Categories
Computer sciences and Information technology

In a 500- to 750-word essay, research virtualization technologies, including Typ

In a 500- to 750-word essay, research virtualization technologies, including Type I and II architectures, the technical mechanisms by which virtualization is implemented in a variety of environments, and their implications for cyber operations. Examine the following virtualization technologies and resource control principles:
– Memory management and isolation.
– Virtual storage allocation.
– Association of physical hardware with virtual hardware and device emulation.
– Live migration and failover of physical systems to virtual environment.
– Benefit of creating virtual snapshots and clones.
– Interfaces both internal and external for managing, monitoring, and synchronizing virtual environments.

Categories
Computer sciences and Information technology

For decades, relational databases remained essentially unchanged; data was segme

For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and repositories, also called structured data. However, in this Internet of Things (IoT) era, databases need to be reengineered because the very nature of data has changed. Today’s databases need to be developed with the needs of IoT in mind and have the ability to perform real-time processing to manage workloads that are dynamic. For example, relational databases should be able to work with real-time data streaming and big data (an example was presented in the unit lesson).
Scenario: eHermes wants their personnel to be able to view security video footage in real-time and provide them with the ability to query video footage for viewing. Choosing a database solution such as MongoDB would allow eHermes to store mobile self-driving video footage in the same database as the metadata.
To do this, eHermes needs a way to manage the demands of real-time data streaming for real-time analytics. Conduct some research for a NoSQL database application such as MongoDB or Cassandra that could meet this need. How would switching to a real-time database solution help eHermes remain competitive? Create a PowerPoint presentation that does the following:
Provides a brief introduction to IoT.
Presents an argument to the eHermes CEO that switching to a more dynamic database structure (NoSQL real-time database) will meet the demands of IoT.
Introduces some features of the database you chose, whether it is MongoDB, Cassandra, or another database.
Describes how switching to a more dynamic database will give eHermes a competitive advantage?
Your presentation must be a minimum of six slides, and you must use at least two academic resources. Any information from a resource used must be cited and referenced in APA format.

Categories
Computer sciences and Information technology

In order to defend digital resources, security professionals must understand the

In order to defend digital resources, security professionals must understand the methodology the cyber attacker will take to compromise an organization’s resources. The penetration testers methodology was developed to follow the phases of compromise that an attacker may take to exploit your information systems.
Research how the phases of compromise that an attacker will take align with the PEN testers methodology. Use at least three academic sources; each should come from current journals or articles (within the past 5 years), beyond the assigned readings.
Then, read the article “Apple, FBI, and Cybersecurity: The Basics,” located in the topic Resources.
Address the following in a 500- to 750-word essay:
-Explain how the phases of compromise that an attacker will take align with the PEN testers methodology.
-Identify the goals and objectives of each phase when evaluating.
-Take a stand, either pro or con: should all phases of the PEN Testers be included in the scope when conducting phase testing? Include supporting evidence for each phase.
-Describe what would motivate an organization to perform penetration testing cyber operations.
-Determine where the use of flaw hypothesis methodology would intersect with the PEN testers methodology. How could other methodologies such as OSSTMM affect the PEN testers methodology steps?
-Consider Matthew 10:6, “as wise as serpents yet as harmless as doves.” How would you make a decision or align legal and ethical issues of cybersecurity with the Christian worldview? Who gets to benefit when following the aforementioned verse?
***SOURCES MUST BE ACADEMIC***
FBI ARTICLE
https://erlc.com/resource-library/articles/apple-fbi-and-cybersecurity-the-basics/

Categories
Computer sciences and Information technology

Instructions Visit at least three e-commerce sites, not including those mentione

Instructions
Visit at least three e-commerce sites, not including those mentioned in Chapter 4. Using the Website Review Template , briefly describe each site’s purpose and examine the effectiveness and performance of the sites according to the eight basic factors, which are listed below:
functionality,
informational,
ease of use,
redundant navigation,
ease of purchase,
multi-browser functionality,
simple graphics, and
legible text.
For each site visited, list any recommended performance improvements needed based on your analysis. Include screenshots of each site to support your choices.
Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary. You will have at least three references to represent the three e-commerce sites that you choose to review.

Categories
Computer sciences and Information technology

Hide Assignment Information Turnitin™ Turnitin™ enabledThis assignment will be s

Hide Assignment Information
Turnitin™
Turnitin™ enabledThis assignment will be submitted to Turnitin™.
Instructions
Week 3 – Coding with Blockly
Computer programming is everywhere these days. Understanding how code works is a great way to know how it might be useful in your career path. This activity is designed to give you a broad understanding of how code works and to help you think like a coder.
1) View the video
First, view the video below that will introduce you to the world of Blockly.

2) Play Games
Now, let’s play some games. Go to Blockly Games using this link:
https://blockly.games/
Blockly games provides eight games to help people new to programing learn how code works. Rather than using code, you use blocks that represent specific actions. Start with Puzzle. This game has several levels that walk you through the various blocks and how they work. Keep moving through the games from left to right. See how far you can go.

3) Deliverables: Screen Capture and Reflection
Provide a screen capture of your most advanced level.
Write a one-page reflection addressing the following topics:
What did you know about computer programming and code prior to doing this assignment?
How far were you able to get through the various games? What caused you to stop?
Did you enjoy this experience?
What do you know now that you did not know prior to this experience?
Upload your completed assignment for grading. Your grade is based on your reflection, not on how far you were able to progress in the games.

