Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Annotted Bibliography

Annotated Bibliography

Name

Institution Affiliation

Date

IOT, is a system of connected Mechanical or Computing devices. (Brown Eric 2016) It is the heart of the transformation of many things that are around us that are on the internet in one way or the other. Kevin Ashton who was a British visionary first documented the internet of things (IOT) in 1999. This brought about a system where reality is connected globally by network data sensors. Today, the IOT has different visions based on its user and use. It has become a dynamic network with capabilities based on interoperable communication protocols where physical and virtual interactions are experienced. (SAP 2014)

According to ( L. Columbus 2016), IOT has become a disruptive technology. The driving force has become digitally transformed to revolutionize the world around us. When connectivity is playing a gigantic role, digitalization is playing defining its role in the mining industry. This is generally to implant many things that are related to electronics and software to make it possible for communication with each other via the internet. This gets us to know the IOT. Coal mining operations have been mobile roof supported by use of IOT. This makes mining easier and fast. CITATION Sin18 \l 1033 (Singh, 2018).

To begin with Safety, it is what everyone should consider in Mine sites. IOT comes in hand in tackling unsafe situations. For instance, safety interlock switches that monitor single doors and provide insight on usage where developed by the RFID. However, workers ignore some of these safeties and use the interlock switch uselessly. This is a dangerous practice pushed by workers chasing productivity gains rather than following safety processes. CITATION CUM19 \l 1033 (CUMBERLAND, 2019) CITATION Zha12 \l 1033 (Zhang Yinghua, 2012)

Secondly, there have been cases of mines corrupting due to mispredictions on what the mines can support. The IOT technology has helped the mining’s company equip the mines with sensors attached to assets, feeding real-time condition data into the system which gives early warnings before the trouble can even begin.

The IOT also helps in time-saving by its ability to develop a data mining system that can maintain the mines. There are machines that have been designed out of technology like the Autonomous Drilling system that doesn't require human efforts to operate. Mines operating without time wastage would allow mined materials to be extracted and processed at a very short time. With the implementation of the IOT technology, there has been an increased in the efficiency of detection of problems through the invented IR, ultrasonic means of easily tracking the movement of goods and people. CITATION Ala18 \l 1033 (Structures, 2018)

In conclusion, many of the mining industries are being modernized hence the need for new skills and training for the workers to operate machinery and use new technology. Learning of new skills and training will not be easy for workers who are still working under the old technology of skills. As such, the mining industry will employ new workers with the needed skills for transition and advancement for the industry hence growing new labor that is technologically advanced. However, workers who are not willing to learn new skills will end up having no jobs. In addition, businesses and industries will benefit greatly from the modernization of mining industries. This is because; mining has been made fast and effective use of technology producing high yields. However, this reduces the lifespan of the mines as a result of over mining. Mine's lifespan is decreased by half the number when technology is used.

Bibliography

1.Hendricks, Drew. "The Trouble with the Internet of Things". London Datastore. Greater London Authority. Retrieved 10 August 2015.

2.Brown, Eric (20 September 2016). "21 Open Source Projects for IoT". Linux.com. Retrieved 23 October 2016.

3.An SAP affiliate company,” The CEO Perspective: Internet of Things for Mining and Metals”,2014.

4.L. Columbus, Roundup of the internet of things forecasts and market estimates, 2016.

5. BIBLIOGRAPHY \l 1033 CUMBERLAND, S. (2019, Feb 13). The human factor of IoT in safety. Retrieved May 27, 2019, from Plant Engineering: https://www.plantengineering.com/articles/the-human-factor-of-iot-in-safety/

6.Singh, A. (2018, March 15). IoT in mining for sensing, monitoring, and prediction of underground mines roof support. 201. Dhanbad, Dhanbad, India: IEEE.

7.Structures, A. (2018, Feb 2). THE ADVANCES OF TECHNOLOGY & METHODS OF FUTURE MINING OPERATIONS. Retrieved May 27, 2019, from Alaska Structures (AKS): https://alaskastructures.com/mining/advances-in-mining-technology-methods/

8. BIBLIOGRAPHY \l 1033 Zhang Yinghua, F. G. (2012). Discussion on Application of IOT Technology in Coal Mine Safety Supervision. Procedia Engineering, 233-237.

Subject: IT

Pages: 2 Words: 600

As A Software Professional, You Are Asked To Review An Implementation Proposal To Establish A Secure Wireless Capability In A Hospital Between Patient Monitoring Equipment And The Hospital's Electronic Medical Record System Using A VPN For Security. The V

Secure wireless network technology in the hospitals

Student’s Name

Institution

Date

Secure wireless network technology in the hospitals

Wireless technology has evolved over the years, from a simple unmanaged network to an organization managed systems a defined centralized monitored and controlled wireless network. Hospitals or any healthcare settings are installed with wireless local area network, which is well defined with coordinated APs. The coordinated AP offers healthcare settings with well defined monitored, configured, controlled and management features which allow organization-level wireless local area network (WLAN) installations. The HIPAA deals with the standard to privacy for individual healthcare information. It also ensures that healthcare information of patients is protected. The whole concept of HIPAA Compliance is to make sure that data records or confidential and private information of patients are kept and not exposed to any third party.

In review of whether the organization has complied with the HIPAA standards, the entity, and the kind of privacy rules and the system protection established by the hospital. First, the level of access established by the hospital will be validated or checked whether it is up to standard required. The level of access should be based on the seniority of employees and usability. Therefore, it would be important to review the kind of access the hospital has installed. The access to WLAN includes guest, patients, administration, management and support access. Certain contents and usability must be limited to certain level within the network. Guest would only use the guest section to access the internet within the facility within a specific and defined time. According to (Osterhage, 2016), the seniority access ensures that individuals are only accessed to specific information within their use to avoid violation of patients’ privacy and confidentiality of information. It ensures that due diligent has been conducted in the hospital to establish the need and protection mechanism for efficient arrangement or assigning of access to the system.

In many cases, the information leak in most healthcare settings occurs when outsiders are allowed to use devices belonging to the institution. It would be important to conduct due diligent to establish whether the hospital practice Bring Your Own Device (BYOD) policy and the way system support biomedical devices and BYOD at the same time keeping the WLAN secure CITATION Moh12 \l 1033 (Watfa, 2012). The virtual Private Network is also an important element in data protection. The wireless policy would be reviewed whether it provides direction on how to manage and address security issues of the hospital. The policy should forbid the unauthorized APs that can violate security and unauthorized reconfiguration of the network or the alteration of the APs CITATION Jay17 \l 1033 (Jayakody, Srinivasan, & Sharma, 2017). The policy should also be established to limit WLAN traffic and to allow operation in a certain channels to limit the risk. The overview of the system would also include conducting due diligent to check whether the hospital has offer VPN training to employees and its usability within the hospital setup. All employees should be educated to use VPN at their workstation to limit the risk of data getting exposed or access by any third party CITATION Jay17 \l 1033 (Jayakody, Srinivasan, & Sharma, 2017). VPN ensures that network access is under protection and invisible to any potential attacker.

In conclusion, securing patients’ information is the responsibility of the management of all healthcare settings. Therefore, in review whether hospital or any healthcare settings has complied with HIPAA, the entity, policy and hardware used would be reviewed to ensure that appropriate measures are in place to address any type of vulnerability, which can occur. The policy and standard should be strict to avoid any authorized entry by all measures possible.

References

BIBLIOGRAPHY Jayakody, D. N., Srinivasan, K., & Sharma, V. (2017). 5G Enabled Secure Wireless Networks. Chicago: Pearson.

Osterhage, W. (2016). Wireless Network Security: Second Edition. New York: Pearson.

Watfa, M. K. (2012). E-Healthcare Systems and Wireless Communications: Current and Future Challenges. England : Oxford Publisher.

Subject: IT

Pages: 2 Words: 600

Assesment 1

Development of house using Project Management

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Development of house using Project Management

Finalize client’s requirements in terms of scope

Project Initiation Phase

The project is initiated and the requirements of the user are gathered by the appointed members. The requirements are then transformed into the scope of the project. The requirements are collected through the user story. The initiator of the project explains his demands, and the project development team proceeds to turn that user story into the initial scope for the starting stages of the project CITATION Vin17 \l 1033 (Corvello, Javernick-Will, & Ratta, 2017). The scope is the basis of the entire project as it highlights the entire area which the project would cover. Everything that is mentioned in the scope is bound to be present in the finished project. Scope also highlights the things that would not be included in the final product so there is no confusion among the stakeholders.

Requirements

The client requires a house to be developed. The house is to be developed within the time span of 12 months. The total client budget is of AUD$ 500,000. Further details regarding the interior of the house and the location are also finalized with the client. Further details that the client highlights are about the overall structure of the house and what he wants the house to look like from inside and outside. Also, the highlighted things are the accessories that the house should be equipped with when the client moves in.

Scope

Creation of a customized house within 12 months of starting date and with the budget of total AUD$ 500,000. The house shall have the features as described by the client in his requirements that are as follows.

Deliverables

The house shall include the following deliverables. Each of the deliverables would be presented to the owner in the sequence mentioned.

A blueprint of the house that has been finalized by the authorities and is according to the needs of the owner.

180 sq. feet finished single story home with 2 bedrooms, 2 bathrooms, a kitchen, and a lounge.

Installed air-conditioning units and heating units in the main rooms of the house.

A garage that can house a minimum of two average-sized cars.

Technical requirements

The house shall conform to the laws with respect to the overall blueprint. This means that the dimensions of the overall house and everything that the law permits should be followed.

Use of high-quality products in the construction of the house. The materials should be of A-grade quality so that there is no element of defect in the product that is given to the client.

The house should be developed so that it can withstand seismic activities. The foundation of the houses, as well as the walls and roofs, should be able to handle earthquakes.

Exclusions and limitations:

Following is the list of things that would not be included in the final product.

The hose would not come with the interior items such as furniture, cabinets, etc.

The development of the house shall be totally based on the items described in the scope and deliverables section. Any other item that would be demanded by the owner would result in a renegotiation of the scope and the time/budget allocated for the project.

The project team shall work on the project from Monday to Friday. Weekends shall be considered off.

Milestones:

The following milestones would be achieved during the process of completion of the house

Permits to start the project gained

Foundations have been poured

Completion of the house

Final inspection of the house completed with the accessories.

Cost estimates:

The budget allocated for the project would be divided into the following areas

The share of the company that is in charge of developing the project. It would cover the salaries of the people that are involved with the projects as well as the company’s own share.

The material that would be utilized in the development of the project. It would include all the things including the equipment that would aid in the development of the house. The vendors would be paid accordingly.

Stakeholders

Owner of the house: The owner is the initiator of the project. They are the clients that hire the company for the development of the project which is, in this case, a house. The main role of the owner is to define the requirements as well as allocate the finances and time period for the project.

Project manager: the project manager is in charge of the project. They make sure that everything is running smoothly by monitoring the overall progress. They are responsible for analyzing and planning of the entire project. They would select and motivate the entire team and ensure the full satisfaction of the customer.

Project team members: The team members include the developers, workers, team lead, etc. All these members work on the project to ensure that everything is working according to the plan laid out by the project manager.

Material supplier/Vendors: the vendors are responsible for delivering the necessary materials and other supplies for the development phase of the house. These could include many things like concrete, cement, sanitary, etc. CITATION Aru15 \l 1033 (Elias, 2015).

Ensure efficient and effective communication with all stakeholders

Plan Communications Management

Purpose

Communication Management is essential for the success of the project. All the stakeholders need to be properly communicated regarding each and every step of the project to ensure the project progresses smoothly. Communication is the way through which all of the stakeholders can be on one page when it comes to the progress of the project. The inclusion of the entire team is essential in the success of the project; therefore, communicating with them about the progress is of paramount importance. Communication is the main component that keeps all the stakeholders together for the successful completion of the project CITATION Mar17 \l 1033 (Smit, Bond-Barnard, Steyn, & Fabris-Rotelli, 2017). If there is any lapse in the process of communication, it could result in fatal errors and delays in the project.

Communication Requirements

The client needs to be updated regarding the project and what is the progress each day. As he is the main role player, he should be fully included in the development process of his house. Material and equipment need to be procured at regular intervals which shall be also managed by the project development team. The contact with the vendor would be arranged in advance so that there are no delays. The Project Manager shall be updated regarding the progress of the team. The project manager would be able to judge the details of the entire project and make sure that everything is on track when it comes to the time and budget.

Communication Purpose

The main objective of communication is to keep the entire stakeholders communicated about the progress that is being made regarding the house.

All the stakeholders except the material providers would be communicated about the progress daily. The update interval would be agreed upon by the client and the company.

The material and equipment providers would be communicated whenever new things are required. The vendors would also be contacted in an emergency if there is an urgent need for any material for the development process if the house.

The owner and the project manager would be contacted immediately in case of any issues that may arise during the development of the project. He would be briefed about the issue and the team shall act upon the decision that would be taken by him.

Communication Methods

The means of communication that shall be established are as follows

Daily updates shall be delivered using email to all the stakeholders. This would include images of the house as well. The update would include the entire information regarding the stage the project is in, what are the next steps involved, what has been done that particular day and any other information agreed upon by the parties.

In case of emergency, cellphone shall be used to communicate the issues

Other means of communication would include face to face meetings which shall be used in case any major discussions are required. The face to face meetings would be utilized to discuss things like changes in the overall projects, any new plans regarding the development of the house, etc.

Subcontractor/Vendor Management

The subcontractor and vendors are two stakeholders that have the main role in the development of the house. The vendors are responsible for providing the necessary equipment to the developers while subcontractors provide the necessary services. Both of these stakeholders play an extremely vital role in the development of a house. No development project can be done without the use of the necessary equipment and material. The use of exceptional quality material and their timely delivery is of the extreme importance when it comes to timely development of a house. This also essential for the project to be within budget that has been allocated. This makes the involvement of both these parties extremely important towards the success of the project.

Interest and influence

The two stakeholders that have a paramount role in the project development is of vendors and subcontractors

Vendors have an interest in the project such that they provide the necessary material for the development of the house. These can include concrete, steel, cement, paint, electric equipment, etc.

The subcontractors shall provide the necessary services like the labor, etc. for the completion of the project. They might be contracted by the main company to provide the necessary services in the project, and thus having a share in the overall finances.

Develop the Communication Management Plan

The process of communication is essential for the success of any project. Proper communication is required among the material and service providers so that the projects can be completed in the stipulated time.

The vendors shall be communicated whenever the need for new material is present. The vendors shall be informed in advance through email or SMS. In case of any emergency need of any equipment and material, the vendors would be called so that the delivery can be made.

The subcontractor shall be reached through email as well as SMS whenever there is any update on the stipulations of the project. The subcontractor would be communicated about the success of the project to the project manager and the owner through daily emails.

Lean project management for finalizing the scope of the house

When speaking about the requirements of the owner and the scope it is necessary to find out what are the components that the owner is most interested in, and which of them are given priority over the other. By identifying the requirements and the scope, the requirements should be numbered so that more focus, budget and time may be allocated to those points.

