Needed it in 500words with apa format

Supply Chain Management

Supply chain management involves tracking the flow of goods and services from the acquisition of inputs to the delivery of output to the consumers. The supply chain represents a connected network of people, organizations, activities, and technologies that help in the development of products or services. The organizational leaders who are in charge of supply chain management need to have adequate details concerning the market and the availability of inputs (Slack, Brandon-Jones, & Johnston, 2013). For instance, they should have details concerning the amount of products that the market requires at a specified duration. The practices enable organizations to obtain the appropriate inputs and develop goods or services that match the customers’ expectation. The existence of proper supply chain management programs also facilitates timely delivery of products to the consumers. Organizations use both internal and external supply chains to acquire inputs and deliver them to the market (Dyckhoff, Lackes, & Reese, 2013). The internal supply chains relate to the movement of resources from one department or process to the next. On the other hand, external supply chains involve the acquisition of inputs from suppliers beyond the company’s environments and the delivery of output to the markets.

The key objectives of supply chain management include generating optimal levels of customer satisfaction, the timely delivery of output and achievement of strategic goals, flexibility and cost minimization (Slack, Brandon-Jones, & Johnston, 2013). The supply chain managers usually promote customer satisfaction by eliminating errors such as the delay of inputs or inappropriate production procedures. The formulation of well-organized plans for resource acquisition and production of output is also a key strategy that helps in the timely delivery of output to the market. The organizations also attain their strategic goals once they manage to develop products and services that match the market demand on time. In some cases, the demand may change unexpectedly (Christopher, 2016). Thus, the supply chain managers develop strategies of promoting sustainability to cater for such instances. Effective supply chain management strategies, also help in the acquisition of high-quality inputs at reasonably low expenses, hence the minimization of operational costs.

Discussion Question: How can technological advancements improve the role of effective supply chain management in the achievement of sustainability?

References

Christopher, M. (2016). Logistics & supply chain management. Harlow, United Kingdom: FT Publishing International.

Dyckhoff, H., Lackes, R., & Reese, J. (Eds.). (2013). Supply chain management and reverse logistics. New York, NY: Springer Science & Business Media.

Slack, N., Brandon-Jones, A., & Johnston, R. (2013). Operations management. Mumbai: Pearson.

Is this the question you were looking for? Place your Order Here

Through analysis of reference materials regarding a notional organization, the student will develop the following products:

Written assessment of the current security posture of the organization.  State in general terms where Omega has strengths and where they have weaknesses.

Develop a listing of threats (five), prioritized by their relative likelihood and potential frequency of occurrence.  By definition, a threat is the occurrence of any event that causes an undesirable impact on the organization.  Threats can be either man-made or natural.  Is the disgruntled employee a threat?  How likely is it that we Omega will be faced with an insider attempting to do bad things on their networks?  Can you estimate how frequently that insider threat might manifest itself?  What about the script kiddy?  How likely is it that Omega will be probed by script kiddy?  How frequently is this likely to occur?

Develop a listing of vulnerabilities (10) in the current security posture of Omega Research.  A vulnerability is defined as the absence or weakness of a safeguard to reduce the risk associated with a specific threat.  

Prioritize the vulnerabilities based on the potential impact on Omega Research if the vulnerability is exploited (threat is realized).  (The FBI yearly report is helpful)

Considering the vulnerabilities associated with the current security posture of Omega, develop a single, optimal network security plan of action that reduces the vulnerabilities to an acceptable level (subjective).  This plan will include:

Proposed changes to the perimeter architecture of all four sites.  Include written description of recommended changes, why you are recommending these changes, and a logical network diagram of your solution for each site.

As necessary to compliment your perimeter design, proposed changes to the internal network/security architecture for each of the four sites.  Include written description of recommended changes, why you are recommending these changes, and include those changes in your site diagrams.

As necessary to compliment your perimeter design, proposed changes to network/security management tools and/or procedures.

The 3 highest priority security policies that must be developed and published now to support your network security plan of action.  Include the essence of these policies by using a customized template.  Include a paragraph that summarizes the changes to the template.

Your recommendations on securely implementing the Omega Research web site and knowledge portal.  Focused on location of networked resources within security zones within the enterprise and guidelines to prevent common web-based and SQL-based attacks.

Any additional recommendations you might have for Omega senior management to improve their bottom line.

