After launching, the users of Cross-Ride application grows and database size grows exponentially. As a consequence, this API of top ride sharing users /api/top-rides becomes very slow. Keeping in mind the current structure of database tables, propose thre

After launching, the users of Cross-Ride application grows and database size grows exponentially. As a consequence, this API of top ride sharing users /api/top-rides becomes very slow. Keeping in mind the current structure of database tables, propose three different possible solutions/improvements to increase the response time of this API? 

*I need by 12am tonight.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organization Leadership and Decision Making

 IFG Case Study – pg 239 – Lesson 5Options Menu: Forum

  • Discuss, comment, and reply.  Original posts and participation graded.
  • Describe the problem at IFG as succinctly as you can.  Use this description to identify the main stakeholders.
  • IFG can’t afford the resources to identify, define, cleanse, and validate all of its data.  On the other hand, building yet another data mart to address a specific problem worsens the data situation.  Propose a solution that will enable IFG to leverage a key business problem/opportunity using their BI tools that does not aggravate their existing data predicament.
  • Describe the problem at IFG as succinctly as you can.  Use this description to identify the main stakeholders.
  • IFG can’t afford the resources to identify, define, cleanse, and validate all of its data.  On the other hand, building yet another data mart to address a specific problem worsens the data situation.  Propose a solution that will enable IFG to leverage a key business problem/opportunity using their BI tools that does not aggravate their existing data predicament.

 

McKeen, J., & Smith, H. (2012). IT Strategy: Issues and Practices. Boston: Prentice Hall.

instuctions: APA Format

4 pages with out title page. Should 4 references .no grammar errors.no plagarism. Quality work

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Annotated Bibliography: (Topic: Defense in depth in the context of protecting National Infrastructure)

  

Annotated Bibliography (Topic: Defense in depth in the context of protecting National Infrastructure)

This paper should be an annotated bibliography, specifically focusing on the “Depth” topic (i.e. Defense in Depth) in the context of protecting National Infrastructure.

Paper must be minimum of 1500 words and with correct APA format, and will need to include at least seven (7) resources (articles) related to Discretion with their respective short summaries for each article. ( 200 words summary for each article (200 * 7= 1400)

ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

What is an Annotated Bibliography?

An Annotated Bibliography is a working list of references—books, journal article, Online documents, websites, etc. that you will use for an essay, research paper, or project. However, each reference citation is followed by a short summative and/or evaluative paragraph, which is called an annotation. 

Here are a few URLs with additional information: (I strongly suggest that you look at these. Closely.)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedbib/apa    <<<< Check out the “Rules! rules! rules!” section

http://guides.library.cornell.edu/annotatedbibliography

https://owl.english.purdue.edu/owl/resource/614/03/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Annotated Bibliography – Depth (Cyber Security)

 

Your paper will be an annotated bibliography, specifically focusing on the “Depth” topic (i.e. Defense in Depth) in the context of protecting National Infrastructure or related to the topic you would like to consider for your dissertation, just examine that from an emergying threats focus

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. 

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out. 

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedbib/apa    <<<< Check out the “Rules! rules! rules!” section

http://guides.library.cornell.edu/annotatedbibliography

https://owl.english.purdue.edu/owl/resource/614/03/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Question Answers

 

Each Question 1 page answer in 11 point font size.APA format,No plagiarism.

Question 1. (8 points). The title of this course is IT Acquisition Management. Explain in YOUR own words what that means? Why is it important? How is IT acquisition different from commodity purchases? Finally, what have you learned this semester about IT Acquisition Management that has impacted you the most?

Question 2. (14 points). State the main purpose of the following:

  1. GANTT chart,
  2. Flow chart, and
  3. Work Breakdown Structure (WBS)

Identify the similarities and differences among the three. In addition, present a pictorial diagram of each and their differences. Note: You are free to use whichever tool you are familiar with—MS Project, SmartDraw, PowerPoint, Excel, etc, to create the images or you can obtain them from the Internet.

Question 3. (8 points).  Why do you think  doing a Risk Analysis  on the chosen alternatives for the performance problem substantially improve for acquisition of IT services 

Question 4. (14 points). A pharmaceutical company is preparing a request for proposal to acquire IT services to improve its pharmaceutical sales system. It plans to implement a tablet software application (“app”) for mobile access to view and update client accounts, update inventories, create orders, communicate with clients and the home office, and view personal work schedules. It plans to prepare a performance work statement (PWS) for the development of the app to include in the RFP.

Your Question/Task: Prepare the required outcomes and their performance standards, monitoring methods, and incentives/disincentives that the pharmaceutical company might use in its PWS for the request for proposal. Your required outcomes and associated information should apply to only the first and second desired app functions, view and update client accounts and update inventories. Your required outcomes and related information should reflect the best practices for performance work statements and each should include performance standards, monitoring methods, and incentives/disincentives, as required by IT Economics Corporation Template 12 (T12-PBWS.pdf )

Note: This is not a test of your knowledge of a pharmaceutical company’s sales activities but of your ability to prepare a performance work statement. You can make reasonable assumptions regarding a pharmaceutical company’s sales activities if necessary. The app functions in the question are comparable to those used by many organizations outside of the pharmaceutical field.

