Wk 6 Discussion 1 [no word count required, answer question, and respond to three peers]

Discussion Topic

Technology advances rapidly in the current market and can become dated and obsolete quickly. Organizations must keep pace with the evolution of technology to compete and sustain a market advantage.

What are some emerging technology trends that have influenced your personal choice of an SDLC, either in your experience or in something you’ve read? Explain the trend and the influence and effect it had on you. Were there any issues? Would you recommend the same SDLC if you had to do it again?

Post your answers to the discussion forum.

Respond to at least three of your peers. In your response, consider providing a similar experience, or why you would have selected a different model.

PEER 1

Good afternoon Class

I would have to say the new google phone for me has influence my future smartphone purchase’s. I have a Galaxy 8 now and I was looking a the feature of the new google pixel 3 phone and many of the built in features you can download on the galaxy 8 but you would run out of storage and pay what you would pay for in a new phone in a applications. This new phone allows you to translate any language into English all controlled by the applications, this is appealing to me because I do travel quite a bit to foreign countries. Along with the unlimited storage cloud based, Google assist is also a standard practice that is used by the Pixel 3. The easy to use navigation, allows for the user to have a knowledgeable use for the smartphone. The wind down mode allows for users to take a step back when its time to sleep at night with dim lighting and message holding ability to hold messages. For electronics such as smartphones and artificial intelligence I would use the agile method anytime only because you can evolve the software anytime and keep growing it a you need too. This software not only holds value to people that travel but to military persons like myself that if we are ever in need of translating a sign we can simply point the phone camera and it will trans late what the sign is saying if it is in another language.

https://www.verizonwireless.com/smartphones/google-pixel-3/?cmp=KNC-C-HQ-NON-R-AC-NONE-NONE-2K0PX0-PX-GAW-71700000016755451&gclid=EAIaIQobChMI2qTN68il4AIVEL7ACh29cAAgEAAYASAAEgLOMfD_BwE&gclsrc=aw.ds

PEER 2

From something I read about one of the trends with the Palm Treo’s phones that did more than just make calls. I had the Treo as well great phone can search the web keyboard email and take photos and a year or two after I had the palm 650 the palm Treo came out the palm tried to follow the trend pre-order the device and got it day one but the Palm Treo was not as good as a phone as the Palm 650 screen hard to user keys was extremely small should of let someone get it first or do my research before made that purchase relate to the writer of the article My Treo doesn’t exist anymore; it was a stepping stone within the larger trend. Which the Palm and Black Berry was the stepping stone for iPhone and Android phones now before I upgrade, I do my research either reading about the phone on the official site or YouTube user who have early access to give reviews.

I notice the company I have work for when they provide user with a phone either iPhone or Android, they give the user the last years models for example if we are on the iPhone 10sThey are giving out the regular 10 to the end user I guess so they know all the bugs are worked out the mobile devices before they release them to the users same as Android if the 10 android just release to the public the company user will receive 9 for that calendar year.

About page, 23 Mobile Things, accessed November 7, 2017, http://23mobilethings.net/wpress/about

PEER 3

Hello everyone!

What are some emerging technology trends that have influenced your personal choice of an SDLC, either in your experience or in something you’ve read? Explain the trend and the influence and effect it had on you. Were there any issues? Would you recommend the same SDLC if you had to do it again?

The SDLC still sort of new . My skills leans more on hardware and networking side.

I am going to go with Artificial Intelligence and I have voice activation on my smartphone as one of the features. There are many forms of AI such in Gaming, Natural Language Processing, Expert Systems, Vision Systems, Speech Recognition, Handwriting Recognition, Intelligent Robots.

I have used the voice activation feature on my smart phone at times it comes in handing when you do not want to text only thing it does not pick up all the words and if you speak to fast it will think of something else.

Pros Error Reduction, Difficult Exploration, Daily Application, Digital Assistants, Repetitive Jobs, Medical Applications, No Breaks,

Cons: High Cost, No replicating humans, no improvement with experience, no original creativity and unemployment.

Reference: Wise Step, Artificial Intelligence, Advantages and Disadvantages of Artificial Intelligence, by Krishna Reddy, https://content.wisestep.com/advantages-disadvantages-artificial-intelligence/

Medium Corporation, Software Development Trends in 2018 that Will Dominate 2019, Jessica Williams, August 07,2018, https://medium.com/@Jessicawlm/software-development-trends-in-2018-that-will-dominate-2019-db1a1681c84dv

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

statement of purpose for phd in IT

 

PhD candidates should provide an authentic personal statement reflecting on their own  person interest. In the event that any outside resources are used, those should be cited in APA format. Statement should be a maximum of 500        words answering the following questions:
What are your research  interests in the area of Information Technology?
Why are you inspired   to possibly research in this area and/or why do you think it is important to research in this area? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Defending Against DDoS

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Telecommunications Network Security

 Computer network security isnot a final solution or a task to be completed. Security is a continuous journey. Safeguards and infrastructures that worked before might offer little or no protection against future attacks. You must constantly develop and deploy new defenses against new exploits. This vigilance is the essence of network security management.

