Case Study—PART 1—Jurisdictional Declaration
Criteria
Levels of Achievement
Content
(70%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not Present
Total
Economic Development Location
18.5 to 20 points:
Location is clearly delineated, fully meeting assignment standards.
16.5 to 18 points:
Meets most of the assignment standards.
1 to 16 points:
Location needs further specification before the student may proceed.
0 points
Not present
Action Research Statement of Work Understood and Signed
13.5 to 15 points:
Template completed.
12.5 to 13 points:
Template partially completed.
1 to 12 points:
Student Modified Template
0 points
Not present
Structure (30%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not present
Total
Formatting, Spelling, and Grammar
13.5 to 15 points:
No spelling or grammar errors
12.5 to 13 points:
1-2 spelling and/or
grammar errors
1 to 12 points:
3-4 spelling and/or
grammar errors
0 points
Not present
Professor Comments:
Total:
/50
Running head: NETWORK DESCRIPTION 1
NETWORK DESCRIPTION 6
NETWORK DESCRIPTION
Institution Affiliation
Student Name
Date
HEALTH-COP COMPANY
Network and Workflow Description
Data mining is a complex process that involves several activities undertaken sequentially for the entire process to be successful. As such, there are specific protocols that must be followed in data mining. The desired goals and objectives are the guiding principles upon which the type of data to be analyzed is identified. The main goal for Health-Cop is to establish links between diet composition and health issues. More specifically, the company will focus on analysis of data from various health facilities, websites, databases and health journals. The analysis is intended to provide new forms of data that can be interpreted to give meaningful patterns. To facilitate the process of data mining, there are several aspects that must be considered such as: statistics, clustering of data, rules of association, data classification, visualization and the decision tree.
Network Description
Health Cop company will set up is network system using both the windows and Linux based operating system. The company will have 10 desktop computers and 5 portable computers. The 10 desktop computers will be connected together via a metered Wi-Fi service. The desktops will be the main engine of the company. All the desktops will be configured with an algorithm that constantly searches for specific keywords from various databases. The portables computers will be connected to the internet via modems. A modem is much safer since it limits the connectivity to only the device being used. Internet connectivity via modem is facilitated through local area networks (LAN), through to the service providers, (Cui, et.al., 2016). Multiple firewalls are set up within the company networks to sort out undesired data traffic from the local network on the computer devices.
The most suitable firewall for the network w ...
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
Running head: INFORMATION SECURITY 1
INFORMATION SECURITY 6
Information Security
Name
Institutional Affiliation
Information Security
Introduction
Information security is defined as the means by which data in computer systems are protected. The protection will is designed to ensure that the confidentiality, integrity, and availability of the data is maintained. Regardless, the proposal of the (my?) organization is that it is to provide data analytics services to various companies in the health sector. By taking advantage of emerging technologies such as cloud computing the company will not only be able to offer its services at competitive rates but will also be able to improve overall performance whilst ensuring data security (Peltier, 2016). Cloud computing, in general, refers to the delivery of computer resources from applications to data centers such as those that will be owned by the company. The basis of this strategy is to have easily available and secured data over the internet. Moreover, it has also been identified that the cloud service to be used is Software as a service (SaaS) (Peltier, 2016). It is the use of an application that is run by a distant computer on the cloud via a browser or internet-based application. By understanding this basis of operations, it willwe can better demonstrate how information security will be attained. Comment by Mark O'Connell: Is that a direct quote? “Ensuring” is a pretty bold word. Not much is guaranteed in InfoSec. Comment by Mark O'Connell: In your final report this will probably be redundant with the cloud section
Reasoning
The SaaS approach was selected for numerous reasons among them, its high flexibility and attractive nature to the clients. Additionally, by simplifying its installation and overall utilization, it eliminates security vulnerabilities. With security as its core value, the SaaS approach to cloud computing offered eliminates control over the hardware by the client (McCoy & Perlis, 2018). This approach is necessary for numerous reasons among them is the fact that having the hardware installed within the organization it will make itnot be as well protected as that provided by the CSP and it might become vulnerable to outside attacks, human error, and malicious employee activities all of which can result in data loss. This realization was after a study conducted by Accense, an analytical company, during the period of 2009 and 2014, the number of cyberattacks increased drastically if the client used on-premises servers instead of cloud-based servers (McCoy & Perlis, 2018). According to their figures, the numbers rose from a total of just over 3 million attacks per year to over 42 million attacks. For example, in 2017, the total number of data breaches cost companies an approximate of $3.6 million (McCoy & Perlis, 2018). With the figure expected to be significantly higher in 2019, the best approach to limiting cyberattacks and overall data breaches is by employing SaaS ...
Hashtag Recommendation System in a P2P Social Networking Applicationcsandit
In this paper focus is on developing a hashtag recommendation system for an online social
network application with a Peer-to-Peer infrastructure motivated by BestPeer++ architecture and
BATON overlay structure. A user may invoke a recommendation procedure while writing the
content. After being invoked, the recommendation procedure returns a list of candidate hashtags, and the user may select one hashtag from the list and embed it into the content. The proposed approach uses Latent Dirichlet Allocation (LDA) topic model to derive the latent or
hidden topics of different content. LDA topic model is a well-developed data mining algorithm
and generally effective in analysing text documents with different lengths. The topic model is
used to identify the candidate hashtags that are associated with the texts in the published content
through their association with the derived hidden topics.
The experiments for evaluating the recommendation approach were fed with the tweets
published in Twitter. Hit-rate of recommendation is considered as an evaluation metricfor our
experiments. Hit-rate is the percentage of the selected or relevant hashtags contained in
candidate hashtags. Our experiment results show that the hit-rate above 50% is observed when
we use a method of recommendation approach independently. Also, for the case that both
similar user and user preferences are considered at the same time, the hit-rate improved to 87%
and 92% for top-5 and top-10 candidate recommendations respectively.
Running headCapstone Project Activity - Unit 2 2C.docxrtodd599
Running head:Capstone Project Activity - Unit 2
2
Capstone Project Activity - Unit 2
Student Name
Frank Owusu Boadu
Course
Program Capstone in IT
Date
09/02/2018
Capstone Project Activity - Unit 2
Which type of network topology would you recommend for the corporate backbone and the wired and wireless connections? Why do you think this would be the best choice?
Internet bubble burst led to many reforms in most organizations. The reforms were due to the value of equity markets which grew rapidly. Rapid technology advancement led to the highest capital growth in the industries which later contributed to them crushing. One of this industries is the Verbania, Inc. which was shut down in the early 20’s. The company now wants to reinvent and launch itself again. To do this, it will need to create a well-integrated social relationship platform that goes in hand with other technologies for instance the CRM. The company will require an efficient network topology such as Bus topology. This kind of network will enable computers and other network devices stay connected on a single cable. It will transmit data in only one direction since it will have only two end points also known as the Linear Bus Topology. This will enable every device to stay connected to the network. This kind of Topology will be advantageous to the company as it is cost effective and easy to expand. However, in case the cable fails it means the whole network fails. For wireless connections, the company can use HYBRID Topology. This kind of topology is reliable as detecting errors is quit very easy (Rahman, & Esmailpour, April 2014). This makes the topology be regarded as effective and flexible. However, the design is complex and costly to install, this is because it is a combination of two topologies.
Which type of cabling would you recommend? Why do you think this would be the best choice?
To complete these networking, the company will require several networking cabling. Cabling carries data across the network, voice, serial-communications, alarm signals, video and audio transmission. This is why the company will require a reliable and well-designed structured cabling system. Cabling typical accounts for less than 10% of the total cost of network infrastructure (Croft, et al 2011). You can be sure the life span of the cabling system is more than 16 years if well installed. It is also important to know that more than half of the problems related to networking are due to poor cabling. This problems are such as slow access while accessing information. There are several communication cabling; this are twisted-pair, shielded or screened twisted pair and fiber optic. However, it is important to distinguish between the backbone cables and the horizontal cables. The backbone cables connect devices such as; servers, switches and routers while the horizontal cables connect the communication closets and the wall outlets. To bring the company back to life, twisted-pair cable can be.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
CURRENT EVENT: CLOUD COMPUTING 1
CLOUD COMPUTING 2
Cloud Computing
Cloud Computing
Introduction:
Cloud computing is that the conveyance identified with registering suppliers over the on the web. Regardless of whether they recognize the thing or not vital, a few individuals fabricate utilization of disabling recording providers as their very own consequence individual needs. Rather than keeping up information all alone repaired circle or transport to-date capacities to your necessities, you utilize partner email discoverer administration over the on the web, from a further place to be prepared to look the information you have or work to use its capacities. Doing in this way would conceivably bring out the unequivocal level of security edges (Rittinghouse and Ransome,).
Maintained the nation over to begin and which is related to points of interest close by mechanical improvement, weaken handling suggests that how related to benefitting figuring infers that returning from an organization, in need, by the method for a misuse client tablet or adaptable PC or PC joined with the framework. Cloud computing in more explicit words is routinely elucidated because the keeping close to getting to related to data along code over World Wide net rather than keeping in modified circle. The most goals ought to supply time-tested close by tweaked successful preparing environment to end customers. Cloud computing suppliers are as often as possible open, individual or crossbreed (Furth & Escalante).
The many main options concerning impair computing are:
1. The services square measures sometimes offered to end user would like computing means that square measure calculated off that build it potential for purchasers to pay restricted to means that alongside employment used.
2. The service is sometimes supplied alongside that a person could profit endless suppliers it would like.
3. A given exceptional quality related to suppliers is sometimes secure through service.
Characteristics of Cloud Computing
The procedure methodologies might be seen everywhere on at whatever time with all the regular frameworks that will be seen by a method for the net.
• A customer will just trade out any registering systems using administration firm while no man relationship.
• Computing region technique unit now and then shared by implies that of different desktops, these zone units powerfully issued to be prepared to desktops figuring on need.
• The registering procedures might be all around profited inside of an adaptable methodology by implies that of householders that may upgrade the methods at whatever time vital also to weaken once that are not anticipated.
• Cloud computing arrangements are region unit some of the time dynamic that is ...
Systems analysis project 10 can you answer the 4 questions at the t.pdfrohit219406
Systems analysis project 10: can you answer the 4 questions at the task section, thank you.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The
centers have done well, and the company is planning an international expansion by opening a
new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT
consultant, Susan Park, to help develop an information system for the new facility. During the
project, Susan will work closely with Gray Lewis, who will manage the new operation.
Background
Susan and Gray finished their work on user interface, input, and output design. They developed
a user-centered design that would be flexible and easy to learn. Now Susan turned her attention
to the architecture for the new system. Susan wanted to consider their own organization and
culture, enterprise resource planning, total cost of ownership, scalability, Web integration, legacy
systems, processing methods, security issues, and corporate portal. She also needed to select a
network plan, or topology, that would dictate the physical cabling and network connections, or
consider a wireless network. When all these tasks were completed, she would submit a system
design specification for approval.
Tasks:
1. What would be the advantages of selecting an Internet-based architecture for the Personal
Trainer’s system?
2. If Personal Trainer wants to increase its Internet marketing efforts, what advice could you
offer? Perform research to find out more about the topic of Web-based marketing before you
answer Gray.
3. What software and hardware infrastructure will be necessary to ensure Personal Trainer can
process point of sale transactions?
4. Prepare an outline for a system design specification and describe the contents of each section
Solution
1)
The Internet has had a colossal effect on system architecture modeling. The Internet has turn out
to be more than a communication channel — numerous IT onlookers see it as a in a far-reaching
way distinctive environment for system development. In a customary client/server system, the
client handles the user interface and the server (or servers in a multi-level framework) handles
the information and application rationale. As it were, a piece of the framework keeps running on
the customer, part on the server.
Interestingly, in an Internet-based architecture, notwithstanding information and application
rationale, the whole user interface is given by the Web server as HTML coded documents that
are deciphered and showed by the client\'s browser. Moving the obligation regarding the
interface from the client to the server improves the procedure of information transmission and
results in lower hardware’s expenses and complexities. The pattern toward Internet-based e-
business is reshaping the IT scene as additional firms utilize the Web to manufacture proficient,
solid, and practical arrangements. At the point when arranging new systems, experts can utilize
accessible.
