In this white-paper, show the reader that the traditional way of outsourcing a development work like this doesn’t work. Show that the only way that works for such an outsourcing job is an outcome based outsourcing model.

Software- and electronic hardware development company

We are a software- and electronic hardware development company.
We are focused on the e-bike (pedelec) / bicycle market.
We develop 360° e-bike IoT solutions for the end-user, fleet operators and e-bike manufacturers.
We have our own product/software on the market as well as we produce white-label solutions for e-bike manufacturers.
In this white-paper we want to show to the reader that the traditional way of outsourcing a development work like this doesn’t work.
We want to show that the only way that works for such an outsourcing job is an outcome based outsourcing model.
We want to present to the reader of this white-paper how such an outcome based model can look like for an e-bike IoT product/service.
In the attached pdf we summarised the intended structure as well as content bullet points.
P.s.: I left “How many sources” at 0 bcs. I don’t know how many makes sense (just use high quality sources if possible).

List and discuss areas in which technology plays a role in the counseling profession. What are the benefits of using technology when working with clients?

Technology in Counseling

The counseling profession has been significantly impacted by the advancement of technology. More and more counseling professionals have incorporated the usage of technology in counselor education, training, and practice. However, cautions always exists regarding how to ethically apply technology in the field of counseling. Based on the readings from the textbook, assigned supplementary articles, and your research, please complete a reflection paper on technology in counseling. The paper should include the following components:

 List and discuss areas in which technology plays a role in the counseling profession.
 What are the benefits of using technology when working with clients?
 What are the ethical concerns of using technology when working with clients?
 What will you do in order to competently and ethically incorporate technology in counseling?

Describe how the information systems will benefit your company. Provide details and examples of applications and solutions offered by retail vendors.

Management Information Systems

In your role as an employee at a medium-to-large aviation-related business, it’s time to drill down to the specifics for two of the Management Information Systems you selected. As you perform research and compose your data, remember that you are in a mid-to-upper level management position and have significant decision-making influence with your company.

*Describe how the information systems will benefit your company.

*Provide details and examples of applications and solutions offered by retail vendors.

*Describe the framework for each solution that the internal staff of your company might develop and implement.

*Present an account of the strengths, weaknesses, and cost considerations for those solutions.

*Identify and describe how a solution can provide a competitive advantage, influence strategy, affect organizational performance, and increase operational efficiency.

 

Complete a 4-5 page Essay on a topic related to Organizational Leadership and Supervision.

Organizational Leadership and Supervision

Essay (4-5 pages): Each student will be required to complete a 4-5 page Essay on a topic related to Organizational Leadership and Supervision. Topics may include any of the chapter topics listed in the textbook (such as: Leadership, Communication, Developing Groups, Planning and Goal Setting, Staffing and Recruiting, Motivating Followers, Performance Appraisal, Workplace Health and Safety, Change Management, etc.).

References are not required. The Essay should be 4-5 pages in length, 12 point type (Arial or Times Roman type font), and double-spaced. Students are encouraged to write about a topic that interests them, and to provide their own personal opinions on their chosen topic.

Read and analyze case studies from the Harvard Business Coursepack. Identify the most important facts surrounding the case. Identify the key issue or issues.

Information Technology

Students will read and analyze case studies from the Harvard Business Coursepack.  These will be key components of the course where students will understand and apply the course subject matter.

Case studies are worked on over a two week period, allowing students time to thoroughly read and analyze the case. While each case study requires you to answer specific questions, a good case study paper should also include the following process and consideration:

  1. Identify the most important facts surrounding the case.
  2. Identify the key issue or issues.
  3. Specify alternative courses of action.
  4. Evaluate each course of action.
  5. Recommend the best course of action.

(These questions and the below case study guide provided to students is from: http://wps.prenhall.com/bp_laudon_essmis_6/21/5555/1422312.cw/content/index.html) Pearson Education)

 

Select and describe a technology other than a smartphone or computer and discuss how you use it or how it affects your daily life. How does your interaction with this technology compare/contrast with how technology, in general, is presented in this week’s readings?

Technology

Select and describe a technology other than a smartphone or computer and discuss how you use it or how it affects your daily life. How does your interaction with this technology compare/contrast with how technology, in general, is presented in this week’s readings?