Is this the question you were looking for? Place your Order Here

This assignment has two goals:  1) have students increase their understanding of ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper, including use of available References and citation tools.  These skills will be valuable throughout a student’s academic career.  The paper will require a title page, NO abstract, three to five full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page.  Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project.  No more than 10% of the paper may be in the form of a direct citation from an external source. 

 A list of topics from which students can choose is provided below.   

 Topics for Research Paper The focus of the paper should be on the following: 

 

1. how information technology supports or makes possible biometrics and its various implementations, and potential ethical and privacy issues related to the use of biometrics. 2. how information technology supports or makes possible the development of artificial intelligence (AI) and intelligent agents (such as Siri, Cortana, etc.) and potential ethical and privacy issues related to AI. 3. how information technology supports or makes possible the development of robots as intelligent as humans, smart machines and the IoT, What potential benefits and risks can/will robots introduce? 4. how information technology supports or makes possible genome-based treatments for curing diseases, and potential ethical and privacy issues that might result from use of such treatments. 5. how information technology impacts family, eldercare, and parenting issues, and potential ethical and privacy issues introduced by the use of information technology  and information systems in this area 6. how information technology has enhanced the use of computer-assisted education in the elementary school classroom, and the possible positive and negative impacts this enhancement provides.  7. issues facing the IT Manager or Security professional (e.g., privacy, ownership, control, accuracy, and security) in an environment where information technology is constantly expanding and changing. 8. how information technology plays a role in the era of Edward Snowden, Chelsea Manning, WikiLeaks, et and the impact on defense information systems 9. how information technology plays a role in the rise (and fall) of cryptocurrency and the positive and negatives of switching to the bitcoin environment. 

 

Is this the question you were looking for? Place your Order Here

Your research proposal was well received by the selection committee, as was your colleague’s. The committee is unable to make a decision due to the high caliber and rigor of both proposals. As a result, they are requesting the candidates critique an experiment, reproduce it, and submit a detailed report as a tiebreaker. They have not specified which experiment to analyze; however, they stipulate that it must be found within a peer-reviewed publication within the last ten years.

First, locate a research study that contains a reproducible experiment taking the time and resource constraints of the course into consideration.

Second, analyze the original study and address the items described below:

  • Describe the problem addressed. Why is it important? Is this an agreed-upon problem?
  • Describe what was accomplished by the study. What was not achieved?
  • Describe the methodology the study utilized. Was it appropriate? Justify.
  • Describe the study results and the contribution it made to the body of knowledge, if any.
  • Describe possible extensions to the research, if any. In what ways can the study be enhanced or modified to provide additional value? Discuss any limitations or assumptions held within the study and how they can be addressed.
  • Present the study’s experiment that will be reproduced. Be sure to outline the setup and resources utilized.
  • Describe how you will reproduce the experiment. How does your experiment differ from the original? In what ways were they the same? How do your results compare with the original results and what conclusions can be drawn with the additional data provided by your experiment?
  • Finally, reproduce the experiment and document the setup, procedure, and results. Create any tables, graphs, raw results, or aggregate reports that would allow for direct comparison with the original study.

Ensure that your critique is comprehensive and meets the quality expectations of doctoral-level work.

Length: 7-10 pages

References: Support your assignment with 7 appropriate and relevant scholarly references

Your work should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. 

Submit the original study (in PDF format), your critique, experiment outputs, and results in a Microsoft Word Document along with PDF copies of all works referenced using the Submit to Dropbox Button.  

Is this the question you were looking for? Place your Order Here

Topic: Identity Theft   

Thesis DRAFT 

Here are the Assignment Instructions:

1. Submit your completed Draft Thesis or Creative Project  

2. Please use the guidance in the Capstone Manual under Resources in the classroom for this assignment.  

3. The coordination process requires consistent communication with you to ensure adequate feedback on draft paper on project.   

4. You are encouraged to ask other faculty, professionals and leaders in your field of study to read and provide feedback on draft sections of your thesis or creative project where these faculty members and professionals may have special expertise. For example, the student's graduate research methods instructor may be asked for feedback on the research paper's research design.

Submission Instructions: Please note: Papers will be automatically added to and checked against the standard Turnitin repositories. Originality reports will be returned to the faculty and student in roughly 15 minutes of the submission. Multiple submissions are allowed.  

