such as: statistics, clustering of data, rules of
  • 12. association, data classification, visualization and the decision tree. Network Description Health Cop company will set up is network system using both the windows and Linux based operating system. The company will have 10 desktop computers and 5 portable computers. The 10 desktop computers will be connected together via a metered Wi-Fi service. The desktops will be the main engine of the company. All the desktops will be configured with an algorithm that constantly searches for specific keywords from various databases. The portables computers will be connected to the internet via modems. A modem is much safer since it limits the connectivity to only the device being used. Internet connectivity via modem is facilitated through local area networks (LAN), through to the service providers, (Cui, et.al., 2016). Multiple firewalls are set up within the company networks to sort out undesired data traffic from the local network on the computer devices. Comment by Mark O'Connell: ? Comment by Mark O'Connell: Think you mean Wifi?? The most suitable firewall for the network would be a layer 3 open systems interconnection (OSI) model, which guarantees maximum security to the local network systems, (Greenberg, et.al., 2016). This type of models is well designed to suit communication within several computers in a standard network system. The network router will generate IP addresses whose packets will be used to launch communication between the computers used. All the data mined through configured search engine will be relayed to the devices whose IP addresses are saved in the network. Since all computers will be assignsed specific IP addresses, resource sharing and data transfer will be effectively done via the network systems. Comment by Mark O'Connell: ? routers don’t “generate” IP addresses. Not sure what you mean.Comment by Mark O'Connell: No. The Windows OS has the TCP/IP that generates packets Comment by Mark O'Connell: What devices? What is transferring data to what? Comment by Mark O'Connell: I’m getting lost here
  • 13. The network architecture will be designed with two firewalls configured into a two firewall demilitarized zone (DMZ). The DMZ is located on a neutral level that serves as the linkage and contact point between Health-Cop network systems and the internet. This is very crucial for maintaining maximum network security. This kind of security protocol also ensures that company networks are not less exposed vulnerable to any threat that may be launched via internet. Health-cop’s domain name servers will remain secured and thus the process of translating IP addresses will be much effective. Interpretation and translation of IP addresses by the company DNS servers facilitates retrieval of data from the internet. Comment by Mark O'Connell: vulnerable Comment by Mark O'Connell: If you only have laptops you are probably using regional DNS servers outside your network from Windows on your PCs The switch devices have been incorporated in the network architecture since Health-cop networks will be configured on the Windows server system. Since the system is configured with layer 3 OSI, enterprise level uses must be used for the process of packet routing to be successfully executed, (Shatri, et.al., 2017). This facilitates the transfer of data packets to different computers in the company system. Switches are much better compared to hubs in a network because they only relay data packets to a specific MAC address destination. Windows server system also requires routers to be installed and configured in the system to facilitate the application of virtual private network (VPN) devices. Comment by Mark O'Connell: ? Comment by Mark O'Connell: What? Enterprise uses must be used… Comment by Mark O'Connell: Not sure what you’re getting at with this Layer 3 OSI issue. Layer 3 devices use focused IP routing whereas Layer 2 device are in broadcast mode to all devices on the network. Your network is tiny. Figure 1 Network Architecture The network incorporates a backbone to host the two switches that have been designed in the network system. The backbone
  • 14. also facilitates effective communication between multiple devices operating within the Health-Cop network systems. Work flow The first stage of the data mining process will be data collection. The search algorithms will be configured to detect certain key words from the databases analyzed. The collected data will then be stored on the network and into the computer drives. Once the data is stored on the data, the data will be subjected to screening and cleansing procedures on the network systems. Afterwards, the data will be classified according to different clusters and patterns identified through the analysis, (Adamuz-Hinojosa, et.al., 2018). Comment by Mark O'Connell: ? I assume when a Keyword is found – some volume of data gets extracted from the databases being searched Comment by Mark O'Connell: What? “Once the data is stored on the data…” Figure 2Network diagram The analytics will also involve regression predictions and outlier identification procedures. Finally, the data will be sorted and the relevant data sent to the network optimization unit while the irrelevant data will be directed back to the regression n analysis. The relevant data will be interpreted in the network optimization units and used to create patterns that explain the links between a certain dietary behavior with a specific lifestyle disease. Comment by Mark O'Connell: Regression analysis in order to make predictions Comment by Mark O'Connell: What? Makes no sense Comment by Mark O'Connell: excellent In conclusion, the company’s network is designed to source for voluptuous data from various internet sources, databases and the cloud, and come up with relevant patterns that