What is the influence of technology on your chosen field of study or future profession? How can you use your understanding of technology in your professional career?

 

Fit a predictive linear regression model to estimate weight of the fish from its length, height and width?

Machine Learning

Q1 Fit a predictive linear regression model to estimate weight of the fish from its length, height and width? (the data source fish.csv can be found here: https://www.kagnle.com/aungnvaeap/fish-market) (50 points)

-Report the coefficients values by using the standard Least Square Estimates -What is the standard error of the estimated coefficients, R-squared term, and the 95% confidence interval? -Is there any dependence between the length and weight of the fish?

Q2 Using the data source in Q1 fit the Ridge and Lasso Regression Models. – Report the coefficients for both the models – Report the attribute(s) least impacting the weight of the fish.

(25 points)

Q3 Modify the example code for Logistic Regression to include all the four attributes in iris dataset for two class and multi-class classification. (25 points)

 

Describe and explain information security threats, vulnerabilities, and attack types. Identify information security requirements for organizations and systems. Explain Integral parts of best practices in information security.

Assignment #5 – VPNs, Firewalls, & IDPS

Answer the following questions and explain with as much detail as necessary for each of the concepts.

What will we do?

Describe the three logical components of an IDS.

List some desirable characteristics of an IDS.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

What are the benefits of VPNs? What are the limitations of VPNs – especially in home usage?

List three design goals for a firewall.

How does an IPS differ from a firewall?

Consider the threat of “theft/breach of proprietary or confidential information held in key data files on the system.” One method by which such a breach might occur is the accidental/deliberate e-mailing of information to a user outside of the organization. A possible countermeasure to this is to require all external e-mail to be given a sensitivity tag (classification if you like) in its subject and for external e-mail to have the lowest sensitivity tag. Discuss how this measure could be implemented in a firewall and what components and architecture would be needed to do this. Why are we doing this?

These are complex topics that can take time to hone the skills. These discussions are meant to show that you have a basic understanding of the concepts and that you can critically think through complex topics.

Learning Objectives

This assignment makes use of multiple course objectives

  • Describe and explain information security threats, vulnerabilities, and attack types.
  • Identify information security requirements for organizations and systems.
  • Explain Integral parts of best practices in information security.

What opportunities could come out of data analytics in the future? Which industry or field will most benefit from data science? Which industry or field will find it the most challenging to gain benefits from data science?

Week 7 Discussion

Week 7 Discussion

Discuss how you see the future of data analytics, and answer two of the following:

  • What opportunities could come out of data analytics in the future?
  • Which industry or field will most benefit from data science?
  • Which industry or field will find it the most challenging to gain benefits from data science?
  • How do you see a suitable fit for you in the future of data analytics?

In response to your peers, provide a response to another question you hadn’t yet answered.

You must make at least two substantive responses to your classmates’ posts. Respond to these posts in any of the following ways:

  • Build on something your classmate said.
  • Explain why and how you see things differently.
  • Ask a probing or clarifying question.
  • Share an insight from having read your classmates’ postings.
  • Offer and support an opinion.
  • Validate an idea with your own experience.
  • Expand on your classmates’ postings.
  • Ask for evidence that supports the post.

Create a 10- to 12-slide presentation with detailed speaker notes that addresses the influence of technology, media, and culture on the following domains of child development.

Effects of Technology, Media, and Culture Presentation

Technology and media can be viewed as both a blessing and a curse when it comes to raising and educating children. While there are many positive influences that technology and media have brought to education, there are drawbacks as well. Another important influence is a child’s cultural background, which tends to impact the way a child participates in learning. In this assignment, you will do a deep dive into the effects, both positive and negative, that technology, media, and culture have on the major domains of child development.

Imagine you’re an instructional coach in a pre-K through 8th-grade school district. You’ve been asked by the head of curriculum to create a presentation to deliver during a teacher institute day.

Create a 10- to 12-slide presentation with detailed speaker notes that addresses the influence of technology, media, and culture on the following domains of child development:

  • Physical
  • Cognitive
  • Emotional
  • Social

Note: You do not need to create audio for this presentation. The detailed speaker notes will be your script for the presentation.