SWOT Analysis As discussed in the chapter, the primary purpose of the SWOT analy

SWOT Analysis
As discussed in the chapter, the primary purpose of the SWOT analy

SWOT Analysis
As discussed in the chapter, the primary purpose of the SWOT analysis is to identify and assign significant factors that affect the business to one of the four categories to analyze where it stands in the market and help guide an organization’s strategic planning process.
Don’t worry about elaborating on the nature of the strengths, weaknesses, opportunities, and threats; bullet points are sufficient at this stage of the analysis. Just capture the factors that are relevant in each of the four areas using two or three words to describe them.
After listing factors in all four areas, compare your lists side by side to get an overall picture of how the businesses is performing and what issues need to be addressed. Create four prioritized lists by prioritizing the issues by importance and ease of implementation by asking yourself “What needs to and can be addressed now?” and “What can and will have to wait until later?”
Finally, review the prioritized lists by asking:
How can we use our strengths to take advantage of the opportunities identified?
How can we use these strengths to overcome the threats identified?
What do we need to do to overcome the identified weaknesses to take advantage of the listed opportunities?
How can we minimize our weaknesses to overcome the identified threats?
When you have your finalized lists, the SWOT analysis is ready to guide the process of developing corporate and IT strategies. The value of a SWOT analysis depends on how well the analysis is performed. To gain the greatest value from performing a SWOT, carrying out the SWOT early on in the strategic planning process and following these rules helps:
Be realistic about the strengths and weaknesses of your organization.
Be realistic about the size of the opportunities and threats.
Be specific and keep the analysis simple or as simple as possible.
Evaluate your company’s strengths and weaknesses in relation to those of competitors (better than or worse than competitors).
Expect conflicting views because SWOT is subjective, forward-looking, and based on assumptions.
Have Fun with a Personal SWOT
To identify the actions you can take to best meet the requirements of the job or promotion you are seeking, conduct a personal SWOT analysis. To help you understand yourself, picture yourself as a competitive product in the marketplace, and list your strengths, weaknesses, opportunities, or threats from the perspective of a prospective “customer,” that is, your employer. Comparing your strengths and weaknesses to job requirements will help you identify gaps, prepare you to be the best candidate for the position you are seeking, and alert you to issues that could arise in the interview process.
The paper should be three to four pages long following APA format.

In this project deliverable, you should develop the 10 functionalities proposed

In this project deliverable, you should develop the 10 functionalities proposed

In this project deliverable, you should develop the 10 functionalities proposed in deliverable 2 in MS Access, and turn in the following files:
1) The updated project proposal (Word document) which has the same five sections as before. Copy my comments from the deliverable 2 and highlight any changes you made from the previous version by turning track changes on in MS Word (or using a different text color). 
2) A MS Visio file that contains the updated ERD (even if you didn’t make any changes from the previous version). 
3) An Access database should have all the tables shown in the ERD with at least 6 to 7 records in each table and all the PK/FKs/relationships/data types properly enforced. The referential integrity option should be checked when setting up the relationship in MS Access. The Access file should also include the 10 queries used to accomplish the 10 functionalities outlined in the proposal. Name the 10 queries based on the order of functionalities listed in the Word document. 
Please name the above file as Project_3_Lastname.docx /.vsdx /.mdb, respectively). All group members need to submit the these three project files.
The final project deliverable is due on November 30 at 11:59 PM. This is a firm deadline and no extension will be given. You are strongly encouraged to submit your project files earlier to avoid any technical issues.