Rubric for Graduate Level 600+ for weekly Literature Review/Final Paper

  • Focus/Thesis –  10%
  • Content/Subject Knowledge — 20%
  • Critical Thinking Skills — 20%
  • Organization of Ideas/Format — 20%
  • Writing Conventions (Grammar & Mechanics) — 20%
  • Use of Computer Technology/Applications — 10%

Rubric for Grading AssignmentsPointsPoints EarnedCommentsFocus/Thesis 1010Content/Subject Knowledge2020Critical Thinking Skills

  • Hypothesis accepted/rejected in quantitative analysis
  • Interpretation of research in respect to questions/hypothesis
  • Implications/findings
  • Suggestions for future research

2020Need to clearly address questions/hypotheses in relationship to study.Organization of Ideas/Format: Overall format of assignment needs to include an appropriate introduction (or abstract), well- developed paragraphs, and conclusion.Title Page Copyright PageDedication PageAcknowledgments PageAbstract of the ThesisTable of ContentList of TablesList of FiguresIntroductionLiterature reviewMethodology Results Discussion Summary Recommendations List of ReferencesPermission to Quote or Reproduce Copyrighted Material Letter2020 “APA style has a specific format for tables. Tables should appear at the end of your paper, after the reference list and before any appendixes. Every table needs a unique title after its label. The title should be brief but clearly explain what is in the table.” See Purdue OWL or APA ManualWriting Conventions (Grammar & Mechanics) 2020Use of Computer Technology/Applications -Overall: A 50 page creative project or thesis paper is due at the end of Week 16. The literature review focuses on how the creative project experience fits into the discipline. It provides the current state of accumulated knowledge as it relates to the project. 1010Total100100Best regards,

************************MUST Follow Attachment instructions ********************************

Is this the question you were looking for? Place your Order Here

  5-2 Lab Assignment: Lab Six ReportAssignment Task: Submit to complete this assignment

To complete this assignment, review the prompt and grading rubric in the Lab Six Guidelines and Rubric document. Use the Lab Report Template to structure your lab report. When you have finished your work, submit the assignment here for grading and instructor feedback.

This assignment requires you to use CYBRScore.

                                    

                                  Lab Report Template 

Complete each of the critical elements in your lab and submit this report to your instructor for grading in your course. Be sure to keep the lab reports that you complete and review, along with any feedback provided by your instructor, as they will help you create a quality submission for your final project. Review the individual lab guidelines and rubric documents for more information on these assignments.

You may complete the report in a separate Word document. If you choose to use a separate document, include all the questions asked in the guidelines and rubric document for that lab, as well as the accompanying screenshot. Your completed report should reflect the information below. Add additional question numbers with accompanying description and screenshot as needed to match the total number of questions required on a given lab guidelines and rubric documents

1. Lab Number and Name: 

2. Brief Summary of Lab: What did you do in the lab?

· How did it work?

· What did you look for/find?

3. Specific Practices or Resources:Briefly describe the specific practices or resources that were most important in terms of supporting the investigation and maintaining evidentiary integrity in this lab. For example:

a. Chain of custody practices

b. Digital forensic tools

c. Incident response tactics

4. Best Practices:Briefly describe best practices or resources necessary in terms of next steps in this lab scenario. 

5. Screenshots:

· Include screenshots that support items 3 and 4 in your briefing.

Ensure your entire report is appropriate to your internal audience, employing brevity and consumable language (in this lab, your audience will be your teammates/company attorneys/executive team).

 5-2 Lab Assignment: Lab Six ReportAssignment Task: Submit to complete this assignment

To complete this assignment, review the prompt and grading rubric in the Lab Six Guidelines and Rubric document. Use the Lab Report Template to structure your lab report. When you have finished your work, submit the assignment here for grading and instructor feedback.

This assignment requires you to use CYBRScore.

Is this the question you were looking for? Place your Order Here

 

The genome of an organism can be expresses as some number G of
"base pairs" (see http://en.wikipedia.org/wiki/Base_pair). Typical
sizes of various genomes are given in (http://en.wikipedia.org/wiki/Genome).

String matching can be used to find particular sequences in a
genome. Several string matching algorithms are described
in (http://en.wikipedia.org/wiki/String_matching)

Consider a program to find to find if a particular sequence of
base pairs is found in a genome, and if so, where and how
many times.

