What Was The Overarching Topic Of The Paper About Forensic Anthropology?
Saturday, December 28, 2019
Province And Its Biodiversity Inside It - 1520 Words
Introduction Indonesia is known for its diverse such as forest and its biodiversity inside it. Indonesia is an archipelago comprising of five noteworthy islands and around 30 little gatherings. The five fundamental islands are Sumatra, Java, Kalimantan, Sulawesi, and West Papua. The island of Sumatra is a standout amongst the most thickly populated and prolific islands in the Indonesian archipelago and the effects of Sumatra s territory use portion strategy. Indonesia is one of the five most species-diverse countries in the world, home to 12% of all mammal species, 16% of all reptile and amphibian species, and 17% of all bird species. It also contains 33% of insect species, 24% of fungi species, and 10% of higher plant species (Indonesia Rainforest Fact, n.d.). However due to the lack of control, Indonesian government does not strict the rules and regulations within its country, it makes a lot of troubles and one of the main issues is the forest fire which is took place in western part of Indonesia in Riau. There are 4 main points that will be discussed in the essay such as economic impact after the forest fire, politics of the problems, which is why could it happened, and international dimension, which is what other countries that has impact because of the problems. Impact on the economic in Indonesia Forest fire has a strong impact on the economic in Indonesia. After the forest fire case that was recently happened in Riau, Indonesia is now consideredShow MoreRelatedCase Analysis : Enbridge Inc.1401 Words à |à 6 Pagesparticularly from plausible dangers to the biodiversity in Alberta, and especially in British Columbia that host one of the last temperate rainforests remaining in the globe. The project is designed to travel through the Great Bear Rainforest, and across 773 watercourses that are crucial to ecosystems, which support wildlife and nearby communities (Harding, 2013, p. 45). Intensification of oil operations pose increased hazards that would ravage marine and land biodiversity. The possibility of around 225 oilRead MoreThe Report On The Uss Guardian Ran1698 Words à |à 7 PagesIntroduction In January 2013, the USS Guardian ran aground on the Tubbataha Reefs in the Palawan province of the Philippines, harming over 2,000 square meters of the protected environment (The Philippine Star 2014). As a result, the US Navy minesweeper had to be disassembled into several pieces in order to safely remove it from the reef without further damaging the corals. It is unclear of how the ship sailed off track and ended up in the shallow waters of the marine sanctuary. After over a yearRead MoreWater Pollution Control And Water Control Essay985 Words à |à 4 Pagesnatural gas for motor vehicles (NGV), gasohol, diesel palm, and biodiesel. Moreover, installing up the system inside the vehicles as using both natural gas and gasoline. - Developing products and services for safety and the environment. The development of LNG - Research ecosystems holistically from coast to hilltop in Thailand. To study biodiversity in the Mak forest of Khao Nan province. The results of the survey are information about the species the residence impacted to the result of global warmingRead MoreThe Chinese Foreign Ministry Website1481 Words à |à 6 Pagessovereignty claims, Vietnamese uses various documents to ââ¬Å"proveâ⬠it. For example, in a 1730 writing called Hai Quoc Do Chi, it is written that ââ¬Å"â⬠¦Truong Saâ⬠¦forms a rampart on the periphery of the Kingdom of Annam (Vietnam).â⬠A map of Kwangtung (Guangdong) Province and a description of the Quiongzhou Prefecture published in 1731 do not mention either the Paracels or the Spratlys as part of China. Secondly, the Ministry of Foreign Affairs asserts that systematic exploitation of the Paracelsââ¬â¢ resources startedRead MoreThe Food Revolution Of Cuba1525 Words à |à 7 Pages(Alteri et al, 1998) An interesting link is made with small-sca le farmers growing a wider variety of fruits and vegetables than large scale farmers, and in doing so they conserve unique cultivars that would have probably died out. This enriches the biodiversity because this diversity attracts birds and animals that would have also not survived the urban landscape. (Garnett, 1996) Socially we mostly think of gardening as a grass roots or hippie movement, or linked with poverty. This is something that hadRead MoreEssay The Extinction of The Dinosaurs1721 Words à |à 7 Pagessuspect list of possible dinosaur extinction events. During the latter part of the Cretaceous Period continents broke up causing