Question 5. (14 points). Federal Acquisition Regulations (FAR) require that federal agencies use performance-based contracting to the maximum extent possible for service contracts, including contracts for the acquisition of IT services. Performance-based contracts rely on a performance work statements (PWS). However, a prominent organization of former federal government acquisition officials argues that the PWS works well with short-term, relatively simple service contracts, but “it is unrealistic to ask agencies to specify services at time of contract award in clear, specific, objective, and measurable terms when future needs are not fully known or understood, requirements and priorities are expected to change during performance, and the circumstances and conditions of performance are not reliably foreseeable.”

Your Question/Task: If you agree with this group’s position, explain why you believe the group is correct in contending that the PWS is not suitable for long-term, complex IT service contracts. If you disagree with this group’s position, explain why you believe the group is not correct and why a PWS is suitable for long-term, complex IT service contracts.

Question 6. (14 points). Template 13, by IT Economics Corporation (T13-Evaluating Sources.pdf ), is an example of a matrix used for summarizing the results of evaluating proposals received from IT services contractors. The template uses “adjectival” rating codes and brief statements to summarize the evaluation results of each proposal from IT services contractors.

Your Question: What are the principal risks associated with using such a matrix and what do you recommend to avoid, mitigate, or transfer each principal risk that you identify?

Question 7. (14 points). An organization is planning an IT acquisition strategy for a large and complex project. It plans to outsource part of the solution implementation to an IT services contractor. Prior to preparing a request for proposals, it must decide which solution implementation activities should be performed by in-house staff and which should be performed by the IT service contractor.

Your Question/Task: What guidelines would you recommend for making the decisions regarding which solution implementation activities should be performed by in-house staff and which should be performed by the IT service contractor?

Question 8. (14 points). An IT services contractor generally tries to appoint the project manager that is best suited to the customer and the project. In the case described below, the contractor appointed one of its best project managers to manage a project under contract with an important client. Here is the problem that the project manager encountered:

  • The Case. An organization awarded a time and materials contract to a qualified IT services contractor to develop software for analyzing large amounts of customer data and establishing tailored reporting of the results for managers of lines of business. The project required 40 full-time analysts, designers, and programmers. Because of the importance of the project to both the customer and the contractor, the contractor assigned a senior project manager who was known for having excellent technical skills and excellent soft skills. After the project was under way for several months, the project manager discovered that two team members had charged time to the project for several three-to five day periods in which they did not work on the project. The customer had no knowledge of this and counted the time in calculating the payments to the contractor.

Your Question/Task: Given the circumstances of this case, what action should the project manager take? Explain the reason(s) for your answer.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company.

 

Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company.

Only MS Word (.doc, .docx) and Adobe Acrobat (PDF) formats are acceptable. Please note that this is a formal writing, all references (peer-reviewed) mostly must be cited appropriately within the text and clearly avoid plagiarism. The paper should have a minimum of 10 pages, 1.5 spacing and Times New Roman font. A minimum of 5 peer review references must be provided. Reference style is APA. You can also have some web references alongside the stated requirement.

NOTE: NEED PPT FOR THIS ASSIGNMENT INCLUDE WITH PAPER(15 SLIDES WITH REFERENCE)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment – Advanced analytics

  please make sure to read Chapter 6 of your textbook.  

(a) In the use of a categorical variable with n possible values, explain the following:
    1. Why only n – 1 binary variables are necessary
    2. Why using n variables would be problematic
 
(b) Describe how logistic regression can be used as a classifier.

(c) Discuss how the ROC curve can be used to determine an appropriate threshold value for a classifier

(d) If the probability of an event occurring is 0.4, then

    1. What is the odds ratio?
    2. What is the log odds ratio?

Requirements:

– Typed in a word document.

– Please write in APA Style and include at least Five (5) reputable sources.

– The complete paper should be between 800-to-1000-words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 1 – Data Analysis in R

 Attached Files:

This will be the first of 2 assignments this semester. You will find 2 files to download. 

1) zipIncomeAssignment.csv is the dataset file you will use for the asignment.

2) ITS836 Assignment 1.docx is the actual assignment instructions.

Note: When you read through the docx file, you’ll notice that some words are in bold. That was intentional. Consider those words very strong hints to the solution. 

This assignment is worth 20 points (20% of your final grade.) You will use R to perform basic data analysis on the supplied dataset. Please refer to the discussion forum for additional information. 

Please note that questions #8 and #9 will likely be quite challenging. I want you to discuss challenges and strategies in the discussion forum. Don’t just give up the answers to other students if you figure out how to solve the problems, but try to offer insights and answer other students’ questions when you can. I’ll be in on the discussion as well. The point is for each of you to learn about R. The best way to get there is to encounter some challenges and collaborate to resolve them. I look at questions #8 and #9 as opportunities to learn more about R, not ways for me to count off points. I’m interested in the outcome. 

Of course, you will need a functioning R implementation to do this exercise. See the discussion forum for more details if you need to acquire R.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail.

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

network forensices

1)developing procedures for network forensices

2)reviewing network logs

3)using network tools

4)using packet analyzers

5)wireshark installation and how you are using

6)honeynet project

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now