Your program will run on a cluster with
the following properties:

Number of nodes - 20

 Number of processors per node 16 2.6 GHz Xeon
 Memory per node               16 GB
 GPU - 2 (NVIDIA CUDA) per node, 1024 stream processors and 4GB RAM, running at 1.5 GHz
 local drives 1 T SATA , 6 GB/sec
 NFS drive 10TB  RAID, bandwidth limited by network
               
Switched Ethernet network
Latency               L = 20 microseconds
Bandwidth             B = 1Gb/sec == 100 Mbytes/sec for messages
  larger than 32Kbytes


You may not need all the above information. If you feel you need some other system
property, feel free to assume some reasonable value (Try Wikipedia)

Assume the genome you are exploring and the sequence you are
trying to find, are both initially files on the NFS disk.

Deliverables:

1. Parallel String Match algorithm - in MPI, OpenMP, CUDA or some
combination of these. Description in English and/or pseudocode is
sufficient. Is yoyur algorithm data parallel, task parallel or both?

Describe data transfer during computation (disk to program, process to process,
CPU - GPU and node - node). Describe how data is partitioned between processes,
shared between processes, or replicated at each process.

2. You may not need all the hardware available for your algorithm. You may use the
entire cluster or any part of it. Describe what resources your algorithm will use to
execute. Explain your choice.

3. Estimate how your algorithm would perform on the computer
system described above. Consider:
   a. Complexity; communication costs.
   b. Is there some file size (in bytes, number of elements, or both)
that is too small for your algorithm to work efficiently? Given the wide range of genome
sizes (see http://en.wikipedia.org/wiki/Genome), is there some range of size that you expect would
be best for your algorithm?
   c. How much speedup would you exepect on the given hardware as compared to running
on a single CPU? Justify your answer    

Is this the question you were looking for? Place your Order Here

 Annotated Bibliography is due for the research paper listed references.  Sample Bibliography is attached 

  

References

1. Chang, V., Ramachandran, M., Yao, Y., Kuo, Y. H., & Li, C. S. (2016). A resiliency framework for an enterprise cloud. International Journal of Information Management, 36(1), 155-166.

2. Colman-Meixner, C., Develder, C., Tornatore, M., & Mukherjee, B. (2016). A survey on resiliency techniques in cloud computing infrastructures and applications. IEEE Communications Surveys & Tutorials, 18(3), 2244-2281.

3. Cost of Data Center Outages January 2016 https://planetaklimata.com.ua/instr/Liebert_Hiross/Cost_of_Data_Center_Outages_2016_Eng.pdf

4. Ghosh, R., Longo, F., Naik, V. K., & Trivedi, K. S. (2010, October). Quantifying resiliency of IaaS cloud. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 343-347). IEEE.

5. Greenberg, A., Hamilton, J., Maltz, D. A., & Patel, P. (2008). The cost of a cloud: research problems in data center networks. ACM SIGCOMM computer communication review, 39(1), 68-73.

6. HANA, S. (2016). Big data.

7. Klein, C., Papadopoulos, A. V., Dellkrantz, M., Dürango, J., Maggio, M., Årzén, K. E., … & Elmroth, E. (2014, October). Improving cloud service resilience using brownout-aware load-balancing. In Reliable Distributed Systems (SRDS), 2014 IEEE 33rd International Symposium on (pp. 31-40). IEEE.

8. Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.

9. Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services. IEEE Internet Computing, 17(4), 18-25.

10. Salapura, V. (2012, September). Cloud computing: Virtualization and resiliency for data center computing. In Computer Design (ICCD), 2012 IEEE 30th International Conference on (pp. 1-2). IEEE.

11. Statistica. Average cost per hour of enterprise server downtime worldwide in 2017 and 2018 https://www.statista.com/statistics/753938/worldwide-enterprise-server-hourly-downtime-cost/

12.  Bosin, A. (January 01, 2013). Resource Provisioning for e-Science Environments. International Journal of Grid and High Performance Computing (ijghpc), 5, 1, 1-24.

13.Raj, P. (January 01, 2014). The Network Infrastructures for Big Data Analytics

Roberto, D. P., Lombardi, F., Martinelli, F., & Sgandurra, D. (January 01, 2014). CheR: Cheating Resilience in the Cloud via Smart Resource Allocation 

14. Roberto, D. P., Lombardi, F., Martinelli, F., & Sgandurra, D. (January 01, 2014). CheR: Cheating Resilience in the Cloud via Smart Resource Allocation 

Is this the question you were looking for? Place your Order Here

  

Use the following code to complete the lab. Include test tables, screen captures and full text of code used and altered.