Moving to the project, the main sequence that the scope should be set accordingly is first the development of the house, secondly the installation of air conditioning and heating units. In this way, the main chunk of the budget and time would be spent in the development of the house. Another main thing that should be kept in mind is the technical requirements. Priority should be given to the blueprint of the house so that there are no discrepancies when it comes to the law. The main people working on the project should ensure that there is no overproduction which would lead to material loss CITATION Edu17 \l 1033 (Salgado & Dekkers, 2017). Those areas should be focused and prioritized that have been selected as important. Some of the lean principles that can be utilized in the scope are

Waste reduction: Only those items are ordered that of utmost importance and avoiding the advanced ordering of materials so that there is no waste in the end. Utilizing every material that is ordered and carefully inspecting them before ordering ensures the least waste.

The human element: Any project is majorly dependent on the expertise of professionals. As the scope is defined, it should be ensured that the teams are selected as such so that the employees would work with maximum efficiency. No task should have an extra number of employees working on it whereas no employee should be idle.

Level production: This is an important concept that can be applied. It features measuring the performance so that it is known in advance what would be the amount of work done each day. Thus, for house development, only a certain amount of materials would be ordered which would be utilized that day. This would mean that there would be no need to maintain inventory.

Lean Project Management to Ensure Effective Communication with Stakeholders

A very important aspect of project management is communication. Communication is the means which make the success of a project possible. It is necessary that all the stakeholders involved in the project are properly updated with the information related to each stage of the project. This ensures that the time is saved and any problems that may arise may be properly handled at an early time. This would eliminate the problem when it is just at the root. The lean principles can also be incorporated in the process of communication through the following

The human element: As described above, the human element is of paramount importance when it comes to the house development project. Communicating with the proper personnel at the right time is necessary. It would ensure that all the people that are connected to the project are timely updated about the entire project so that there are no delays or discrepancies of any sort. It allows time to be saved by early detection and resolution of issues that might occur and cause troubles later on.

Just in Time Production: This principle can be utilized in two ways. Firstly, the communication with all the stakeholders should be done just in time. As the interval is selected in the communication management process, so there should be no need to go out of the schedule. Secondly, it is also necessary when speaking to the vendors. By ordering just the right amount from the vendors, there would be no need to keep unnecessary stock in the inventory. The number of products that are ordered should be utilized there and then that day.

Lean Project Management for Effective Management of Subcontractors/Vendors

The use of lean principles is also utilized when it comes to the management of stakeholders and vendors. It is necessary that they are onboard when it comes to the process of success. They should be fully aware of their participation in the project and when their concentration is required. The following principles can be applied

Waste reduction: When ordering from the vendors, only those products would be delivered that would allow the full quantity to be used so that there wouldn’t be any leftovers. Having no extra leftover would help to remain in the budget as no extra cost would be paid by the client. The subcontractors would be utilizing the products. They should be fully aware of the details of the project and know how much quantity of each element would be utilized at each time. Having such knowledge would result in a house that is created within the budget CITATION Giu18 \l 1033 (Marodin, Frank, Tortorella, & Netland, 2018).

Just in time production: For the success of Just in Time production, it is necessary that the vendors provide the materials as they are needed and within the quantity that they are needed. It’s necessary for the project to remain in budget and time. Since both of these factors are what the client focused on, so it is the responsibility of the team to deliver it. This would also ensure that there is the least amount or no inventory that is left behind. From the subcontractor’s point of view, it is their duty to utilize all the products that have been delivered. The subcontractor should be well aware of their capacity in advance. This would ensure that only those materials are ordered that can be utilized on that particular day.

Level production: Since the main goal of lean project management is less wastage, so the subcontractors should be well acquainted with the tasks that each day would bring. This would allow an indication in advance of how much material should be ordered, and thus producing less inventory and wastage. Only those items would be procured that would be fully utilized on that particular day. This would also ease the process of procuring as the vendor would know in advance what he must deliver each day for the success of the project.

Defect detection through automation: Such a principle of lean project management can be utilized by the project developers. They could hire those vendors that would have materials that are properly tested and graded. This would result in the procurement of components that would be reliable and are liable to produce less defective end results. This would make sure that there is no wastage and cost incurred on the rebuilding of the defective parts. The materials decided also depend upon the budget allocated for the project. So, the best items that can be procured, should be a priority of the team while keeping within the budget.

References

BIBLIOGRAPHY Corvello, V., Javernick-Will, A., & Ratta, A. M. (2017). Routine project scope management in small construction enterprises. Project Organization and Management.

Elias, A. A. (2015). Analysing the stakes of stakeholders in research and development project management: a systems approach.

Marodin, G., Frank, A. G., Tortorella, G. L., & Netland, T. (2018). Lean Product Development and Lean Manufacturing: Testing Moderation Effects.

Salgado, E. G., & Dekkers, R. (2017). Lean Product Development: Nothing New Under the Sun? International Journal of Management Reviews.

Smit, M. C., Bond-Barnard, T. J., Steyn, H., & Fabris-Rotelli, I. (2017). Email communication in project management A bane or a blessing? South African Journal of Information Management.

Subject: IT

Pages: 10 Words: 3000

Assessment 1

RUNNING HEAD: IT

Assessment 1

Steven Everson

[Name of the Institution]

Assessment 1

The Information Systems or Information Technology is utilized by business organizations to improve the business position and compete with rivals. IT is imperative to enhance the efficiency of business operations and bring innovation in its processes. In the highly competitive business environment, organizations cannot survive without technological innovations and use of Information Systems. In addition, companies that utilized IS/IT to innovate and maintain a competitive position in the market.

Examples from Industries

Some of the organizations that have employed IS/IT for innovation include Zappos, Netflix, Amazon, Royal Bank of Scotland and CVS Health etc. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"OOD9jzs1","properties":{"formattedCitation":"(\\uc0\\u8220{}The World\\uc0\\u8217{}s Most Innovative Companies List,\\uc0\\u8221{} n.d.)","plainCitation":"(“The World’s Most Innovative Companies List,” n.d.)","noteIndex":0},"citationItems":[{"id":914,"uris":["http://zotero.org/users/local/orkqtrjP/items/IQX9DUPZ"],"uri":["http://zotero.org/users/local/orkqtrjP/items/IQX9DUPZ"],"itemData":{"id":914,"type":"webpage","title":"The World's Most Innovative Companies List","URL":"https://www.forbes.com/innovative-companies/list/#tab:rank","accessed":{"date-parts":[["2019",8,21]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“The World’s Most Innovative Companies List,” n.d.). Zappos is known to be one of the most successful organisations that implemented IS to bring innovation in the customer service experience. The website of the company is connected with the warehouse management and merchandising planning and warehouse management system. The company utilizes IS to compute precise merchandize and make updates on a daily basis ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"7lFdjP7k","properties":{"formattedCitation":"(Rainer et al., 2013)","plainCitation":"(Rainer et al., 2013)","noteIndex":0},"citationItems":[{"id":681,"uris":["http://zotero.org/users/local/orkqtrjP/items/AYKN2F32"],"uri":["http://zotero.org/users/local/orkqtrjP/items/AYKN2F32"],"itemData":{"id":681,"type":"book","title":"Introduction to information systems: Supporting and transforming business","publisher":"John Wiley & Sons","ISBN":"1-118-47699-9","author":[{"family":"Rainer","given":"R. Kelly"},{"family":"Cegielski","given":"Casey G."},{"family":"Splettstoesser-Hogeterp","given":"Ingrid"},{"family":"Sanchez-Rodriguez","given":"Cristobal"}],"issued":{"date-parts":[["2013"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Rainer et al., 2013). Netflix is a famous name when it comes to creative technological innovation. It is an excellent example of the successful adoption of information technology that brought a huge revolution in the industry of television shows ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"H5XHsEIt","properties":{"formattedCitation":"(McDonald and Smith-Rowsey, 2016)","plainCitation":"(McDonald and Smith-Rowsey, 2016)","noteIndex":0},"citationItems":[{"id":911,"uris":["http://zotero.org/users/local/orkqtrjP/items/IWU29TYS"],"uri":["http://zotero.org/users/local/orkqtrjP/items/IWU29TYS"],"itemData":{"id":911,"type":"book","title":"The Netflix effect: Technology and entertainment in the 21st century","publisher":"Bloomsbury Publishing USA","ISBN":"1-5013-0942-0","author":[{"family":"McDonald","given":"Kevin"},{"family":"Smith-Rowsey","given":"Daniel"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (McDonald and Smith-Rowsey, 2016).

Amazon is s one of the leading innovative giants and in 2017 it was considered as the most innovative company in the world. The technological sophistication at the company empowers customers to interact with the digital platform of the company ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3nG3VxzC","properties":{"formattedCitation":"(Thierry and Lescop, 2009)","plainCitation":"(Thierry and Lescop, 2009)","noteIndex":0},"citationItems":[{"id":909,"uris":["http://zotero.org/users/local/orkqtrjP/items/B28F3H4G"],"uri":["http://zotero.org/users/local/orkqtrjP/items/B28F3H4G"],"itemData":{"id":909,"type":"article-journal","title":"Open innovation within business ecosystems: a tale from Amazon. com","container-title":"Communications & stratégies","page":"37","issue":"74","author":[{"family":"Thierry","given":"Isckia"},{"family":"Lescop","given":"Denis"}],"issued":{"date-parts":[["2009"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Thierry and Lescop, 2009). It has adopted the technology of networking to integrate its human resource, logistics and accounting systems. However, some corporations also failed to implement IT and IS successfully, that caused huge disruption. One example of such an organisation is the Royal Bank of Scotland that caused disruption among 600,000 customers due to a system failure in 2015.

Success factors and lessons learned

Numerous factors were responsible for the success and failures of these corporations concerning the implementation of IT and IS. Zappos used IS to enhance the customer's shopping experience. The e-commerce system implemented by the company enhanced customer experience that resulted in a huge loyal customer base and gave creative freedom to its employees ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"6joMgBlO","properties":{"formattedCitation":"(Perschel, 2010)","plainCitation":"(Perschel, 2010)","noteIndex":0},"citationItems":[{"id":682,"uris":["http://zotero.org/users/local/orkqtrjP/items/IWK3UT5F"],"uri":["http://zotero.org/users/local/orkqtrjP/items/IWK3UT5F"],"itemData":{"id":682,"type":"article-journal","title":"Work‐life flow: How individuals, Zappos, and other innovative companies achieve high engagement","container-title":"Global Business and Organizational Excellence","page":"17-30","volume":"29","issue":"5","author":[{"family":"Perschel","given":"Anne"}],"issued":{"date-parts":[["2010"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Perschel, 2010). Amazon changed the online shopping and delivery in the most innovative ways. Amazon Prime Air was a game-changer in the arena of online shopping since it enabled the fastest delivery via drones. It also uses cloud computing to make web service faster. Amazon accounts create ease for customers in making payments. In addition, both businesses merged to bring the best outcome for customers.

Netflix has revolutionized the use of the internet to create an innovative business model that transformed the way people watch TV ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"nJattuYZ","properties":{"formattedCitation":"(McDonald and Smith-Rowsey, 2016)","plainCitation":"(McDonald and Smith-Rowsey, 2016)","noteIndex":0},"citationItems":[{"id":911,"uris":["http://zotero.org/users/local/orkqtrjP/items/IWU29TYS"],"uri":["http://zotero.org/users/local/orkqtrjP/items/IWU29TYS"],"itemData":{"id":911,"type":"book","title":"The Netflix effect: Technology and entertainment in the 21st century","publisher":"Bloomsbury Publishing USA","ISBN":"1-5013-0942-0","author":[{"family":"McDonald","given":"Kevin"},{"family":"Smith-Rowsey","given":"Daniel"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (McDonald and Smith-Rowsey, 2016). The internet subscription and video streaming are some of the ways it chose to deliver content. It transformed the concept of exclusive content, from buying the content to producing its own original content. Technology-enabled the company to provide unlimited access to its users anywhere in the world. The case of the Royal Bank of Scotland gives clear speculation of what an IT failure can lead to, especially for the company highly dependent on the technology. The IT failure resulted in millions of loss to the customers and a heavy monetary cost to the company as well. The banking industry must learn from this failure that banks rely on resilient IT systems and one failure creates a setback for millions of customers.

The impact of internal and external factors

The success or failure of an IT/IS enabled innovation depends on numerous internal and external factors. These factors guide an organisation in the way it can implement the technology to enhance its business performance. The internal factors like people, management and leadership of an organisation determine the success of IT-based programs as well ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"JZMW5DRv","properties":{"formattedCitation":"(Deschamps, 2005)","plainCitation":"(Deschamps, 2005)","noteIndex":0},"citationItems":[{"id":912,"uris":["http://zotero.org/users/local/orkqtrjP/items/UGVFSB2U"],"uri":["http://zotero.org/users/local/orkqtrjP/items/UGVFSB2U"],"itemData":{"id":912,"type":"article-journal","title":"Different leadership skills for different innovation strategies","container-title":"Strategy & Leadership","page":"31-38","volume":"33","issue":"5","author":[{"family":"Deschamps","given":"Jean-Philippe"}],"issued":{"date-parts":[["2005"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Deschamps, 2005). For instance, Zappos created a culture of "Customer First" and employed technology to attain its aim to be the best customer service provider. Employees of the company are familiar with the company's culture and they have an alignment of their personal goals with that of goals of the company. Amazon CEO Jeff Bezos is known to be the technology leader that made Amazon the most tech-oriented company ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Iuwuxaer","properties":{"formattedCitation":"(Levy, 2011)","plainCitation":"(Levy, 2011)","noteIndex":0},"citationItems":[{"id":910,"uris":["http://zotero.org/users/local/orkqtrjP/items/UTQC5E7Z"],"uri":["http://zotero.org/users/local/orkqtrjP/items/UTQC5E7Z"],"itemData":{"id":910,"type":"article-journal","title":"Jeff Bezos owns the web in more ways than you think","container-title":"Wired Magazine","author":[{"family":"Levy","given":"Steven"}],"issued":{"date-parts":[["2011"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Levy, 2011).

In addition, the company responded to the external factors of adopting the best innovative technology to serve its customers and differentiate itself from other players in the industry. Amazon takes several other decisions such as merging with Zappos to preserve its position in the highly competitive e-commerce industry alongside introducing innovative technologies. Netflix also retorted to the external factors and was able to explore potential opportunities in the industry before any tech leader. The company leadership resulted in a huge success and made Netflix a technological breakthrough. In the same manner, the failure of the Royal Bank of Scotland is not merely an IT failure but an outcome of several poor decisions taken by the company. It is proof of the lack of effective management and leadership at the company that led to the IT system crash. Besides, the bank went for an IT upgrade but failed to keep its operations streamlined.

Recommendations

This paper discussed some success and failure stories with regard to IT/IS innovations. From the successful IT projects, it can be witnessed that IT can make or break a company. Innovation in technology is a factor, every organization must emphasise on to survive in the market. Companies must learn lessons from this success and failures and the underlying factors responsible in each case before implementing change. In addition to this, relying on technology merely is not something commended but various other associated factors must also be kept in mind.