Network security management strives to maintain established security, adjust the infrastructure to future threats, and respond to breaches in a timely manner. Using a variety of techniques and tools, including incident response, host security, backup and recovery, checklists, and security assessment, network security management is a complex, but essential component of long-term, reliable security.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Essay on 5G network

Topic: what is different between previous generation (3G mobile network,4G mobile network )

       5G and how 5G mobile networks

       discuss what value add 5G will provide to businesses

Basically, discuss about this topic about 5g Technology :

how it works.  Why is it important in today’s high-tech world?  Be sure to discuss differences in competing technologies, and pros and cons with this technology.  

Take a position on why this technology is critical/beneficial/detrimental to the world we live in.  What are the issues (pros and cons) with using this technology/architecture?  

How does this technology or architecture benefit businesses and commerce?  

How are companies taking advantage of these technologies or architectures, or what limits companies from using them?  What does the future hold? 

Guideline:

Write a 4-5 page research paper in APA format (double spaced, 12 pt. font, cite your sources in a References page) Note:referece page not count in 5 page.  

Provide an introduction paragraph that defines what your key topics will be.  

Provide a good concluding paragraph drawing conclusions based on your research and restating your research topics and describing what you have learned.

Reference: atleast 2 book reference and atleast 5 web reference in APA format

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 4 Discussion 3

Discussion Topic

Review this week’s course materials and learning activities, and reflect on your learning so far this week.

Respond to one or more of the following prompts in one to two paragraphs:

  1. Choose a topic from this week’s course materials, and summarize what you learned about the topic. Provide citation and reference to the material(s) you discuss. Describe what you found interesting regarding this topic, and why.
  2. Discuss a key knowledge, skill, or ability you gained from your learning this week. Describe how you will apply that learning in your daily life, including your work life.
  3. Describe 2 to 3 ideas, topics, or concepts from this week’s course materials for which you would like to learn more, and why. Describe what may be unclear to you, and what you would like to learn.

Students need to contribute two substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

PEER 1

“A contact management CRM system maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information. For example, a contact management system can take an incoming telephone number and automatically display the person’s name along with a comprehensive history, including all communications with the company. This allows the sales representative to personalize the phone conversation and ask such things as, “How is your new laptop working, Sue?” or “How was your family vacation to Colorado?” The customer feels valued, since the sales associate knows her name and even remembers details of their last conversation. ” (Baltzan, 2018, ).

Technology is amazing! I have noticed the ability for customer call service, I call in and they already know who I am. Usually I just need to verify the account with a few details but they already have my information readily available. It makes it very easy if I refer back to a previous phone call and they respond “Oh yes sir, I see that here.” I remember many years ago, when the response would have been, “that wasn’t me” or “sir we would never offer that” Leaving me with a feeling of frustration trying to prove a conversation, I knew took place.

Reference: ´Baltzan, P. (2018). Business Driven Technology (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

PEER 2

“Customer relationship management (CRM) is a means of managing all aspects of a customer’s relationship with an organization to increase customer loyalty and retention and an organization’s profitability. CRM allows an organization to gain insights into customers’ shopping and buying behaviors. Every time a customer communicates with a company, the firm has the chance to build a trusting relationship with that particular customer. Harley-Davidson realizes that it takes more than just building and selling motorcycles to fulfill the dreams of its loyal customers. For this reason, the company strives to deliver unforgettable experiences along with its top-quality products. When the company began selling products online it found itself facing a dilemma—its online strategy for selling accessories directly to consumers would bypass Harley-Davidson’s dealers, who depend on the high-margin accessories for store revenues. The solution was to deploy Harley-Davidson.com, which prompts customers to select a participating Harley-Davidson dealership before placing any online orders. ” (Baltzan, 2018, ).

I found the story about Harley-Davidson to be interesting. They wanted to ensure that they protected their vendors from losing out on potential sales, while also making sure that they were able to give their customers the best experience. I think they might have tried for a greedy more ambitious solution of trying to support their customers directly and cutting out the dealerships.