  • 15. would be used to facilitate data analysis and reporting. The entire process must follow the outlined protocol for success to be achieved. Comment by Mark O'Connell: WRONG WORD References Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P., Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018). Automated network service scaling in nfv: Concepts, mechanisms and scaling workflow. IEEE Communications Magazine, 56(7), 162-169. Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE network, 30(1), 58-65. Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta, S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039. Washington, DC: U.S. Patent and Trademark Office. Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in- the-loop architecture with MATLAB/Simulink and QuaRC for rapid prototyping of CMAC neural network controller for ball- and-beam plant. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1201-1206). IEEE. CLOUD COMPUTING CLOUD COMPUTING Cloud Computing Institution Affiliation Student Name Krishna Chaithanya Arabati Date 07/27/2019
  • 16. Oxram Llimited is a multinational company that offers data analytics services to various companies. The company helps business enterprises to earn competitive advantage through support of data analysis. Over the years, the company has always relied on manual frameworks for data analysis. Collection of data has always relied on manual data collection, a review of available hardcopy documents as well as making observations through a human workforce. The company aims at improving its services through the adoption of innovative technologies. In a review, the company aims at implementing a cloud platform to act as data heaven that will support for data storage as well as analysis. The company intends to use the software as a service approach in the cloud computing environment (Tsai, Bai, & Huang, 2014). Fetching of data will be performed through the support of the internet of things. This paper will, therefore, seek to identify how the company intends to use the cloud platform in its operations. Comment by Mark O'Connell: Wrong. A start-up Comment by Mark O'Connell: ? Comment by Mark O'Connell: no Goals and Objectives The company aims to be a leading provider of data analytics services across the world. In its goal to become a diverse company in its service providence, the company aims at earning profits from its wide range of services it offers. The
  • 17. main aim is to provide organizations with data handling support. In this view, the company aims at providing real-time streams of data analytics. The software as a service platform will enable the company to have accessibility from many places in the world (Khoshafian, 2016). In its mandate, the organization aims to provide the safest and the most dependable data facilities that the clients can have confidence in. The company aims at providing scheduled as well as random reports on the various data analysis dockets it is tasked with. The company provides for this intending to provide a robust structure that will enable its client organization to perform market analysis that will enable them to attain a competitive advantage. Comment by Mark O'Connell: ? Comment by Mark O'Connell: What business are you in? Who is your customer? What do you sell? Comment by Mark O'Connell: Is that your business? “Data handling support”? Comment by Mark O'Connell: So you are a facilities-provider?? Content Security Policy Considering the fact that Oxram limited intends to use a cloud platform in data storage and handling, there will be a need to have a policy that will ensure the security of data. The expected security is enabled through the website that will be used to access data from the cloud platform. The content security policy will help in detection as well as prevention of certain types of attacks that target cloud platforms (Patil, & Frederik, 2016). A content security policy will be capable of efficiently handling forms of attacks such as cross-site scripting, browser hijacking, form jacking as well as ad injecting. The company plans to have a regularly updated inventory of the first- and third-party domains, lists of whitelisted domains and a method of alerting violations of the content security policy. The company also aims to have a regular update of the policy in order to ensure that it meets data security standards. Comment by Mark O'Connell: I’m confused.