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
Running head: INFORMATION SECURITY 1
INFORMATION SECURITY 6
Information Security
Name
Institutional Affiliation
Information Security
Introduction
Information security is defined as the means by which data in computer systems are protected. The protection will is designed to ensure that the confidentiality, integrity, and availability of the data is maintained. Regardless, the proposal of the (my?) organization is that it is to provide data analytics services to various companies in the health sector. By taking advantage of emerging technologies such as cloud computing the company will not only be able to offer its services at competitive rates but will also be able to improve overall performance whilst ensuring data security (Peltier, 2016). Cloud computing, in general, refers to the delivery of computer resources from applications to data centers such as those that will be owned by the company. The basis of this strategy is to have easily available and secured data over the internet. Moreover, it has also been identified that the cloud service to be used is Software as a service (SaaS) (Peltier, 2016). It is the use of an application that is run by a distant computer on the cloud via a browser or internet-based application. By understanding this basis of operations, it willwe can better demonstrate how information security will be attained. Comment by Mark O'Connell: Is that a direct quote? “Ensuring” is a pretty bold word. Not much is guaranteed in InfoSec. Comment by Mark O'Connell: In your final report this will probably be redundant with the cloud section
Reasoning
The SaaS approach was selected for numerous reasons among them, its high flexibility and attractive nature to the clients. Additionally, by simplifying its installation and overall utilization, it eliminates security vulnerabilities. With security as its core value, the SaaS approach to cloud computing offered eliminates control over the hardware by the client (McCoy & Perlis, 2018). This approach is necessary for numerous reasons among them is the fact that having the hardware installed within the organization it will make itnot be as well protected as that provided by the CSP and it might become vulnerable to outside attacks, human error, and malicious employee activities all of which can result in data loss. This realization was after a study conducted by Accense, an analytical company, during the period of 2009 and 2014, the number of cyberattacks increased drastically if the client used on-premises servers instead of cloud-based servers (McCoy & Perlis, 2018). According to their figures, the numbers rose from a total of just over 3 million attacks per year to over 42 million attacks. For example, in 2017, the total number of data breaches cost companies an approximate of $3.6 million (McCoy & Perlis, 2018). With the figure expected to be significantly higher in 2019, the best approach to limiting cyberattacks and overall data breaches is by employing SaaS ...
Hashtag Recommendation System in a P2P Social Networking Applicationcsandit
In this paper focus is on developing a hashtag recommendation system for an online social
network application with a Peer-to-Peer infrastructure motivated by BestPeer++ architecture and
BATON overlay structure. A user may invoke a recommendation procedure while writing the
content. After being invoked, the recommendation procedure returns a list of candidate hashtags, and the user may select one hashtag from the list and embed it into the content. The proposed approach uses Latent Dirichlet Allocation (LDA) topic model to derive the latent or
hidden topics of different content. LDA topic model is a well-developed data mining algorithm
and generally effective in analysing text documents with different lengths. The topic model is
used to identify the candidate hashtags that are associated with the texts in the published content
through their association with the derived hidden topics.
The experiments for evaluating the recommendation approach were fed with the tweets
published in Twitter. Hit-rate of recommendation is considered as an evaluation metricfor our
experiments. Hit-rate is the percentage of the selected or relevant hashtags contained in
candidate hashtags. Our experiment results show that the hit-rate above 50% is observed when
we use a method of recommendation approach independently. Also, for the case that both
similar user and user preferences are considered at the same time, the hit-rate improved to 87%
and 92% for top-5 and top-10 candidate recommendations respectively.
Running headCapstone Project Activity - Unit 2 2C.docxrtodd599
Running head:Capstone Project Activity - Unit 2
2
Capstone Project Activity - Unit 2
Student Name
Frank Owusu Boadu
Course
Program Capstone in IT
Date
09/02/2018
Capstone Project Activity - Unit 2
Which type of network topology would you recommend for the corporate backbone and the wired and wireless connections? Why do you think this would be the best choice?
Internet bubble burst led to many reforms in most organizations. The reforms were due to the value of equity markets which grew rapidly. Rapid technology advancement led to the highest capital growth in the industries which later contributed to them crushing. One of this industries is the Verbania, Inc. which was shut down in the early 20’s. The company now wants to reinvent and launch itself again. To do this, it will need to create a well-integrated social relationship platform that goes in hand with other technologies for instance the CRM. The company will require an efficient network topology such as Bus topology. This kind of network will enable computers and other network devices stay connected on a single cable. It will transmit data in only one direction since it will have only two end points also known as the Linear Bus Topology. This will enable every device to stay connected to the network. This kind of Topology will be advantageous to the company as it is cost effective and easy to expand. However, in case the cable fails it means the whole network fails. For wireless connections, the company can use HYBRID Topology. This kind of topology is reliable as detecting errors is quit very easy (Rahman, & Esmailpour, April 2014). This makes the topology be regarded as effective and flexible. However, the design is complex and costly to install, this is because it is a combination of two topologies.
Which type of cabling would you recommend? Why do you think this would be the best choice?
To complete these networking, the company will require several networking cabling. Cabling carries data across the network, voice, serial-communications, alarm signals, video and audio transmission. This is why the company will require a reliable and well-designed structured cabling system. Cabling typical accounts for less than 10% of the total cost of network infrastructure (Croft, et al 2011). You can be sure the life span of the cabling system is more than 16 years if well installed. It is also important to know that more than half of the problems related to networking are due to poor cabling. This problems are such as slow access while accessing information. There are several communication cabling; this are twisted-pair, shielded or screened twisted pair and fiber optic. However, it is important to distinguish between the backbone cables and the horizontal cables. The backbone cables connect devices such as; servers, switches and routers while the horizontal cables connect the communication closets and the wall outlets. To bring the company back to life, twisted-pair cable can be.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
CURRENT EVENT: CLOUD COMPUTING 1
CLOUD COMPUTING 2
Cloud Computing
Cloud Computing
Introduction:
Cloud computing is that the conveyance identified with registering suppliers over the on the web. Regardless of whether they recognize the thing or not vital, a few individuals fabricate utilization of disabling recording providers as their very own consequence individual needs. Rather than keeping up information all alone repaired circle or transport to-date capacities to your necessities, you utilize partner email discoverer administration over the on the web, from a further place to be prepared to look the information you have or work to use its capacities. Doing in this way would conceivably bring out the unequivocal level of security edges (Rittinghouse and Ransome,).
Maintained the nation over to begin and which is related to points of interest close by mechanical improvement, weaken handling suggests that how related to benefitting figuring infers that returning from an organization, in need, by the method for a misuse client tablet or adaptable PC or PC joined with the framework. Cloud computing in more explicit words is routinely elucidated because the keeping close to getting to related to data along code over World Wide net rather than keeping in modified circle. The most goals ought to supply time-tested close by tweaked successful preparing environment to end customers. Cloud computing suppliers are as often as possible open, individual or crossbreed (Furth & Escalante).
The many main options concerning impair computing are:
1. The services square measures sometimes offered to end user would like computing means that square measure calculated off that build it potential for purchasers to pay restricted to means that alongside employment used.
2. The service is sometimes supplied alongside that a person could profit endless suppliers it would like.
3. A given exceptional quality related to suppliers is sometimes secure through service.
Characteristics of Cloud Computing
The procedure methodologies might be seen everywhere on at whatever time with all the regular frameworks that will be seen by a method for the net.
• A customer will just trade out any registering systems using administration firm while no man relationship.
• Computing region technique unit now and then shared by implies that of different desktops, these zone units powerfully issued to be prepared to desktops figuring on need.
• The registering procedures might be all around profited inside of an adaptable methodology by implies that of householders that may upgrade the methods at whatever time vital also to weaken once that are not anticipated.
• Cloud computing arrangements are region unit some of the time dynamic that is ...
Systems analysis project 10 can you answer the 4 questions at the t.pdfrohit219406
Systems analysis project 10: can you answer the 4 questions at the task section, thank you.
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The
centers have done well, and the company is planning an international expansion by opening a
new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT
consultant, Susan Park, to help develop an information system for the new facility. During the
project, Susan will work closely with Gray Lewis, who will manage the new operation.
Background
Susan and Gray finished their work on user interface, input, and output design. They developed
a user-centered design that would be flexible and easy to learn. Now Susan turned her attention
to the architecture for the new system. Susan wanted to consider their own organization and
culture, enterprise resource planning, total cost of ownership, scalability, Web integration, legacy
systems, processing methods, security issues, and corporate portal. She also needed to select a
network plan, or topology, that would dictate the physical cabling and network connections, or
consider a wireless network. When all these tasks were completed, she would submit a system
design specification for approval.
Tasks:
1. What would be the advantages of selecting an Internet-based architecture for the Personal
Trainer’s system?
2. If Personal Trainer wants to increase its Internet marketing efforts, what advice could you
offer? Perform research to find out more about the topic of Web-based marketing before you
answer Gray.
3. What software and hardware infrastructure will be necessary to ensure Personal Trainer can
process point of sale transactions?
4. Prepare an outline for a system design specification and describe the contents of each section
Solution
1)
The Internet has had a colossal effect on system architecture modeling. The Internet has turn out
to be more than a communication channel — numerous IT onlookers see it as a in a far-reaching
way distinctive environment for system development. In a customary client/server system, the
client handles the user interface and the server (or servers in a multi-level framework) handles
the information and application rationale. As it were, a piece of the framework keeps running on
the customer, part on the server.
Interestingly, in an Internet-based architecture, notwithstanding information and application
rationale, the whole user interface is given by the Web server as HTML coded documents that
are deciphered and showed by the client\'s browser. Moving the obligation regarding the
interface from the client to the server improves the procedure of information transmission and
results in lower hardware’s expenses and complexities. The pattern toward Internet-based e-
business is reshaping the IT scene as additional firms utilize the Web to manufacture proficient,
solid, and practical arrangements. At the point when arranging new systems, experts can utilize
accessible.
The advent of hybrid clouds, multi clouds and app driven business models hasnecessitated a network that has to be robust, secure and scalable to meet rapidly changing business expectations.
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
Running head: NETWORK DESIGN PROPOSAL
NETWORK DESIGN PROPOSAL15
NETWORK DESIGN PROPOSAL
Student’s Name
Professor’s Name
UNIVERSITY OF MARYLAND
Course Title
Physical Network Design
1. Network Topology
The purpose of this paper is to present a proposal of network architectural system; it explains analysis of a detailed network arrangement with the networking infrastructure. This paper includes the study of physical topology according to the business needs for establishing a network layout such as premises of campus of “University of Maryland” is connected along with the departments, library, rooms, laboratory, and grounds with the network connections. The data must be secured for the campus teachers as well as students through all network arrangements. The new network system should also take into consideration the future development of the campus with more labs, library, computer, classrooms other offices in the building locations. So the proposed layout of the network layout is worthwhile for University (Stewart, 2008).
A general layout of a network that is topological with a protected system linking within the campus of the college:
Business Needs
The Cisco Enterprise Specialist of the IT Business association is for IT professionals to help them provide their business with innovation to improve their business output. The IT experts will groom their skills as part of this association such as:
· Assessing the technological alternatives within a business connection
· Evaluating and meeting the business needs.
· Behaving and talking courteously with business peers.
· Getting knowledge about an aggregate expense of proprietorship and an arrival on speculation IT arrangement's (Eernet, (n.d)).
Proposed topology
It is important to keep the system documentation brief and comprehensive. Initially, at the establishment of a system, the system documentation is generally concise, but when the system changes or develops more, the documentation needs to be redesign. System topology maps usually present a unique floor arrangement. When there are changes in the floor arrangements, the necessary steps are taken to change the Diagrams or redline are created to demonstrate the alterations. The changed layout is organized and well presented. An outline that is as-assembled represents how actually a system was created, which can be further altered. It is guaranteed that the existing records reflect the all systems topology changes and arrangement of the as-manufactured floor.
(Cisco.com)
Justification for proposed network topology
The Cisco Services – is a global level organization having more than 9,500 workers in more than 120 countries with more than 380 locations – Cisco Enterprise Architecture Services has a trustworthy public image due to best practices, industry based technological developments, and brilliance. Cisco maintains various network emergency response vehicles (NERV)’s that are deployed by the Cisco employees in case of natural disa ...
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
Read the Discussions below and give a good reply
Discussion 1.
Information systems infrastructure consists the procedures of Software, Hardware, telecommunications, Networks managed by various specialists. Information systems are complementary networks like an organization that transcend information. Mainly it has 7 main components like Hardware platforms, Operating Systems, Software applications etc.
Information is data given meaning usually through some form of processing and combination with other data. Data is one of individual fact. An information system that collects, processes, manipulates, stores and communicates data according to a set of rules. It may include a methodology for update and feedback.
Usually, we can see information systems as two types. 1. Simple information systems 2. Complex Information systems.