Companies must be ready to respond to the ever-changing technological environment. When it comes to technology, the decision must be based on research in the future. In the absence of a culture of technology and innovation, reliable leadership, sound management and efficient decision making, the most innovative technologies can also fail to produce favourable results for the companies ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"W7qrWnZb","properties":{"formattedCitation":"(Harper and Utley, 2001)","plainCitation":"(Harper and Utley, 2001)","noteIndex":0},"citationItems":[{"id":913,"uris":["http://zotero.org/users/local/orkqtrjP/items/IRBRP9PU"],"uri":["http://zotero.org/users/local/orkqtrjP/items/IRBRP9PU"],"itemData":{"id":913,"type":"article-journal","title":"Organizational culture and successful information technology implementation","container-title":"Engineering Management Journal","page":"11-15","volume":"13","issue":"2","author":[{"family":"Harper","given":"George R."},{"family":"Utley","given":"Dawn R."}],"issued":{"date-parts":[["2001"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Harper and Utley, 2001).

Bibliography

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Deschamps, J.-P., 2005. Different leadership skills for different innovation strategies. Strategy Leadersh. 33, 31–38.

Harper, G.R., Utley, D.R., 2001. Organizational culture and successful information technology implementation. Eng. Manag. J. 13, 11–15.

Levy, S., 2011. Jeff Bezos owns the web in more ways than you think. Wired Mag.

McDonald, K., Smith-Rowsey, D., 2016. The Netflix effect: Technology and entertainment in the 21st century. Bloomsbury Publishing USA.

Perschel, A., 2010. Work‐life flow: How individuals, Zappos, and other innovative companies achieve high engagement. Glob. Bus. Organ. Excell. 29, 17–30.

Rainer, R.K., Cegielski, C.G., Splettstoesser-Hogeterp, I., Sanchez-Rodriguez, C., 2013. Introduction to information systems: Supporting and transforming business. John Wiley & Sons.

The World’s Most Innovative Companies List [WWW Document], n.d. URL https://www.forbes.com/innovative-companies/list/#tab:rank (accessed 8.21.19).

Thierry, I., Lescop, D., 2009. Open innovation within business ecosystems: a tale from Amazon. com. Commun. Strat. 37.

Subject: IT

Pages: 3 Words: 900

Assessment 2: Case Study-2

Assessment 2: Case Study 2

[Name of the institution]

[name of the Author]

Class Diagram:

A class diagram describes and represent the structure of the software by representing the classes, attributes, operations and the relationship between them.

In the given case study of training Inc, the class diagram will be of 5 different classes each with different attributes and functions. The logistic department is linked with the coordinator as it have to hire it and then the coordinator which is the main class is linked with all other classes as it have to deal with all of them, the following picture is the class diagram of training Inc.

ERD Diagram:

ERD stands for entity relationship diagram. It is used in database design as it is a structural diagram. It includes different symbols like connectors that visualize two important information.

In the following ERD diagram the relationship between the class is represented. The relationship of coordinator class with the booking department and the sales manager is many to many as each pass many requests to the other. The attributes are also mentioned.

State machine diagram:

It is a diagram which shows behavior (discrete) of the designed system. Following is the state machine diagram against the given case study.

Sequence diagram:

A sequence diagram shows the interaction between the objects in an order. The following diagram is the sequence diagram against the given case study and it shows the interaction between all 5 objects and an actor.

Activity Diagram:

The activity diagram is basically represents the flow of the system from one activity to another. The following diagram is the activity diagram of the case study given and it shows the flow of the system accordingly.

System Architecture Diagram:

It is used to show relationship of different components and mostly it is designed for systems which include hardware and software both. The following diagram is the architecture diagram of the given case study. This design is for multi-user software.

Suitable User Interface:

This is the graphical view of the system which user can read it easily. The following picture is the user interface of the software given in case study.

Testing and deployment activities:

Now the system is complete and ready to deploy. The quality assurance team will now test the system for the last time and then deploy it. The following picture is the plan.

Subject: IT

Pages: 6 Words: 1800

Assessment 3: Applied Project

VYUM D@bjbjcc 7 we we8- 8dsyHxxxFpxxxxPCeFx0xxxVx

RUNNING HEAD IT

Assessment 3 Applied Project

Name of the writer

Name of the institution

Assessment 3 Applied Project

Introduction

Amazon is one of the biggest technology companies that focuses on cloud computing, e-commerce, artificial intelligence, and digital streaming. It has been serving its customers for the last two decades. The basic vision of the founder of Amazon was to build a virtual shopping place for consumers. In the initial stage, Amazon provides its customers with a massive number of books through virtual shopping. It was founded it 1995 by Jeff Bezos and proved to be a huge success in the nineties. With the passage of time, Amazon began to offer services through for all kind of customers including content creators, enterprises, sellers, and consumers. A critical examination of Amazon is highly necessary to determine various existing information systems that proved to be effective for Amazon. Nowadays, people can easily access various services of Amazon through their smartphones. The entrance of Amazon in the Australian market is problematic for local retailers as Amazon is using modern information systems to gather more customers. However, Amazon needs to incorporate effective information systems to attract more consumers towards its products and services. Here, the focus is to introduce some effective information systems for Amazon, so it can excel in the given market.

Discussion

Amazon used both order fulfillment system and website system to enhance their online trafficking and security system. It is important to mention that Amazon has a huge database by 1995, which was running on DAS (Digital Alpha Servers). With the passage of time, Amazon began to introduce new systems to improve security and online trafficking. In the 2000s, Amazon spent more than 200 million dollars to introduce some efficient systems. It is essential to notify that Amazon introduces logistics from Manugistics and analysis software from epiphany. Incorporation of information systems was highly important and necessary for Amazon due to various cyber-attacks on their website. Amazon began to develop its own systems such as Simple Storage Service (SSS) and Amazon Web Service (AWS). Establishment of these new systems provides valuable support for Amazon to maintain huge online trafficking. A critical examination of these information systems provides a better understanding of their working. Amazon establishes and incorporates these systems to maintain millions of active consumers and penalty of its products. Nowadays, Amazon web service provides a specific platform for many retailers to sell their services and products. It wasnt all that long ago that books were the sole focus of amazon and this was the only market that it chose to work in and dominate. However, with a rather unprecedented turn of events, at present, the company represents four percent of all retail sales and around 44 percent of eCommerce. Since its inception, its stock has also gone up by 8,000 percent ADDIN ZOTERO_ITEM CSL_CITATION citationID5RQo5i1m,propertiesformattedCitation(CB Insights, 2019),plainCitation(CB Insights, 2019),noteIndex0,citationItemsid944,urishttp//zotero.org/users/local/0omESN17/items/IWSIMMGB,urihttp//zotero.org/users/local/0omESN17/items/IWSIMMGB,itemDataid944,typewebpage,titleAmazon Strategy Teardown,container-titleCB Insights Research,abstractSeattle-based Amazon is doubling down on AI for AWS and the ecosystem around its AI assistant, Alexa. Its seeking to become the central provider for AI-as-a-service. But its not leaving retail behind either, running grocery, book, and convenience stores across the US.,URLhttps//www.cbinsights.com/research/report/amazon-strategy-teardown/,languageen-US,authorfamilyCB Insights,given,issueddate-parts2019,accesseddate-parts2019,9,7,schemahttps//github.com/citation-style-language/schema/raw/master/csl-citation.json (CB Insights, 2019). The future of Amazon is as bright as ever, with seven of its marketing strategies already in place that can catapult Amazon at an unprecedented rate right into the future. Here is a look at its strategies and the impact it can have on customers, vendors, as well as its competitor.

Amazon prime was a way to earn the loyalty of customers and bring in more customers over to the platform by offering them better increments and value propositions, such as free shipping. This move has proved to the linchpin in the success of this empire, making it one of the most successful enterprises of all times. While it has paved the way for amazons success, new vendors just entering the market can ride on this wave of success and ensure that their brand is also a success in nearly no time. With most brands trying to go online, having access to a platform as giant as amazon can quadruple the success potential for small business. They can simply sign up to amazon and have the sites credibility and amazing service to pave its way to success. Amazon is quite known for using drone technology to make across the state deliveries within 48 hours. This is putting an immense pressure on its competitors to keep up, while also reducing the sheer amount of labour involved. However, while it offers its airborne fulfilment centre to some retailers and their products, expanding in this arena can certainly help. On one hand, Amazon does offer worldwide shipping, but this worldwide shipping option is controlled by the retailer, who are usually hesitant to ship products globally. Thus, it is high time that amazon introduces incentives for retailers and vendors to grow their reach and ship products overseas.

Viability of Information Systems

Incorporation of modern information systems is highly necessary for an organization as it simplifies various processes. The information system provides a valuable opportunity for the organization to make better decisions regarding their processes and services. In the modern world, companies are trying to utilize various effective strategies to reach out to their clients. There is an immense need for organizations to establish a better communication channel to interact with their clients and customers (OBrien and Marakas, 2006, pp.14). In that particular aspect, information system helps to create better communication between an organization and customers. Amazon needs to develop global domination in order to compete with other technology companies such as Apple, Facebook, and Google. Moreover, Amazon is facing various problems in the Australian retail market. Amazon has proved its effectiveness in many countries around the globe. However, due to significant challenges in the Australian market, Amazon needs to develop and incorporate various new information systems to excel in the market. CRM (Customer Relation Management) system is one of the most effective systems in the retail industry. Companies are using it to gather information about their customers. Therefore, Amazon should need to incorporate CRM system for searching and data mining. With the help of this system, Amazon will be able to get information regarding customers activity and what they buy or not. It is important for Amazon to utilize the services of CRM as it is an efficient information system that analyses information and provides service accordingly. It is important to consider the fact that Amazon can increase its sales with the applications of CRM regarding products and ordering products.

Now, Amazon is in need of a specific strategy to improve its transaction processing system. Improvement in the transaction processing system is highly necessary for a company to improve their online sales. Customers tend to use the services of those information systems that provide ease in the payment process. For that particular purpose, Amazon needs to provide effective transaction processing system. Amazon should need to enhance its secure credit/debit card payment so that its customers feel secure. There is a need for secured server software for Amazon to incorporate in its processes. It is highly important for companies to encrypt personal information and credit card number during the transaction process (Wadley, 2006, pp.9). Utilizing the applications of secured server software, companies can easily secure sensitive information of client over the internet (OBrien and Marakas, 2006, pp.26). It is also necessary for Amazon to bring a 1-click purchase information system in its transaction processes. There are many significant companies in Australia that are using 1 click ordering to provide ease for customers to make a purchase. 1 click strategy will be highly efficient for Amazon to increase its profitability. Amazon can easily safe its time along with customers time through 1 click ordering system. Utilization of 1 click ordering system will be beneficial for Amazon to provide ease for its loyal customers to purchase any item without filling order form. Amazon also needs to improve its recommendation system, to determine the interest of customers regarding their purchase.

Companies are using recommendation systems to keep a record for customers past purchase through efficient searching system. A critical examination of the recommendation system provides a better understanding of its effectiveness and efficiency. It is important to consider the fact that companies can make significant progress through the recommendation system. It allows companies to understand the likes and dislikes of their clients. Amazon should need to use the recommendation system as it will help it to save money. It will provide valuable information for Amazon that what products are more likely to attract customers. Through this, Amazon can easily increase its sales and profit margin. The recommendation system is incorporated with linking and data mining systems that keep a record of customers activity and purchases. A best possible recommendation is presented by this recommendation system, which can ultimately enhance customers browsing experience (Smith and Linden, 2017, pp.21). It is important to consider the fact that customer satisfaction is highly important for an organization to excel in a particular market. By using the services of recommendation systems, a company can search for queries from customers to establish an effective interactive platform (Smith and Linden, 2017, pp.23). Therefore, it is beneficial for Amazon to maximize its customers satisfaction along with sales to increase its profit margin as compared to other companies. Furthermore, it is highly important for an organization to incorporate an interactive searching system in order to make it easy for clients to find out any item of their interest. If Amazon wants to increase its sales, then it should need to provide its customers with an interactive searching option. The basic purpose behind this interactive searching system is to provide ease for customers to find their desired item (Smith and Linden, 2017, pp.23). Through the utilization of this searching tool, Amazon can easily increase its sales and profit margin as customers can easily find millions of items through it.

Acquisition Management Plan

It is identified that Amazon needs to introduce 1-click purchase, secure credit card payment, recommendation system, and interactive searching system to improve its profit margin. The utilization of these information systems will be beneficial for Amazon to enhance its processes. Incorporation of 1-click purchase, secure credit card payment, recommendation system, and the interactive searching system is highly important for Amazon to keep a track on the activity and purchase of its customers. For the incorporation of these 1-click purchase, secure credit card payment, recommendation system, and interactive searching system, Amazon should need to invest in this new system. There is an immense need to establish cost goals for the acquisition of these systems in Amazon. Management of Amazon should need to ensure that they have financial resources to incorporate these information systems. Amazon should need to spend almost 800 million dollars to establish and incorporate these programs into its current processes. Design-to-cost should need to be utilized by Amazon to reduce cost in the design phase of this project. It is essential for Amazon to establish an effective design for this recommendation system in order to save money. Evaluation of recent business and sales activities of Amazon ensures that it has sufficient financial resources to introduce these new systems. After designing and establishing these information systems, it is necessary to train employees to utilize them. Training of employees before incorporating these information systems is beneficial to make them use-to with these systems. Amazon should need to look for its manpower to ensure that it has sufficient physical resources to introduce these new systems. IT department of Amazon is highly efficient, which ensures that it will be easy to train these employees. After proper training of employees, Amazon should need to incorporate these new information systems. It is necessary to analyze the performance-period requirements of these information systems. Amazon should need to completely incorporate these information systems in 8 months.

Conclusion

In a nutshell, incorporation of new information systems such as 1-click purchase, secure credit card payment, recommendation system, and the interactive searching system is necessary for Amazon to improve online trafficking and sales. Amazon should need to utilize these information systems to provide ease for its customers. A critical analysis of Amazon ensures that it has sufficient physical and financial resources to incorporate these information systems.

References

OBrien, J.A. and Marakas, G.M., 2006.Management information systems(Vol. 6). McGraw-Hill Irwin.

Smith, B. and Linden, G., 2017. Two decades of recommender systems at Amazon.com.Ieee internet computing,21(3), pp.12-18.

Wadley, D.K., Hewlett Packard Development Co LP, 2006.Retail consumer information methods and retail consumer information system. U.S. Patent 7,021,536.