  • 18. Your proposal is to use someone’s cloud services, so you can provide basically data-storage for your customers. Is that right? Organizational Structure Oxram Company is headed by a chief executive officer who is in charge of coordinating different departments in the organization. In his mandate, the chief executive officer is in charge of fostering a good relationship between the company and the target client companies. Through his influence, he makes approval of innovative technology such as the current impending cloud computing platform. Under the chief executive officer, lies a business manager and a functional manager. The business manager ensures that the company is strategically positioned to perform business (Goetsch, & Davis, 2014). The functional manager coordinates activities that lay down the structure of the business. He is in charge of coordinating information technology issues. The three top bosses are mandated to sit in board meetings that discuss the reports of the business. There are other supervisors who are I charge of other smaller departments in the company. Target Market The company target all business-oriented companies across the globe. The intention of targeting these companies is that they are in a position to purchase the data storage and analytics plans the company offers. The company will provide the data analysis services to companies that are in need to perform digitized and more efficient market analysis (Liu, 2014). The idea is to enable these companies to identify market niches as well as to attain competitive advantages. The company will target these companies through specialized plans that will enable favourable conditions that are economically viable. Comment by Mark O'Connell: No Pick a niche area
  • 19. Budget Estimation With the infrastructure that comes with the cloud computing platform, it is will be necessary to have a special room where architectural equipment will be placed. The cost of building a physically secure room will be incurred. There will also be a cost incurred in buying a domain that will be used to access cloud resources. A server will also be procured in order to support the large network of organizations that will be linked to the company’s cloud platform. Installing the technology will also require an investment in financial resources in acquiring skilled personnel to install and maintain the cloud platform. In addition, training of human resource personnel in the company will incur some cost. Conclusion Comment by Mark O'Connell: You missed the point of this assignmenrt A review of current marketing trends in many organizations indicates that data handling an analysis are key components of every organization. Every organization strives to ensure that they can grasp market requirements that gives them a niche in the market. For these reasons, Oxram Company’s cloud computing project fits the market requirements of data handling and analysis. References Goetsch, D. L., & Davis, S. B. (2014). Quality management for organizational excellence. Upper Saddle River, NJ: pearson. Khoshafian, S. (2016). Service oriented enterprises. Auerbach Publications. Liu, Y. (2014). Big data and predictive business analytics. The Journal of Business Forecasting, 33(4), 40. Patil, K., & Frederik, B. (2016). A Measurement Study of the Content Security Policy on Real-World Applications. IJ Network Security, 18(2), 383-392. Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service (SaaS): perspectives and challenges. Science China Information Sciences, 57(5), 1-15.
  • 20. Running head: INFORMATION SECURITY 1 INFORMATION SECURITY 3 Information Security Name Institutional Affiliation Information Security Introduction Information security is defined as the means by which data in computer systems are protected. The protection will ensure that the confidentiality, integrity, and availability of the data is maintained. Regardless, the proposal of the organization is that it is to provide data analytics services to various companies in the health sector. By taking advantage of emerging technologies such as cloud computing the company will not only be able to offer its services at competitive rates but will also be able to improve overall performance whilst ensuring data security (Peltier, 2016). Cloud computing, in general, refers to the delivery of computer resources from applications to data centers such as those that will be owned by the company. The basis of this strategy is to have easily available and secured data over the internet. Moreover, it has also been identified that the cloud service to be used is Software as a service (SaaS) (Peltier, 2016). It is the use of an application that is run by a distant computer on the cloud via a browser or internet-based
  • 21. application. By understanding this basis of operations, it will better demonstrate how information security will be attained. Reasoning The SaaS approach was selected for numerous reasons among them, its high flexibility and attractive nature to the clients. Additionally, by simplifying its installation and overall utilization, it eliminates security vulnerabilities. With security as its core value, the SaaS approach to cloud computing offered eliminates control over the hardware by the client (McCoy & Perlis, 2018). This approach is necessary for numerous reasons among them is the fact that having the hardware within the organization it will make it vulnerable to outside attacks, human error, and malicious employee activities all of which can result in data loss. This realization was after a study conducted by Accense, an analytical company, during the period of 2009 and 2014, the number of cyberattacks