A simple information system can be represented by Rolodex of names, addresses and telephone numbers
A complex information system could be a computer capable of storing the information on many Rolodexes, plus pictures, likes and dislikes, appointments and correspondence, organizing it for retrieval, a keyboard for input, a screen to view it, a printer for retrieval, a disk drive to store it and software to manage it.
Commonly an information system may only refer to a database management system which handles all the functions of collecting, managing, storing and retrieving the Rolodex information. Commonly today’s technological society, information systems are thought of within the context of the technology such as computers and software, but that need not be a case. As noted earlier, a Rolodex is also an information system
IS Evolution: Technology evaluation has impacted our lives positively over the last two decades so we should expect the same or similar outcomes from the future. If we observe the IT infrastructure evaluation, we can find several implementations from Enterprise computing to Cloud and mobile computing. Due to the implemental changes in Information systems, technology revolution happened over two decades.
Now an estimated 2.3 billion people worldwide using internet access and it became affordable. Technological advancements have had affects in all areas Health, Advertisement, Finance, Entertainment, just anything we can think about.
Ans: Give Reply
Discussion 2.
In 1960s a 5 MB of capacity was acquired a truck and now we can see terabytes of information in our grasp. This is an advancement of information frameworks. Today a huge number of clients are making information regarding content, voice, video and so forth. The association of this information is a major test for a portion of the organizations. Presently we are talking not as far as Gigabytes or Terabytes but rather Zettabyte (1000000000 TB).
So as to deal with this information three noteworthy developing patterns are approaching:
1. Democratization of Data: By making the information fair implies that information ought to be accessible for all. There ...
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxjeanettehully
Running head: NETWORK DIAGRAM AND WORKFLOW 1
NETWORK DIAGRAM AND WORKFLOW 2
Network and Workflow for Data Analytics Company
Name: sunil patel
Running head: Network diagram and work Flow 1
MIT 681: capstone Assignment 4
Network and Workflow for Data Analytics Company
Every company requires a workflow that is consistent with the network in order to achieve productivity and value addition. There are different network setups for different companies based on the services and products offered. The main idea behind formulation of a network is to map the workflow of the company to different resources available. The network design must guarantee effective connection among the staff members in a company. The relationship between network diagram and company’s workflow is based on the idea to maintain communication in the company among the existing staff members. The achievement of the company’s objective is based on the nature and performance of the network as well as the workflow of the respective company (Kumar & Kirthika, 2017). This paper outlines the design and architecture of a good practice network and workflow for a big data company.
The implementation of the network for a data analytics company requires planning based on the requirements and user roles. Connecting the staff is the main idea in a network architecture. The requirements for a data analytics company shall need data analysts for decision making and identification of opportunities in the market sector (Kumar & Kirthika, 2017). A good network workflow shall guarantee improvement in service offering for the company in context. A highly skilled team shall be required for the achievement of the objectives with the use of the network workflow.
The composition of a data analytics company is made of the leader director of analytics, data science manager and analytics manager. The director is in charge of management of the analytics and data science manager. He/she shall oversee the activities of the lower position leaders. The exploratory and description of the analyses shall be conducted by the data engineers in the lower departments. All data scientists shall be controlled by the data science manager in their respective roles. The company shall also have professionals in different fields and qualifications in other areas who shall collaborate in the achievement of objectives and goals of the institution. The skill set shall include; data architects, statisticians, software engineers, business analysts and data visualizers.
The major component of the network in the data analytics company is the software applied for data analysis. The software is usually created by the software engineers and comprises of components that are able to collect and process data (Cao, Chen, Zhao & Li, 2009). The role of the software engineers in this case is to guide the company with their skills and expertise for the best technology and implementation procedures. The advice and edu ...
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONScscpconf
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
Part 1.pdf
__MACOSX/._Part 1.pdf
Part 2.pdf
__MACOSX/._Part 2.pdf
Part 3.pdf
__MACOSX/._Part 3.pdf
Part 4.pdf
__MACOSX/._Part 4.pdf
Definitions
Term
Definition
Access
A means of approaching, entering, exiting, communicating with, or making use of: used a browser to access a website; accessed her bank account online.
Authentication
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.
Connection
A communications link between two points:
Established a connection to the Internet.
Customer
One that buys goods or services.
Data
Distinct pieces of digital information. Data is usually formatted in a specific way and can exist in a variety of forms, such as numbers, text, etc. When used in the context of transmission media, data refers to information in binary digital format.
Device
A device is a unit of physical hardware or equipment that provides one or more computing functions within a computer system. It can provide input to the computer, accept output or both. A device can be any electronic element with some computing ability that supports the installation of firmware or third-party software.
DSL
Digital Subscriber Line or Digital Subscriber Loop. Refers to the variety of different types of Digital Subscriber Line protocols – high-speed data transmission protocols that are compatible with regular copper telephone wire. DSL is typically used to provide a continuous, high-speed connection directly to an Internet Service Provider
Email
Electronic mail. A service that sends messages on computers via local or global networks.
Home network
A local area network (LAN) that connects the PCs in a home and lets users access the Internet simultaneously, share drives, share files and printers, and play head-to-head multi-player games.
Internet
A network of networks; a group of networks interconnected via routers. The Internet (with a capital I) is the world's largest internet.
Internet Access
Access to the Internet via a dial-up account via telephone circuit or direct connection.
Internet Protocol
(IP). The IP part of TCP/IP; the protocol used to route a data packet from its source to its destination over the Internet.
IP Address
The unique 32 bit number assigned to each computer connected to the Internet and used by the TCP/IP protocol to route packets of data to their destinations. The number is usually written in shorthand "dotted octet" notation in which the 32 bit address is grouped into four sets of 8 bits. Each of those eight-bit sets is converted into a decimal number, and the four resulting decimal numbers are written separated by dots. Most Internet addresses consist of a network portion and a node portion. The address for a host must be unique on the network. When you connect to a web server, for example, you may tell your browser to connect to www.mysite.com, but your computer ultimately has to translate the name to its IP .
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
1. The ALIVE status of each SEX. (SEX needs to be integrated into the only Male, Female, ND, and Other) (bar comparison chart, pie comparison chart)
2. How many Male, Female, ND, and Other are there in each ALIGN. (Bar comparison chart)
3. How many red-haired heroes do Marvel and DC have?
.
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
1. Some potentially pathogenic bacteria and fungi, including strains of Enterococcus, Staphylococcus, Candida, and Aspergillus, can survive for one to three months on a variety of materials found in hospitals, including scrub suits, lab coats, plastic aprons, and computer keyboards. What can hospital personnel do to reduce the spread of these pathogens?
2. Human immunodeficiency virus (HIV) preferentially destroys CD4+ cells. Specifically, what effect does this have on antibody and cell-mediated immunity?
**Provide APA references for each
.
More Related Content
Similar to Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
The advent of hybrid clouds, multi clouds and app driven business models hasnecessitated a network that has to be robust, secure and scalable to meet rapidly changing business expectations.
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
Running head: NETWORK DESIGN PROPOSAL
NETWORK DESIGN PROPOSAL15
NETWORK DESIGN PROPOSAL
Student’s Name
Professor’s Name
UNIVERSITY OF MARYLAND
Course Title
Physical Network Design
1. Network Topology
The purpose of this paper is to present a proposal of network architectural system; it explains analysis of a detailed network arrangement with the networking infrastructure. This paper includes the study of physical topology according to the business needs for establishing a network layout such as premises of campus of “University of Maryland” is connected along with the departments, library, rooms, laboratory, and grounds with the network connections. The data must be secured for the campus teachers as well as students through all network arrangements. The new network system should also take into consideration the future development of the campus with more labs, library, computer, classrooms other offices in the building locations. So the proposed layout of the network layout is worthwhile for University (Stewart, 2008).
A general layout of a network that is topological with a protected system linking within the campus of the college:
Business Needs
The Cisco Enterprise Specialist of the IT Business association is for IT professionals to help them provide their business with innovation to improve their business output. The IT experts will groom their skills as part of this association such as:
· Assessing the technological alternatives within a business connection
· Evaluating and meeting the business needs.
· Behaving and talking courteously with business peers.
· Getting knowledge about an aggregate expense of proprietorship and an arrival on speculation IT arrangement's (Eernet, (n.d)).
Proposed topology
It is important to keep the system documentation brief and comprehensive. Initially, at the establishment of a system, the system documentation is generally concise, but when the system changes or develops more, the documentation needs to be redesign. System topology maps usually present a unique floor arrangement. When there are changes in the floor arrangements, the necessary steps are taken to change the Diagrams or redline are created to demonstrate the alterations. The changed layout is organized and well presented. An outline that is as-assembled represents how actually a system was created, which can be further altered. It is guaranteed that the existing records reflect the all systems topology changes and arrangement of the as-manufactured floor.
(Cisco.com)
Justification for proposed network topology
The Cisco Services – is a global level organization having more than 9,500 workers in more than 120 countries with more than 380 locations – Cisco Enterprise Architecture Services has a trustworthy public image due to best practices, industry based technological developments, and brilliance. Cisco maintains various network emergency response vehicles (NERV)’s that are deployed by the Cisco employees in case of natural disa ...
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
Read the Discussions below and give a good reply
Discussion 1.
Information systems infrastructure consists the procedures of Software, Hardware, telecommunications, Networks managed by various specialists. Information systems are complementary networks like an organization that transcend information. Mainly it has 7 main components like Hardware platforms, Operating Systems, Software applications etc.
Information is data given meaning usually through some form of processing and combination with other data. Data is one of individual fact. An information system that collects, processes, manipulates, stores and communicates data according to a set of rules. It may include a methodology for update and feedback.
Usually, we can see information systems as two types. 1. Simple information systems 2. Complex Information systems.
A simple information system can be represented by Rolodex of names, addresses and telephone numbers
A complex information system could be a computer capable of storing the information on many Rolodexes, plus pictures, likes and dislikes, appointments and correspondence, organizing it for retrieval, a keyboard for input, a screen to view it, a printer for retrieval, a disk drive to store it and software to manage it.
Commonly an information system may only refer to a database management system which handles all the functions of collecting, managing, storing and retrieving the Rolodex information. Commonly today’s technological society, information systems are thought of within the context of the technology such as computers and software, but that need not be a case. As noted earlier, a Rolodex is also an information system
IS Evolution: Technology evaluation has impacted our lives positively over the last two decades so we should expect the same or similar outcomes from the future. If we observe the IT infrastructure evaluation, we can find several implementations from Enterprise computing to Cloud and mobile computing. Due to the implemental changes in Information systems, technology revolution happened over two decades.
Now an estimated 2.3 billion people worldwide using internet access and it became affordable. Technological advancements have had affects in all areas Health, Advertisement, Finance, Entertainment, just anything we can think about.
Ans: Give Reply
Discussion 2.
In 1960s a 5 MB of capacity was acquired a truck and now we can see terabytes of information in our grasp. This is an advancement of information frameworks. Today a huge number of clients are making information regarding content, voice, video and so forth. The association of this information is a major test for a portion of the organizations. Presently we are talking not as far as Gigabytes or Terabytes but rather Zettabyte (1000000000 TB).
So as to deal with this information three noteworthy developing patterns are approaching:
1. Democratization of Data: By making the information fair implies that information ought to be accessible for all. There ...
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxjeanettehully
Running head: NETWORK DIAGRAM AND WORKFLOW 1
NETWORK DIAGRAM AND WORKFLOW 2
Network and Workflow for Data Analytics Company
Name: sunil patel
Running head: Network diagram and work Flow 1
MIT 681: capstone Assignment 4
Network and Workflow for Data Analytics Company
Every company requires a workflow that is consistent with the network in order to achieve productivity and value addition. There are different network setups for different companies based on the services and products offered. The main idea behind formulation of a network is to map the workflow of the company to different resources available. The network design must guarantee effective connection among the staff members in a company. The relationship between network diagram and company’s workflow is based on the idea to maintain communication in the company among the existing staff members. The achievement of the company’s objective is based on the nature and performance of the network as well as the workflow of the respective company (Kumar & Kirthika, 2017). This paper outlines the design and architecture of a good practice network and workflow for a big data company.
The implementation of the network for a data analytics company requires planning based on the requirements and user roles. Connecting the staff is the main idea in a network architecture. The requirements for a data analytics company shall need data analysts for decision making and identification of opportunities in the market sector (Kumar & Kirthika, 2017). A good network workflow shall guarantee improvement in service offering for the company in context. A highly skilled team shall be required for the achievement of the objectives with the use of the network workflow.