IT PAGE MERGEFORMAT 9

67lmn) e ucTE6hahMCJOJQJaJhah.CJOJQJaJhahCJOJQJaJhahI56CJOJQJaJhah56CJOJQJaJhahJkCJOJQJaJhahCJOJQJaJhahx5CJOJQJaJhahCJOJQJaJhah CJOJQJaJhahxCJOJQJaJhahgVCJOJQJaJhahxCJOJQJaJ7Lfghijkl

ddagdTmpddagdTddgdTmpe 1 m u k

yjL.hahSCJOJQJaJhahCJOJQJaJhahRlCJOJQJaJhahLfbCJOJQJaJhahLCJOJQJaJhah dVCJOJQJaJhahICJOJQJaJhah93CJOJQJaJhahCJOJQJaJhah CCJOJQJaJhah@CJOJQJaJhahXUCJOJQJaJhahCJOJQJaJhahP DCJOJQJaJ

S vgXEXEXEX9X9XhTCJOJQJaJjhahTCJOJQJUaJhahTCJOJQJaJhahyJCJOJQJaJhahCJOJQJaJhahCJOJQJaJhah1CJOJQJaJhahCJOJQJaJhah1CJOJQJaJhah CJOJQJaJhah CJOJQJaJhah56CJOJQJaJhahCJOJQJaJ

,A44@@@@@@0dd0gdTmpddagdTmpddgdTmpddgdTmpddgdTD dwwQB3hah5CJOJQJaJhahfdCJOJQJaJhahqCJOJQJaJ-hah jCJOJQJaJfHq hah jCJOJQJaJhah0CJOJQJaJhahlGCJOJQJaJhahCJOJQJaJhah(iCJOJQJaJhahCJOJQJaJhah6CJOJQJaJhah6CJOJQJaJhah5CJOJQJaJ4nxyjL.hah,CJOJQJaJhah9CJOJQJaJhah-CJOJQJaJhah_aCJOJQJaJhahCJOJQJaJhah8CJOJQJaJhahCJOJQJaJhahrCJOJQJaJhah1CJOJQJaJhah@CJOJQJaJhahjECJOJQJaJhahrCJOJQJaJhahb,CJOJQJaJhahsCJOJQJaJ ((D(((((((5)7)W)X)Z))MxiZKhahHMCJOJQJaJhahgK6CJOJQJaJhahs/CJOJQJaJhah3CJOJQJaJhah.CJOJQJaJhahbLCJOJQJaJ-hah jCJOJQJaJfHq hah jCJOJQJaJ-hahWACJOJQJaJfHq hahWACJOJQJaJhahACJOJQJaJhahICJOJQJaJ,,_,,,-...X///yjLhahMCJOJQJaJhahJCJOJQJaJhahqlCJOJQJaJhahVpCJOJQJaJhah((CJOJQJaJhahfCJOJQJaJhahCJOJQJaJhahCJOJQJaJhahMCJOJQJaJhah5CJOJQJaJhahBCJOJQJaJhahHMCJOJQJaJhahsCJOJQJaJ///01171811123333333@4A44whYJ8hahoP56CJOJQJaJhah8CJOJQJaJhahbCJOJQJaJhahCJOJQJaJ-hahYCJOJQJaJfHq hahCJOJQJaJhahuCJOJQJaJhah _CJOJQJaJhah_CJOJQJaJhahJCJOJQJaJhahMCJOJQJaJ-hahMCJOJQJaJfHq 44555w555h6n6o667O7T777g777778848B8_8yjjLjhahw@CJOJQJaJhaht CJOJQJaJhahCJOJQJaJhah

CJOJQJaJhahCJOJQJaJhahQCJOJQJaJhahdxCJOJQJaJhahGCJOJQJaJhahCJOJQJaJhahvCJOJQJaJhahZCJOJQJaJhahiCJOJQJaJ_8888999995yjL.hahiCJOJQJaJhahzCJOJQJaJhah

CJOJQJaJhahCJOJQJaJhah_YCJOJQJaJhah xCJOJQJaJhahR/CJOJQJaJhah)CJOJQJaJhahCJOJQJaJhah_pCJOJQJaJhahSdCJOJQJaJhahIz CJOJQJaJhahSCJOJQJaJhah@GFCJOJQJaJCMRikm@zzIzzzzzhahq9CJOJQJaJ-hahWACJOJQJaJfHq 3hahq96CJOJQJaJfHq -hahq9CJOJQJaJfHq hahkCJOJQJaJhahCJOJQJaJhahCJOJQJaJhahV7CJOJQJaJhahDCJOJQJaJhahD56CJOJQJaJhah56CJOJQJaJ@@@@@@@ @@@@@@@@@@A@B@C@D@-hahq9CJOJQJaJfHq hhfCJOJQJaJmHnHuhhxCJOJQJaJjhhxCJOJQJUaJhhCJOJQJhgVCJOJQJhjjhjU@@@@A@B@C@D@0dd0gdTmpagdx5 01hpj/ w666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XVx 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@6666 OJPJQJ_HmH nH sH tH JJ Normal dCJ_HaJmH sH tH x Heading 1@5CJ KH OJPJQJJaJ ZZ x Heading 3@5CJOJPJQJJaJZZ z Heading 4@5CJOJPJQJJaJDA D Default Paragraph FontRiR 0 Table Normal4 l4a (k (

0No List 4@4 xHeader

4 4 xFooter

R/R x Header CharCJOJPJQJ_HaJmH sH tH V/V xHeading 1 Char5CJ KH OJPJQJJaJ R/1R xHeading 3 Char5CJOJPJQJJaJV V xp TOC Heading@ BCJKHaJph6_

ipTOC 1

pdhmFF

ipTOC 3

pdhm6U q6 x0 Hyperlink BphDD

0 Normal (Web)CJOJQJaJ/ zHeading 4 Char5CJOJPJQJJaJmH sH tH PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKg theme/theme/theme1.xmlY4O3dHTwbS.,.1UR0aF0tStzQ@o_EG2 @GRU1aN KjVkUDRKQj/dRSxMPsJ54vqWC D3REBUt Qy@.X7

0h @nBVqu 5kPOC Aw0kPo(h5(CVsmY2zwnKDCjKXK P@IYCgxV(ekQtx7xbJ7 oW_ynFido/_1z/Lo_933S,F@)R8elmEv/,qh1ij.uk CZWcK0E8SsdKANM1I/AeQGF@Aeh-QR9C 5

d9 0expJ7t Lc)Ic8ESf@Awr32@7knaWJN1XGVhLZVKbXzsIn .qc7/NZu-eamHm3C .nAr)-NVlkvNs _OuCXmO4msd0npt2ezOrgI(

B8L

4F8JIrVLvVxNNfVYx-,JfVkhPaLfhHHX WQXt,JU,Z BpB)siE4(U.O. xaMBF7xytK-zzF75eo5C9Zc76M2 9B N

1(IzZYrH9pd4n(KgVB,lDAeX)Ly5ot ebW3gp j/gQjZTae9i5j5 fE514g7vnO( ,jV9kvvadVoTAn7jahy@ARhW.GMuO

/e5sZWfPtfkA0zUw@tAm4T2j

hvWwA9 ZNUAwvhv36VPK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-g theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/D8 ,,,,,/e

/4_8@D@(),-.

@D@/ D8Q)/8@0( B S 888888888B8E8888888888B8E840B0888@8E88E8eii-ke1ilx2J5AtjAtJRKetvetfbkketAtQ 50R@ eRQ Iz t t

Jx

IqHMUdWA2nIj),)C

lG35RlR))

b-R/ 393gK6w68/99q9V7o7@A1AQCP D@GFHoK0KLBOOQXU dVgV ,iC C j_.qls xLfbbU7dHdHdiiijJkno_pVpOtwdwxdxjy_u5bfZz M(i1G jEYL1 CruJv((ffj(qIh_YDlRgZ6G08_TxyJM-asfd)b, h51VR8Xc_a oPfkuQBedz6xSdww@r _L6IDSMyIbSjs/bLL

b.yITg88__Grammarly_42____i__Grammarly_42___14H4sIAAAAAAAEAKtWckksSQxILCpxzi/NK1GyMqwFAAEhoTITAAAATH4sIAAAAAAAEAKtWcslP9kxRslIyNDa0NDc0tDQwtzSwMDCyNDFQ0lEKTi0uzszPAykwqQUAcZRzRiwAAAA@9D8@UnknownGAx Times New Roman5Symbol3. Cx Arial7.@Calibri7@CambriaC., @Calibri LightABCambria Mathhyy/ e/ enr4773P PgZ2xxr0 AMSD ProofreaderOh0l ( 4

@LTdAMSDNormal Proofreader2Microsoft Office Word@@@DbpCe@DbpCe /.,0 hp

e7 Title

(),-./023456789@ABCDFGHIJKLNOPQRSTWXRoot Entry FCeZ@1Table1WordDocument 7SummaryInformation(EDocumentSummaryInformation8MMsoDataStorepCe@CeABSKKBHKHLLPQ2pCe@CeItem PropertiesUCompObj r xml version1.0 encodingUTF-8 standalonenobSources SelectedStyleAPA.XSL StyleNameAPA xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliography xmlnshttp//schemas.openxmlformats.org/officeDocument/2006/bibliography/bSourcesxml version1.0 encodingUTF-8 standaloneno

dsdatastoreItem dsitemID4801009A-A9A2-4806-872A-D1CB2CFE10CB xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 6 Words: 1800

Assigment

Assignment

Your Name (First M. Last)

School or Institution Name (University at Place or Town, State)

Assignment

Self-reflection:

Nowadays every firm requires its employees not just to have technical skills, but also set of non-technical and interpersonal skills. The skill that I require to get an excellent job in a prestigious firm is the following.

Technical skills:

As an IT student, the most important skill that I need to have are the programming skills, It is essential for an IT expert to have command over all the basic and popular programming languages, i.e. C, C++, Java, PHP, SQL, HTML, CSS, Python, Ruby, Go, Matlab, Julia, TensorFlow, Scala, etc. It is important for an It professional to have command over all the software and tools that are required for completion of the projects and tasks. I have command over all the languages that are mentioned above. I am confident that I have all the technical skills that I require to excel in my career.

Non-technical and Interpersonal Skills:

All the employers look for a certain set of non-technical skills in their employees to ensure they have a dynamic personality. I have great analytical and problem-solving skills. I am a hard worker and can perform great under pressure. I love taking risks and accepting challenges. Once I take a decision I prove it right. I am really creative and always think out of the box. I always ready to try new solutions for the problems. The biggest weakness I have is communication skills. I find it really difficult to communicate with the people that I am not familiar with. I can work in teams and alone. I am an independent thinker and never procrastinate. I am punctual and organized in my all tasks. Emotional intelligence is one of my personality attributes that makes me a perfect candidate for any job. I am well aware of my

emotions and feelings that why I sort them on time so that they don’t affect my progress and productivity.

Job openings:

LSM Latin America Desktop Support Engineer. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"V9hci8FQ","properties":{"formattedCitation":"(\\uc0\\u8220{}LSM Latin America Desktop Support Engineer - Miami, FL 33172 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“LSM Latin America Desktop Support Engineer - Miami, FL 33172 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1808,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/DG47NJ54"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/DG47NJ54"],"itemData":{"id":1808,"type":"webpage","title":"LSM Latin America Desktop Support Engineer - Miami, FL 33172 - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=a2aa3f7e7434b20e&tk=1d88kqb6ghpos801&from=serp&vjs=3&advn=6613095622180756&adid=8974242&sjdu=teYnAu8OgCGxABCwWD3OBGSvNPsXXaEnWLrUq8268_QXNSff-4L1nEpngp6rNGRQ6B1ThLJGp4K4gT1KDFOao8eSPxZCuEl0hMQipV1VPT6vIRhbN2jzOprwFHzzg5eqxOXYwqAWJE_UcoQCNCw6LRlCbhxuJ1NyW7ahYRyxQ0bm15ADDeU6A8w0o9m4K53n5Spd8-3l9sYGjsT4vneCbCnkFr3lfmC_HRdMRuLCNAV1RmY5j64JdbkoK4E6xltiNkrOMQO9KmvfHaVTSV2N0Q","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} ("LSM Latin America Desktop Support Engineer - Miami, FL 33172 - Indeed.com," n.d.)

LSM Latin America Desktop Support Engineer ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jYO42dnn","properties":{"formattedCitation":"(\\uc0\\u8220{}Sr. Network Engineer - Coral Gables, FL - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Sr. Network Engineer - Coral Gables, FL - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1810,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/BJQ7DRHK"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/BJQ7DRHK"],"itemData":{"id":1810,"type":"webpage","title":"Sr. Network Engineer - Coral Gables, FL - Indeed.com","URL":"https://www.indeed.com/cmp/Optical-Telecommunications-Inc/jobs/Senior-Network-Engineer-ccfcfc3eceb7e920?sjdu=QwrRXKrqZ3CNX5W-O9jEvUgHuMMcoipLqcCysZb0GioRsBjH982W2TswTqRQhFmqI-MeM2xGDO5G_4uL4PZWkA&tk=1d88kq6b653rb802&adid=274020552&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Sr. Network Engineer - Coral Gables, FL - Indeed.com,” n.d.).

IT Support Specialist ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"ZEZateKP","properties":{"formattedCitation":"(\\uc0\\u8220{}IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1812,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/3DSRQZAH"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/3DSRQZAH"],"itemData":{"id":1812,"type":"webpage","title":"IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com","URL":"https://www.indeed.com/cmp/One-Park-Financial/jobs/IT-Support-Specialist-48bee6fa44db0ee4?sjdu=QwrRXKrqZ3CNX5W-O9jEvUuVHwIjeM2SdLN2tDGnDs_64J1ZFYFQ9iwFqwYqPdipzVCm1TPKIscJT3FhTxJm4TQ2b9Il319ZICwwVIqdchs&tk=1d88l3c5s53rb802&adid=281139618&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,” n.d.).

IT Specialist ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"hqeldTm0","properties":{"formattedCitation":"(\\uc0\\u8220{}IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1812,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/3DSRQZAH"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/3DSRQZAH"],"itemData":{"id":1812,"type":"webpage","title":"IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com","URL":"https://www.indeed.com/cmp/One-Park-Financial/jobs/IT-Support-Specialist-48bee6fa44db0ee4?sjdu=QwrRXKrqZ3CNX5W-O9jEvUuVHwIjeM2SdLN2tDGnDs_64J1ZFYFQ9iwFqwYqPdipzVCm1TPKIscJT3FhTxJm4TQ2b9Il319ZICwwVIqdchs&tk=1d88l3c5s53rb802&adid=281139618&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com,” n.d.).

Information Technology Assistant ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"SKQgHipg","properties":{"formattedCitation":"(\\uc0\\u8220{}Information Technology Assistant - Coral Gables, FL - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Information Technology Assistant - Coral Gables, FL - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1816,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/6DJZUHWI"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/6DJZUHWI"],"itemData":{"id":1816,"type":"webpage","title":"Information Technology Assistant - Coral Gables, FL - Indeed.com","URL":"https://www.indeed.com/cmp/Ascendant-Commercial-Insurance,-Inc/jobs/Information-Technology-Assistant-f7cece695065139d?q=it+security&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Information Technology Assistant - Coral Gables, FL - Indeed.com,” n.d.)

Full Stack Developer ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AoKHHe5L","properties":{"formattedCitation":"(\\uc0\\u8220{}Full Stack Developer - Miami, FL 33222 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Full Stack Developer - Miami, FL 33222 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1818,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/U83IKKS9"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/U83IKKS9"],"itemData":{"id":1818,"type":"webpage","title":"Full Stack Developer - Miami, FL 33222 - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=aa114dba48dfb427&tk=1d88l8m2v409r802&from=serp&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Full Stack Developer - Miami, FL 33222 - Indeed.com,” n.d.)