  Tasks to complete Goal: This project will be used to integrate concepts develo

 
Tasks to complete
Goal: This project will be used to integrate concepts develo

 
Tasks to complete
Goal: This project will be used to integrate concepts developed from all the assignments in the second half of this class, specifically. You will identify a data driven business problem that requires preparation of the data. This preparation involves Extracting data (from 3 or more sources), Transforming (or cleaning) the data before Loading it into a database for analysis. In other words, you will experience, first-hand, the ETL process of Data management – preparing the data for further analyses.
Options: You can take this project in one of two directions: (1) Identify a large file, clean the data and normalize it into three or more tables OR (2) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis. In either case, you will need to identify what you plan to learn from the cleaned and loaded data.  BOTTOM LINE: Can you do the analyses WITHOUT going through this ETL process. If so, what’s the point?!
Resource: This articleLinks to an external site.
In preparation for your project this term, I need you to do some digging to identify sources and ideas for a decent project.
There are a couple of decisions that have to be made. And so, I am making part of the project a “deliverable” so you can begin mulling over it. Most ETL tasks involve cleaning and integration. For integration, it is vital that you have an attribute that is common across all three data sets
Cleaning
Cleaning is one of the most important steps as it ensures the quality of the data in the data warehouse. Cleaning should perform basic data unification rules, such as:
Making identifiers unique (sex categories Male/Female/Unknown, M/F/null, Man/Woman/Not Available are translated to standard Male/Female/Unknown)
Convert null values into standardized Not Available/Not Provided value
Convert phone numbers, ZIP codes to a standardized form
Validate address fields, convert them into proper naming, e.g. Street/St/St./Str./Str
Validate address fields against each other (State/Country, City/State, City/ZIP code, City/Street).
Transform
The transform step applies a set of rules to transform the data from the source to the target. This includes
converting any measured data to the same dimension (i.e. conformed dimension) using the same units so that they can later be joined.
generating surrogate keys or FKs so that you can join data from several sources,
generating aggregates
deriving new calculated values,
Adding columns to create PKs and/or FKs
Data Integration
It is at this stage that you get the most value for the project. This typically means you are adding some attribute from a related set that adds ‘Color’ to the data. Perhaps Census data to labor data or other demographic data. The challenge is to locate data that are relatable.
Project direction: You will need to complete a datamart with significant pre-processing (ETL) activities. 
Requirements:
Problem being solved:  What do you propose to learn from this data? List several of these business questions and show how your project solution (data set) could answer them.
Tools: You must complete the entire project using Visual Studio. OR you can do this with some other tool of your choice (ETL) like Power BI or tableauLinks to an external site..
Volume: Total result data set must add up to at least 5k records, but not more than 100k.
Destination: SQL server table(s). Depending on the direction you are taking, you can move all the data to a single CSV file and dump it into SQL server at the end or direct the final destination tables to SQL server.
Transformation – it must include TWO new columns (for each final destination) that is populated by (a) the current date and time so you know when that data was brought into the final dataset and (b) a second one to know where the data came from (source file name). This may be done through SSIS or in SQL server.
Note: Filename capturing works only when the source is a flat file.  So, if your source is NOT a flat file,  you may want to make a CSV file an intermediate destination and then use this file as the source (Hint: Use derived column transformation to add a column)
In addition it must include at least 3 of the following transformations: data conversion, derived column, data split, lookup, merge, merge join, multicast, union all, fuzzy lookup or any of the transforms not covered in class. 
Data sources: You are welcome to use datasets from work that has been sufficiently “anonymizedLinks to an external site.”. In fact this itself is a valuable transformation task that you can then use to protect your data and make it available for additional analysis/exploration. There are many public data sets that can be used (see “data sources” tab)
 