The composition of a data analytics company is made of the leader director of analytics, data science manager and analytics manager. The director is in charge of management of the analytics and data science manager. He/she shall oversee the activities of the lower position leaders. The exploratory and description of the analyses shall be conducted by the data engineers in the lower departments. All data scientists shall be controlled by the data science manager in their respective roles. The company shall also have professionals in different fields and qualifications in other areas who shall collaborate in the achievement of objectives and goals of the institution. The skill set shall include; data architects, statisticians, software engineers, business analysts and data visualizers.
The major component of the network in the data analytics company is the software applied for data analysis. The software is usually created by the software engineers and comprises of components that are able to collect and process data (Cao, Chen, Zhao & Li, 2009). The role of the software engineers in this case is to guide the company with their skills and expertise for the best technology and implementation procedures. The advice and edu ...
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONScscpconf
In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop
environment. We also discuss various possible solutions for the issues in cloud computing
security and Hadoop. Today, Cloud computing security is developing at a rapid pace which
includes computer security, network security and information security. Cloud computing plays a
very vital role in protecting data, applications and the related infrastructure with the help of
policies, technologies and controls.
Part 1.pdf
__MACOSX/._Part 1.pdf
Part 2.pdf
__MACOSX/._Part 2.pdf
Part 3.pdf
__MACOSX/._Part 3.pdf
Part 4.pdf
__MACOSX/._Part 4.pdf
Definitions
Term
Definition
Access
A means of approaching, entering, exiting, communicating with, or making use of: used a browser to access a website; accessed her bank account online.
Authentication
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.
Connection
A communications link between two points:
Established a connection to the Internet.
Customer
One that buys goods or services.
Data
Distinct pieces of digital information. Data is usually formatted in a specific way and can exist in a variety of forms, such as numbers, text, etc. When used in the context of transmission media, data refers to information in binary digital format.
Device
A device is a unit of physical hardware or equipment that provides one or more computing functions within a computer system. It can provide input to the computer, accept output or both. A device can be any electronic element with some computing ability that supports the installation of firmware or third-party software.
DSL
Digital Subscriber Line or Digital Subscriber Loop. Refers to the variety of different types of Digital Subscriber Line protocols – high-speed data transmission protocols that are compatible with regular copper telephone wire. DSL is typically used to provide a continuous, high-speed connection directly to an Internet Service Provider
Email
Electronic mail. A service that sends messages on computers via local or global networks.
Home network
A local area network (LAN) that connects the PCs in a home and lets users access the Internet simultaneously, share drives, share files and printers, and play head-to-head multi-player games.
Internet
A network of networks; a group of networks interconnected via routers. The Internet (with a capital I) is the world's largest internet.
Internet Access
Access to the Internet via a dial-up account via telephone circuit or direct connection.
Internet Protocol
(IP). The IP part of TCP/IP; the protocol used to route a data packet from its source to its destination over the Internet.
IP Address
The unique 32 bit number assigned to each computer connected to the Internet and used by the TCP/IP protocol to route packets of data to their destinations. The number is usually written in shorthand "dotted octet" notation in which the 32 bit address is grouped into four sets of 8 bits. Each of those eight-bit sets is converted into a decimal number, and the four resulting decimal numbers are written separated by dots. Most Internet addresses consist of a network portion and a node portion. The address for a host must be unique on the network. When you connect to a web server, for example, you may tell your browser to connect to www.mysite.com, but your computer ultimately has to translate the name to its IP .
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
1. The ALIVE status of each SEX. (SEX needs to be integrated into the only Male, Female, ND, and Other) (bar comparison chart, pie comparison chart)
2. How many Male, Female, ND, and Other are there in each ALIGN. (Bar comparison chart)
3. How many red-haired heroes do Marvel and DC have?
.
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
1. Some potentially pathogenic bacteria and fungi, including strains of Enterococcus, Staphylococcus, Candida, and Aspergillus, can survive for one to three months on a variety of materials found in hospitals, including scrub suits, lab coats, plastic aprons, and computer keyboards. What can hospital personnel do to reduce the spread of these pathogens?
2. Human immunodeficiency virus (HIV) preferentially destroys CD4+ cells. Specifically, what effect does this have on antibody and cell-mediated immunity?
**Provide APA references for each
.
1. Taking turns to listen to other students is not always easy f.docxketurahhazelhurst
1. Taking turns to listen to other students is not always easy for young children. What does the research show about promoting good listeners in the classroom setting?
2. How would you help the shyest student to become a confident speaker? How would you help the overly confident speaker to have self-control? Why are these skills important to instill in children at this age? How can becoming a confident speaker encourage stronger advocacy skills for themselves? Likewise, how does maintaining self-control encourage better listening?
.
1. The main characters names in The Shape of Things are Adam and E.docxketurahhazelhurst
1. The main characters names in "The Shape of Things" are Adam and Evelyn, suggesting the play is a retelling of the original creation myth. Compare the original “Adam and Eve” and characters in the Judea-Christian creation account to Adam and Evelyn. How is The Shape of Things similar or different from the traditional Judea-Xian account? (Keep in mind the main difference being art and artistic versus theistic creation).
2. The “garden” is the museum, and roped off sculpture with the fig leaf is, like the tree of good and evil, what you’re not supposed to touch. Why does the author present the museum as a creation space? How is the sculpture like the tree of good and evil? What happens when they cross the line and touch (or photograph) it?
3. Compare Evelyn and Pygmalion as creators. How does their gender effect their position in history and creation? How do both their creations critique the culture in which they exist? Describe the "changes" to society that Evelyn and Pygmalion aspire to in their art.
4. How much are the creators (Evelyn and Pygmalion) in control of creation and their art work? Where does their control break down? What is the difference between creator and creature; or is the creature reducible to its creator?
5. When does Adam assert his own mind, (if at all) or veer towards independence by not relying on the tools to achieve superficial beauty that Evelyn imparts?
.
1. Select one movie from the list belowShutter Island (2010; My.docxketurahhazelhurst
1. Select one movie from the list below:
Shutter Island (2010; Mystery, Thriller; Leonardo DiCaprio, Mark Ruffalo
2. Watch the film you have selected as a psychology student and not merely as an ordinary film viewer (it is suggested that you watch the selected film multiple times).
3. Provide your own summary of the film, using psychological terms and concepts that you have learned in class and from your textbook. State clearly the psychological disorder you have seen portrayed in the film you have chosen, using DSM criteria/language. You should explain the psychological disorder portrayed in the movie. Determine and evaluate if the disorder identified in the film is accurate according to your textbook and other resource materials. Provide evidence using actual behaviors seen in the film. Is the depiction of the psychological disorder in the film accurate or not? Give evidence to support your claims using observable behaviors from the movie.
4. Based on the information from the film, determine what clinical diagnosis (or diagnoses) a character from the movie most likely has/have (can be the main character or supporting characters). Use criteria provided by the DSM-5 and provide an evidence-based diagnosis/diagnoses of the person. You will need to justify their diagnoses by demonstrating how the character’s symptoms meet some or all the criteria outlined in the DSM-5 as evidence of your diagnosis/diagnoses. Everything that you assert should be supported by evidence.
7. Be sure to use APA format using the latest edition of the APA Manual (7th edition).
.
1. Select a system of your choice and describe the system life-cycle.docxketurahhazelhurst
1. Select a system of your choice and describe the system life-cycle. Construct a detailed flow diagram tailored to your situation
2. What characteristics of an airplane would you attribute to the system as a whole rather than to a collection of its parts? Explain why.
.
1. Sensation refers to an actual event; perception refers to how we .docxketurahhazelhurst
1. Sensation refers to an actual event; perception refers to how we interpret the event. What are some cultural differences that might affect responses to particular stimuli, particularly in taste and pain?
2. Most of us feel like we never get enough sleep. What are the stages of sleep and what is the importance of sleep? What are some common sleep disorders and treatments?
.
1. The Institute of Medicine (now a renamed as a part of the N.docxketurahhazelhurst
1. The Institute of Medicine (now a renamed as a part of the
National Academies of Sciences, Engineering, and Medicine
) defined patient-centered care as: "Providing care that is respectful of and responsive to individual patient preferences, needs, and values, and ensuring that patient values guide all clinical decisions.”[1] While this definition clearly emphasizes the importance of a patient’s perspective in the context of clinical care delivery, it does not allow managers to focus on the actual “person” inside the institutional role of the patient.
In the same sense that a person who is incarcerated in a prison may receive extremely humane treatment, the “person” is still defined into the role of an “inmate,” and as such cannot, by definition, be granted the same rights and privileges as a non-institutionalized member of the civil order enjoys. In other words, I may be placed in a cell with great empathy and understanding of my preferences, needs, and values, but I am still being locked-up in jail.
No one is suggesting that being admitted into a jail cell is the same as being admitted into a hospital bed. There are many obvious differences between the two, including the basic purpose of the two institutions.
But while much is different, what is the same is how a pre-existing set of structured behaviors and processes are used to firmly, and without asking or negotiating, radically transform a “regular” person into a defined role of a “patient” that then can be diagnosed, treated, and discharged back into the world once the patient has finished their “time” in the “system.”
While patient-centered care emphasizes the value of increased sensitivity to a patient’s preferences, needs, and values, what we want to focus on is how decisions made by healthcare leaders affect the actual experience of a person receiving that care.
So with the "real person" in mind, this week's question is:
What can healthcare leaders do in improve the actual personal experience that "real people" go through as our "patients?"
(Be sure to develop your answers AFTER you review the definition and roles of "Leadership" in the readings for this week).
[1] Institute on Medicine, Crossing the Quality Chasm: A New Health System for the 21st Century, March, 2001
2. Health Information Technonogy - PPP Discussion
The board has created an innovation fund designed to foster improved quality, increased access, or reduced costs in healthcare delivery. Select a health information technology related to genomics, precision medicine, or diagnostics that you would propose to be funded for implementation. Prepare a PowerPoint presentation that describes the selected health information technology, what it does, why it would be beneficial, and what risks may be involved. Please note, this activity is weighted 5% toward the final grade. The PowerPoint should be no more than 5-6 slides with the presenter's notes. Follow the APA format.
.
1. The Documentary Hypothesis holds that the Pentateuch has a number.docxketurahhazelhurst
1. The Documentary Hypothesis holds that the Pentateuch has a number of underlying documents (alt., sources) that were ultimately gathered and sewn into the Pentateuch as we now have it. The method of separating those underlying documents is called source criticism. Please perform a source-critical analysis of Gen 1-3. In so doing, please identify the significant features that distinguish each underlying document. Note: There are many such features.
2. Why are covenants important in the Bible? What do they accomplish? Are they all the same, whether in structure or outlook? Do the different writers view them differently? What does the ancient Near Eastern background to the biblical covenant contribute to our understanding?
3. Dt 6:4 used to be translated
“Hear, O Israel: The LORD [YHWH] our God, the LORD [YHWH] is one.”
Currently, we translate
“Hear, O Israel: The LORD [YHWH] is our God, the LORD [YHWH] alone.”
In all likelihood, the second translation is grammatically preferable. What is the interpretive difference between “one” and “alone”? Is it significant? How, if at all, does this verse relate to the First Commandment? How does this verse relate to Gen 1:26, 3:22, and 11:7? How does this verse relate to the variant non-MT variant in Dt 32:8-9 (as reproduced in HarperCollins)? Why is any of this important?
Be sure to provide a careful, well-written essay which gives ample biblical examples (proof texts) to support the point(s) you wish to make.
.
1. Search the internet and learn about the cases of nurses Julie.docxketurahhazelhurst
1. Search the internet and learn about the cases of nurses Julie Thao and Kimberly Hiatt.
2. List and discuss lessons that you and all healthcare professionals can learn from these two cases.
3. Describe how the principle of beneficence and the virtue of benevolence could be applied to these cases. Do you think the hospital adminstrators handled the situations legally and ethically?
4. In addition to benevolence, which other virtues exhibited by their colleagues might have helped Thao and Hiatt?
5. Discuss personal virtues that might be helpful to second victims themselves to navigate the grieving process.
Scholarly article, APA format, and no grammar error
.
1. Search the internet and learn about the cases of nurses Julie Tha.docxketurahhazelhurst
1. Search the internet and learn about the cases of nurses Julie Thao and Kimberly Hiatt.
2. List and discuss lessons that you and all healthcare professionals can learn from these two cases.
3. Describe how the principle of beneficence and the virtue of benevolence could be applied to these cases. Do you think the hospital adminstrators handled the situations legally and ethically?
4. In addition to benevolence, which other virtues exhibited by their colleagues might have helped Thao and Hiatt?
5. Discuss personal virtues that might be helpful to second victims themselves to navigate the grieving process.
use reference and scholarly nursing article.
.