EXECUTIVE OFFICER ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"tYTL9hgY","properties":{"formattedCitation":"(\\uc0\\u8220{}EXECUTIVE OFFICER - Homestead AFB, FL - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“EXECUTIVE OFFICER - Homestead AFB, FL - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1820,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/E9BSRG82"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/E9BSRG82"],"itemData":{"id":1820,"type":"webpage","title":"EXECUTIVE OFFICER - Homestead AFB, FL - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=dcb6eef9c300fb9d&tk=1d88l8m2v409r802&from=serp&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“EXECUTIVE OFFICER - Homestead AFB, FL - Indeed.com,” n.d.)

Web Software Developer (Sierra Vista, AZ) ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"9vVhqjvE","properties":{"formattedCitation":"(\\uc0\\u8220{}Web Software Developer (Sierra Vista, AZ) - United States - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Web Software Developer (Sierra Vista, AZ) - United States - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1822,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/IHY6PUXY"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/IHY6PUXY"],"itemData":{"id":1822,"type":"webpage","title":"Web Software Developer (Sierra Vista, AZ) - United States - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=6d3024c1ab0bb8f3&tk=1d88lc9le535v800&from=serp&vjs=3&advn=1088434599155228&adid=281287624&sjdu=0ZFwD5rbjMRcHz87Kzx_g4vCuYcUlfQDT0ZNEwkdaRNOj08oZkkMuIxGSfcvNAv030DwQ3TXh6z4CahQ5yYod8qJoe9rLZLilU3lVGiBxclrc6R3J0gnzpcr_KB0L3cS_ailPslYaWzrpr4-WW1fbEQMpxDd0GM0p4upDnXy_BtieV0-NOUNJ0Xtciillm1w5pCjr9i_SvDWLvpZ0jzvpmVB2rjNtN5tm1sModc1dOIRQHiXu_rxsDk-ME2HeINCbSimMSgLJdGbJKio7wnx2hsdt2UEU43u9iUUuObN-jNVKOyxgrF5UetY42YQLHBSC6W9cjxjCrIRRQr3yTeTQKjSijoEKh5on8IM80q0aiSUYk8HzPahjqVQoccAKHgCq-1_V2emfZpejWTNTbMEQg","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Web Software Developer (Sierra Vista, AZ) - United States - Indeed.com,” n.d.)

Lead Angular Developer - Relocate to Raleigh, NC ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"TWCROLCe","properties":{"formattedCitation":"(\\uc0\\u8220{}Lead Angular Developer - Relocate to Raleigh, NC - Miami, FL 33222 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Lead Angular Developer - Relocate to Raleigh, NC - Miami, FL 33222 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1824,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/AELPVIDM"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/AELPVIDM"],"itemData":{"id":1824,"type":"webpage","title":"Lead Angular Developer - Relocate to Raleigh, NC - Miami, FL 33222 - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=25d34d212703ab47&tk=1d88lcbce535v800&from=serp&vjs=3&advn=5614217612740155&adid=175523092&sjdu=i6xVERweJM_pVUvgf-Mzud6v7vx4W2vba62rTobId34fjZvD2_PKOVtwJDWslUqt","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Lead Angular Developer - Relocate to Raleigh, NC - Miami, FL 33222 - Indeed.com,” n.d.)

Front End Web Developer / Designer ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"dyUL41eI","properties":{"formattedCitation":"(\\uc0\\u8220{}Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1826,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/CTUQHA3R"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/CTUQHA3R"],"itemData":{"id":1826,"type":"webpage","title":"Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com","URL":"https://www.indeed.com/cmp/Pierson-Media/jobs/Front-End-Web-Developer-f219387b3048c7ed?q=Graphic+developer&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,” n.d.)

Web Developer ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"YWUdQ8eB","properties":{"formattedCitation":"(\\uc0\\u8220{}Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1826,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/CTUQHA3R"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/CTUQHA3R"],"itemData":{"id":1826,"type":"webpage","title":"Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com","URL":"https://www.indeed.com/cmp/Pierson-Media/jobs/Front-End-Web-Developer-f219387b3048c7ed?q=Graphic+developer&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com,” n.d.)

Full-Stack Application Developer (Remote) ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"duYLofMJ","properties":{"formattedCitation":"(\\uc0\\u8220{}Full-Stack Application Developer (Remote) - United States - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Full-Stack Application Developer (Remote) - United States - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1830,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/Q6C77GUH"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/Q6C77GUH"],"itemData":{"id":1830,"type":"webpage","title":"Full-Stack Application Developer (Remote) - United States - Indeed.com","URL":"https://www.indeed.com/cmp/Support.com/jobs/Full-Stack-Application-Developer-05b1472587534f42?sjdu=QwrRXKrqZ3CNX5W-O9jEvRQls7y2xdBHzhqWkvhd5FEakwwpesGna4pw3F3Ntf3XwjXRh-Ei8rwF66CRMEKeynmb5pthVMX2YVeMIuAIAtTWx0VBwymo-Nh4rGSJ5evQ&tk=1d88lgvdma3pb805&adid=277145963&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Full-Stack Application Developer (Remote) - United States - Indeed.com,” n.d.)

Business Analyst I - Ormond Beach, FL ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qCyp7Trg","properties":{"formattedCitation":"(\\uc0\\u8220{}Business Analyst I - Ormond Beach, FL - Florida - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Business Analyst I - Ormond Beach, FL - Florida - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1832,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/L37Y5H4F"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/L37Y5H4F"],"itemData":{"id":1832,"type":"webpage","title":"Business Analyst I - Ormond Beach, FL - Florida - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=fb73d9e8791934cf&tk=1d88lh6c5a1d8800&from=serp&vjs=3&advn=7371754118884563&adid=281320084&sjdu=9qTUNWR4GRxE2aPSbFdHX7AKxBjPMziuyC2tzGWxjkhPjZM5ZDwIu0Qo4-v297D33PM9754VsU8Vga9Yl6HS62JHxwOoRcTGElqqTtosl3LLjyofoqiRkRcdosNly7jC","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Business Analyst I - Ormond Beach, FL - Florida - Indeed.com,” n.d.)

Test Architect ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3SBVyXHX","properties":{"formattedCitation":"(\\uc0\\u8220{}Test Architect - Florida - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“Test Architect - Florida - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1834,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/II9ZRDQB"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/II9ZRDQB"],"itemData":{"id":1834,"type":"webpage","title":"Test Architect - Florida - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=e83c7b66433d9aae&tk=1d88lh8ema1d8801&from=serp&vjs=3&advn=2026521959955385&adid=250194258&sjdu=E0cNxzrTssWjsrBEGmgQB14YQAuiSAs4BlGREQJFcnbrnBliKdFhkOX_WEJbuRYvtCnRqS_8cNxy4qPkUtfgDtb_NOYvwJ0WtZNs74X-FZ1lPKVdyea6__fVgHzEj31FamqBX-IHusMkub4Id4zGGTQgqX-n4xizGQO27XDk3a4","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Test Architect - Florida - Indeed.com,” n.d.)

IT Manager, Web Administration, Mobility & Desktop Engineering ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"PZrGF25G","properties":{"formattedCitation":"(\\uc0\\u8220{}IT Manager, Web Administration, Mobility & Desktop Engineering - Miami, FL 33186 - Indeed.com,\\uc0\\u8221{} n.d.)","plainCitation":"(“IT Manager, Web Administration, Mobility & Desktop Engineering - Miami, FL 33186 - Indeed.com,” n.d.)","noteIndex":0},"citationItems":[{"id":1836,"uris":["http://zotero.org/users/local/KZl8ZL3A/items/DFA7D7J4"],"uri":["http://zotero.org/users/local/KZl8ZL3A/items/DFA7D7J4"],"itemData":{"id":1836,"type":"webpage","title":"IT Manager, Web Administration, Mobility & Desktop Engineering - Miami, FL 33186 - Indeed.com","URL":"https://www.indeed.com/viewjob?jk=bfbe26c53c3d8daa&tk=1d88lgvdma3pb805&from=serp&vjs=3","accessed":{"date-parts":[["2019",4,12]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“IT Manager, Web Administration, Mobility & Desktop Engineering - Miami, FL 33186 - Indeed.com,” n.d.)

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Business Analyst I - Ormond Beach, FL - Florida - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=fb73d9e8791934cf&tk=1d88lh6c5a1d8800&from=serp&vjs=3&advn=7371754118884563&adid=281320084&sjdu=9qTUNWR4GRxE2aPSbFdHX7AKxBjPMziuyC2tzGWxjkhPjZM5ZDwIu0Qo4-v297D33PM9754VsU8Vga9Yl6HS62JHxwOoRcTGElqqTtosl3LLjyofoqiRkRcdosNly7jC

EXECUTIVE OFFICER - Homestead AFB, FL - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=dcb6eef9c300fb9d&tk=1d88l8m2v409r802&from=serp&vjs=3

Front End Web Developer / Designer - South Miami, FL 33143 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/cmp/Pierson-Media/jobs/Front-End-Web-Developer-f219387b3048c7ed?q=Graphic+developer&vjs=3

Full Stack Developer - Miami, FL 33222 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=aa114dba48dfb427&tk=1d88l8m2v409r802&from=serp&vjs=3

Full-Stack Application Developer (Remote) - United States - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/cmp/Support.com/jobs/Full-Stack-Application-Developer-05b1472587534f42?sjdu=QwrRXKrqZ3CNX5W-O9jEvRQls7y2xdBHzhqWkvhd5FEakwwpesGna4pw3F3Ntf3XwjXRh-Ei8rwF66CRMEKeynmb5pthVMX2YVeMIuAIAtTWx0VBwymo-Nh4rGSJ5evQ&tk=1d88lgvdma3pb805&adid=277145963&vjs=3

Information Technology Assistant - Coral Gables, FL - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/cmp/Ascendant-Commercial-Insurance,-Inc/jobs/Information-Technology-Assistant-f7cece695065139d?q=it+security&vjs=3

IT Manager, Web Administration, Mobility & Desktop Engineering - Miami, FL 33186 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=bfbe26c53c3d8daa&tk=1d88lgvdma3pb805&from=serp&vjs=3

IT Support Specialist - Coconut Grove, FL 33133 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/cmp/One-Park-Financial/jobs/IT-Support-Specialist-48bee6fa44db0ee4?sjdu=QwrRXKrqZ3CNX5W-O9jEvUuVHwIjeM2SdLN2tDGnDs_64J1ZFYFQ9iwFqwYqPdipzVCm1TPKIscJT3FhTxJm4TQ2b9Il319ZICwwVIqdchs&tk=1d88l3c5s53rb802&adid=281139618&vjs=3

Lead Angular Developer - Relocate to Raleigh, NC - Miami, FL 33222 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=25d34d212703ab47&tk=1d88lcbce535v800&from=serp&vjs=3&advn=5614217612740155&adid=175523092&sjdu=i6xVERweJM_pVUvgf-Mzud6v7vx4W2vba62rTobId34fjZvD2_PKOVtwJDWslUqt

LSM Latin America Desktop Support Engineer - Miami, FL 33172 - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=a2aa3f7e7434b20e&tk=1d88kqb6ghpos801&from=serp&vjs=3&advn=6613095622180756&adid=8974242&sjdu=teYnAu8OgCGxABCwWD3OBGSvNPsXXaEnWLrUq8268_QXNSff-4L1nEpngp6rNGRQ6B1ThLJGp4K4gT1KDFOao8eSPxZCuEl0hMQipV1VPT6vIRhbN2jzOprwFHzzg5eqxOXYwqAWJE_UcoQCNCw6LRlCbhxuJ1NyW7ahYRyxQ0bm15ADDeU6A8w0o9m4K53n5Spd8-3l9sYGjsT4vneCbCnkFr3lfmC_HRdMRuLCNAV1RmY5j64JdbkoK4E6xltiNkrOMQO9KmvfHaVTSV2N0Q

Sr. Network Engineer - Coral Gables, FL - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/cmp/Optical-Telecommunications-Inc/jobs/Senior-Network-Engineer-ccfcfc3eceb7e920?sjdu=QwrRXKrqZ3CNX5W-O9jEvUgHuMMcoipLqcCysZb0GioRsBjH982W2TswTqRQhFmqI-MeM2xGDO5G_4uL4PZWkA&tk=1d88kq6b653rb802&adid=274020552&vjs=3

Test Architect - Florida - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=e83c7b66433d9aae&tk=1d88lh8ema1d8801&from=serp&vjs=3&advn=2026521959955385&adid=250194258&sjdu=E0cNxzrTssWjsrBEGmgQB14YQAuiSAs4BlGREQJFcnbrnBliKdFhkOX_WEJbuRYvtCnRqS_8cNxy4qPkUtfgDtb_NOYvwJ0WtZNs74X-FZ1lPKVdyea6__fVgHzEj31FamqBX-IHusMkub4Id4zGGTQgqX-n4xizGQO27XDk3a4

Web Software Developer (Sierra Vista, AZ) - United States - Indeed.com. (n.d.). Retrieved April 12, 2019, from https://www.indeed.com/viewjob?jk=6d3024c1ab0bb8f3&tk=1d88lc9le535v800&from=serp&vjs=3&advn=1088434599155228&adid=281287624&sjdu=0ZFwD5rbjMRcHz87Kzx_g4vCuYcUlfQDT0ZNEwkdaRNOj08oZkkMuIxGSfcvNAv030DwQ3TXh6z4CahQ5yYod8qJoe9rLZLilU3lVGiBxclrc6R3J0gnzpcr_KB0L3cS_ailPslYaWzrpr4-WW1fbEQMpxDd0GM0p4upDnXy_BtieV0-NOUNJ0Xtciillm1w5pCjr9i_SvDWLvpZ0jzvpmVB2rjNtN5tm1sModc1dOIRQHiXu_rxsDk-ME2HeINCbSimMSgLJdGbJKio7wnx2hsdt2UEU43u9iUUuObN-jNVKOyxgrF5UetY42YQLHBSC6W9cjxjCrIRRQr3yTeTQKjSijoEKh5on8IM80q0aiSUYk8HzPahjqVQoccAKHgCq-1_V2emfZpejWTNTbMEQg

Subject: IT

Pages: 2 Words: 600

Assigment

Assignment: Blockchain

Ngoc Nguyen

[Institutional Affiliation(s)]

Author Note

Assignment: Blockchain

A blockchain is a mounting rundown concerning records, named as “blocks”, which are connected with each other owing to the utilization of cryptography. Each block holds a cryptographic botch of the former block a timestamp, and exchange information. By plan, a blockchain is impervious to alteration of the information. It is an uncluttered, dispersed record that can document the history of exchanges between the business parties proficiently and in an irrefutable and perpetual way CITATION Blo19 \l 1033 (Blockgeeks, 2019).