increased drastically (McCoy & Perlis, 2018). According to their figures, the numbers rose from a total of just over 3 million attacks per year to over 42 million attacks. For example, in 2017, the total number of data breaches cost companies an approximate of $3.6 million (McCoy & Perlis, 2018). With the figure expected to be significantly higher in 2019, the best approach to limiting cyberattacks and overall data breaches is by employing SaaS cloud services. SaaS and Information Security The strategy of using SaaS is advantageous because it allows numerous features to be included. This allows for the automated implementation of security measures while data is being stored or extracted from the database. Among the features present are transit protection between the client and the service. This security measure is critical as some forms of cyber-attack target data while they are in transit to the storage areas over the internet (Rittinghouse & Ransome, 2017). By using complex encryption algorithms, the data if intercepted during transmission will be useless to the hacker without the decryption key. Secondly, all user accounts will have mandatory
  • 22. authentication processes that will further secure the accounts of the application users. This will limit unauthorized access to the application; this strategy will be needed for any data to be transferred, added, destroyed or manipulated (Rittinghouse & Ransome, 2017). The healthcare sector in 2017 was the most affected industry with relation to cyberattacks, by automating their security measures, future attacks can be limited. The SaaS approach also allows for auditing or logging of activities, the objective of this security approach is to maintain accountability. By reviewing the activities of the users, malicious employees can be easily identified and the necessary disciplinary action implemented (Rittinghouse & Ransome, 2017). Finally, the SaaS platform will allow for the utilization of already available cloud computing security protocols further ensuring the safety of the data uploaded as well as the information stored. An example of the security measure in place include protection against DDoS and access regulation to prevent unexpected interceptions. Data Valuing When valuing the company and its data, the main area of focus was the market niche it was targeting. Technology is evolving at a rapid rate and this is especially recognizable in the healthcare industry. The majority of modern healthcare institutions have migrated from the legacy system and embraced electronic health records (Chang, Kuo, & Ramachandran, 2016). It is the digital format of medical records mandated by the HITECH (Health Information Technology for Economic and Clinical Health) Act. This act is then enforced by the ARRA (American Recovery and Reinvestment Act) of 2009 (Chang, Kuo, & Ramachandran, 2016). Nevertheless, the value collected and stored will have to undergo processes that will not only allow it to be verified but also screened to be classified in different clusters. The process allows for network optimization to be achieved thereby allowing for faster processing and storing of data collected from the client’s end. Moreover, the patterns used by the client’s in accessing as well as transmitting data are analyzed for better
  • 23. operations of the service (Chang, Kuo, & Ramachandran, 2016). Conclusion Big data is the future for all industries as it offers the needed insight and understanding of operations thereby allowing for cloud computing services to progress their services. This is demonstrated by the approach that is adopted by Health Cop. The company will be sampling data with the main objective of improving the network and overall system. References Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24- 41. McCoy, T. H., & Perlis, R. H. (2018). Temporal trends and characteristics of reportable health data breaches, 2010-2017. Jama, 320(12), 1282-1284. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: implementation, management, and security. CRC press. Running head: BIG DATA APPROACH 6 BIG DATA APPROACH Big Data Approach Student's name Krishna Chaithanya Arabati Professor's name Mark O conell Institution IGLOBAL UNIVERSITY
  • 24. Course Title MSIT 681 Capstone Date:08/03/2019 As a result of the enormous amount of data required for analysis, big data approach has become a necessity for health- oriented organizations. This approach enables the companies to perform analysis in a systematic way from data repositories. The structure of storing data in a dataset is also an important aspect. The approach offers better statistical power through the tools it provides to organizations (Chen, Mao, & Liu, 2014). The approach seeks to solve challenges about handling large amounts of data. The challenges range from data analysis, storage, capture, visualization as well as information privacy. This paper will, therefore, seek to discuss the big data approach, the origin of big data, methods of storing the data as well as the format of the database that will be used. Use of semi-custom applications. Use of semi-custom applications will form a basis for the handling big data. This technique will employ machine learning and artificial intelligence. Use of artificial intelligence and machine learning will significantly add value to the organization by providing platforms for handling big data in an efficient manner (Li, Li, Wang, Zhu, & Li, 2019). This technique will help in shaping the data analytics mindset at the Health-cop company. Customized applications will help the company convert model-based recommendations of treatment into actual insights that can be used in treatment of diabetes.
