Problem 4- Initiating Project

Problem 4- Initiating Project

Please see attached file for question

Text

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

A Guide to the Project Management Body of Knowledge (PMBOK(R) Guide-Sixth Edition / Agile Practice Guide Bundle (HINDI) 

ISBN: 9781628255393 

Authors: Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2019-08-05

Pros and Cons of Telecommuting

Pros and Cons of Telecommuting

 

Define telecommuting and discuss the collaborative technologies that a company would have to provide to create an effective telecommuting program. 

How would providing improved collaborative technologies facilitate telecommuting? Name a few of such technologies and explain their role. 

Describe at least three human behavior challenges with telecommuting, and explain what a company would have to do to overcome each of them.

Record your responses to these questions in a Word document.  This written assignment should be 250-500 words, formatted in APA style. If you use outside sources, be sure to cite them using APA style as well.  Save the Word document under your name and M4 Written Assignment, and submit the file to the assignment submission folder.

Computer 4

Computer 4

In this week’s chapter we learned about the information security triad, security tools, and how to secure yourself digitally. Thinking about your own security, and maintaining good passwords, keeping software up to date, etc., we should also discuss the security risks associated with social media.

With online activity, one may be curious about privacy. For example, many folks probably use Facebook, YouTube, WhatsApp, Instagram, Snapchat, etc. Have you viewed and of these sites’ privacy pages recently?

Write 1 page to answer questions below:

  • Do you own your “personal data”?
  • Is it easy to be anonymous online?
  • Do you have any other thoughts or concerns around online privacy related to social media or other technology? 
  • Name at least one online privacy regulation, standard, or law. What are your thoughts on this?
  • Was there anything surprising or interesting about the privacy policy of any of the social media platforms listed?

Computer 5

Computer 5

What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two pages paper that describes at least two new advances in encryption technology.

  • Prepare a summary of issues related to Encryption Technology. 
  • Consider and discuss:
    • the impact of encryption on organizations and society
    • regulations/laws/standards related to encryption
    • limitations and issues
    • Be sure to give attribution to your sources.

Assignment Question

Assignment Question

  1. This is a required assignment, worth 45 points, and must be submitted by the due date.
    Review the Grading Rubric before completing this assignment.
    Research a scholarly paper on the impact of “Emerging Technologies on SAD” and reflect on only one of the following topics:

    • “Impact”: How do recent or emerging technologies impact SAD? 
    • “Cloud”: Is the SAD process different when dealing with Cloud Systems? 
    • “Analytics-centric”: Is the SAD process different when dealing with Analytics-centric organizations? 
    • “DM-Warehouses”: Is the SAD process different when advanced Data Management and Warehouses are involved?
    • NOTE:
      You must copy and paste the topic (“Impact” or “Cloud” or “Analytics-centric” or “DM-Warehouses”) at the start of your paper to provide a context for your answer
      This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
      Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
      Do not copy and paste text from the referenced resource.
      You must provide at least one APA reference for your resource and corresponding in-text citations..
      You must provide the referenced resource URL/DOI in the APA reference.
      Do not use the Textbook as a referenced resource.

response eric

response eric

 

In a world controlled by technology, the internet is something that has become a staple of any business. You have a range of options on how you choose to connect to the internet. DSL was one of the first options, carrying data through telephone lines, next came cable that uses buried ground lines serviced by cable companies. WiMax entered the industry around 2001 and uses wireless technology to carry data. Fiber is the newest technology, utilizing modulated light pulses.

In terms of security, DSL and cable are relatively equal as they are simple copper wires that can be tapped into with easily available equipment. WiMax is the least secure technology as wireless signals are easier to intercept than having to tap into a physical line. Fiber is the most secure option as it is expensive to get equipment for attempting to tap into and decode the data. The best security option is to protect your data inside your network and secure packets for transfer over the internet. You can use firewalls to ensure that your company’s data isn’t accessed without authorization in your network and encryption for when you transmit packets over your chosen connection medium.

response

response

 

Two of the last year’s most significant recent trends in supply chain management have been flexibility through the Covid-19 pandemic’s trickle-down effects and social and mobile commerce. Growing emphasis on rapid-response and adaptive supply chains has been seen during times of high demand, as we’ve seen many shortages occur across many different industries (Laudon & Traver, 2021). The ongoing chip shortage is an excellent example of this. This is a global issue that stems from many different factors and has affected a wide variety of markets, from the auto industry to computer components and other household electronics.

            Social and mobile commerce has become more popular than ever. Again, the pandemic brought on a wave of mobile consumers, with companies like Amazon seeing some of their highest volumes in sales due to store closures and social distancing, affecting the ability to shop in person. With on-demand purchasing through many websites and mobile platforms, transactions can occur much faster at any moment, day or night. Supply chains need to recognize the risks that can come with high availability in consumer buying. Though this is generally a good thing, supply chains must counteract high demand for certain products. Many sites have implemented buying limits on certain items both in-store and on mobile platforms to prevent multiple transactions from individuals attempting to resell high-demand products.

            B2B commerce can be very beneficial, especially to the buying company, allowing for volume purchase rates on bulk items, discounted rates through contracts, and higher availability of products and materials. Contracts always pose potential risks, whether it be losing bids to a competing company or fallout and breach of contract resulting in wasted time and resources. However, contracts usually help avoid the risk of high volatility in products and services.

Reference:

Laudon, K. C., & Traver, C. G. (2021). E-Commerce 2021: Business, Technology, and Society (16th Edition). Pearson Education (US).

response

response

 

businesses seem to move more towards e-commerce and utilization of technology. As the use of the web increases, consumers are turning to shopping online. This may be for many reasons including, time-saving, brand visibility, offers, messaging, personal recommendations and many more (Singhal, & Tanwar, 2021). Shopping online allows consumers many more options than shopping in person would. Businesses also have many options when it comes to B2B commerce. In the planning process they analyze many options to decide what manufacture to go with and what price will be agreed upon. B2C has a more simple process that often does take as long between business and consumer. Nice job and good luck in your future endeavors. 

Singhal, S., & Tanwar, P. (2021). A prediction model for benefitting e-commerce through usage of regional data: A new framework. IAES International Journal of Artificial Intelligence, 10(4), 1009-1018. doi:https://doi.org/10.11591/ijai.v10.i4.pp1009-1018

Neural Network

Neural Network

A Realtor in Massachusetts is analyzing the relationship between the sale price of a home (in $), it’s the square footage (in ft2), the number of bedrooms, the number of bathrooms, and a colonial dummy variable (colonial equals 1 if a colonial-style home; 0 otherwise). The relater collects data of 36 sales in Massachusetts for the analysis. The attached file “Assignment – Dataset 2” contains the data.

Address the following questions: 

a)  Develop a Neural Network (NN) prediction model for the sales price (Number of layers = 3, dense layers, activation function of “Relu”, number of nodes in each layer = 32).

b)  Predict the price of 2100 ft2 colonial style home with two bedrooms and two bathrooms.

c)  What are the limitations of the model?

Submit a PDF file for your answers as well as the excel sheet. Include the Python code in the PDF. 

Personal Database

Personal Database

 

Think of an example of a database that you could use to help manage your personal data.  Using that example, explain the following points:

  • What is the purpose of your personal database?
  • How many tables do you think would be needed to support your database?
  • Give examples of a few attributes that your database would store.
  • Give an example or two of a type of query and a report you may generate based on the data in your personal database.

Share your answers to these prompts in your initial post. Then scan your classmates’ threads and reply to at least TWO classmates whose answers interest you most. In your reply, comment on what you like about his/her sharing. Further the discussion in a direction you deem appropriate.