A blockchain is, in the easiest of footings, a period stepped arrangement of an unchanging record of information that is overseen by a bunch of PCs not possessed by any single being. Every one of these blocks of information is verified and bound to one another utilizing cryptographic standards CITATION Blo19 \l 1033 (Blockgeeks, 2019). Anyway, what is so uncommon about it and for what reason would we say we are stating that it has the ability to upset industry?

There is no principle authority in such a network— it falls under the very nature of a democratized framework. Since it is a common and unchanging record, the data in it is exposed to anybody and everybody to perceive. Consequently, anything hinges upon the blockchain is straightforward owing to its very nature and everybody included is responsible for their activitiesCITATION Aca16 \l 1033 (IBM, 2016).

Any industry would go through a complex landscape. It has the potential vulnerabilities with clear transactions in any industry's complex landscape from its very start to final product to the consumer CITATION Sav17 \l 1033 (Savjee, 2017). Take a diamond industry, for instance, blockchain would be ideal for mining, refining, and distribution of one of the most valuable goods in the world. Diamonds' path can be traced from mine to the consumer's hands coupled with exceptional security and transparency CITATION Aca16 \l 1033 (IBM, 2016). This technology offers a number of benefits which include halting the capital flow, speedy processing, low transaction cost, security and most importantly it provides trust.

References

BIBLIOGRAPHY Blockgeeks. (2019). What is Block Chain Technology? Retrieved May 19, 2019, from Blockgeeks: https://blockgeeks.com/about/

IBM (Director). (2016). How it Works: Blockchain [Online Video]. Retrieved May 19, 2019, from https://www.youtube.com/watch?v=lD9KAnkZUjU

Savjee (Director). (2017). How does a blockchain work [Online Video]. Retrieved May 19, 2019, from https://www.youtube.com/watch?v=SSo_EIwHSd4

Subject: IT

Pages: 1 Words: 300

Assignment

Your Name

Instructor Name

Course Number

Date

Assignment

Open access to information and the government helps people to work with their dedication and help their countries to develop. This is because there is transparency and there would not be inequality. The use of technology in promoting open government system is challenging but this is a route for the development of organizations. In this era of globalization, information is considered a valuable commodity to improve the ongoing competitions in the organizations.

Freedom of information act enables the citizens to access the information about activities and on the other hand, there is some exempted information that cannot be shared with the public. Giving access to all of the information can create security issues. Technology helps governments to achieve policies, stakeholders share ideas and give access to information to determine the policy outcomes. Fostering technology would also help in building trust between governments and citizens ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"xpXWJrEo","properties":{"formattedCitation":"(Sebre)","plainCitation":"(Sebre)","noteIndex":0},"citationItems":[{"id":73,"uris":["http://zotero.org/users/local/F0XOCTdk/items/KGQMZCBB"],"uri":["http://zotero.org/users/local/F0XOCTdk/items/KGQMZCBB"],"itemData":{"id":73,"type":"webpage","title":"How to Break Down Silos and Leverage Platform Technology","abstract":"Local governments have historically relied on siloed software systems to store data. This approach produces redundancy and errors. The modern solution lies in platform technology.","URL":"https://www.govtech.com/analytics/How-to-Break-Down-Silos-and-Leverage-Platform-Technology.html","language":"en","author":[{"family":"Sebre","given":"Ben"}],"issued":{"date-parts":[["2019",2,15]]},"accessed":{"date-parts":[["2019",10,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sebre). Access is given to citizens for open government which usually determines the behaviors towards their government.

South Dakota is an interest research group that has improved in sharing the data related to economic development initiatives, scores for inspections, task force, legislation and statistics for health (Open Government - Better Government). The data is being shared with the citizens so that they know about the ongoing activities and procedures in the government. Citizens can have access to information according to their needs and choices. Also, technology is helping people to access information but on the other hand, it is creating problems regarding computer choices over mail services ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"okX5932H","properties":{"formattedCitation":"(Wood)","plainCitation":"(Wood)","noteIndex":0},"citationItems":[{"id":82,"uris":["http://zotero.org/users/local/F0XOCTdk/items/3UKD5C9T"],"uri":["http://zotero.org/users/local/F0XOCTdk/items/3UKD5C9T"],"itemData":{"id":82,"type":"webpage","title":"Can Open Government Be Too Open?","genre":"Govtech.com","abstract":"A new rash of public records requests in Washington state have the public and members of the open data movement divided on just how open government should be.","URL":"https://www.govtech.com/state/Can-Open-Government-Be-Too-Open.html","language":"en","author":[{"family":"Wood","given":"Colin"}],"issued":{"date-parts":[["2015"]]},"accessed":{"date-parts":[["2019",10,11]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Wood). Another problem is that; too much data cannot be handled at once because of overcrowd of people.

Works Cited

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Sebre, Ben. How to Break Down Silos and Leverage Platform Technology. 15 Feb. 2019, https://www.govtech.com/analytics/How-to-Break-Down-Silos-and-Leverage-Platform-Technology.html.

Wood, Colin. Can Open Government Be Too Open? 2015, https://www.govtech.com/state/Can-Open-Government-Be-Too-Open.html.

Subject: IT

Pages: 1 Words: 300

Assignment

Your Name

Instructor Name

Course Number

Date

Title: Technical Communication for Computer Professionals

To:

From:

Date:

Subject: Significance of Effective Communication

Every job seeks applicants having strong interpersonal communication skills and abilities to work collaboratively. When it comes to the job of a computer professional, they are also expected to exhibit some technical interpersonal communication skills. In addition, the communication skills are needed in this job to allocate a suitable time to spend on each form of communication pertaining to this role. This memo is aimed at highlighting the need of effective communication to attain high level of job satisfaction. In addition, it will also discuss the average amount of time to be spent on each form of communication needed in this job.

Communication is the key to success in an organization despite the role a person is performing. At the workplace, effective communication is pivotal for companies to work in an efficient manner. If the employees are engaged in communication, they experience high productivity, commitment and morale. In addition, employees who spend time in creating free communication lines are trusted by their supervisors and sub-ordinates. Such employees are considered as a valuable asset for an enterprise. Poor communication also results in the demotivation of staff. A number of studies have reported a positive relationship between effective communication and employee performance. A computer professional has to indulge in various forms of communication as part of performing various job duties. These involve verbal and non-verbal communication. Computer professionals not only need to interact with the other employees, since they need to develop and design computer software in order to meet the needs of different people. Owing to the job duties a computer professional has to effectively divide their time on verbal and non-verbal communication.

Immediate supervisors evaluate the performance of an employee based on the communication of their job performance and duties. Effective communication is one of the ways by which supervisors assess the performance of employees. One major type of communication in an enterprise i.e. supervisor-subordinate communication plays a vital role in determining the positive and good rating from the immediate supervisors. Poor communication may result in the failure to demonstrate good job performance resulting in a poor rating from the immediate supervisor. Speaking of time spent on both the forms of communication, the computer professional will have to spend most of the times in communicating non-verbally with the clients and other professionals. First of all, they need to communicate regularly with experts and clients, both to gather information and also to have the documents reviewed. In addition, almost half of their time must be spent on verbal communication, in the organization and with the external parties. That’s why technical writing is not for hermits; it requires good social communication skills as well as good writing skills. Thus, a pleasant outgoing personality helps a computer professional to excel in their job.

When it comes to time spent communicating with a computer professional, I used to believe on an average the computer professionals must spend most of the time on the internet and non-verbal communication. However, the research revealed that computer professional need to spend almost half of the time in verbal communication and a half in non-verbal communication. Pertaining to their job duties, verbal communication is as important as non-verbal communication. Speaking of the communication and its impacts on the supervisors’ feedback, the initial view was similar to what the research found. Communication plays a key role in demonstrating one’s job skills and abilities and hence it is imperative in exhibiting good performance. Therefore, effective communication plays a vital role in getting positive feedback from the immediate supervisor. This can also be applied to the feedback obtained from the peers and other organizational members.

Works Cited

https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118955567.wbieoc199

https://www.sciencedirect.com/science/article/pii/S0747563217301590

Subject: IT

Pages: 2 Words: 600

Assignment

Assignment

Chimene Tchokoko Diboma

School or Institution Name (University at Place or Town, State)

Information Technology System Architecture:

Information technology plays the role of utility in modern business. Concept Analysis Corporation is a company providing data analysis services to other organizations. The company specializes in delivering big data analysis and trend development using streaming data analysis. The company utilizes an internal network of computing resources to provide efficient data analysis to its clients. As the most crucial asset of the organization is the data that it collected from its clients, the protection of the critical data against digital darks is the objective of the organization. Data is considered to be the oil in the modern world as cybercriminals are always inventing sophisticated attacks to compromise large corporate networks. Following Network Security and Vulnerability threat table provides an overview of the threats to the information technology infrastructure of the organization.

Component

Vulnerabilities

Threats

Likelihood

LAN Security

Outdated router configuration

Software security holes

Lack of access policies

Remote code execution

Computer viruses

Trojan Horses

Key loggers

Rootkits

Hacking

Eavesdropping

Man in the middle attacks

Ransomware

Packet sniffing

Very High

Identity Management

Authentication protocol spoofing.

Authorization weakness

Insider threats

Host intrusions

High

Physical Security

Lack of physical restrictions

Physical tempering in the system

High

Personal Security

Weakness in identity management protocols

Personal information of the employees or clients can be compromised by targeted attacks

Very High

Availability

Weakness in the physical infrastructure of the network.

Data may not be available to concerned departments when needed due to cyber attacks

Very High

Privacy

Lack of intrusion detection systems and cryptography for message protection

Data interception by key loggers and hackers infiltrating the network

Very High

Cyber-attacks on information systems are increasing at an exponential rate. Hackers and malicious actors are continuously developing sophisticated attacks to gain more and more monetary benefits. Financial perks are the major motivation of most of the cyber-attacks. Criminals can be sponsored by the states as well to digitally harm the opponents of the state government. Cybercrimes are developing as an industry. Criminals focus on organizational networks because they can harvest more data from a single organizational attack as compared to the attack on millions of individual computer users ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"aqjv7fj7t3","properties":{"formattedCitation":"(Rid & Buchanan, 2015)","plainCitation":"(Rid & Buchanan, 2015)"},"citationItems":[{"id":1810,"uris":["http://zotero.org/users/local/gITejLE9/items/K6NXTFP7"],"uri":["http://zotero.org/users/local/gITejLE9/items/K6NXTFP7"],"itemData":{"id":1810,"type":"article-journal","title":"Attributing cyber attacks","container-title":"Journal of Strategic Studies","page":"4-37","volume":"38","issue":"1-2","author":[{"family":"Rid","given":"Thomas"},{"family":"Buchanan","given":"Ben"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Rid & Buchanan, 2015). Common attack methods used by criminals include penetration into the organizational network. There can be several ways of penetration into the network of any organization. Most of the time successful penetrations into the network are accompanied by the existing vulnerabilities in installed software on the networked machines in the organization.

Vulnerabilities serve as the open window in a locked home. The home will be at risk of being compromised in a theft attempt despite the fact that the main door was perfectly locked. All of the logical measures of securing and protecting the organizations serve the same functionality as locking down the main door. On the other hand software vulnerabilities serve as the open window in the locked home allowing an attacker to infiltrate the system. Hackers can also inject code into legitimate applications installed on the system creating and maintaining backdoor access to the system. When a system is compromised, then attackers can have full control over the network or the information being shared on the network. One such example is the man in the middle attacks in which the attacker can sniff the network packets and change their content before they reach the final destination without the knowledge of the participating parties in the network communication. Privacy of the message can be severely compromised in such attacks. Several measures, including patch management systems, vulnerability management, threat detection and response system, intrusion detection system, physical security measures, and encryption techniques will be added to the security portfolio of the organization to protect the most valuable asset of the organization.

Plan of Protection:

As per the described threats to the information systems and for information assurance to provide confidentiality, integrity, availability, and non-repudiation of the data following measures will be taken gradually. To protect the privacy of the data various encryption algorithms and technologies will be deployed. Encryption will help to maintain the confidentiality of the data either being shared on the network or stored in the databases. Public key cryptographic infrastructure will be utilized to provide authentication and non-repudiation of the data. As encryption algorithms include symmetric and asymmetric encryption capabilities, public key cryptographic systems are associated with asymmetric encryption. Asymmetric encryption provides with different keys for coding and decoding the data making it very hard for criminals to break the code.

All the logical measures of protecting the data and critical information technology infrastructure of the organization may go in vain if there are no provisions of physical security. Physical security involves restricting physical access to the systems. It involves effective user authentication methods such as the use of smart cards for accessing certain physical systems of the organization. Physical restrictions will be applied to the system including a mechanism of access control using smart card approach. It will help the protection of critical assets against physical tampering.

Data Hiding Technologies:

Cryptography is a practice of coding the ordinary message with special techniques known as ciphers so that only the intended recipients can read the message. After applying cipher on the plain text message, the resulting message is known as the ciphertext. A simple example is of shift ciphers or Caesar ciphers. In Caesar cipher, each letter of the English alphabets is rotated three places. The resulting message is known as ciphertext. To retrieve the original message the receiver must perform the exact opposite of the operation at the sender end ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"au7t82afdc","properties":{"formattedCitation":"(Patil, Narayankar, Narayan, & Meena, 2016)","plainCitation":"(Patil, Narayankar, Narayan, & Meena, 2016)"},"citationItems":[{"id":1811,"uris":["http://zotero.org/users/local/gITejLE9/items/TMZA3UHQ"],"uri":["http://zotero.org/users/local/gITejLE9/items/TMZA3UHQ"],"itemData":{"id":1811,"type":"article-journal","title":"A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish","container-title":"Procedia Computer Science","page":"617-624","volume":"78","author":[{"family":"Patil","given":"Priyadarshini"},{"family":"Narayankar","given":"Prashant"},{"family":"Narayan","given":"D. G."},{"family":"Meena","given":"S. Md"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Patil, Narayankar, Narayan, & Meena, 2016). In Caesar cipher, the key to encrypting the message is three. In such encryption techniques, the data will be secure even if the attacker knows exactly the underlying algorithm of the encryption as well provided that the key is kept secret. Polyalphabetic ciphers are based on the substitution of the alphabets with multiple characters. These are also symmetric cryptographic methods because the keys for encryption and decryption remains the same.

Block ciphers are also symmetric in nature, but they do not replace single characters with the ciphers. Instead, block ciphers capture a block of input data and apply the cipher on the block of data resulting in a block of encrypted data. Block ciphers are widely used in network communications due to the simplicity of their implementation and higher speeds of their operation. It is relatively easy for criminals to break symmetric encryption due to the same keys used for encryption and decryption ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1jsqs4osl3","properties":{"formattedCitation":"(Gupta & Kaushik, 2017)","plainCitation":"(Gupta & Kaushik, 2017)"},"citationItems":[{"id":1812,"uris":["http://zotero.org/users/local/gITejLE9/items/ATV5QBMG"],"uri":["http://zotero.org/users/local/gITejLE9/items/ATV5QBMG"],"itemData":{"id":1812,"type":"article-journal","title":"A Review: RSA and AES Algorithm","container-title":"IITM Journal of Management and IT","page":"82-85","volume":"8","issue":"1","author":[{"family":"Gupta","given":"Ashutosh"},{"family":"Kaushik","given":"Sheetal"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Gupta & Kaushik, 2017). However, the sophistication of such symmetric ciphers can be increased by passing the plaintext message through the encryption algorithm multiple times. A popular example of this technique is known as a triple data encryption standard also known as DES. In triple DES, the cipher is applied on the plaintext three times creating three folds of encryption. RSA, on the other hand, is an encryption algorithm utilizing asymmetric cryptography also known as public key cryptography. The problem with the symmetric cryptography was to share the secret key with intended parties using some secure channel. The problem created a bottleneck in the development of symmetric cryptography systems. Solution to the problem is asymmetric cryptographic systems such as RSA.