Categories
Computer sciences and Information technology

Please note, points will be deducted for the overuse of citations. Please read t

Please note, points will be deducted for the overuse of citations. Please read the information related to this week’s points and paraphrase it and/or provide your thoughts and ideas on what it means to you in relation to the knowledge that you have thus far.
Assignment Instructions:
Explain URL and why you as the analyst should care about its importance.
Explain the URL parameters.
Explain cookies and why these matter in web analytics.

Assignment Resources:
Class: You may find newer and older resources listed each week in the Lessons and Assignments; however, the older resources are still relevant in content and concept. The relevancy is noted in that they build on the structural foundation of web analytics. We must be aware that Web Analytics is always in motion, and organizations are seeking to create actionable insights driving the decision-making process.

Class, please feel free to explore your own research for eBooks, journals, and articles that best answer the topics and assignments. Do your best to locate resources that are no more than three (3) years old. PLEASE DO NOT USE WIKIPEDIA AS A RESOURCE AND OR REFERENCE.

Cookies:
2016: Cookies
2015: Google Analytics Cookies Usage on Websites
2011: Web Analytics and Cookies
2007: Locate book “Web Analytics 2.0” by Avinash Kaushik in the APUS Library, Chapter 4 pages 141-142, and 126-140 will be most helpful. Web_Analytics_An_Hour_a_Day_Chapter4.pdf
URLs
2011: Web Analytics Strategy Part 1: Understanding the Importance of URL Tagging
(n.d.) Guide to URL Tracking in Google Analytics
2007: Locate book “Web Analytics an Hour a Day” by Avinash Kaushik in the APUS Library, Chapter 6 pages 126-131 will be most helpful. Web_Analytics_An_Hour_a_Day_Chapter6.pdf

Please submit a Word Doc with your answers in 500 words or more, and use APA references in support of your answers. Be sure to place your Name and Class on your submission, for example:
Smith, John
WEDB122 I001 Fall 12

Assignment 3 Readings: Please review the Week 3 Lesson for the reading materials.
Lesson Objectives:
Demonstrate the importance of understanding URL parameters and sub-domains
Explain how the web analyst should be aware of the URL usage
Describe and explain why page tagging may be affected by URL structures

Categories
Computer sciences and Information technology

Detailed coursework assessment specification are in the files below. Report must

Detailed coursework assessment specification are in the files below. Report must cover and follow all lecture topics in a critical analytical manner and a sample information on the report is provided below. Comparison with the country’s headquarters of the company is not really necessary due to the word count but valued information will be accepted.

Categories
Computer sciences and Information technology

Please complete the questions fully and completely. This MUST be completed in th

Please complete the questions fully and completely. This MUST be completed in the given timeframe. If you need more payment as the length may be exceeded, I can do so.

Categories
Computer sciences and Information technology

In this assignment, you will create a presentation for your organization explain

In this assignment, you will create a presentation for your organization explaining how successful collaboration can improve success and provide competitive advantages.
Scenario: Your organization has used a variety of collaboration systems developed by some project managers. Some of these systems were successful while others were not. Your organization has one unique challenge – many of your employees are staffed at other locations or work from home (telework). You would like to standardize the collaboration process to improve team communication for all company projects. In your presentation, you should do the following:
Explain why collaboration information systems are important from the organization’s perspective.
Discuss how collaboration tools can improve team communication.
Identify three tools that will be used for synchronous communications and three tools that will be used for asynchronous communications. Be sure to explain why you made these choices.
Describe how project files such as MS Word, MS Excel, MS Project, and MS Visio will be shared with team members. Be sure to explain the rationale behind your choice.
Explain how the task list for managing tasks will be shared with team members. Be sure to explain the rationale behind your choice.
Discuss how this new collaboration information system could provide competitive advantages for your organization.
Your presentation should be a minimum of six slides long (not including the title and references slides). Use of images, graphics, and diagrams is encouraged.
You can use an industry of your choosing or examples from your personal or professional experiences in developing this assignment. You can also use the resources in the Suggested Unit Resources section to assist you with this assignment.
Be sure to follow the 7×7 rule (no more than 7 words per line and no more than 7 lines per slide). You are required to use speaker notes to discuss the bullet points on your slides.
You must use at least two academic resources to create your presentation, and you must cite (in APA format) any information on your slides or in your speaker notes that came from these sources.

Categories
Computer sciences and Information technology

The final presentation will be a professional presentation, created using a pres

The final presentation will be a professional presentation, created using a presentation tool such as PowerPoint, Canva, etc., discussing your Contemporary Issues topic. It will include a cover slide and reference slide(s). The presentation will be evaluated on the following:
Presentation Professionalism
• Professional dress and presentation of content
• Knowledge of presentation
• Language use and audience awareness
• Teamwork
Technical Components
• Appropriate use of visual aids
• Five lines; five words
• Large, clear type
• Professional fonts and cascades
• Each element has a specific purpose
• Speaker notes
The presentation must include each of the following:
Problem
• Problem statement is clearly described
• Current hypothesis
• Pitch your vision of the world where this is solved
• Go through the problem methodically and with precision
Metrics
• Explain what the factors are and how they were determined
• Show a visual example of how this is measured
Analysis
• Provide a clear model of the system, including a visual model
• Provide the analysis results of the current state of the system, including the two visuals from Section 2
• Short and sweet explanations; if an explanation is too complex, provide an opportunity for discussion after presentation
Solutions
• What are the solution options?
• Give a solid feasible solution
• Provide rationale for your decision with data
• Provide a vision of your implementation strategy
Values and Virtues
• Explain what steps were taken to ensure that the solution purposed is a moral and ethical decision
• How is your solution informed by the values and virtues of the Christian worldview?
Use the assignments I have provided for context