Discuss what benefits could the company realize from using a BI/BA environment. Discuss what challenges your selected organization might encounter in transitioning to the new environment; challenges such as organizational culture, skills, technologies including tools, as examples. Develop a system diagram displaying at a conceptual level, what the BI/BA environment would look like.

Business Intelligence/Business Analytics Environment

You have been tasked with developing an approach for transitioning your organization, or an organization you are familiar with, from a “spreadsheet-driven” data analysis environment to a Business Intelligence (BI) environment which includes a Business Analytics (BA) function. Your approach should fulfill the following requirements:

• Discuss what benefits could the company realize from using a BI/BA environment.

• Discuss what challenges your selected organization might encounter in transitioning to the new environment; challenges such as organizational culture, skills, technologies including tools, as examples.

• Develop a system diagram displaying at a conceptual level, what the BI/BA environment would look like.

• Make the approach actionable. After reading your paper, the reader should not wonder what steps need to be undertaken to implement this approach.

Your paper should be a minimum of 2 pages in length, not including title and reference pages, and must fully address the assignment requirements. It should conform to CSU Global Writing Center e, . Include at least two credible references in addition to the course textbook. The CSU Global Library.o is a good place to find these references.

Write a 4 page Essay addressing the five Communication Factors in Effective Team Performance. Additionally, you must cite as per APA 7th Edition rules for references, the article used as the basis for the summary.

Effective Project Communication

Write a 4 page Essay addressing the five Communication Factors in Effective Team Performance. Your essay must cite as per APA 7th Edition rules for references and should address the following subheadings;

  • Cover page
  • Abstract
  • Five communication Factors in effective team performance
  • Factor 1 – Supportive Leadership
  • Factor 2 – Communication Safety
  • Factor 3 -Team Reflexivity
  • Factor 4 – Task Communication
  • Factor 5 – Boundary Spanning
  • Conclusion
  • References

Additionally, you must cite as per APA 7th Edition rules for references, the article used as the basis for the summary. Try to find at least 1 other supporting or opposing source.

How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing? What features does each IoT device offer? How are the IoT devices installed and configured? How could this IoT device be used in schools and classrooms?

Determine the implications involved in the design of an internet of things (IoT) software application

Create a white paper using APA format with citations. You may use the White Paper Guidelines document in the Supporting Materials section. Your white paper must address the following:

IoT Devices: Select at least two of the IoT devices introduced in the scenario. Then describe the IoT devices and potential use cases. You may reflect on:

(1) How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?
(2) What features does each IoT device offer?
(3) How are the IoT devices installed and configured?
(4) How could this IoT device be used in schools and classrooms?

Background Information: Explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices. In your explanation, you should also address:

(1) How are cloud computing and the internet of things connected?
(2) How is data from the IoT devices collected and stored?
(3) What are the vulnerabilities, risks, and other issues involved?
(4) What are the layers of an IoT architecture?

Errors in the Design of IoT: Identify 3 to 5 potential errors and issues that may occur with the design of the IoT in the context described in the scenario. As you explain potential errors in your white paper, you must consider:

(1) Confidentiality: Are there any privacy errors in the architectural design?
(2) Integrity: Are there errors that reduce the accuracy, consistency, or trustworthiness of the data collected and stored on any of the devices?
(3) Availability: What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?

Confidentiality: How do your solutions improve user privacy?

Integrity: How do your solutions improve the integrity of the data?

Availability: How do your solutions affect the availability of the system? Do they change the maintenance times?

Ethical and Societal Implications: Describe any ethical and societal implications of the design of IoT that you think should be considered by the IT professionals, administrators, or teachers who are working in the schools. You must include how IoT can positively and negatively impact society. Perhaps you may even consider the impact on parents if their child engages with the IoT at school. To help you determine these implications, you may want to reflect on:

(1) What are ethical stances that both IT and educational professionals would need to consider if they integrate YODAE’s IoT devices into schools?
(2) What seems right or wrong about these devices, and why?
(3) Is there a specific IoT device that seems problematic for the context that it will be implemented in?
(4) Just because these products are on the market, should you promote them and encourage the use of them?

 

Citations: You must use APA format to cite any source that you used to gather your information. You’ll also want to include a References page at the end of your white paper. This page is helpful in the event that the professionals reviewing your white paper want to learn more about the technology. In most companies, the readers of the white paper are likely to want to learn more about the subject, and the references allow them to research topics of interest.

What is the name of this e-commerce company? What is the fictional name of the CEO, and what is the fictional name of the CIO? In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government agency? A nonprofit or charity, perhaps?

Identifying Your Company and Your Role

Overview
You have accepted a job from the chief information officer at a small business with 30 employees. The company moved into a new building last year and quickly expanded. The CEO has asked the CIO to serve as executive stakeholder of the project steering committee, which is headed by the lead project manager of the PMO that the company is contracting with.
For this activity, you will establish the fictional company, executives, and team members that you will refer to.