In the RSA algorithm, different keys are used for encrypting and decrypting the message. Before starting the communication, a public key is decided and broadcasted to everyone including the attacker. The encryption is a result of encrypting the data with a combination of shared public key and a secret private key. The strength of the system is governed by the fact that even if both the private and public keys are based on prime number factorization, none can be extracted from the other. Simply a public key cannot be used in any way to retrieve the private key of any party because there is no correlation between the two. Advance encryption standard also known as AES is asymmetric cryptographic standard ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a181ahpb9it","properties":{"formattedCitation":"(Rihan, Khalid, & Osman, 2015)","plainCitation":"(Rihan, Khalid, & Osman, 2015)"},"citationItems":[{"id":1813,"uris":["http://zotero.org/users/local/gITejLE9/items/7IDMAY8J"],"uri":["http://zotero.org/users/local/gITejLE9/items/7IDMAY8J"],"itemData":{"id":1813,"type":"article-journal","title":"A performance comparison of encryption algorithms AES and DES","container-title":"International Journal of Engineering Research & Technology (IJERT)","page":"151-154","volume":"4","issue":"12","author":[{"family":"Rihan","given":"Shaza D."},{"family":"Khalid","given":"Ahmed"},{"family":"Osman","given":"Saife Eldin F."}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Rihan, Khalid, & Osman, 2015). The reason behind the invention of the AES is that DES use smaller key lengths. It is not feasible in modern world communications to use DES because a DES-encrypted message can be cracked in 52 hours and it has been proved ineffective as well. AES uses key lengths of 128 bit or 256 bits. Computational resources required to break these keys are not feasible even in the modern world. Therefore, it is the most secure encryption standard up until now.

Instead of encrypting the messages using sophisticated encryption techniques the information can also be protected against malicious use by hiding the information. A technique in which the actual message is hidden in an ordinary image is known as steganography. Only the intended person will be able to find the message in such a picture. Digital watermarks can also be used to ensure non-repudiation and authenticity of the message. In digital watermarking, a small portion of authentication data is embedded within the message not visible to humans except the intended parties.

Network Security Vulnerability and Threat Table:

Component

Vulnerabilities

Threats

Likelihood

Defense

LAN Security

Outdated router configuration

Software security holes

Lack of access policies

Remote code execution

Computer viruses

Trojan Horses

Key loggers

Rootkits

Hacking

Eavesdropping

Man in the middle attacks

Ransomware

Packet sniffing

Very High

Use of updated security software along with security policies ensuring the data security.

Identity Management

Authentication protocol spoofing.

Authorization weakness

Insider threats

Host intrusions

High

Use of smart cards and access controls.

Physical Security

Lack of physical restrictions

Physical tempering in the system

High

Physical access restrictions and authentication using smart cards.

Personal Security

Weakness in identity management protocols

Personal information of the employees or clients can be compromised by targeted attacks

Very High

Host based intrusion prevention systems.

Availability

Weakness in the physical infrastructure of the network.

Data may not be available to concerned departments when needed due to cyber attacks

Very High

Monitoring and compliance of the physical network.

Privacy

Lack of intrusion detection systems and cryptography for message protection

Data interception by key loggers and hackers infiltrating the network

Very High

Public key cryptographic systems based on AES.

Access Control Based on Smart Card Strategies:

As it has been described earlier that all of the logical security steps can be bypassed if there are no adequate physical security measures. Various physical security measures can be deployed to control access to the physical infrastructure of the organization. Smart card approach will be used to protect physical breaches of critical infrastructure. Smart cards have electronic chips integrated with them to provide encryption capabilities to the data stored on such cards. Personally identifiable information of the employees will be stored in the chips and will be encrypted using a public key cryptographic system. The information will be digitally signed by the digital certificate of the organization as part of the identity management program.

In this way trusted third parties would also participate in authentication of the users before granting access to the critical infrastructure. Card scanners will be available along with all of the doors of the departments ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1qgketo08t","properties":{"formattedCitation":"(Batalla, Mastorakis, Mavromoustakis, & Zurek, 2016)","plainCitation":"(Batalla, Mastorakis, Mavromoustakis, & Zurek, 2016)"},"citationItems":[{"id":1814,"uris":["http://zotero.org/users/local/gITejLE9/items/K4BLZSDP"],"uri":["http://zotero.org/users/local/gITejLE9/items/K4BLZSDP"],"itemData":{"id":1814,"type":"article-journal","title":"On cohabitating networking technologies with common wireless access for home automation system purposes","container-title":"IEEE Wireless Communications","page":"76-83","volume":"23","issue":"5","author":[{"family":"Batalla","given":"Jordi Mongay"},{"family":"Mastorakis","given":"George"},{"family":"Mavromoustakis","given":"Constandinos X."},{"family":"Zurek","given":"Jerzy"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Batalla, Mastorakis, Mavromoustakis, & Zurek, 2016). Whenever an employee tries to open the door, the card will be scanned. The solution will also provide extended monitoring of daily attendance of the employees as well. Common access cards are actively being used by the department of defense for personnel identification and identity management due to the extended security features of these cards. Similar mechanisms will be implemented in the organizations for physical security and identity management of employees and workers.

The Email Security Strategy:

The main source of communication between the employees and clients is using email. As phishing campaigns are increasing both in numbers and in complexity, it is inevitable to secure email communications. Pretty good privacy is a public key cryptography system to secure email communications. It provides authentication and identification capabilities. A message is signed with the digital signature of the individual using the PGP encryption mechanism ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1q67qibn1q","properties":{"formattedCitation":"(Anugurala & Chopra, 2016)","plainCitation":"(Anugurala & Chopra, 2016)"},"citationItems":[{"id":1815,"uris":["http://zotero.org/users/local/gITejLE9/items/GWA2SY66"],"uri":["http://zotero.org/users/local/gITejLE9/items/GWA2SY66"],"itemData":{"id":1815,"type":"paper-conference","title":"Securing and preventing man in middle attack in grid using open pretty good privacy (PGP)","container-title":"2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)","publisher":"IEEE","page":"517-521","ISBN":"1-5090-3669-5","author":[{"family":"Anugurala","given":"Anuradha"},{"family":"Chopra","given":"Anshu"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Anugurala & Chopra, 2016). The recipient of the message will be able to verify the identity of the message by looking at the digital signature that is accompanied by the message. PGP encryption mechanism will be implemented in the organization, and it will be mandatory for employees to digitally sign all of the email messages. Digital signatures provide encryption capabilities and are managed by certification authorities. Certification authorities and verification mechanism of digital signatures are part of the public key infrastructure.

Public key infrastructure is a network of certification authorities that issue digital signatures to the public. Digital signatures bind public keys with the corresponding private keys of the users. In an organization, a digital signature can be used to identify and manage the identity of the employee. When a message is to be sent by the sender, will encrypt the message with the private key along with the public key of the intended recipient of the message ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"ahoodhg7v","properties":{"formattedCitation":"(White & Yeh, 2017)","plainCitation":"(White & Yeh, 2017)"},"citationItems":[{"id":1816,"uris":["http://zotero.org/users/local/gITejLE9/items/C95QN4QA"],"uri":["http://zotero.org/users/local/gITejLE9/items/C95QN4QA"],"itemData":{"id":1816,"type":"article-journal","title":"Developing Accessible P2P Email Encryption Based on CLOW-GKA","author":[{"family":"White","given":"Kathleen D."},{"family":"Yeh","given":"Jyh-haw"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (White & Yeh, 2017). The receiver will decrypt the original message from the email using a private key and corresponding public key. In this case, the public key is designated as the digital signature used to sign the message. Certification authorities regulate the use of digital certificates. There are expiration dates as well for digital signatures or certificates to ensure that the ownership details are up to date. It is inevitable to stop misuse of public keys as well.

Mobile devices are used by the employees to send and receive emails. Most of the time critical documents related to the business operations are also stored in handheld devices of the employees. Therefore, securing mobile devices using encryption algorithms is inevitable. Some of the mobile manufacturers provide encryption capabilities by default such as Apple and Blackberry. Encryption provides added layers of security for mobile devices because if the mobile devices are lost no third party will be able to retrieve the data stored in the device ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a13lmdh7qcn","properties":{"formattedCitation":"(Callaghan et al., 2016)","plainCitation":"(Callaghan et al., 2016)"},"citationItems":[{"id":1817,"uris":["http://zotero.org/users/local/gITejLE9/items/HDVT2ZJK"],"uri":["http://zotero.org/users/local/gITejLE9/items/HDVT2ZJK"],"itemData":{"id":1817,"type":"book","title":"Content item encryption on mobile devices","publisher":"Google Patents","author":[{"family":"Callaghan","given":"David"},{"family":"Pudipeddi","given":"Ravisankar"},{"family":"Olsen","given":"Geir"},{"family":"Patel","given":"Sachin"},{"family":"Zhou","given":"Jianming"},{"family":"D'silva","given":"Dylan"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Callaghan et al., 2016). Other device manufacturers and software developer’s applications can be configured to support encryption capabilities. Devices support external memory cards, or memory enhancement add-ons must be encrypted as well. If the memory enhancements are not encrypted, then attackers can use the memory devices to retrieve the data from the devices. All of the recommended security measures along with intrusion detection systems will be implemented in the organization to ensure confidentiality, integrity, availability, and non-repudiation of the data.

References

ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY Anugurala, A., & Chopra, A. (2016). Securing and preventing man in middle attack in grid using open pretty good privacy (PGP). In 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 517–521). IEEE.

Batalla, J. M., Mastorakis, G., Mavromoustakis, C. X., & Zurek, J. (2016). On cohabitating networking technologies with common wireless access for home automation system purposes. IEEE Wireless Communications, 23(5), 76–83.

Callaghan, D., Pudipeddi, R., Olsen, G., Patel, S., Zhou, J., & D’silva, D. (2016). Content item encryption on mobile devices. Google Patents.

Gupta, A., & Kaushik, S. (2017). A Review: RSA and AES Algorithm. IITM Journal of Management and IT, 8(1), 82–85.

Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617–624.

Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37.

Rihan, S. D., Khalid, A., & Osman, S. E. F. (2015). A performance comparison of encryption algorithms AES and DES. International Journal of Engineering Research & Technology (IJERT), 4(12), 151–154.

White, K. D., & Yeh, J. (2017). Developing Accessible P2P Email Encryption Based on CLOW-GKA.

Subject: IT

Pages: 8 Words: 2400

Assignment

Students name:

Instructor:

Date of submission:

Introduction:

Geographical Information System

A geographical information system is a system that aims at capturing, storing, manipulating, analyzing, managing and the presentation of all types of data obtained geographically. Often the data captured through this system is usually spatial. Because the technology depends mostly on Geography, .it is inferred that the data collected always have a reference point to a certain point of the earth. The data collected geospatially can either be raster or vector data. Vector data is discrete and is represented in the form of lines, e.g. boundaries. Raster data is continuous data or information that is not limited to borders.

The GIS has played a significant role in the architectural sector as it helps with the designing of the cities and urban areas. Citizens have always wanted to live in a town that is well planned as it will ensure a smooth flow of their daily activities (GISgeography). GIS can be used to extract the actual coordinates and all the necessary requirements for the planning of a city. For example, it can be used to calculate the shadow length hence determining the height of buildings in that city. GIS can also be used in the mapping of quantities to get where there is a higher density of people. The data captured by this technology will always help architects to plan the city so as it is not overcrowded. The main advantage of GIS technology is when used correctly; it will always give the most accurate data required (GISgeography).

The main problem with GIS technology is that it hasn't been in use for an extended period. The number of people who are conversant with this technology is very minimal; hence, it is not possible to implement it everywhere. The technology itself is costly to use; therefore, a limited number of people or organizations can afford it.

Works cited:

https://gisgeography.com/gis-applications-uses/

Subject: IT

Pages: 1 Words: 300

Assignment

Gregory K Dapaa

Instructor Name

Art 101

20 October 2019

IT Essay: Real-time crime center of New Orleans

The New Orleans real-time crime center (RTCC) is a city improvement plan that won smart city award of North America 2019. This document aims to provide a summary of the RTCC initiative plan. The overall costs to the plan and its benefits for common people have been provided. The document also includes RTCC’s advantages of connecting several departments of the city to decrease crime rates.

The RTCC, a proactive citywide public safety improvement plan based on $40 million was launched in 2017. The RTCC has won smart city award in Public Safety category (Smartcity). Since then, the smart project gained recognition worldwide because of its enormity and integration pattern (Smartcity). The strategy was employing the cameras, license plate readers and variety of software to use information from a wide range of sources. This information is provided to Police, fire department and emergency medical services (EMS). The RTCC keeps all the departments connected by providing on scene information and directions the location.

The technology has been employed in an amazing fashion in the plan to assist public safety officials in their mission to keep the residents and tourists safe in real time. The real time technology has been used to provide real time information to the safety officers (NOLA). According to Ross Bourgeois Administrator of the RTCC, this technology acts as a force multiplier and aid in the tasks which cannot be performed in physical forms like visual aid before arrival to the crime scene (NOLA). Moreover, the RTCC system integrates EMS with police, enable them to see the crime area and collect necessary information before arrival on the location which cuts a lot of time in investigations providing video evidence (Smartcity).

Being a citizen of New Orleans, I can say that I along with other residents feel protected every time I step out of my house and move around the city for school, work, leisure or business. We always have a feeling that we have an eye in the air safeguarding us all the time. RTCC can identify a suspect before the crime scene provide information to police. It also identifies possible hazards to prevent larger damages. Overall, the protection it provides to the people is remarkable. Moreover, the plan has not only brought protection to the community but has also strengthened the city’s economy by attracting tourists from all over the country and world.

Works cited

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY New Orleans, Louisiana. Real-time crime center. 29 January 2019, https://www.nola.gov/homeland-security/real-time-crime-center/.

Smartcity. How Smart Tourism Will Shape Smart City Design. 14 October 2019, https://www.smartcity.press/how-smart-tourism-will-shape-smart-city-design/.

Smartcity. IDC – Smart City Winners Of North America In 2019. 16 May 2019, https://www.smartcity.press/smart-initiatives-winners/

Subject: IT

Pages: 1 Words: 300

Assignment

Your Name

Instructor Name

Course Number

Date

Assignment

One of the greatest advancements of technology is the Artificial Intelligence. Many countries, around the globe are using artificial intelligence in various fields in order to optimize the overall performance of their systems and processes. One of the most prominent examples of such countries is of China.