// C code

// This program will input and store meteorological data into an array. 

// Developer:

// Date: Dec 11, 2018

#define NUMMONTHS 12

#define NUMYEARS 5

#include <stdio.h>

// function prototypes

void inputdata();

void printdata();

// Global variables

// These are available to all functions

float Raindata[NUMYEARS][NUMMONTHS];

char years[NUMYEARS][5] = {"2011","2012","2013","2014","2015"};

char months[NUMMONTHS][12] ={"Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"};

int main ()

{

char enterData = 'y';

printf("Do you want to input Precipatation data? (y for yes)n");

scanf("%c",&enterData);

if (enterData == 'y') {

// Call Function to Input data

inputdata(); 

// Call Function to display data

printdata();

}

else {

printf("No data was input at this timen");

}

printf("Please try the Precipitation program again. n");

return 0;

}

// function to inputdata

void inputdata() {

/* variable definition: */

float Rain=1.0; 

// Input Data

for (int year=0;year < NUMYEARS; year++) {

for (int month=0; month< NUMMONTHS; month++) {

printf("Enter rain for %d, %d:n", year+1, month+1);

scanf("%f",&Rain);

Raindata[year][month]=Rain; 

}

}

}

// Function to printdata

void printdata(){

// Print data

printf ("yeart montht rainn");

for (int year=0;year < NUMYEARS; year++) {

for (int month=0; month< NUMMONTHS; month++) {

printf("%st %st %5.2fn", years[year],months[month],Raindata[year][month]); 

} 

}

}

Learning Exercises for you to complete

1. Demonstrate you successfully followed the steps in this lab by preparing screen captures of you running the lab as specified in the Instructions above.

2. Modify the program to add a function to sum the rainfall for each year. (Hint: you need to sum for each year. You can do this using a looping structure). Support your experimentation with screen captures of executing the new code.

3. Enhance the program to allow the user to enter another meteorological element such as windspeed (e.g. 2.4 mph). Note, the user should be able to enter both rainfall and windspeed in your new implementation. Support your experimentation with screen captures of executing the new code.

4. Prepare a new test table with at least 2 distinct test cases listing input and expected output for the new code you created allowing the user to enter another meteorological element.

5.  What happens if you change the NUMMONTHS and NUMYEARS definitions to other values? Be sure to use both lower and higher values. Describe and implement fixes for any issues if errors results. Support your experimentation with screen captures of executing the new code.

Is this the question you were looking for? Place your Order Here

 Computer Concepts and Office Applications

W3 Assignment: Computer Information and Screenshot

Please complete and submit both parts of this assignment:

Part A – Computer Information

In this assignment, you will investigate and learn more about your own computer. Review the presentation W3 Lecture 2 as it will show you how to find the information on your computer. Review the lectures for Week 3 as they will show you how to find the information on your computer.

  1. What type of device(s) are you using for class? For example:desktop computer, laptop, tablet, 2 in 1(laptop and tablet), smartphoneetc.
  2. What is your operating system?
  3. How much system memory do you have (RAM)?
  4. How fast is your CPU?
  5. Do you have a 32-bit or 64-bit machine? A CPU can process 32 bits of information or 64 bits of information at a time (there are 8 bits in a byte). When you download software from the internet, sometimes there will be one link for a computer that has a 32-bit CPU and another link if it has 64-bit CPU. That is why it is good to know this.
  6. What is the size of your hard drive?

Answer the questions and take a screenshot of the system properties area in which you would have found the answers to questions 2-5.  

Part B – Screenshots

In this assignment, we want to see that you are able to take a screenshot showing you haveMicrosoft Office.

  1. Log into Office 365 and take a screenshot showing the applications. The screenshot would include your name as it shows when you login

Your Part B screenshot should look similar to this:

ScreenshotExample

Submission Instructions:
  1. To submit your work, you can answer the 6 questions in the message box (visual below) and attach the two screenshots. Remember you probably saved these to your Desktop. (If you have Microsoft Word and are comfortable using it, you may paste the two screenshots into a Word document and use it for your submission.)
  2. All files submitted for this assignment must have your lastname and GIDnumber as part of the filename.

Is this the question you were looking for? Place your Order Here