What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.

Finally, choose one of the following roles on the team. Pick one that is closest to your concentration you have studied. For example, software engineering would be closest to software development, forensic investigation would be closest to cybersecurity. If you have any questions on how to answer this, reach out to your instructor. Which of the following is your major (concentration) closest to?

  • Software Development.
  • Networking.
  • IT Project Management.
  • Data Analytics.
  • Data Management.
  • Cybersecurity (yes, this is the correct spelling).

Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name in where it belongs; the other roles can have fictional names assigned to them.

  • Cybersecurity Specialist:
  • Networking Specialist:
  • Data Management Specialist:
  • IT Project Manager (Assistant to the Project Manager):
  • Software Development Team Lead:

How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing? What features does each IoT device offer? How are the IoT devices installed and configured? How could this IoT device be used in schools and classrooms?

Determine the implications involved in the design of an internet of things (IoT) software application

Create a white paper using APA format with citations. You may use the White Paper Guidelines document in the Supporting Materials section. Your white paper must address the following:

IoT Devices: Select at least two of the IoT devices introduced in the scenario. Then describe the IoT devices and potential use cases. You may reflect on:

(1) How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?
(2) What features does each IoT device offer?
(3) How are the IoT devices installed and configured?
(4) How could this IoT device be used in schools and classrooms?

Background Information: Explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices. In your explanation, you should also address:

(1) How are cloud computing and the internet of things connected?
(2) How is data from the IoT devices collected and stored?
(3) What are the vulnerabilities, risks, and other issues involved?
(4) What are the layers of an IoT architecture?

Errors in the Design of IoT: Identify 3 to 5 potential errors and issues that may occur with the design of the IoT in the context described in the scenario. As you explain potential errors in your white paper, you must consider:

(1) Confidentiality: Are there any privacy errors in the architectural design?
(2) Integrity: Are there errors that reduce the accuracy, consistency, or trustworthiness of the data collected and stored on any of the devices?
(3) Availability: What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?

Confidentiality: How do your solutions improve user privacy?

Integrity: How do your solutions improve the integrity of the data?

Availability: How do your solutions affect the availability of the system? Do they change the maintenance times?

Ethical and Societal Implications: Describe any ethical and societal implications of the design of IoT that you think should be considered by the IT professionals, administrators, or teachers who are working in the schools. You must include how IoT can positively and negatively impact society. Perhaps you may even consider the impact on parents if their child engages with the IoT at school. To help you determine these implications, you may want to reflect on:

(1) What are ethical stances that both IT and educational professionals would need to consider if they integrate YODAE’s IoT devices into schools?
(2) What seems right or wrong about these devices, and why?
(3) Is there a specific IoT device that seems problematic for the context that it will be implemented in?
(4) Just because these products are on the market, should you promote them and encourage the use of them?

 

Citations: You must use APA format to cite any source that you used to gather your information. You’ll also want to include a References page at the end of your white paper. This page is helpful in the event that the professionals reviewing your white paper want to learn more about the technology. In most companies, the readers of the white paper are likely to want to learn more about the subject, and the references allow them to research topics of interest.

Draw and explain a function stack . Be sure to communicate what is happening and what will happen when the strcpy occurs.  Is this following code segment safe? Explain why or why not?

Buffer Overflow

 

Part 2: Buffer Overflow [30 points]

Question 1:  Draw and explain a function stack . Be sure to communicate what is happening and what will happen when the strcpy occurs.  Use the following C code to depict the stack/heap like the slides 15 in the buffer overflow teaching materials. [20 point]

int main () //think of main like P { int returnedvalue.

/* In C, a function can return values */

/* Now you are passing a string into buffered */

/* the function buffered returns a value */

 

returnedvalue =  buffered (“12345678910”);

 

/* think of bof as Q; don’t forget your parameters */

 

return 0;

}

int buffered (char *str)

{ char mybuffer [10];  strcpy (mybuffer, str); return 1; }

 

Question 2: Is this following code segment safe? Explain why or why not? [10 points]

/* Assume this function can be called from a C program */ int bof (char *str, int size) {char *buffer = (char *) malloc (size); strcpy (buffer, str); return 1;}

Notes: malloc is a C library function that allocates space of a specific size

 

How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing? What features does each IoT device offer? How are the IoT devices installed and configured? How could this IoT device be used in schools and classrooms?

Determine the implications involved in the design of an internet of things (IoT) software application

Create a white paper using APA format with citations. You may use the White Paper Guidelines document in the Supporting Materials section. Your white paper must address the following:

IoT Devices: Select at least two of the IoT devices introduced in the scenario. Then describe the IoT devices and potential use cases. You may reflect on:

(1) How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?
(2) What features does each IoT device offer?
(3) How are the IoT devices installed and configured?
(4) How could this IoT device be used in schools and classrooms?