1. Review the three articles about Inflation that are found below th.docxketurahhazelhurst
1. Review the three articles about Inflation that are found below this.
Globalization and Inflatio
n
Drivers of Inflation
Inflation
and Unemploymen
t
2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.
3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.
4.The replies are due by the deadline specified in the Course Schedule.
Please post (in APA format) your article citation.
.
1. Review the following request from a customerWe have a ne.docxketurahhazelhurst
1. Review the following request from a customer:
We have a need to replace the aging Signage Application. This application is housed in District 4 and serves the district as well as two other districts. We would like a new application that can be used statewide to track all information related to road signs.
The current system is old and doesn’t do most of what we need it to.
The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved.
We also can’t create our own reports, on-demand, when we need to. Currently, data is entered into the application manually by Administrative Staff, but in the future, we would like to be able to take a picture of the road sign using a phone app, and have it automagically populate the database with geospatial location and other information. We thought about having a Smart Watch interface, but we don’t need that. Also, the current method does not have any way to manage the quality of the data that is entered, so there is a lot of garbage information there. There is no way to centrally manage security access, with the existing application. We want to get real time alerts when a sign gets knocked over in an accident and have a dashboard that shows where signs have been knocked over across the state. This is kind of important, but not super-critical. We need to store location information, types of signs, when a new sign is installed, who installed it, etc. We plan to provide the phone app to drivers in each district who will drive around, take pictures of the signs, and upload them to the database at the end of each day, or in realtime, if a data connection is available.
Back in Central Office, reviewers will review the sign information and validate it. A report will be printed every month with the results and a map. There are probably other things, but we can’t think of anything else right now.
2. List the main goal(s) of this request
3. Write all the user stories you see (include value statements and acceptance criteria, if possible)
4. Prioritize the user stories as
a. Critical
b. Important
c. Useful
d. Out of Scope
5. Are the user stories sufficiently detailed? If not, what steps would you take to split them/further define them?
6. What are the known Data Entities?
7. Is there an implied business process? Draw an activity diagram or a flow chart of it
8. Who are the actors/roles?
9. What questions would you ask of the stakeholders to get more information?
10. What technology should be used to implement the solution?
11. What would you do next as the assigned Business Analyst working on an Agile team?
.
1. Research risk assessment approaches.2. Create an outline .docxketurahhazelhurst
1. Research risk assessment approaches.
2. Create an outline for a basic qualitative risk assessment plan.
3. Write an introduction to the plan explaining its purpose and importance.
4. Define the scope and boundaries for the risk assessment.
5. Identify data center assets and activities to be assessed.
6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
7. Identify relevant types of controls to be assessed.
8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
9. Develop a proposed schedule for the risk assessment process.
10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.
.
1. Research has narrowed the thousands of leadership behaviors into .docxketurahhazelhurst
1. Research has narrowed the thousands of leadership behaviors into two primary dimensions. Please list and discuss these two behaviors.
2. Distinguish between charismatic, transformational, and authentic leadership. Could an individual display all three types of leadership?
.
1. Research Topic Super Computer Data MiningThe aim of this.docxketurahhazelhurst
1. Research Topic: Super Computer Data Mining
The aim of this project is to produce a super-computing data mining resource for use by the UK academic community which utilizes a number of advanced machine learning and statistical algorithms for large datasets. In particular, a number of evolutionary computing-based algorithms and the ensemble machine approach will be used to exploit the large-scale parallelism possible in super-computing. This purpose is embodied in the following objectives:
1. to develop a massively parallel approach for commonly used statistical and machine learning techniques for exploratory data analysis
1. to develop a massively parallel approach to the use of evolutionary computing techniques for feature creation and selection
1. to develop a massively parallel approach to the use of evolutionary computing techniques for data modelling
1. to develop a massively parallel approach to the use of ensemble machines for data modelling consisting of many well-known machine learning algorithms;
1. to develop an appropriate super-computing infra-structure to support the use of such advanced machine learning techniques with large datasets.
Research Needs:
Problem definition – In the first phase problem definition is listed i.e. business aims and objectives are determined taking into consideration certain factors like the current background and future prospective.
Data exploration – Required data is collected and explored using various statistical methods along with identification of underlying problems.
Data preparation – The data is prepared for modeling by cleansing and formatting the raw data in the desired way. The meaning of data is not changed while preparing.
Modeling – In this phase the data model is created by applying certain mathematical functions and modeling techniques. After the model is created it goes through validation and verification.
Evaluation – After the model is created, it is evaluated by a team of experts to check whether it satisfies business objectives or not.
Deployment – After evaluation, the model is deployed and further plans are made for its maintenance. A properly organized report is prepared with the summary of the work done.
Research paper Policy
· APA format
. https://apastyle.apa.org/
. https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
· Min number of pages are 15 pages
· Must have
. Contents with page numbers
. Abstract
. Introduction
. The problem
4. Are there any sub-problems?
4. Is there any issue need to be present concerning the problem?
. The solutions
5. Steps of the solutions
. Compare the solution to other solution
. Any suggestion to improve the solution
. Conclusion
. References
· Missing one of the above will result -5/30 of the research paper
· Paper does not stick to the APA will result in 0 in the research paper
· Submission
. you have multiple submission to check you safe assignments
. The percentage accepted is 1%.
1. Research and then describe about The Coca-Cola Company primary bu.docxketurahhazelhurst
1. Research and then describe about The Coca-Cola Company primary business activities. Include: Minimum 7 Pages. Excluding reference page
2.
A. A brief historical summary,
B. A list of competitors,
C. The company's position within the industry,
D. Recent developments within the company/industry,
E. Future direction, and
F. Other items of significance to your corporation.
3. Include information from a variety of resources. For example:
A. Consult the Form 10-K filed with the SEC.
B. Review the Annual Report and especially the Letter to Shareholders
C. Explore the corporate website.
D. Select at least two significant news items from recent business periodicals
The report should be well written with cover page, introduction, the body of the paper (with appropriate subheadings), conclusion, and reference page.
.
1. Prepare a risk management plan for the project of finding a job a.docxketurahhazelhurst
1. Prepare a risk management plan for the project of finding a job after graduation.
and
2. Develop a reward system for motivating IPT members to do their jobs more conscientiously and to take on more responsibility.
[The assignment should be at least 400 words minimum and in APA format (including Times New Roman with font size 12 and double spaced), and attached as a WORD file.]
Plagiarism free
.
1. Please define the term social class. How is it usually measured .docxketurahhazelhurst
1. Please define the term social class. How is it usually measured? What are some ways that social class is affecting health outcomes for people who become ill with COVID-19?
2. What is the CARES Act? Has it been enough? What has happened to people's ability to pay their bills since it expired?
3. As things stand now, data is showing higher COVID-19 related mortality rates for African Americans. Given what you know from the textbook and from the attached articles, what are some explanations for the disparity?
4. What is environmental racism (injustice)? How does environmental racism put some populations at higher risk for severe medical complications than others? (Vice article)
https://www.theatlantic.com/ideas/archive/2020/07/600-week-buys-freedom-fear/613972/
https://www.vox.com/2020/4/10/21207520/coronavirus-deaths-economy-layoffs-inequality-covid-pandemic
https://www.vice.com/en_us/article/pke94n/cancer-alley-has-some-of-the-highest-coronavirus-death-rates-in-the-country
https://www.theguardian.com/us-news/2020/apr/12/coronavirus-us-deep-south-poverty-race-perfect-storm
.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
1. Case Study—PART 1—Jurisdictional Declaration
Criteria
Levels of Achievement
Content
(70%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not Present
Total
Economic Development Location
18.5 to 20 points:
Location is clearly delineated, fully meeting assignment
standards.
16.5 to 18 points:
Meets most of the assignment standards.
1 to 16 points:
Location needs further specification before the student may
proceed.
0 points
Not present
Action Research Statement of Work Understood and Signed
13.5 to 15 points:
Template completed.
12.5 to 13 points:
Template partially completed.
1 to 12 points:
Student Modified Template
2. 0 points
Not present
Structure (30%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not present
Total
Formatting, Spelling, and Grammar
13.5 to 15 points:
No spelling or grammar errors
12.5 to 13 points:
1-2 spelling and/or
grammar errors
1 to 12 points:
3-4 spelling and/or
grammar errors
0 points
Not present
Professor Comments:
Total:
/50
Running head: NETWORK DESCRIPTION 1
3. NETWORK DESCRIPTION 6
NETWORK DESCRIPTION
Institution Affiliation
Student Name
Date
HEALTH-COP COMPANY
Network and Workflow Description
Data mining is a complex process that involves several
activities undertaken sequentially for the entire process to be
successful. As such, there are specific protocols that must be
followed in data mining. The desired goals and objectives are
the guiding principles upon which the type of data to be
analyzed is identified. The main goal for Health-Cop is to
establish links between diet composition and health issues.
More specifically, the company will focus on analysis of data
from various health facilities, websites, databases and health
journals. The analysis is intended to provide new forms of data
that can be interpreted to give meaningful patterns. To facilitate
the process of data mining, there are several aspects that must
be considered such as: statistics, clustering of data, rules of
association, data classification, visualization and the decision
tree.
4. Network Description
Health Cop company will set up is network system using both
the windows and Linux based operating system. The company
will have 10 desktop computers and 5 portable computers. The
10 desktop computers will be connected together via a metered
Wi-Fi service. The desktops will be the main engine of the
company. All the desktops will be configured with an algorithm
that constantly searches for specific keywords from various
databases. The portables computers will be connected to the
internet via modems. A modem is much safer since it limits the
connectivity to only the device being used. Internet connectivity
via modem is facilitated through local area networks (LAN),
through to the service providers, (Cui, et.al., 2016). Multiple
firewalls are set up within the company networks to sort out
undesired data traffic from the local network on the computer
devices.
The most suitable firewall for the network would be a layer 3
open systems interconnection (OSI) model, which guarantees
maximum security to the local network systems, (Greenberg,
et.al., 2016). This type of models is well designed to suit
communication within several computers in a standard network
system. The network router will generate IP addresses whose
packets will be used to launch communication between the
computers used. All the data mined through configured search
engine will be relayed to the devices whose IP addresses are
saved in the network. Since all computers will be assigns
specific IP addresses, resource sharing and data transfer will be
effectively done via the network systems.
The network architecture will be designed with two firewalls
configured into a two firewall demilitarized zone (DMZ). The
DMZ is located on a neutral level that serves as the linkage and
contact point between Health-Cop network systems and the
internet. This is very crucial for maintaining maximum network
security. This kind of security protocol also ensures that
company networks are not exposed to any threat that may be
launched via internet. Health-cop’s domain name servers will
5. remain secured and thus the process of translating IP addresses
will be much effective. Interpretation and translation of IP
addresses by the company DNS servers facilitates retrieval of
data from the internet.
The switch devices have been incorporated in the network
architecture since Health-cop networks will be configured on
the Windows server system. Since the system is configured with
layer 3 OSI, enterprise level uses must be used for the process
of packet routing to be successfully executed, (Shatri, et.al.,
2017). This facilitates the transfer of data packets to different
computers in the company system. Switches are much better
compared to hubs in a network because they only relay data
packets to a specific MAC address destination. Windows server
system also requires routers to be installed and configured in
the system to facilitate the application of virtual private
network (VPN) devices.
Figure 1 Network Architecture
The network incorporates a backbone to host the two switches
that have been designed in the network system. The backbone
also facilitates effective communication between multiple
devices operating within the Health-Cop network systems.
Work flow
The first stage of the data mining process will be data
collection. The search algorithms will be configured to detect
certain key words from the databases analyzed. The collected
data will then be stored on the network and into the computer
drives. Once the data is stored on the data, the data will be
subjected to screening and cleansing procedures on the network
systems. Afterwards, the data will be classified according to
different clusters and patterns identified through the analysis,
6. (Adamuz-Hinojosa, et.al., 2018).
Figure 2Network diagram
The analytics will also involve regression predictions and
outlier identification procedures. Finally, the data will be sorted
and the relevant data sent to the network optimization unit
while the irrelevant data will be directed back to the regression
n analysis. The relevant data will be interpreted in the network
optimization units and used to create patterns that explain the
links between a certain dietary behavior with a specific lifestyle
disease.
In conclusion, the company’s network is designed to source for
voluptuous data from various internet sources, databases and the
cloud, and come up with relevant patterns that would be used to
facilitate data analysis and reporting. The entire process must
follow the outlined protocol for success to be achieved.
References
Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P.,
Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018).
Automated network service scaling in nfv: Concepts,
mechanisms and scaling workflow. IEEE Communications
Magazine, 56(7), 162-169.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets
software-defined networking: SDN for big data and big data for
SDN. IEEE network, 30(1), 58-65.
Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta,
S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039.
Washington, DC: U.S. Patent and Trademark Office.
Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in-
the-loop architecture with MATLAB/Simulink and QuaRC for
rapid prototyping of CMAC neural network controller for ball-
and-beam plant. In 2017 40th International Convention on
Information and Communication Technology, Electronics and
Microelectronics (MIPRO) (pp. 1201-1206). IEEE.
7. Cloud Computing
Cloud Computing
Institution Affiliation
Student Name
Date:
Health-cop company is a start -up company will offer data
analytics services to various companies. The company helps
heath facilities through proper service delivery to their clients
through support of data analysis. The company aims at
improving its services through the adoption of innovative
technologies. In a review, the company aims at implementing a
cloud platform to act as data heaven that will support for data
storage as well as predictive data analysis. The company intends
to use the software as a service approach in the cloud computing
environment (Tsai, Bai, & Huang, 2014). Fetching of data will
be performed through the support of the internet of things. This
paper will, therefore, seek to identify how the company intends
to use the cloud platform in its operations.
8. Goals and Objectives
The company aims to be a leading provider of predictive
data analytics services across the united states. In its goal to
become a diverse company in its service providence, the
company aims at earning profits from its wide range of services
it offers. The main aim is to provide organizations with data
handling support. In this view, the company aims at providing
real-time streams of data analytics. The software as a service
platform will enable the company to have accessibility from
many places in the nation (Khoshafian, 2016). In its mandate,
the organization aims to provide the safest and the most
dependable data facilities that the clients can have confidence
in. The company aims at providing scheduled as well as random
reports on the various predictive data analysis dockets it is
tasked with. The company provides for this intending to provide
a robust structure that will enable its client organization to
perform health information analysis that will enable them to
attain a competitive advantage in privately owned hospitals.
Content Security Policy
Considering the fact that Health-cop company intends to
use a cloud platform in data storage and handling as well as
offering support for data analytics, there will be a need to have
a policy that will ensure the security of data. The expected
security is enabled through the website that will be used to
access data from the cloud platform. The content security
policy will help in detection as well as prevention of certain
types of attacks that target cloud platforms (Patil, & Frederik,
2016). A content security policy will be capable of efficiently
handling forms of attacks such as cross-site scripting, browser
hijacking, form jacking as well as ad injecting. The company
plans to have a regularly updated inventory of the first- and
third-party domains, lists of whitelisted domains and a method
of alerting violations of the content security policy. The
company also aims to have a regular update of the policy in
order to ensure that it meets data security standards.
Organizational Structure
9. Health-cop Company is headed by a chief executive officer
who is in charge of coordinating different departments in the
organization. In his mandate, the chief executive officer is in
charge of fostering a good relationship between the company
and the target client companies. Through his influence, he
makes approval of innovative technology such as the current
impending cloud computing platform. Under the chief
executive officer, lies a business manager and a functional
manager. The business manager ensures that the company is
strategically positioned to perform business (Goetsch, & Davis,
2014). The functional manager coordinates activities that lay
down the structure of the business. He is in charge of
coordinating information technology issues. The three top
bosses are mandated to sit in board meetings that discuss the
reports of the business. There are other supervisors who are I
charge of other smaller departments in the company.
Target Market
The company target all the health facilities across in the state.
The intention of targeting these companies is that they are in a
position to purchase the data storage and analytics plans the
company offers. The company will provide the predictive data
analysis services to companies that are in need to perform
digitized and more efficient market analysis (Liu, 2014). The
idea is to enable these companies to identify market niches as
well as to attain competitive advantages. The company will
target these companies through specialized plans that will
enable favourable conditions that are economically viable.
Market Niche
With the many chronic diseases in the country, health
organizations are increasingly having the need to predict the
prevalence of these diseases. Health-cop services will provide
the much-needed reports to health facilities. These will help
health facilities draw plans on how to curb as well as prevent
diseases.
Budget Estimation
With the infrastructure that comes with the cloud
10. computing platform, it is will be necessary to have a special
room where architectural equipment will be placed. The cost of
building a physically secure room will be incurred. There will
also be a cost incurred in buying a domain that will be used to
access cloud resources. A server will also be procured in order
to support the large network of organizations that will be linked
to the company’s cloud platform. Installing the technology will
also require an investment in financial resources in acquiring
skilled personnel to install and maintain the cloud platform. In
addition, training of human resource personnel in the company
will incur some cost.
Conclusion
A review of current marketing trends in many
organizations indicates that data handling an analysis are key
components of every organization. Every organization strives to
ensure that they can grasp market requirements that gives them
a niche in the market. For these reasons, Health-cop Company’s
cloud computing project fits the market requirements of data
handling and analysis.
References
Goetsch, D. L., & Davis, S. B. (2014). Quality management for
organizational excellence. Upper Saddle River, NJ: Pearson.
Khoshafian, S. (2016). Service oriented enterprises. Auerbach
Publications.
Liu, Y. (2014). Big data and predictive business analytics. The
Journal of Business Forecasting, 33(4), 40.
Patil, K., & Frederik, B. (2016). A Measurement Study of the
Content Security Policy on Real-World Applications. IJ
Network Security, 18(2), 383-392.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service
(SaaS): perspectives and challenges. Science China Information
Sciences, 57(5), 1-15.
11. Running head: NETWORK DESCRIPTION 1
NETWORK DESCRIPTION 6
NETWORK DESCRIPTION
Institution Affiliation Iglobal University
Student Name Krishna Chaithanya Arabati
Date 8/13/2019
HEALTH-COP COMPANY
Network and Workflow Description
Data mining is a complex process that involves several
activities undertaken sequentially for the entire process to be
successful. As such, there are specific protocols that must be
followed in data mining. The desired goals and objectives are
the guiding principles upon which the type of data to be
analyzed is identified. The main goal for Health-Cop is to
establish links between diet composition and health issues.
More specifically, the company will focus on analysis of data
from various health facilities, websites, databases and health
journals. The analysis is intended to provide new forms of data
that can be interpreted to give meaningful patterns. To facilitate
the process of data mining, there are several aspects that must
be considered such as: statistics, clustering of data, rules of
12. association, data classification, visualization and the decision
tree.
Network Description
Health Cop company will set up is network system using both
the windows and Linux based operating system. The company
will have 10 desktop computers and 5 portable computers. The
10 desktop computers will be connected together via a metered
Wi-Fi service. The desktops will be the main engine of the
company. All the desktops will be configured with an algorithm
that constantly searches for specific keywords from various
databases. The portables computers will be connected to the
internet via modems. A modem is much safer since it limits the
connectivity to only the device being used. Internet connectivity
via modem is facilitated through local area networks (LAN),
through to the service providers, (Cui, et.al., 2016). Multiple
firewalls are set up within the company networks to sort out
undesired data traffic from the local network on the computer
devices. Comment by Mark O'Connell: ? Comment by
Mark O'Connell: Think you mean Wifi??
The most suitable firewall for the network would be a layer 3
open systems interconnection (OSI) model, which guarantees
maximum security to the local network systems, (Greenberg,
et.al., 2016). This type of models is well designed to suit
communication within several computers in a standard network
system. The network router will generate IP addresses whose
packets will be used to launch communication between the
computers used. All the data mined through configured search
engine will be relayed to the devices whose IP addresses are
saved in the network. Since all computers will be assignsed
specific IP addresses, resource sharing and data transfer will be
effectively done via the network systems. Comment by
Mark O'Connell: ? routers don’t “generate” IP addresses. Not
sure what you mean.Comment by Mark O'Connell: No. The
Windows OS has the TCP/IP that generates packets Comment by
Mark O'Connell: What devices? What is transferring data to
what? Comment by Mark O'Connell: I’m getting lost here
13. The network architecture will be designed with two firewalls
configured into a two firewall demilitarized zone (DMZ). The
DMZ is located on a neutral level that serves as the linkage and
contact point between Health-Cop network systems and the
internet. This is very crucial for maintaining maximum network
security. This kind of security protocol also ensures that
company networks are not less exposed vulnerable to any threat
that may be launched via internet. Health-cop’s domain name
servers will remain secured and thus the process of translating
IP addresses will be much effective. Interpretation and
translation of IP addresses by the company DNS servers
facilitates retrieval of data from the internet. Comment by
Mark O'Connell: vulnerable Comment by Mark O'Connell: If
you only have laptops you are probably using regional DNS
servers outside your network from Windows on your PCs
The switch devices have been incorporated in the network
architecture since Health-cop networks will be configured on
the Windows server system. Since the system is configured with
layer 3 OSI, enterprise level uses must be used for the process
of packet routing to be successfully executed, (Shatri, et.al.,
2017). This facilitates the transfer of data packets to different
computers in the company system. Switches are much better
compared to hubs in a network because they only relay data
packets to a specific MAC address destination. Windows server
system also requires routers to be installed and configured in
the system to facilitate the application of virtual private
network (VPN) devices. Comment by Mark O'Connell: ?
Comment by Mark O'Connell: What? Enterprise uses must
be used… Comment by Mark O'Connell: Not sure what you’re
getting at with this Layer 3 OSI issue. Layer 3 devices use
focused IP routing whereas Layer 2 device are in broadcast
mode to all devices on the network. Your network is tiny.
Figure 1 Network Architecture
The network incorporates a backbone to host the two switches
that have been designed in the network system. The backbone
14. also facilitates effective communication between multiple
devices operating within the Health-Cop network systems.
Work flow
The first stage of the data mining process will be data
collection. The search algorithms will be configured to detect
certain key words from the databases analyzed. The collected
data will then be stored on the network and into the computer
drives. Once the data is stored on the data, the data will be
subjected to screening and cleansing procedures on the network
systems. Afterwards, the data will be classified according to
different clusters and patterns identified through the analysis,
(Adamuz-Hinojosa, et.al., 2018). Comment by Mark
O'Connell: ? I assume when a Keyword is found – some volume
of data gets extracted from the databases being searched
Comment by Mark O'Connell: What? “Once the data is
stored on the data…”
Figure 2Network diagram
The analytics will also involve regression predictions and
outlier identification procedures. Finally, the data will be sorted
and the relevant data sent to the network optimization unit
while the irrelevant data will be directed back to the regression
n analysis. The relevant data will be interpreted in the network
optimization units and used to create patterns that explain the
links between a certain dietary behavior with a specific lifestyle
disease. Comment by Mark O'Connell: Regression analysis in
order to make predictions Comment by Mark O'Connell: What?
Makes no sense Comment by Mark O'Connell: excellent
In conclusion, the company’s network is designed to
source for voluptuous data from various internet sources,
databases and the cloud, and come up with relevant patterns that
15. would be used to facilitate data analysis and reporting. The
entire process must follow the outlined protocol for success to
be achieved. Comment by Mark O'Connell: WRONG WORD
References
Adamuz-Hinojosa, O., Ordonez-Luciana, J., Ameigeiras, P.,
Ramos-Munoz, J. J., Lopez, D., & Folgueira, J. (2018).
Automated network service scaling in nfv: Concepts,
mechanisms and scaling workflow. IEEE Communications
Magazine, 56(7), 162-169.
Cui, L., Yu, F. R., & Yan, Q. (2016). When big data meets
software-defined networking: SDN for big data and big data for
SDN. IEEE network, 30(1), 58-65.
Greenberg, A., Lahiri, P., Maltz, D. A., Patel, P. K., Sengupta,
S., Jain, N., & Kim, C. (2016). U.S. Patent No. 9,497,039.
Washington, DC: U.S. Patent and Trademark Office.
Shatri, V., Kurtaj, L., & Limani, I. (2017, May). Hardware-in-
the-loop architecture with MATLAB/Simulink and QuaRC for
rapid prototyping of CMAC neural network controller for ball-
and-beam plant. In 2017 40th International Convention on
Information and Communication Technology, Electronics and
Microelectronics (MIPRO) (pp. 1201-1206). IEEE.
CLOUD COMPUTING
CLOUD COMPUTING
Cloud Computing
Institution Affiliation
Student Name Krishna Chaithanya Arabati
Date 07/27/2019
16. Oxram Llimited is a multinational company that offers
data analytics services to various companies. The company
helps business enterprises to earn competitive advantage
through support of data analysis. Over the years, the company
has always relied on manual frameworks for data analysis.