volcanoes to erupt and fill the sky with gas and ash resulting in a drastic climate change (ââ¬Å"Dinosaurs Climate Change and Biodiversityâ⬠). The shifting of continents changed the Earthââ¬â¢s landscape, altering weather patterns and overall climate (ââ¬Å"Dinosaur Extinction Theoriesâ⬠). Also, over a long period of time, climate gradually changed. Ocean habits changed, temperatures grew muchRead MoreThe Munich Massacre : A Survivor s Story1487 Words à |à 6 Pageshomemade grenades. The series of attacks conducted by Xinjiang separatists left 16 police officers dead and shocked the Chinese authorities (Jacobs). The attacks originated from the c onflict between the Han Chinese and the Uighur based in Xinjiang province in China. In addition to the Uighur, the East Turkestan Terrorist Group also posed a threat to the Beijing Olympics. According to CNN, the Turkestan Terrorist Group forced the Chinese government to impose a security force of 100,000 and even includeRead MoreTable Mountain National Park and Cape Town4533 Words à |à 19 Pagesyour thing, youve come to the right place. As local troubadour David Krammers sing-along anthem for the Cricket World Cup has it, Welcome to Cape Town/Enjoy the party/Come in and have some fun/Cape Towns number one. The capital of Western Cape province and the parliamentary capital of the republic, Cape Town works in a way that so few cities on the African continent do. Historic buildings have been saved, businesses are booming, inner-city crime is coming under control and youll seldom be stuckRead MoreThe Effects Of Climate Change On Canadas National Parks2271 Words à |à 10 Pageswhy? 3. What can you do to reduce climate change in Canadaââ¬â¢s national parks? 4. How does the climate change in Canadaââ¬â¢s national parks affect North America as a whole? 5. How do you think that Canadaââ¬â¢s government should react towards climate change inside and outside of Canadaââ¬â¢s national parks? 6. What are the leading causes of climate change in Canadaââ¬â¢s national parks? 7. What are the environmental impacts of climate change towards Canadaââ¬â¢s national parks? (2) Changing Populations: Canadaââ¬â¢sRead MoreThe Effects Of Climate Change On Canada s National Parks2271 Words à |à 10 Pageswhy? 3. What can you do to reduce climate change in Canadaââ¬â¢s national parks? 4. How does the climate change in Canadaââ¬â¢s national parks affect North America as a whole? 5. How do you think that Canadaââ¬â¢s government should react towards climate change inside and outside of Canadaââ¬â¢s national parks? 6. What are the leading causes of climate change in Canadaââ¬â¢s national parks? 7. What are the environmental impacts of climate change towards Canadaââ¬â¢s national parks? (2) Changing Populations: Canadaââ¬â¢s
Friday, December 20, 2019
The Problems Of The World s Population - 1606 Words
The worldââ¬â¢s population has been increasing since the industrial revolution at a pace that has never been seen in human history, and with that growth comes the societal obligation of maintaining stable societies where everyone s basic needs are met. Among the most important of these needs is the drastically increasing demand to feed everyone. But just as technology sparked the industrial revolution that initially caused this problem, it has also been responsible for the innovative solutions weââ¬â¢ve created to solve it. For example, genetic engineering has been used as a tool to produce strains that require less nutrients, water and pesticides to grow. These strains also produce bigger yields on less land, and contain a higher nutrient density themselves. In addition, advanced growing techniques like vertical farming in controlled environments can create more food safety and security for growing metropolitan populations. In other words, although technology can create flaws inherent to the world it creates, it can, moreover, act as a powerful tool for solving those very problems. From the beginning of humanityââ¬â¢s long history to the start of the industrial revolution the worldââ¬â¢s population rose by approximately one billion, but in the less than two hundred years since then it has grown by over six billion more. This growth has naturally been followed by an increase in exploitation of the earthââ¬â¢s natural resources and agriculturally viable spaces to meet the world s dietaryShow MoreRelatedThe Obesity Epidemic Is A Problem Underlying The World s Population2019 Words à |à 9 Pages The obesity epidemic is a problem underlying the worldââ¬â¢s population and has only gotten worse over the decades. The processed food industry has almost conditioned the human mind to believe that the information they provide is genuine. Using