Reference: ´Baltzan, P. (2018). Business Driven Technology (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Windows Application Security

  

Pick a topic relevant to the information we have covered between week 5 and 11. It can cover information in the book chapters or any of the articles presented in the readings area. The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):

Week 05 – Protecting Microsoft Windows against Malware

Week 06 – Microsoft Windows Network Security

Week 09: Group Policy Controls in Microsoft Windows

Week 09  Microsoft Windows Security Profile and Audit Tools

Week 10: Microsoft Windows Backup and Recovery Tools

INTRODUCTION:

· State the topic you are attempting to cover.

· State the issues involved

· State why we should be concerned with resolving whatever issues are involved

· State how answering the issues will help us

· State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE (2 sources minimal, at least 1 needs to be peer-reviewed). Identify who has tried to answer the question before by doing the following:

· Summarize how each of the sources presents and deals with the subject

· Explain how each source presents and deals with its findings or results

· Explain the relevancy of each source to your topic

· State what you learned from each of your sources

· State in what way(s) each source contributes to answering your issues

DISCUSSION:

· State your answer to your issue

· State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue

· State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS:

· Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)

· State the implications of your conclusions

· State what might be the possible consequences of your conclusions

· State the significance these implications and consequences might have in the information technology / information security realm 

DOCUMENTATION:

· On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper

· You should have a MINIMUM of three (2) sources for your paper, at least 1 source needs to be peer-reviewed

· Not meeting this minimum requirement of three (2) sources will lead to a lower evaluation of your paper for each missing source

· Use APA format for documenting your sources

-For APA help: Purdue OWL

-For more details on journal types, refer to this link: Rutgers Library

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Web Application Security

Topic: Web Application Security.

Needed 6-7 pages on : Results/Findings/Discussion/Conclusion of the research. 

Results/Findings:

 

Your research results/findings paper must include:

  • Include the results of your study
  • Include figures and tables along showing visual comparisons
  • Include narrative text (not bullet points) describing the comparisons

Discussion:

  • Write a research discussion paper for your research.

Discussion paper must include:

  • A discussion and evaluation of the conflicting results
  • A discussion of the unexpected findings
  • A discussion on how the findings answer your research questions, address the hypotheses or propositions
  • An explanation of the implication of your findings (why they are important and how they affect our understanding of the research problem).

Conclusion:

Conclusion paper must include:

  • A summarization of the entire research project
    • What you set out to do (purpose)
    • What you did (methods)
    • What you found (results)
  • A a critical evaluation of the research project, future research suggestions, and recommendations.

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain scholarly references. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Lab Assignment 1: NSLookup

You may create your assignment using either a word processing software program (i.e. Microsoft Word) or a simple text editor (i.e. Notepad).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java data Sturcture Searching and Sorting

 

Guidelines
Please follow the guidelines below:
Submit the homework and lab solutions in the drop box. For a programming question,
submit a .java file (for source code) and a .txt file for program output. If the problem
involves other questions, submit a separate .txt file to answer the question.    
P1 (20 points)
Implement a binary search of an array iteratively using the methodpublic 

static <T extends Comparable<? super T>> booleaninArrayIterativeSorted(T[]
anArray, T anEntry)
P2 (30 points)
Consider an array data of n numerical values in sorted order and a list of numerical target
values (target values are not necessarily sorted). Your goal is to compute the smallest range of
array indices that contains all of the target values. If a target value is smaller than data[0], the
range should start with -1. If a target value is larger than data[n – 1], the range should end with
n.
For example, given the array [ 5 8 10 13 15 20 22 26] and the target values (8, 2, 9, 17), the
range is -1 to 5.
1.   Devise an efficient algorithm that solves this problem and implement it in
public static <T extends Comparable<? super T>>
Interval findInterval(T[] sortedData, List<T> targetValues)

where Interval is a class that provides two public methods getLower() and getUpper() to return
the lower and upper values of an Interval object. Implement the Interval class.

2.   If you have n data values in the array and m target values in the list, what is the Big Oh
performance of your algorithm?  
P3 (20 points)
Write the java code for the method
pubic static <T extends Comparable<? super T>> boolean  isSorted(T[ ] a)
which returns true if the array a is in sorted in ascending order. The code must run in O(n) time.
P4 (30 points)
Consider a revised selection sort algorithm so that on each pass it finds both the largest and
smallest values in the unsorted portion of the array. The sort then moves each of these values
into its correct location by swapping array entries.
1.   Implement the modified selection sort using the method
public static <T extends Comparable<? super T>> void modifiedSelectionSort(T[] a, int n)
2.   How many comparisons are necessary to sort n values?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now