Collection of data has always relied on manual data collection,
a review of available hardcopy documents as well as making
observations through a human workforce. The company aims at
improving its services through the adoption of innovative
technologies. In a review, the company aims at implementing a
cloud platform to act as data heaven that will support for data
storage as well as analysis. The company intends to use the
software as a service approach in the cloud computing
environment (Tsai, Bai, & Huang, 2014). Fetching of data will
be performed through the support of the internet of things. This
paper will, therefore, seek to identify how the company intends
to use the cloud platform in its operations. Comment by
Mark O'Connell: Wrong. A start-up Comment by Mark
O'Connell: ? Comment by Mark O'Connell: no
Goals and Objectives
The company aims to be a leading provider of data
analytics services across the world. In its goal to become a
diverse company in its service providence, the company aims at
earning profits from its wide range of services it offers. The
17. main aim is to provide organizations with data handling
support. In this view, the company aims at providing real-time
streams of data analytics. The software as a service platform
will enable the company to have accessibility from many places
in the world (Khoshafian, 2016). In its mandate, the
organization aims to provide the safest and the most dependable
data facilities that the clients can have confidence in. The
company aims at providing scheduled as well as random reports
on the various data analysis dockets it is tasked with. The
company provides for this intending to provide a robust
structure that will enable its client organization to perform
market analysis that will enable them to attain a competitive
advantage. Comment by Mark O'Connell: ? Comment by
Mark O'Connell: What business are you in?
Who is your customer?
What do you sell? Comment by Mark O'Connell: Is that your
business? “Data handling support”? Comment by Mark
O'Connell: So you are a facilities-provider??
Content Security Policy
Considering the fact that Oxram limited intends to use a
cloud platform in data storage and handling, there will be a
need to have a policy that will ensure the security of data. The
expected security is enabled through the website that will be
used to access data from the cloud platform. The content
security policy will help in detection as well as prevention of
certain types of attacks that target cloud platforms (Patil, &
Frederik, 2016). A content security policy will be capable of
efficiently handling forms of attacks such as cross-site
scripting, browser hijacking, form jacking as well as ad
injecting. The company plans to have a regularly updated
inventory of the first- and third-party domains, lists of
whitelisted domains and a method of alerting violations of the
content security policy. The company also aims to have a
regular update of the policy in order to ensure that it meets data
security standards. Comment by Mark O'Connell: I’m
confused.
18. Your proposal is to use someone’s cloud services, so you can
provide basically data-storage for your customers. Is that right?
Organizational Structure
Oxram Company is headed by a chief executive officer
who is in charge of coordinating different departments in the
organization. In his mandate, the chief executive officer is in
charge of fostering a good relationship between the company
and the target client companies. Through his influence, he
makes approval of innovative technology such as the current
impending cloud computing platform. Under the chief
executive officer, lies a business manager and a functional
manager. The business manager ensures that the company is
strategically positioned to perform business (Goetsch, & Davis,
2014). The functional manager coordinates activities that lay
down the structure of the business. He is in charge of
coordinating information technology issues. The three top
bosses are mandated to sit in board meetings that discuss the
reports of the business. There are other supervisors who are I
charge of other smaller departments in the company.
Target Market
The company target all business-oriented companies across the
globe. The intention of targeting these companies is that they
are in a position to purchase the data storage and analytics plans
the company offers. The company will provide the data analysis
services to companies that are in need to perform digitized and
more efficient market analysis (Liu, 2014). The idea is to enable
these companies to identify market niches as well as to attain
competitive advantages. The company will target these
companies through specialized plans that will enable favourable
conditions that are economically viable. Comment by
Mark O'Connell: No
Pick a niche area
19. Budget Estimation
With the infrastructure that comes with the cloud
computing platform, it is will be necessary to have a special
room where architectural equipment will be placed. The cost of
building a physically secure room will be incurred. There will
also be a cost incurred in buying a domain that will be used to
access cloud resources. A server will also be procured in order
to support the large network of organizations that will be linked
to the company’s cloud platform. Installing the technology will
also require an investment in financial resources in acquiring
skilled personnel to install and maintain the cloud platform. In
addition, training of human resource personnel in the company
will incur some cost.
Conclusion Comment by Mark O'Connell: You missed the
point of this assignmenrt
A review of current marketing trends in many
organizations indicates that data handling an analysis are key
components of every organization. Every organization strives to
ensure that they can grasp market requirements that gives them
a niche in the market. For these reasons, Oxram Company’s
cloud computing project fits the market requirements of data
handling and analysis.
References
Goetsch, D. L., & Davis, S. B. (2014). Quality management for
organizational excellence. Upper Saddle River, NJ: pearson.
Khoshafian, S. (2016). Service oriented enterprises. Auerbach
Publications.
Liu, Y. (2014). Big data and predictive business analytics. The
Journal of Business Forecasting, 33(4), 40.
Patil, K., & Frederik, B. (2016). A Measurement Study of the
Content Security Policy on Real-World Applications. IJ
Network Security, 18(2), 383-392.
Tsai, W., Bai, X., & Huang, Y. (2014). Software-as-a-service
(SaaS): perspectives and challenges. Science China Information
Sciences, 57(5), 1-15.
20. Running head: INFORMATION SECURITY 1
INFORMATION SECURITY 3
Information Security
Name
Institutional Affiliation
Information Security
Introduction
Information security is defined as the means by which data
in computer systems are protected. The protection will ensure
that the confidentiality, integrity, and availability of the data is
maintained. Regardless, the proposal of the organization is that
it is to provide data analytics services to various companies in
the health sector. By taking advantage of emerging technologies
such as cloud computing the company will not only be able to
offer its services at competitive rates but will also be able to
improve overall performance whilst ensuring data security
(Peltier, 2016). Cloud computing, in general, refers to the
delivery of computer resources from applications to data centers
such as those that will be owned by the company. The basis of
this strategy is to have easily available and secured data over
the internet. Moreover, it has also been identified that the cloud
service to be used is Software as a service (SaaS) (Peltier,
2016). It is the use of an application that is run by a distant
computer on the cloud via a browser or internet-based
21. application. By understanding this basis of operations, it will
better demonstrate how information security will be attained.
Reasoning
The SaaS approach was selected for numerous reasons
among them, its high flexibility and attractive nature to the
clients. Additionally, by simplifying its installation and overall
utilization, it eliminates security vulnerabilities. With security
as its core value, the SaaS approach to cloud computing offered
eliminates control over the hardware by the client (McCoy &
Perlis, 2018). This approach is necessary for numerous reasons
among them is the fact that having the hardware within the
organization it will make it vulnerable to outside attacks, human
error, and malicious employee activities all of which can result
in data loss. This realization was after a study conducted by
Accense, an analytical company, during the period of 2009 and
2014, the number of cyberattacks increased drastically (McCoy
& Perlis, 2018). According to their figures, the numbers rose
from a total of just over 3 million attacks per year to over 42
million attacks. For example, in 2017, the total number of data
breaches cost companies an approximate of $3.6 million
(McCoy & Perlis, 2018). With the figure expected to be
significantly higher in 2019, the best approach to limiting
cyberattacks and overall data breaches is by employing SaaS
cloud services.
SaaS and Information Security
The strategy of using SaaS is advantageous because it allows
numerous features to be included. This allows for the automated
implementation of security measures while data is being stored
or extracted from the database. Among the features present are
transit protection between the client and the service. This
security measure is critical as some forms of cyber-attack target
data while they are in transit to the storage areas over the
internet (Rittinghouse & Ransome, 2017). By using complex
encryption algorithms, the data if intercepted during
transmission will be useless to the hacker without the
decryption key. Secondly, all user accounts will have mandatory
22. authentication processes that will further secure the accounts of
the application users. This will limit unauthorized access to the
application; this strategy will be needed for any data to be
transferred, added, destroyed or manipulated (Rittinghouse &
Ransome, 2017). The healthcare sector in 2017 was the most
affected industry with relation to cyberattacks, by automating
their security measures, future attacks can be limited.
The SaaS approach also allows for auditing or logging of
activities, the objective of this security approach is to maintain
accountability. By reviewing the activities of the users,
malicious employees can be easily identified and the necessary
disciplinary action implemented (Rittinghouse & Ransome,
2017). Finally, the SaaS platform will allow for the utilization
of already available cloud computing security protocols further
ensuring the safety of the data uploaded as well as the
information stored. An example of the security measure in
place include protection against DDoS and access regulation to
prevent unexpected interceptions.
Data Valuing
When valuing the company and its data, the main area of focus
was the market niche it was targeting. Technology is evolving at
a rapid rate and this is especially recognizable in the healthcare
industry. The majority of modern healthcare institutions have
migrated from the legacy system and embraced electronic health
records (Chang, Kuo, & Ramachandran, 2016). It is the digital
format of medical records mandated by the HITECH (Health
Information Technology for Economic and Clinical Health) Act.
This act is then enforced by the ARRA (American Recovery and
Reinvestment Act) of 2009 (Chang, Kuo, & Ramachandran,
2016). Nevertheless, the value collected and stored will have to
undergo processes that will not only allow it to be verified but
also screened to be classified in different clusters. The process
allows for network optimization to be achieved thereby allowing
for faster processing and storing of data collected from the
client’s end. Moreover, the patterns used by the client’s in
accessing as well as transmitting data are analyzed for better
23. operations of the service (Chang, Kuo, & Ramachandran, 2016).
Conclusion
Big data is the future for all industries as it offers the needed
insight and understanding of operations thereby allowing for
cloud computing services to progress their services. This is
demonstrated by the approach that is adopted by Health Cop.
The company will be sampling data with the main objective of
improving the network and overall system.
References
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud
computing adoption framework: A security framework for
business clouds. Future Generation Computer Systems, 57, 24-
41.
McCoy, T. H., & Perlis, R. H. (2018). Temporal trends and
characteristics of reportable health data breaches, 2010-2017.
Jama, 320(12), 1282-1284.
Peltier, T. R. (2016). Information Security Policies, Procedures,
and Standards: guidelines for effective information security
management. Auerbach Publications.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing:
implementation, management, and security. CRC press.
Running head: BIG DATA APPROACH
6
BIG DATA APPROACH
Big Data Approach
Student's name Krishna Chaithanya Arabati
Professor's name Mark O conell
Institution IGLOBAL UNIVERSITY
24. Course Title MSIT 681 Capstone
Date:08/03/2019
As a result of the enormous amount of data required for
analysis, big data approach has become a necessity for health-
oriented organizations. This approach enables the companies to
perform analysis in a systematic way from data repositories.
The structure of storing data in a dataset is also an important
aspect. The approach offers better statistical power through the
tools it provides to organizations (Chen, Mao, & Liu, 2014).
The approach seeks to solve challenges about handling large
amounts of data. The challenges range from data analysis,
storage, capture, visualization as well as information privacy.
This paper will, therefore, seek to discuss the big data approach,
the origin of big data, methods of storing the data as well as the
format of the database that will be used.
Use of semi-custom applications.
Use of semi-custom applications will form a basis for the
handling big data. This technique will employ machine learning
and artificial intelligence. Use of artificial intelligence and
machine learning will significantly add value to the
organization by providing platforms for handling big data in an
efficient manner (Li, Li, Wang, Zhu, & Li, 2019). This
technique will help in shaping the data analytics mindset at the
Health-cop company. Customized applications will help the
company convert model-based recommendations of treatment
into actual insights that can be used in treatment of diabetes.
25. Comment by Mark O'Connell: So you’re going to write
these applications then ….right??
The rationale for using semi-customized applications
According to the prevailing circumstances at Health-cop
company, a semi-customized application would suit the
organization in a better way. Semi customized applications take
relatively short development time. Therefore, it takes a very
short time to deploy these applications. When a semi-
customized application is well constructed, they it offersoffer
stability by offering great reliability levels as well as more
resilience (Eapen, & Peterson, 2015). Semi-custom applications
are more flexible offering great service through an extended
lifetime, adaptability as well as their scalability. Lastly, semi-
customized applications offer better quality. Their package
components have robust performance levels. Moreover, they
offer high-quality standards due to their applicability in many
environments.
Source of Big Data
According to statistics by the world health organization,
the prevalence of diabetes disease is about 9% in the Uunites
sStates of America. Considering these statistics, this number of
people is large. Going further to consider the daily data required
to be fetched each day in monitoring this disease in each
patient, the data collected each day is enormous. The cloud
platform will offer daily data collection from patients through
the use of artificial intelligence in collaboration of sensor-based
networks (Aazam, et al, 2014). The internet of things will
provide support for the collection of data through miniaturized
sensors. These miniaturized sensors will then be controlled
through artificial intelligence. Since the cloud platform uses the
software as a service technique. Each patient in the Health-cop
database will have their portals that they can access services
from any environment. Machine learning techniques will help in
identifying patients that require urgent help. Considering all
these actions that are performed on the cloud platform, big data
will be generated as a result. Comment by Mark O'Connell:
26. Wow. Looking forward to that explanation! Comment by
Mark O'Connell: This is not a complete sentence.