  • 25. Comment by Mark O'Connell: So you’re going to write these applications then ….right?? The rationale for using semi-customized applications According to the prevailing circumstances at Health-cop company, a semi-customized application would suit the organization in a better way. Semi customized applications take relatively short development time. Therefore, it takes a very short time to deploy these applications. When a semi- customized application is well constructed, they it offersoffer stability by offering great reliability levels as well as more resilience (Eapen, & Peterson, 2015). Semi-custom applications are more flexible offering great service through an extended lifetime, adaptability as well as their scalability. Lastly, semi- customized applications offer better quality. Their package components have robust performance levels. Moreover, they offer high-quality standards due to their applicability in many environments. Source of Big Data According to statistics by the world health organization, the prevalence of diabetes disease is about 9% in the Uunites sStates of America. Considering these statistics, this number of people is large. Going further to consider the daily data required to be fetched each day in monitoring this disease in each patient, the data collected each day is enormous. The cloud platform will offer daily data collection from patients through the use of artificial intelligence in collaboration of sensor-based networks (Aazam, et al, 2014). The internet of things will provide support for the collection of data through miniaturized sensors. These miniaturized sensors will then be controlled through artificial intelligence. Since the cloud platform uses the software as a service technique. Each patient in the Health-cop database will have their portals that they can access services from any environment. Machine learning techniques will help in identifying patients that require urgent help. Considering all these actions that are performed on the cloud platform, big data will be generated as a result. Comment by Mark O'Connell:
  • 26. Wow. Looking forward to that explanation! Comment by Mark O'Connell: This is not a complete sentence. Storage of Data From the proposed architectures of data storage done before, data storage will be handled through cloud storage facilities. The company aims to implement a cloud data repository. The cloud platform will provide one to many replications. One to many replications will provide data reliability as a failure of one storage node will not affect the operations in the company. It will also help in consolidating data from all remote locations, therefore, enabling an analysis of data at a central point (Jiang, et al, 2014). Storage will depend on high-speed transmissions of data from the patient's local location to the cloud storage. This will enable continuous synchronization of data in the database and therefore enabling data in the database to be up to date. This will enhance its reliability and therefore giving a clear reflection of analytics. Storage in the database will also be supported by high-speed data acceleration. Cloud storage will enable the semi- customized data-intensive health support application to collect data from the sensor sources and pass it over to the cloud (Sookhak, 2015). Data obtained will be stored by using data segmentation methods. Several segments that will range according to the type of diabetes disease on is suffering from will be enhanced. This will enable easier querying and analyzing data from the database. Comment by Mark O'Connell: Hadoop?? Comment by Mark O'Connell: Hmmm ok…how do you get your hands on this data? Database Formats Modern technologies have come up with formats that enable easier storage of biodata. Among the formats, is the Next Generation Sequencing. Health cop company intends to use this database format due to its suitability to storing biodata (Banerjee, & Sheth, 2017). Additionally, the database format is of an advantage as it will help in providing useful data mining techniques as well as machine learning techniques that will help
  • 27. in inputting data into specific data types and formats. The main agenda towards choosing this format is to enable Health-cop company store and analyze the data more efficiently Conclusion Considering the factors in play at the Health-cop company, semi-custom applications will help the company achieve its objectives in handling big data. The Next-generation sequencing database format will enable the company to store biodata more efficiently. References Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating the Internet of Things and cloud computing and the issues involved. In Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th- 18th January 2014 (pp. 414-419). IEEE. Banerjee, T., & Sheth, A. (2017). Iot quality control for data and application needs. IEEE Intelligent Systems, 32(2), 68-73. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile networks and applications, 19(2), 171-209. Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health applications facilitate meaningful behaviour change?: time for answers. Jama, 314(12), 1236-1237. Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in the cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443-1451. Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019). Semicustomized Design Framework of Container Accommodation for Migrant Construction Workers. Journal of Construction Engineering and Management, 145(4), 04019014. Sookhak, M. (2015). Dynamic remote data auditing for securing big data storage in cloud computing (Doctoral dissertation,
