+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

D-5

 Why is it so important to know your data? Discuss some methods you would implement to better learn and understand your data. What are some advantages to your methods? What are some disadvantages?

Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

Data Analyzing & Visualization

 

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dat

Research Project 1

 Select one of the three research topics listed and follow the detailed instructions. The paper can be single or double spaced. The paper's cover page does not count as a page against the maximum number of pages, however, references do.  So you will write on 4 pages, but the 5th page will be the reference. Please check your paper against the Vericite database by submitting it for checking prior to your final submission here.  

CIS 505 Discussion Post Response


CIS 505 discussion post responses.

Respond to the colleagues posts regarding:

After reading about and studying VPNs this week, describe a scenario where you might find a VPN useful in the business world. What are some major concerns you might have as a network manager?

There are two discussions here that need to be responded to thoroughly. Responses must be on APA format 150+words 1-2 legitimate verifiable sources per response.


GS post states the following:


As a company that utilizes VPN for the past 10 years we have found it a productive way for employees to conduct business in a secure fashion. We implemented a RSA token for extra security and this eases executives over security concerns. With our VPN (Checkpoint) we offer two ways to access our internal network:

-RSA token: This is handed out to personnel that use a laptop for business. This 3 part authentication requires username/pi

BUS 517 Discussion Post Response


BUS 517 discussion post responses.

Respond to the colleagues posts regarding:

Dedicated or Non-Dedicated Resources

You are now deciding on resources for a project team. You have a choice to staff a team of resources who will be dedicated (or allocated) 100% to the project, or staff a team of resources who will be dedicated (or allocated) three days each week to your project. Using information from the readings, explain how you can use either set of resources.

There are two discussions here that need to be responded to thoroughly. Responses must be on APA format 150+words 1-2 legitimate verifiable sources per response.


SW post states the following:


This weeks review is in regards to dedicated project staff versus temporary project staff. The dedicated project team consists of 100% project staff allocation for project activities. The ability to have a support staff that is dedicated to th

Discussion

 

In your initial post, discuss the differences between Virtualization and Cloud Computing.

Please find one organization that has recently adopted virtualization and summarize their reasons for taking this approach. What challenges did they face?

Respond substantively to at least two other students' posts. Compare and discuss the key challenges that other classmates listed in their initial post. Were they similar to other organizations? If not, why? If so, how?

Good forum interaction!

*please remember to include at least one credible scholarly reference with your initial post! 

Week 4 Discussion & Respond To Discussion Board

Attached below is:

WEEK 4: As always, include references. As always,   no plagiarism, cite and list in apa format   


 Respond To Discussion Board: They are 2 discussion boards post below. read and Reply to each discussion post 100 words per each response so total 200words.  Responses should demonstrate critical thinking and comprehension of the discussion topic and are strengthened when they are supported by additional research. You are expected to provide supporting details for your response; that support may come from the points covered in the readings and additional external research all source must be cited and listed  (appropriately cited) in APA      

IS – Week 5 Dis

 

Based on Chapter 6 lecture, in your OWN opinion what department or role do you believe should own the IG development policy process? IT? Legal? HR? Risk Management? Records Management?  Once the IG policy is developed what would be your Communication strategy plan for your organization? 250 to 300 words with APA and Scholarly refreences

Information Systems Infrastructure

Discussion 3

Research at least two articles on the topic of big data and its business impacts. Write a brief synthesis and summary of the two articles. How are the topics of the two articles related? What information was relevant and why?

Provide the references.

Discussion

  •  
  • Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
  • Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

  • Make an argument concerning the topic.
  • <