Storage of Data
From the proposed architectures of data storage done
before, data storage will be handled through cloud storage
facilities. The company aims to implement a cloud data
repository. The cloud platform will provide one to many
replications. One to many replications will provide data
reliability as a failure of one storage node will not affect the
operations in the company. It will also help in consolidating
data from all remote locations, therefore, enabling an analysis
of data at a central point (Jiang, et al, 2014). Storage will
depend on high-speed transmissions of data from the patient's
local location to the cloud storage. This will enable continuous
synchronization of data in the database and therefore enabling
data in the database to be up to date. This will enhance its
reliability and therefore giving a clear reflection of analytics.
Storage in the database will also be supported by high-speed
data acceleration. Cloud storage will enable the semi-
customized data-intensive health support application to collect
data from the sensor sources and pass it over to the cloud
(Sookhak, 2015). Data obtained will be stored by using data
segmentation methods. Several segments that will range
according to the type of diabetes disease on is suffering from
will be enhanced. This will enable easier querying and
analyzing data from the database. Comment by Mark
O'Connell: Hadoop?? Comment by Mark O'Connell: Hmmm
ok…how do you get your hands on this data?
Database Formats
Modern technologies have come up with formats that enable
easier storage of biodata. Among the formats, is the Next
Generation Sequencing. Health cop company intends to use this
database format due to its suitability to storing biodata
(Banerjee, & Sheth, 2017). Additionally, the database format is
of an advantage as it will help in providing useful data mining
techniques as well as machine learning techniques that will help
27. in inputting data into specific data types and formats. The main
agenda towards choosing this format is to enable Health-cop
company store and analyze the data more efficiently
Conclusion
Considering the factors in play at the Health-cop company,
semi-custom applications will help the company achieve its
objectives in handling big data. The Next-generation sequencing
database format will enable the company to store biodata more
efficiently.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014,
January). Cloud of Things: Integrating the Internet of Things
and cloud computing and the issues involved. In Proceedings of
2014 11th International Bhurban Conference on Applied
Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-
18th January 2014 (pp. 414-419). IEEE.
Banerjee, T., & Sheth, A. (2017). Iot quality control for data
and application needs. IEEE Intelligent Systems, 32(2), 68-73.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey.
Mobile networks and applications, 19(2), 171-209.
Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health
applications facilitate meaningful behaviour change?: time for
answers. Jama, 314(12), 1236-1237.
Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014).
An IoT-oriented data storage framework in the cloud computing
platform. IEEE Transactions on Industrial Informatics, 10(2),
1443-1451.
Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019).
Semicustomized Design Framework of Container
Accommodation for Migrant Construction Workers. Journal of
Construction Engineering and Management, 145(4), 04019014.
Sookhak, M. (2015). Dynamic remote data auditing for securing
big data storage in cloud computing (Doctoral dissertation,
28. University of Malaya).
Running head: BIG DATA APPROACH
6
BIG DATA APPROACH
Big Data Approach
Student's name
Professor's name
Institution
Course Title
Date:
As a result of the enormous amount of data required for
analysis, big data approach has become a necessity for health-
oriented organizations. This approach enables the companies to
perform analysis in a systematic way from data repositories.
The structure of storing data in a dataset is also an important
aspect. The approach offers better statistical power through the
tools it provides to organizations (Chen, Mao, & Liu, 2014).
The approach seeks to solve challenges about handling large
amounts of data. The challenges range from data analysis,
storage, capture, visualization as well as information privacy.
This paper will, therefore, seek to discuss the big data approach,
29. the origin of big data, methods of storing the data as well as the
format of the database that will be used.
Use of semi-custom applications.
Use of semi-custom applications will form a basis for the
handling big data. This technique will employ machine learning
and artificial intelligence. Use of artificial and machine
learning will significantly add value to the organization by
providing platforms for handling big data in an efficient manner
(Li, Li, Wang, Zhu, & Li, 2019). This technique will help in
shaping the data analytics mindset at the Health-cop company.
Customized applications will help the company convert model-
based recommendations of treatment into actual insights that
can be used in treatment of diabetes.
The rationale for using semi-customized applications
According to the prevailing circumstances at Health-cop
company, a semi-customized application would suit the
organization in a better way. Semi customized applications take
relatively short development time. Therefore, it takes a very
short time to deploy these applications. When a semi-
customized application is well constructed, they offer stability
by offering great reliability levels as well as more resilience
(Eapen, & Peterson, 2015). Semi-custom applications are more
flexible offering great service through an extended lifetime,
adaptability as well as their scalability. Lastly, semi-customized
applications offer better quality. Their package components
have robust performance levels. Moreover, they offer high-
quality standards due to their applicability in many
environments.
Source of Big Data
According to statistics by the world health organization,
the prevalence of diabetes disease is about 9% in the unites
states of America. Considering these statistics, this number of
people is large. Going further to consider the daily data required
to be fetched each day in monitoring disease in each patient, the
data collected each day is enormous. The cloud platform will
offer daily data collection from patients through the use of
30. artificial intelligence in collaboration of sensor-based networks
(Aazam, et al, 2014). The internet of things will provide support
for the collection of data through miniaturized sensors. These
miniaturized sensors will then be controlled through artificial
intelligence. Since the cloud platform uses the software as a
service technique. Each patient in the Health-cop database will
have their portals that they can access services from any
environment. Machine learning techniques will help in
identifying patients that require urgent help. Considering all
these actions that are performed on the cloud platform, big data
will be generated as a result.
Storage of Data
From the proposed architectures of data storage done
before, data storage will be handled through cloud storage
facilities. The company aims to implement a cloud data
repository. The cloud platform will provide one to many
replications. One to many replications will provide data
reliability as a failure of one storage node will not affect the
operations in the company. It will also help in consolidating
data from all remote locations, therefore, enabling an analysis
of data at a central point (Jiang, et al, 2014). Storage will
depend on high-speed transmissions of data from the patient's
local location to the cloud storage. This will enable continuous
synchronization of data in the database and therefore enabling
data in the database to be up to date. This will enhance its
reliability and therefore giving a clear reflection of analytics.
Storage in the database will also be supported by high-speed
data acceleration. Cloud storage will enable the semi-
customized data-intensive health support application to collect
data from the sensor sources and pass it over to the cloud
(Sookhak, 2015). Data obtained will be stored by using data
segmentation methods. Several segments that will range
according to the type of diabetes disease on is suffering from
will be enhanced. This will enable easier querying and
analyzing data from the database.
Database Formats
31. Modern technologies have come up with formats that enable
easier storage of biodata. Among the formats, is the Next
Generation Sequencing. Health cop company intends to use this
database format due to its suitability to storing biodata
(Banerjee, & Sheth, 2017). Additionally, the database format is
of an advantage as it will help in providing useful data mining
techniques as well as machine learning techniques that will help
in inputting data into specific data types and formats. The main
agenda towards choosing this format is to enable Health-cop
company store and analyze the data more efficiently
Conclusion
Considering the factors in play at the Health-cop company,
semi-custom applications will help the company achieve its
objectives in handling big data. The Next-generation sequencing
database format will enable the company to store biodata more
efficiently.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014,
January). Cloud of Things: Integrating the Internet of Things
and cloud computing and the issues involved. In Proceedings of
2014 11th International Bhurban Conference on Applied
Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th-
18th January 2014 (pp. 414-419). IEEE.
Banerjee, T., & Sheth, A. (2017). Iot quality control for data
and application needs. IEEE Intelligent Systems, 32(2), 68-73.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey.
Mobile networks and applications, 19(2), 171-209.
Eapen, Z. J., & Peterson, E. D. (2015). Can mobile health
applications facilitate meaningful behaviour change?: time for
answers. Jama, 314(12), 1236-1237.
Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., & Xu, B. (2014).
An IoT-oriented data storage framework in the cloud computing
platform. IEEE Transactions on Industrial Informatics, 10(2),
32. 1443-1451.
Li, Y., Li, G., Wang, T., Zhu, Y., & Li, X. (2019).
Semicustomized Design Framework of Container
Accommodation for Migrant Construction Workers. Journal of
Construction Engineering and Management, 145(4), 04019014.
Sookhak, M. (2015). Dynamic remote data auditing for securing
big data storage in cloud computing (Doctoral dissertation,
University of Malaya).
Running head: PROJECT PROPOSAL 1
PROJECT PROPOSAL 4
PROJECT PROPOSAL
Institution Affiliation
Student Name
Data
Start-up Proposal: HEALTH-COP COMPANY
Predicting When and Where Lifestyle & Dietetic Related Health
Issues Are Most Likely to Occur.
Introduction
Health-cop company is a data mining company that predicts
33. health trends and possible illnesses that could be witnessed in
the near future. The company will mainly focus on data mining
and analytics to establish links between diet composition and
health issues in society, (Larose, 2015). The data to be used in
the predictive analytics will mainly be obtained from hospital
databases, nutrition and dietetics websites, health journals as
well as information shared through social media platforms.
Health-cop company intends to predict such issues before they
can become tough to manage.
Goals & Objectives
The main goal is to become a leader in health predictive
analytics in the health sector, improve the level of preparedness
for various health issues, and earn a profit from running the
business. Health-cop’s main objective is to identify certain
lifestyle and dietetic related illnesses that are most likely to be
experienced within a certain region in the near future. The
company will analyze purchases from food stores and groceries
and also analyze the various meals ordered for from various
food joints. The company also aims at providing consolidated
reports on diet composition of various people from various
regions based on data obtained from websites and social media
platforms.
Organizational Structure
The company will be headed by a chief executive officer who
will be in charge of overseeing all operations. A seven-member
board of directors will be selected among data analytics
professionals to undertake the duties of policy formulation and
implementation. Health-cop will have a data mining division,
analytics division, IT department, as well as a human resource
and customer relations departments; each headed by a
departmental manager. An independent division to deal with
business modeling and statistical database creation will receive
data from the analytics division. This division will create
various projections that will be used to make predictions about
specific illnesses.
Target Market
34. The company targets to sell its information to health
departments at various levels of governments. The company will
also provide its analysis to various hospitals for an agreed fee.
Health-cop will also sell its findings to private health care
institutions especially nutritionists and pharmaceutical
organizations. The existing competitors in the market offer
predictive analytics for chronic diseases unrelated to dietetics,
(Sepah, et.al., 2015). Health-cop will majorly focus on lifestyle
and dietetics related illnesses that are easily preventable thus
the company will be unique in the market. The major illnesses
that the company will analyze and report on are diabetics,
obesity, and osteoporosis.
Budgetary Estimation
The start-up will require planning and preparation finances to
facilitate sufficient research before launching the company.
Costs will also be incurred to secure strategically positioned
premises for the company. Acquisition of digital equipment
such as computers and network cables as well as the installation
of internet services will require sufficient funding, (Shah, et.al.,
2018). Other operational expenses that are expected include
salaries and wages for the company’s staff and marketing of the
company and its services in the market.
Conclusion
In recent years, lifestyle-related illnesses have become an issue
for many people in the world, (Peirson, et.al., 2015). The main
factors that contribute to the increased incidence of such
illnesses are changes in lifestyle and dietary behavior. The
reported cases of diabetes, obesity, and osteoporosis have
significantly shot up in recent times. This can all be attributed
to the changes in diet behavior. A preventive analytical
algorithm would be most suitable to manage these illnesses. A
computer algorithm programmed to analyze what is being
consumed in various regions and link the food substance to a
certain lifestyle-related disease would be very important,
(Razzak, et.al., 2019). This would facilitate early detection and
application of preventive measures.
35. References
Larose, D. T. (2015). Data mining and predictive analytics.
John Wiley & Sons.
Peirson, L., Fitzpatrick-Lewis, D., Morrison, K., Ciliska, D.,
Kenny, M., Ali, M. U., & Raina, P. (2015). Prevention of
overweight and obesity in children and youth: a systematic
review and meta-analysis. CMAJ open, 3(1), E23.
Razzak, M. I., Imran, M., & Xu, G. (2019). Big data analytics
for preventive medicine. Neural Computing and Applications, 1-
35.
Sepah, S. C., Jiang, L., & Peters, A. L. (2015). Long-term
outcomes of a Web-based diabetes prevention program: 2-year
results of a single-arm longitudinal study. Journal of medical
Internet research, 17(4), e92.
Shah, N. D., Sternberg, E. W., & Kent, D. M. (2018). Big data
and predictive analytics: recalibrating
expectations. Jama, 320(1), 27-28.