  • 28. University of Malaya). Running head: BIG DATA APPROACH 6 BIG DATA APPROACH Big Data Approach Student's name Professor's name Institution Course Title Date: As a result of the enormous amount of data required for analysis, big data approach has become a necessity for health- oriented organizations. This approach enables the companies to perform analysis in a systematic way from data repositories. The structure of storing data in a dataset is also an important aspect. The approach offers better statistical power through the tools it provides to organizations (Chen, Mao, & Liu, 2014). The approach seeks to solve challenges about handling large amounts of data. The challenges range from data analysis, storage, capture, visualization as well as information privacy. This paper will, therefore, seek to discuss the big data approach,
  • 29. the origin of big data, methods of storing the data as well as the format of the database that will be used. Use of semi-custom applications. Use of semi-custom applications will form a basis for the handling big data. This technique will employ machine learning and artificial intelligence. Use of artificial and machine learning will significantly add value to the organization by providing platforms for handling big data in an efficient manner (Li, Li, Wang, Zhu, & Li, 2019). This technique will help in shaping the data analytics mindset at the Health-cop company. Customized applications will help the company convert model- based recommendations of treatment into actual insights that can be used in treatment of diabetes. The rationale for using semi-customized applications According to the prevailing circumstances at Health-cop company, a semi-customized application would suit the organization in a better way. Semi customized applications take relatively short development time. Therefore, it takes a very short time to deploy these applications. When a semi- customized application is well constructed, they offer stability by offering great reliability levels as well as more resilience (Eapen, & Peterson, 2015). Semi-custom applications are more flexible offering great service through an extended lifetime, adaptability as well as their scalability. Lastly, semi-customized applications offer better quality. Their package components have robust performance levels. Moreover, they offer high- quality standards due to their applicability in many environments. Source of Big Data According to statistics by the world health organization, the prevalence of diabetes disease is about 9% in the unites states of America. Considering these statistics, this number of people is large. Going further to consider the daily data required to be fetched each day in monitoring disease in each patient, the data collected each day is enormous. The cloud platform will offer daily data collection from patients through the use of
  • 30. artificial intelligence in collaboration of sensor-based networks (Aazam, et al, 2014). The internet of things will provide support for the collection of data through miniaturized sensors. These miniaturized sensors will then be controlled through artificial intelligence. Since the cloud platform uses the software as a service technique. Each patient in the Health-cop database will have their portals that they can access services from any environment. Machine learning techniques will help in identifying patients that require urgent help. Considering all these actions that are performed on the cloud platform, big data will be generated as a result. Storage of Data From the proposed architectures of data storage done before, data storage will be handled through cloud storage facilities. The company aims to implement a cloud data repository. The cloud platform will provide one to many replications. One to many replications will provide data reliability as a failure of one storage node will not affect the operations in the company. It will also help in consolidating data from all remote locations, therefore, enabling an analysis of data at a central point (Jiang, et al, 2014). Storage will depend on high-speed transmissions of data from the patient's local location to the cloud storage. This will enable continuous synchronization of data in the database and therefore enabling data in the database to be up to date. This will enhance its reliability and therefore giving a clear reflection of analytics. Storage in the database will also be supported by high-speed data acceleration. Cloud storage will enable the semi- customized data-intensive health support application to collect data from the sensor sources and pass it over to the cloud (Sookhak, 2015). Data obtained will be stored by using data segmentation methods. Several segments that will range according to the type of diabetes disease on is suffering from will be enhanced. This will enable easier querying and analyzing data from the database. Database Formats
  • 31. Modern technologies have come up with formats that enable easier storage of biodata. Among the formats, is the Next Generation Sequencing. Health cop company intends to use this database format due to its suitability to storing biodata (Banerjee, & Sheth, 2017). Additionally, the database format is of an advantage as it will help in providing useful data mining techniques as well as machine learning techniques that will help in inputting data into specific data types and formats. The main agenda towards choosing this format is to enable Health-cop company store and analyze the data more efficiently Conclusion Considering the factors in play at the Health-cop company, semi-custom applications will help the company achieve its objectives in handling big data. The Next-generation sequencing database format will enable the company to store biodata more efficiently. References Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating the Internet of Things and cloud computing and the issues involved. In Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th- 18th January 2014 (pp. 414-419). IEEE. Banerjee, T., & Sheth, A. (2017). Iot quality control for data and application needs. IEEE Intelligent Systems, 32(2), 68-73. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile networks and applications, 19(2), 171-209. Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health applications facilitate meaningful behaviour change?: time for answers. Jama, 314(12), 1236-1237. Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014). An IoT-oriented data storage framework in the cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2),
