Category: Information Systems

Data analyzing and visualization

 

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios:

THE SUBJECT: Texas Department of Criminal Justice

Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)

Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations

Scenario C: A campaign group looking to influence the debate about the ending of capital punishment

Website reference:

Assignment Link: http://book.visualisingdata.com/chapter/chapter-3

Info Tech in Global Economy

 

Chapter 7 presents a comparative analysis of various tools useful in policy making. Select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment.  

Use class materials or open web credible resources for this discussion. (Maximum 150 words, initial post latest by Thursday). References and in-text citations must be APA compliant. Please, respond substantially to a minimum of two colleagues’ posts.

ITM Information Security Overview for Managers

Need a 6-7 page paper analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels. APA format, reference page, title page. 

Discussion

 Statistic assumptions, pitfalls, and the illusion of credibility statistics can create

Kirk (2016) does not discuss specifics regarding statistical assumptions. 

Provide at least 2 examples of specific statistical tools (examples include t-test, ANOVA, or linear regression)

Describe the assumptions associated with each of the tools and what the assumptions mean in your own words

What can the test tell you about your data? (examples include strength of a linear relationship or predict an outcome)

Explain each field in the output of each of the tools, as it would appear in R.

How can the data be misinterpreted? Explain.

Do not list the same tools as your peers. Provide references. Do not just regurgitate your references, offer insight and support your interpretations with evidence from references.

APA format, with references

Case study

Using the Case study provided(Please find the attached document) write a 2-page paper addressing the questions in the Case(Questions are below). Provide references in your paper (cited and referenced in APA format), citations. Please use the following sources.  

1. Do some Internet research on Chevrons use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.

2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security.

3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on-premises to the cloud.

4. Do some Internet research on identity management and single sign-on systems. Briefly explain how these work and why they are important in business intranets and extranets.

5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?

Sources

[CHEV12] Chevron.com Seismic Imaging. Retrieved online: at http://www.chevron.com/deliveringenegy/oil/seismicimaging.

[GALL12] Gallant, J. Chevrons CIO Talks Transformation and Why IT Leaders Should Smile. April 12, 2012. Retrieved online at: http://www.cio.com/article/print/704095.

[SCRI11] Scribd.com. Chevron Corporation CRUSH Report. August 17, 2011. Retrieved online at http://www.scribd.com/doc/62481977/Chevron-CRUSH-Report-09A1.

[STAT12] Statistic Brain. Chevron Company Statistics. February 12, 2102. Retrieved online at: http://www.statisticbrain.com/chevron-company-statistics/.

Need 600+ words with no Plagiarism and 2+ references

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Need a 1 page APA format

 

The video attached is a 27 minute video by one of my favorite learning channels on Youtube for all things Machine Learning! I would like you to listen to the speaker and come back to this link and briefly (in under 500 words) answer the following questions:

Video Link: 

1. Prior to watching this video, did you think there was a difference between ML, DL and AI? If yes, explain. If no, also explain.

2.Based on your own field, how would ML, DL or AI be applied.

Assignment

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualizer facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualization/infographic in each of the following made-up scenarios:

THE SUBJECT: Texas Department of Criminal Justice

Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)

Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations

Scenario C: A campaign group looking to influence the debate about the ending of capital punishment

Website reference:

Assignment Link: http://book.visualisingdata.com/chapter/chapter-3

For writting king

  1.define secret word 2.create a revealed letter list that starts empty 

2. set wrong guess count to 0

3. ask the user for a letter

4. is the letter in the secret word?

5. if so: add it to the revealed letters list

create a blank string

for each letter in the secret word, if the letter in  revealed letter list, add that letter to string,  otherwise add an underscore to string

6. if letter not in secret word, add one to wrong guess

7. repeat from step 

CIS 558 case study 1

Case Study 1: Mitigating Cloud Computing Risks

Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online which discuss the security risks related to Cloud based computing and storage. One that stood out was located at . You are being asked to summarize the information you can find on the Internet and other sources that are available.  Moving forward, the CIO wants to have a firm grasp of the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems, if they were in place, should be monitored to ensure not only proper usage, but also that none of these systems or their data have been compromised.

Write a three to four (3-4) page paper in which you:

  1. Provide a summary analysis of the most recent research that is available in this area.
  2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. Include primary examples applicable from the case studies you previously reviewed. 
  3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.
  4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.