Discrimination in The Age of Algorithms Discussion

The topic and content expectations for each paper are included with each paper assignment. However, here are some general requirements for all papers:

  1. All papers should be at most 300 words. If your paper is longer we will not read anything beyond the 300 word limit. On the other hand, your paper should not be substantially shorter than 300 words.
  2. You must check spelling and grammar in the paper. You will always lose marks for such errors. Remember, you are learning to write papers in a professional manner.
  3. All paper assignments must:
  • cite sources
  • in general quoted passages taken from sources are not acceptable (even if cited); using extensive cited quotations will generally result in a lower mark

Summary:

Summarize the key points of Section I-III of the paper cited below. Write the summary as an essay rather than a list of main point/ideas. This is meant to be an exercise in expressing the ideas from something you’ve read in your own words – a key ability you need to avoid plagiarism. The other requirement to avoid plagiarism is to cite the source, of course.

Having a clear structure in your writing will always make it more understandable for the reader. For this assignment, I suggest beginning with a sentence describing what the paper does (a thesis). Following that, I suggest having three paragraphs each of which begins with a claim like ‘The purpose of section 1 (or 2 or 3) is…’. After that opening explanatory sentence (of each paragraph), summarize the key points of the section.

Companies Accepting Bitcoin Research

This week’s reading centered around Bitcoin Economics. For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency. Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet these requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  • No plagarism

Security Architecture and Cache Handling Discussion

Question 1

Write at least 600 words in APA format along with 2 references

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Question 2

Write at least 400 words in APA format along with 2 references

How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

Cache Control and Cache Control Policy

Fetching something over the network is both slow and expensive. Large responses require many roundtrips between the client and server, which delays when they are available and when the browser can process them, and also incurs data costs for the visitor. As a result, the ability to cache and reuse previously fetched resources is a critical aspect of optimizing for performance.

The good news is that every browser ships with an implementation of an HTTP cache.

Examplain in details the follwoing:

  1. Validating cached responses

2.Cache-Control and Cache-Control policy

please search and solve in 3 page and give me reference with out plegaresem

Information Technology Strategic Planning Literature Review

Due to the changing nature of our project, there will be only one option for this research project:

  • Conduct a literature review in Information Technology Strategic Planning on a specific issue of your choosing. As a group, you are to review the literature on Information Technology Strategic Planning and discuss problems and gaps that have been identified in the literature. Your group will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection. At least 1500 words.

Here are some resources to get you acquainted with creating literature reviews:

Benefits and Drawbacks Template

  1. discussed in the lesson and assigned reading for this week, EHRs provide both benefits and drawbacks. Create a “Pros” versus “Cons” table and include at least 3 items for each list. Next to each item, provide a brief rationale as to why you selected to include it on the respective list.
  2. Refer to the Stage 3 objectives for Meaningful Use located in this week’s lesson under the heading Meaningful Use and the HITECH Act. Select two objectives to research further. In your own words, provide a brief discussion as to how the objective may impact your role as an APN in clinical practice.

Nationstate Insurance Case Study Discussion

Nationstate Insurance Case Study

Three pages using APA format

Reference:

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.

Technical Evaluation of An Operating System Final Project

Instructions

Submit your final project.

For additional details, please refer to the Final Project Guidelines and Rubric document.

Final Submission: Technical Evaluation of an Operating System

In Module Nine, you will consider the questions below and make revisions to the document you submitted for Milestone Three.

With your Milestone Three document in front of you, consider the following and make revisions as necessary:

a) Have you incorporated all of the feedback and suggestions you received from your instructor?

b) Does your submission address all of the critical elements outlined above?

c) Does the operating system you selected match the specific requirements your organization identified?

d) Do you have title and references pages?

e) Is your submission at least 15 pages of content not including title and reference pages?

f) Have you supported each of your positions with a credible source?

g) Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos?

h) Does your submission make a clearly stated recommendation for an operating system?

Your final submission should be a polished artifact containing all of the critical elements of the final project. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric (below).

Server Characteristics & Resource Utilization in Google Cloud Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.

Attacking Network Security Monitoring Discussion

In a minimum of 300 words, differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.