  • 32. 1443-1451. Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019). Semicustomized Design Framework of Container Accommodation for Migrant Construction Workers. Journal of Construction Engineering and Management, 145(4), 04019014. Sookhak, M. (2015). Dynamic remote data auditing for securing big data storage in cloud computing (Doctoral dissertation, University of Malaya). Running head: PROJECT PROPOSAL 1 PROJECT PROPOSAL 4 PROJECT PROPOSAL Institution Affiliation Student Name Data Start-up Proposal: HEALTH-COP COMPANY Predicting When and Where Lifestyle & Dietetic Related Health Issues Are Most Likely to Occur. Introduction Health-cop company is a data mining company that predicts
  • 33. health trends and possible illnesses that could be witnessed in the near future. The company will mainly focus on data mining and analytics to establish links between diet composition and health issues in society, (Larose, 2015). The data to be used in the predictive analytics will mainly be obtained from hospital databases, nutrition and dietetics websites, health journals as well as information shared through social media platforms. Health-cop company intends to predict such issues before they can become tough to manage. Goals & Objectives The main goal is to become a leader in health predictive analytics in the health sector, improve the level of preparedness for various health issues, and earn a profit from running the business. Health-cop’s main objective is to identify certain lifestyle and dietetic related illnesses that are most likely to be experienced within a certain region in the near future. The company will analyze purchases from food stores and groceries and also analyze the various meals ordered for from various food joints. The company also aims at providing consolidated reports on diet composition of various people from various regions based on data obtained from websites and social media platforms. Organizational Structure The company will be headed by a chief executive officer who will be in charge of overseeing all operations. A seven-member board of directors will be selected among data analytics professionals to undertake the duties of policy formulation and implementation. Health-cop will have a data mining division, analytics division, IT department, as well as a human resource and customer relations departments; each headed by a departmental manager. An independent division to deal with business modeling and statistical database creation will receive data from the analytics division. This division will create various projections that will be used to make predictions about specific illnesses. Target Market
  • 34. The company targets to sell its information to health departments at various levels of governments. The company will also provide its analysis to various hospitals for an agreed fee. Health-cop will also sell its findings to private health care institutions especially nutritionists and pharmaceutical organizations. The existing competitors in the market offer predictive analytics for chronic diseases unrelated to dietetics, (Sepah, et.al., 2015). Health-cop will majorly focus on lifestyle and dietetics related illnesses that are easily preventable thus the company will be unique in the market. The major illnesses that the company will analyze and report on are diabetics, obesity, and osteoporosis. Budgetary Estimation The start-up will require planning and preparation finances to facilitate sufficient research before launching the company. Costs will also be incurred to secure strategically positioned premises for the company. Acquisition of digital equipment such as computers and network cables as well as the installation of internet services will require sufficient funding, (Shah, et.al., 2018). Other operational expenses that are expected include salaries and wages for the company’s staff and marketing of the company and its services in the market. Conclusion In recent years, lifestyle-related illnesses have become an issue for many people in the world, (Peirson, et.al., 2015). The main factors that contribute to the increased incidence of such illnesses are changes in lifestyle and dietary behavior. The reported cases of diabetes, obesity, and osteoporosis have significantly shot up in recent times. This can all be attributed to the changes in diet behavior. A preventive analytical algorithm would be most suitable to manage these illnesses. A computer algorithm programmed to analyze what is being consumed in various regions and link the food substance to a certain lifestyle-related disease would be very important, (Razzak, et.al., 2019). This would facilitate early detection and application of preventive measures.
  • 35. References Larose, D. T. (2015). Data mining and predictive analytics. John Wiley & Sons. Peirson, L., Fitzpatrick-Lewis, D., Morrison, K., Ciliska, D., Kenny, M., Ali, M. U., & Raina, P. (2015). Prevention of overweight and obesity in children and youth: a systematic review and meta-analysis. CMAJ open, 3(1), E23. Razzak, M. I., Imran, M., & Xu, G. (2019). Big data analytics for preventive medicine. Neural Computing and Applications, 1- 35. Sepah, S. C., Jiang, L., & Peters, A. L. (2015). Long-term outcomes of a Web-based diabetes prevention program: 2-year results of a single-arm longitudinal study. Journal of medical Internet research, 17(4), e92. Shah, N. D., Sternberg, E. W., & Kent, D. M. (2018). Big data and predictive analytics: recalibrating expectations. Jama, 320(1), 27-28.