Explain considerations staffing levels and training. Ensure you provide justifications for why these considerations are important.

Final Project MIS300 CT4

Review the requirements for this Portfolio Project in the Module 8 folder, then proceed with Milestone 2.

For this milestone, you are required to submit a system diagram of the ERP system. The design should contain the databases, software application areas, and the business user groups which will use their respective software applications. ERP software applications normally are categorized by business function, e.g.

Human Resources, Accounting and Finance, Supply Chain Management, and Sales and Marketing (which includes Customer Relationship Management). Your deliverable should also contain a discussion of the rationale behind inclusion of each of the components in your system diagram.

The second part of this assignment is an analysis of considerations for information systems personnel regarding the implementation of this new system. Examples of considerations are staffing levels and training. Ensure you provide justifications for why these considerations are important.

How are they using cloud computing? What recommendations would you make to the organization regarding other business areas that could benefit from the use of cloud computing? In response to your peers, discuss a potential challenge you think their organization would face utilizing cloud computing.

Cloud Computing MIS300 DF4

Consider an organization’s use of cloud computing. Feel free to draw conclusions and examples from your own company or one in which you are familiar.

How are they using cloud computing? What recommendations would you make to the organization regarding other business areas that could benefit from the use of cloud computing? In response to your peers, discuss a potential challenge you think their organization would face utilizing cloud computing.

Explain what, why, and how of technology as it relates to your life, so you can unlock the door to success in the workplace, at home, and at school. (200 word or more)

Technology in a relation to ones life

Explain what, why, and how of technology as it relates to your life, so you can unlock the door to success in the workplace, at home, and at school. (200 word or more)

Describe your contributions to the areas explored by this project. Each chapter should focus on a theme that is important to your project’s overall goals. If your project aims to solve a particular problem or implement a particular system, describe your methodology, trials, and findings.

Robotics in Cyber Defense

An abstract of up to 300 words that summarizes the purpose and findings of your project.

A Table of Contents that identifies the page number on which each chapter begins.

An Introduction chapter in which you state very clearly your reasons for doing this project and what you are going to do.

One or two chapters that review the literature. In these chapters, you describe work that has been done before in this particular area. Most of your reference citations will likely be included in these sections. Cite your references using APA or IEEE format.

One or more chapters that describe your contributions to the areas explored by this project. Each chapter should focus on a theme that is important to your project’s overall goals. If your project aims to solve a particular problem or implement a particular system, describe your methodology, trials, and findings.

If your project aims to research a particular topic or topics to a much greater depth than what you explored in your coursework, use these chapters to develop rigorous new insights from the literature you have reviewed. These new insights must follow logically from the works you have researched.

A final chapter that summarize the findings you presented in the previous chapter and outline avenues for possible future development of this work.

Your list of references, expressed in APA or IEEE format, presented in the order in which they were cited in the preceding chapters.

What are the main elements of a VM process, tailored to Mercury USA and the transportation sector?How will you plan for and define the scope of a VM process?

Project 1 – Cybersecurity Strategy and Plan of Action

What are the main elements of a VM process, tailored to Mercury USA and the transportation sector?

How will you plan for and define the scope of a VM process?

How will you identify the assets involved?

How will you scan and assess vulnerabilities?

What is/are the industry standard scanning tools? Support your findings.

What frequency of scanning do you recommend and why?

How will you report the results of scanning and recommended countermeasures?

What is the Maine source that form this data, does it come from speed detectors, inductive loops, GPS systems.

Datasets for traffic congestion management

The document should include the following:

1. Introduction section to introduce the importance of data mining in many fields, then focus on data mining in intelligent transport systems, some facts and historical information.

2. Data Mining for traffic congestion: in this section more details about data mining techniques in transport systems.Data Acquisition that includes the sources of data and how it is collected.

Then Data Preprocessing: including what are the steps and calculations that are needed to be performed to prepare the data for use, the Segmentation, Data Transformation.

The section should include a flow chart representing the data mining techniques and another figure to include the data mining steps.

3. Review the related work on datasets that are used in traffic congestion management solutions : this includes the state of the art machine learning based solutions that use different types of dataset.

This section should include the types of data that are used such as speed, GPS, density, number of vehicles, time of days, peak and non peak hours as so on.

The total size of these data and the format of the data is it Video, CSV, XML and so on, what is the Maine source that form this data, does it come from speed detectors, inductive loops, GPS systems. The section must include a table that summaries the content of this section , the table can include the name of the datasets and where it is used and the availability for use is it a commercial data or open source data. Some figures to compare the total type of data that are used. The figures can be the total number of publications that use speed data, or the total number of publications that use a specific data sets.