Project ideas & Data sets [for ETL]
Goal: Explore various datasets (see below) to see what is missing in any of the data and how you can enhance it by combining info from other seemingly unconnected data (industry, education, poverty and liquor shops?). The links below serve as a starting point for your exploration. Get started!’
Expectation: You can take this project in one of two directions: (1) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis.  OR (2) Identify a large file, clean the data and normalize it into three or more tables so that when you rejoin them, you get more accurate answers to your questions. Sometimes this process may require you to get “reference sources” so your dimension tables (destinations in Model Y above) are more complete/accurate.  
In either case, you will need to identify what you plan to learn from the cleaned and loaded data.
There are two main ideas to keep in mind: (1) Cleaning badly prepared data and (2) integrating data from multiple sources. An ETL project usually involves BOTH of these.
When integrating data from more than one source, you need to make sure that they can be linked in the first place. In other words, is there something in common between the two data sets? Some kind of identifier like we use as PK and FK? If not, can you create it?
As you review the following sources for ideas, look for files that can be linked. Otherwise, all you have is data!
Note: You don’t have to get ALL your data from a single source. As long as they are related, you can draw from multiple sources.
I ALREADY HAVE THE DATA SOURCES AND PROJECT BACKGROUND TO WORK WITH. YOU JUST HAVE TO DO THE PROJECT ETL AND PRESENTATION. FOR THIS PROJECT YOU NEED TO USE VISUAL STUDIO 2019(PREFFERED) OR POWER BI OR TABLEAU. I NEED IN A SHORT TIME SO PLEASE BID ONLY IF YOU ARE SURE YOU CAN DO IT . I WILL BE UPLOADING THE DATA FILES HERE.

Explain the relationship between entities / attributes and tables / columns. Dis

Explain the relationship between entities / attributes and tables / columns. Dis

Explain the relationship between entities / attributes and tables / columns. Discuss why understanding the theoretical concepts during the design process is an important facet of successful database implementation.
Research naming conventions and discuss some of the good practices when assigning names for the elements in your physical model.

Vulnerability Case Study For the project, 15 minute presentation, a Powerpoint p

Vulnerability Case Study
For the project, 15 minute presentation, a Powerpoint p

Vulnerability Case Study
For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely.   Subject Matter: Your task is to research a known exploit of a vulnerability from within the past 3 years.  A high-level description of the vulnerability A more detailed discussion of the vulnerability.  You should start by looking up the CVE in the National Vulnerability Database and use that as a way to find additional references.   Analyze what STRIDE aspects apply to the vulnerability Analyze what aspects of the CIA triad were impacted How the vulnerability was discovered and disclosed How it was exploited and the impact How it was resolved  Research Process: Your research should be done in a few separate phases: 1.  Start with a general search to find an interesting case for analysis.  You can Google for news stories, look at Google Project Zero, security focused blogs, newsletters, or YouTube channels, and similar sources to find a high-level discussion. 2.  Find the CVE in the National Vulnerability Database.  This will be a key step in getting sufficient technical details about the vulnerability and will lead you to additional resources. 3.  Look for third party analysis, discussion of exploits, responses from the product owner, patches, and other related information pertaining to the vulnerability.  Again, the CVE will be a good resource for this part. As you find relevant sources that you will use, add it to the bibliography with a brief annotation.  The annotation should provide a high-level summary of the source and why the purpose for which you are using the source.  It could be helpful to highlight key quotes and/or excerpts as well. Presentation and Slides: Once you have done your research and conducted your analysis, the next step is to prepare the presentation.  Prepare a Powerpoint presentation (should be around 12 to 15 slides).  Slides should be organized.  Slides should provide short bullet points -- do not write paragraphs on the slide and read off of them.  Relevant visuals and graphics that enhance the discussion are always welcome. PLEASE YOU HAVE TO INCLUDE EVERYTHING WHICH I HAVE MENTION ABOVE ,  As you find relevant sources that you will use, add it to the bibliography with a brief annotation.  The annotation should provide a high-level summary of the source and why the purpose for which you are using the source.  It could be helpful to highlight key quotes and/or excerpts as well. IT HAS TO BE IN A DIFFERENT FILE 

The World Wide Web Consortium (W3C) is an organization that promotes standardiza

The World Wide Web Consortium (W3C) is an organization that promotes standardiza

The World Wide Web Consortium (W3C) is an organization that promotes standardization of things like Hypertext Markup Language (HTML). There have been multiple versions of HTML that developers and browsers have had to learn and adapt to over the years. Discuss the advantages and disadvantages of standardization.