Background Information: Explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices. In your explanation, you should also address:

(1) How are cloud computing and the internet of things connected?
(2) How is data from the IoT devices collected and stored?
(3) What are the vulnerabilities, risks, and other issues involved?
(4) What are the layers of an IoT architecture?

Errors in the Design of IoT: Identify 3 to 5 potential errors and issues that may occur with the design of the IoT in the context described in the scenario. As you explain potential errors in your white paper, you must consider:

(1) Confidentiality: Are there any privacy errors in the architectural design?
(2) Integrity: Are there errors that reduce the accuracy, consistency, or trustworthiness of the data collected and stored on any of the devices?
(3) Availability: What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?

Confidentiality: How do your solutions improve user privacy?

Integrity: How do your solutions improve the integrity of the data?

Availability: How do your solutions affect the availability of the system? Do they change the maintenance times?

Ethical and Societal Implications: Describe any ethical and societal implications of the design of IoT that you think should be considered by the IT professionals, administrators, or teachers who are working in the schools. You must include how IoT can positively and negatively impact society. Perhaps you may even consider the impact on parents if their child engages with the IoT at school. To help you determine these implications, you may want to reflect on:

(1) What are ethical stances that both IT and educational professionals would need to consider if they integrate YODAE’s IoT devices into schools?
(2) What seems right or wrong about these devices, and why?
(3) Is there a specific IoT device that seems problematic for the context that it will be implemented in?
(4) Just because these products are on the market, should you promote them and encourage the use of them?

 

Citations: You must use APA format to cite any source that you used to gather your information. You’ll also want to include a References page at the end of your white paper. This page is helpful in the event that the professionals reviewing your white paper want to learn more about the technology. In most companies, the readers of the white paper are likely to want to learn more about the subject, and the references allow them to research topics of interest.

Write a well researched 4 page essay not including title page and references on Risk Management in a project.

Risk Management

Write a well researched 4 page essay not including title page and references on Risk Management in a project. Your Essay should cover the following risk management steps:

I. Abstract
II. Introduction – what is risk in a project. This is a definition of risk as it relates to a project
III. Risk Analysis Process

  • a. Identification
  • b. Assess the Risk
  • c. Develop a Risk Response plan
  • d. Monitor and review risk

IV. Conclusion
V. References

Eugene Atget considered his images as documents for artists, but they have been interpreted in a wide variety of ways. They have been seen as surrealistic art and they have been said to resemble documents of a crime scene. Discuss.

Eugene atget essay photography subject

Eugene Atget considered his images as documents for artists, but they have been interpreted in a wide variety of ways. They have been seen as surrealistic art and they have been said to resemble documents of a crime scene. Discuss.

The hard drive(s) must be of sufficient size to meet the intended use of the computer. Indicate the brand, model number, and key specifications such as spindle speed, access time, amount of cache (RAM on the hard drive). Also indicate the price and source of the drive(s). The optical drive needs to be sufficient for loading the operating system and meeting whatever other needs based on the intended use of the computer. Indicate whether you chose a CD, DVD, Blue-Ray, etc. and whether it is read-only, writable, or re-writable. Also indicate the price and source. The video graphics expansion board (if desired) must exceed the capabilities of the on-board graphics of the motherboard. Whether you choose to purchase a graphics card or not, provide the rationale for this decision. If chosen, list the specifications (including types of video output such as VGA, DVI, HDMI, Display Port, etc.), the source, and the price.

Project Storage Devices & Video Considerations

In this Unit, you complete and submit Phase 2 of your Course Project: Storage Devices & Video Considerations. In this phase, you will be simulating the purchase of one or more hard drives (or solid state drives), optical drives, and consider whether you will be adding a video card in an expansion slot or sticking with the motherboard’s on-board video.

Instructions

The requirements for Phase 2 of your course project are as follows:

The hard drive(s) must be of sufficient size to meet the intended use of the computer. Indicate the brand, model number, and key specifications such as spindle speed, access time, amount of cache (RAM on the hard drive). Also indicate the price and source of the drive(s).

The optical drive needs to be sufficient for loading the operating system and meeting whatever other needs based on the intended use of the computer. Indicate whether you chose a CD, DVD, Blue-Ray, etc. and whether it is read-only, writable, or re-writable. Also indicate the price and source.

The video graphics expansion board (if desired) must exceed the capabilities of the on-board graphics of the motherboard. Whether you choose to purchase a graphics card or not, provide the rationale for this decision. If chosen, list the specifications (including types of video output such as VGA, DVI, HDMI, Display Port, etc.), the source, and the price.