China is focusing on adopting the best practices of AI in the entire industries in order to widen and enhance their lead in Artificial intelligence. The plan for presented by china regarding the development of intelligence have a strong and significant impact on the adoption, and piloting of AI. Unlike other countries, the overall value extracted by China from AI is not dependent on one or two specific industries. Rather, it is progressing in the way of industry-dependent explains the approach of Chinese managers towards innovation.

Another country that is utilizing AI and has developed a proper national strategy regarding the deployment of AI is the United States. The strategy developed by the US is focused on promoting and protecting the national innovation and AI. This initiative presents a strategy in collaboration with the academia, private sector, and the public minded international partners. The focus is on the following fundamental five pillars for improving AI:

1) promoting stable AI, and R&D investment

2) unleashing the resources of Federal AI

3) clearing path for the innovation in AI

4) providing the American workers with the education and training opportunities regarding AI

5) promoting an AI friendly environment that supports the innovation in AI

Some of the powerful examples of AI in modern times are listed below with their brief explanation:

1) Siri

Siri is a famous personal assistance used by Apple. It is an AI based voice activated computer which is used for finding information, directions, information about events and many other services. It is a smart solution that uses machine learning to search and process the voice queries CITATION Tea17 \l 1033 (Team).

#2 — Alexa

Alexa is a powerful AI application launched by Amazon and is capable of deciphering speech from anywhere in the room. It can provide information stored in its dictionary database and from internet in very short time. It is also useful as a powerful gadget to control functioning of smart homes CITATION Xin19 \l 1033 (Le).

#3 — Tesla

Tesla is leading in Ai driven cars as it provides state of the art AI based services that help in self driving and predictive services.

AI is promising to bring revolution in technology by improving its machine learning models and incorporating its use in daily life as explained in above examples. Tech giants are investing their money and resources in this field to stay at the top in the industry because AI is the future.

Cited By:

BIBLIOGRAPHY \l 1033 Le, Xinyu. "The Insecurity of Home Digital Voice Assistants." (2019): 12.

Team, Siri. "Hey Siri: An On-device DNN-powered Voice Trigger for Apple’s Personal Assistant." 6 October 2017. Machine Learning Journal.

Subject: IT

Pages: 1 Words: 300

Assignment

Proposal - Genetic Algorithms Improves School Transportations Performance

Background

School Transportation problem is linked to a class of Vehicle Routing Problem. This problem consist of various vehicles to transport students to their destinations in an effective and efficient way. The solution to the problems is all about extracting optimal school routes by reducing the total number of buses, the amount of bus routes, and the distance among all the extracted or traversed routes. Manual scheduling of routes of school buses creates many routes, the amount of buses increased. It also lead to the buses transporting on the same route, increasing the cost and time.

The study will analyze the School transportation performance and solve the Vehicle Routing Problem by using genetic algorithm. Genetic algorithm can be related to the search heuristic that is evolved by the “Charles Darwin’s Theory of natural evolution”. The algorithm demonstrates a process, which consist of the selection of the healthiest or fittest individuals for further reproduction by using natural selection technique. These fittest individual the allowed to build up next generation by producing their offspring.

The main goal of the study is to extract a best possible solution of problems related to school transportation performance using genetic algorithms. The problem is complex “Combinatorial Optimization problems” and it belongs to the NP-complete category. As the nature of problems is complex, other methods are not suitable huge amount of instances, for this, it is required to use genetic algorithm to find the optimal solution. Genetic algorithms are based on search technique to identify and provide suitable optimized solution of a complex problem.

Plan:

To solve the problem related to school transportation performance, various research papers would be analyzed. Different techniques to solve vehicle routing problems would be analyzed. The solution would be implemented using C# programming language. The main advantage of this programming paradigm is that it provides object-oriented approach. Related work of various authors will be discussed by analyzing their work in the school bus routing problem and how they solved it. To test the algorithm further, we can also manage any data set to analyze results. Various charts can be constructed to show the performance of genetic algorithm and other techniques. The study consists of examining or analyzing the implementation results of genetic algorithm.

Genetic and non-genetic algorithms can be related to the stochastic and random phenomena. The stochastic is all about the things happens periodically and independently but there still exists some sort of dependency. The stochastic search algorithms such as genetic algorithms, ACO, PSO, the randomness is obtained and controlled by rules related to evolution or optimization process. But in case of random search algorithms, at each iteration, we can have local trial-and-error to escape local or general solutions. The other non-genetic algorithms includes, simulated annealing, ant-colony optimization, tabu search and clustering algorithm.

Various research papers and journals are analyzed to solve Vehicle routing problem. Ant colony colony technique has been used to solve dynamic school bus routing problem with immigrants’ schemes. Researchers have used exact and meta-heuristic methods to reduce the objective function and applying various constraints and suppositions on the formulation. Researchers also present a solution to the vehicle routing problem by implementing bio-inspired algorithm in which genetic material is vertically transmitted to offspring. Harmony search is also used to solve school bus routing problems by various researchers. It is a heuristic technique and “commercial optimization package” utilized as an exact approach to validate a proposed model.

Conclusion

The genetic algorithm is most effective and efficient technique to solve N-Complete problems like vehicle routing problems to enhance school transporting performance. The main reason behind this approach: various local optima, due to non-symmetrical objective function, large number of instances (buses and routes), and stochastic objective function. The genetic algorithms always returns solutions better with respect to time. It is inherently parallel and easy to use.

References

K. A. Eldrandaly, and A. F. Abdallah, “A novel GISbased decision-making framework for the school bus routing problem,” Geo-spatial Information Science, Vol. 15, No. 1, pp. 51–59, 2012, http://dx.doi.org/10.1080/10095020.2012.708151.

S. R. Thangiah, and K. E. Nygard, “School bus routing using genetic algorithms,” Proceedings of SPIE, Applications of Artificial Intelligence X: KnowledgeBased Systems, Vol. 1707, pp. 387-398, 1992.

T. Kim, and B-J. Park, “Model and Algorithm for Solving School Bus Problem,” Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 8, pp. 596 - 600, 2013, ISSN 2079-8407.

D. Ripplinger, “Rural school vehicle routing problem”, Transportation Research Record, vol. 1922, pp. 105-110, 2005.

S. R. Thangiah, A. Fergany, B. Wilson, A. Pitluga and W. Mennell, “School Bus Routing in Rural School Districts,” Lecture Notes in Economics and Mathematical Systems, Vol. 600, No. 2, pp. 209-232, 2008

A. J. Awuah, S. K. Amponsah, J. Annan, and C. Sebil, “School Bus Routing: A case study of Wood Bridge school complex,” Sekondi-Takorandi, Ghana. International Journal of Business and Social Research, Vol. 3, No. 12, pp. 26-36, 2013

Subject: IT

Pages: 2 Words: 600

Assignment

Name:

Professor’s Name:

Subject:

Date:

William Barr Call Logs collection

Every public officer has a duty to uphold ethics whenever they are conducting their duties at work. They have a role to protect the interests of the public and safeguard any public interests that may put them at risk if exposed to the wrong hands. This paper will look into the conduct of a public official on the manner he uses technology without authorization to obtain information from the public. It is based on the case of William Barr’s actions of recording call logs that ended up collecting billions of American’s call logs.

As a public officer William Barr’s responsibility if to work in the interest of the government but ending up taking matters into his own hands without informing his seniors completely begs the question why. His actions are completely a breach of privacy and it begs the question why he opted to do it secretly. William Barr’s actions in the year 1992 beg the question if it is in order for him to secretly tap people’s conversation without their knowledge in the name of spying or his move was illegal for breaching people’s privacy.

William Bar’s case is that of undermining people’s constitutional rights because of the position he holds in the public service and complete disregard for people’s privacy. Mr. Barr is indeed a man after creating a reputation for himself not knowing that his actions show a complete will for undermining the rule of law and make use of expansive powers to achieve their goals at work.

In conclusion Mr. Barr completely goes against the public service code and did not obey the rule of the law by seeking to circumvent it to meet his goals at work. It is indeed an unethical practice that has cost the American citizens their privacy thus Mr. Barr should be prosecuted for having misused the power granted to him and even barred from serving in the public service.

Works Cited

Savage, Charlie. "27 Years Later, Senators Want Inquiry into Barr’s Blessing of Call Logs Collection." The New York (2019): 1.

https://www.nytimes.com/2019/12/05/us/politics/barr-dea-bulk-collection.html

https://www.youtube.com/watch?reload=9&v=1BJTgDiX0k8&feature=youtu.be

Subject: IT

Pages: 1 Words: 300

Assignment

ABC

Instructor Name

Course Number

2 November 2019

Title: Cybercrime

Cybercrime is defined as any criminal activity which involves a computer and a network device. Cybercriminals use computer technology to access personal information and business trade secrets. Currently, the methods which I implement to prevent cybercrime are the following. Use of stronger password and multi-factor authentications

To prevent cybercrime I adopt some of the strategies such as, for my credit card I use a strong password. I have created a password that is more than 8 words and it’s a combination of lowercase, uppercase, symbols, and numbers. Secondly, I frequently change the password of my credit card. For my bank and credit card accounts, I have enabled multi-factor authentication as I know it will be harder for hackers to break into my account. I also do not use the same password for everything as I am aware of the fact that different websites have different security levels. For my email, bank and credit account I always prefer to use different passwords. Although it becomes difficult for me to remember all my passwords. For this, I have maintained a diary in which I have written all the passwords.

Social media settings

I have accounts on Facebook. Twitter, YouTube, and Instagram. My profiles on all these social networking websites are set to private. Secondly, every few days, I check my security settings on these websites. I am always careful about posting any information on Facebook and Twitter. Other than this I never add information regarding my home address and phone number on these platforms. I never post photos of family members and the place where I live. I do not accept friend requests from people who I do not know.Anti-virus Software

To protect my laptop and mobile from viruses, I have installed antivirus software on my laptop, and I update it regularly as I know the effectiveness of an antivirus software depending on how frequently it is updated ADDIN EN.CITE <EndNote><Cite><Author>Mathew</Author><Year>2010</Year><RecNum>1194</RecNum><DisplayText>(Mathew, Al Hajj and Al Ruqeishi)</DisplayText><record><rec-number>1194</rec-number><foreign-keys><key app="EN" db-id="axzrwpxxqvwtw5evsf3xrer2arfwsa5f0e5d" timestamp="1572731258">1194</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mathew, Alex Roney</author><author>Al Hajj, Aayad</author><author>Al Ruqeishi, Khalil</author></authors></contributors><titles><title>Cyber crimes: Threats and protection</title><secondary-title>2010 International Conference on Networking and Information Technology</secondary-title></titles><pages>16-18</pages><dates><year>2010</year></dates><publisher>IEEE</publisher><isbn>1424475783</isbn><urls></urls></record></Cite></EndNote>(Mathew, Al Hajj and Al Ruqeishi).

Works Cited

ADDIN EN.REFLIST Cyber Crimes: Threats and Protection. 2010 International Conference on Networking and Information Technology. 2010. IEEE. Print.

Subject: IT

Pages: 1 Words: 300

Assignment

Gregory K Dapaa

Instructor Name

Course Number

Date

Assignment

Blockchain is an advancing technology based on an increasing list of records which are known as blocks and are linked together through cryptography. Many industries and organizations have started to incorporate blockchain into their system as a better approach. Originally, it was used for Bitcoin and more cryptocurrencies but now blockchain is used in numerous industries including health, finance, and real estate.

The government can use blockchain to the existing system in generally four major activities. The first one is to verify the records, transactions, licenses, events, and processes. The second activity that can ease the finance sector is the movement of assets using blockchain technology. Secure and convenient money transfer and automatically sending salary to employees upon given task conditions are two obvious benefits. Thirdly, it can help in maintaining records and data of all real estate matters like property title and land registry. Lastly, E-identities enabled by blockchain can facilitate automating processing like voting, access to places or services, and for traveling purposes.

One of the public sectors benefiting from blockchain technology is the Finance sector. Managing and supervising the finance has always been a tough challenge. Now with, promising technologies and automation it is possible to restructure the system and blockchain are one the revolutionary tool among them ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"JUzRiDc2","properties":{"formattedCitation":"({\\i{}Is Public Finance Ready to Rely on Blockchain Technology?})","plainCitation":"(Is Public Finance Ready to Rely on Blockchain Technology?)","noteIndex":0},"citationItems":[{"id":54,"uris":["http://zotero.org/users/6144444/items/M497SP7W"],"uri":["http://zotero.org/users/6144444/items/M497SP7W"],"itemData":{"id":54,"type":"webpage","title":"Is Public Finance Ready to Rely on Blockchain Technology?","abstract":"Governments often contend with many issues when attempting to link public dollars to real-world outcomes captured by data in disparate systems. EY claims its OpsChain Public Finance Manager will reduce those struggles.","URL":"https://www.govtech.com/analytics/Is-Public-Finance-Ready-to-Rely-on-Blockchain-Technology.html","language":"en","accessed":{"date-parts":[["2019",11,17]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Is Public Finance Ready to Rely on Blockchain Technology?)

A recent example of the adoption of blockchain to finance sector is of Singapore government where they used blockchain to stop traders from deceiving banks. A few years earlier, in fraud case, Standard Chartered faced loss of around $200 million in China's Qingdao port. The fake companies used identical invoices for the same goods to take money out of the bank. After this incident, the government established a structure with local banks dedicated to preventing fraud through fake invoices. This was done using blockchain to form an exclusive cryptographic hash for each invoice. Now the banks use this unique key for transactional purposes instead of data. The system has a feature in which if some other bank tries to register an invoice using that detail, the system will detect and precautionary measures will be taken. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"iPteyyk5","properties":{"formattedCitation":"(\\uc0\\u8220{}Why the Blockchain Is Perfect for Government Services\\uc0\\u8221{})","plainCitation":"(“Why the Blockchain Is Perfect for Government Services”)","noteIndex":0},"citationItems":[{"id":56,"uris":["http://zotero.org/users/6144444/items/VTX89SBB"],"uri":["http://zotero.org/users/6144444/items/VTX89SBB"],"itemData":{"id":56,"type":"post-weblog","title":"Why the Blockchain Is Perfect for Government Services","container-title":"Observer","abstract":"Let’s hope the public sector around the world starts putting the blockchain on their agenda.","URL":"https://observer.com/2016/09/why-the-blockchain-is-perfect-for-government-services/","language":"en","issued":{"date-parts":[["2016",9,8]]},"accessed":{"date-parts":[["2019",11,17]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Why the Blockchain Is Perfect for Government Services”)

There are many other useful applications of blockchain are yet to come in many sectors.

Works Cited

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Is Public Finance Ready to Rely on Blockchain Technology? https://www.govtech.com/analytics/Is-Public-Finance-Ready-to-Rely-on-Blockchain-Technology.html. Accessed 17 Nov. 2019.

“Why the Blockchain Is Perfect for Government Services.” Observer, 8 Sept. 2016, https://observer.com/2016/09/why-the-blockchain-is-perfect-for-government-services/.

Subject: IT

Pages: 1 Words: 300

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.