4. Conclusion: a summary of the work.

Explain three elements that were added, removed, or modified when updating and prioritizing the backlog for the chosen case study. Include the updated backlog in the “Product Backlog/User Stories” section of the “Sprint Planning Template” attachment.

TASK 2 SPRINT PLANNING

Create a retrospective from the last sprint for the chosen case study in the “Retrospective” section of the “Sprint Planning Template” attachment.

The retrospective needs to include quality issues, communication issues, and positive outcomes.

B. Explain three elements that were added, removed, or modified when updating and prioritizing the backlog for the chosen case study. Include the updated backlog in the “Product Backlog/User Stories” section of the “Sprint Planning Template” attachment.

C. Create a sprint plan that covers the next month’s project tasks. Provide a sprint goal, five sprint tasks, a sprint forecast, and a resource allocation

for the chosen case study in the “Sprint Goal” and “Sprint Plan” sections of the “Sprint Planning Template” attachment.

D. Create a communication plan for the chosen case study by completing the table in the “Communication Plan” section of the “Sprint Planning

Template” attachment that shows the meetings, documents, and associated information that will be used during the next sprint. Provide five
instances of standard communication for three stakeholders.

E. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

F. Demonstrate professional communication in the content and presentation of your submission.

What areas of your project proposal could have an ethical implication? What are you doing to address these ethical issues, both in reality and in the perception of those involved? What are the policies

Assessment 4 – IT-FP4990

How do your solutions address the specific organizational problems that you have identified, and how do they address the key stakeholder concerns?

The solution addresses the organization problems related to old hardware, and costly network Mail Handlining network infrastructure.

How are the solutions connected to global or domestic (or both) IT trends and solutions?
s
How does what you are proposing keep the organization in line with what is happening in the industry?

We Ship USA organization hires/contracts new skills to adapt to the ever-changing technology, where old employees still have value on the current infrastructure, the new skills help migrate to a new fully solutioned network enterprise that can handle what is currently available in the market for WAN capabilities.

What model or architecture do you propose for your solution (or solutions)?
No idea on this one

What technology or technologies do you recommend as part of the solution?
Recommending SD-WAN using different types of WAN technologies.

What are the specific IT principles that support your proposed solution?

What are key issues that the organization needs to consider from a legal, ethical, and policy standpoint?
1.0 Legal Point:

What are risks associated with the solution (or solutions) proposed, and how might they be minimized?

Risk is loss of network connectivity during the deployment of new network solution, a Change ticket with all relevant information, including the point of contact, the service location, the account information for supporting the service from the internet service provider, as well as any network detailed drawing to help assist network issues that may arise during a migration.

Using a lessons learned approach will help reduce

the risk for the next site deployment.
Needs and Risk Analysis

This analysis specifies how the proposal’s solutions meet the needs of the organization and key stakeholders, and it identifies the potential risks involved as well as strategies for addressing those risks.

When considering a possible course of action, an organization will ask two key questions:
Does the solution meet the organization’s and key stakeholders’ needs?

What are the potential risks to the organization, and how might they be minimized? A needs analysis helps answer the first question, determining whether a solution measures up against key areas of concern to an organization.

A risk analysis addresses the second question. It explores the potential risks of adopting the solution and helps decision makers strategize ways of minimizing, or even avoiding, potential damages to the organization.

Write a two- to three-page needs and risk analysis for the solution or solutions you have proposed.

The analysis should answer the two questions above, addressing critical issues in the organizational context and stakeholder needs. A risk matrix would be a good addition to the risk analysis portion of this document.

In addition, address the following questions:

What are some barriers to the project you have encountered in your analysis? How might you adjust your proposal to address them?

What insights or advice would you give to someone who is working on a similar area for the first time? How can he or she be better at

identifying risks and more effective in managing or avoiding potential risks?
Legal, Ethical, and Policy Analysis

Conduct a thorough analysis of the legal, ethical, and policy issues that could affect your IT project. The result should be a one- to two-page summary that answers the following questions:

Are there any legal issues specific to the action learning environment that you should consider?

What areas of your project proposal could have an ethical implication? What are you doing to address these ethical issues, both in reality and in the perception of those involved? What are the policies

How much of the current discussion is based on credible research (with clearly explained methodologies) and how much is essentially opinion?

The Technoligical Singularity

This is a discussion on which there is widespread debate and disagreement, perhaps largely because there are different concepts of what the TS really is.

Write a 2,000-word formal academic paper (in IEEE two-column format and referencing style) discussing essential technological features of the TS and the various ways in which different futurists conceive it.

You should also discuss the current, emerging and future technologies that may be driving us towards the TS, as well as potential obstacles to prevent it.

How much of the current discussion is based on credible research (with clearly explained methodologies) and how much is essentially opinion?