various different techniques, the processed food industry has worked its way into the everyday life of most. It is very important that society takes into careful consideration the dangers of processed food, and are mad e aware of how the industry in a sense,Read MoreThe Development Of The World Population1528 Words à |à 7 Pageshistory, the development of the world population directly depends on the mode of social production, especially the level of development of productive forces. In the history, mankind got the tremendous progress in productivity often with the population rapid develop. In the primitive society, the primitive society s population birth rate and the mortality rate all maintained at about 50% because of the objective law and the social production mode. The number of the population maintain in a state of highRead MoreThe Current World s Population1409 Words à |à 6 Pagescurrent world s population is approximately seven billion people, and the amount of time that it takes for the population to increase by another billion is decreasing with each billion. According to the World Population Data sheet, there will be about eight billion people by the year 2020, and this is due to its continuation of growth (Southwick 159). A clear understanding of the causes and what might possibly happen is the first step to dealing with the population crisis. The world s human populationRead MoreWe Must Stop The Global System Essay1034 Words à |à 5 Pagesthe only planet in our galaxy that supports life. Unfortunately, our planet is suffering due to population and resource availability. If these problems are not recognized, and the appropriate actions are not taken to slow down or put an end to them, then the consequences could be overwhelming. The global system will need to adjust to this massive population growth. Over the past few decades, the world has seen major advancements in health and largely as a result, people are generally living longerRead MoreProbably The Greatest Ecological Problem Of Our Time Is1051 Words à |à 5 Pagesecological problem of our time is the rapid growth of the human population. During most of the time humans have lived on Earth, its population has grown fairly steadily and slowly. For example, between the years 10 000 and 500 a. the global population passed from 5 million to 100 million. By the year 130 00 of our era it reached 500 million, and by the beginning of the nineteenth century it had doubled to 1000 million. Since then there has been a real explosion of the human population, reaching moreRead MoreChina And Indi Driving Forces Of Overpopulation712 Words à |à 3 PagesEmre Can Aydà ±n Writing Assignment 104A 03/15/2015 China and India: Driving Forces of Overpopulation According to BBC, India s population reached nearly 1.21bn (India census: population goes up to 1.21bn). China is also has the population of 1.36bn according to Chinese Government (China Statistical Yearbook-2014). That s almost the half of the Earth s population. There are negative outcomes of this situation like poverty, depletion of resources and disturbed cultural structures. ActuallyRead MoreThe Overpopulation Of The World s Population1656 Words à |à 7 PagesMany people believe that today the world s population is already too large for everyone to live comfortably. Let us brainstorm for a while. According to the UN, we are living in the era of the most intense growth of urbanization. Right now, when the level of urbanization is quite high, the remains of the rural population of the planet dramatically swept into the city. Everyone knows that the urban life style helps to reduce the birth rate to a subthreshold level. This means that neither sharp jumpRead MoreAccording To The United Nations Population Fund, The World1239 Words à |à 5 Pagesto the United Nations Population Fund, the world population reached 7 billion on October 31, 2011. The previous milestone, the six billion mark, had been reached on October 12, 1999. This means t hat the number of inhabitants increased by one billion in only twelve years, that is, two million seven hundred thirty nine thousand seven hundred twenty six people per day. Although the growth rate has decreased from 2.08 percent in 1970 to 1.13 percent in 2016, by 2024 the population is expected to hit theRead MoreOverpopulation : Preserve The World1291 Words à |à 6 PagesOverpopulation: Preserve The World If there was a way to have a better life for you and your loved ones would you take it? Or would you rather not take the opportunity and struggle throughout the rest of your life, this will happen by world overpopulation. In the past, Overpopulation started out from the baby boom which increased the birthrate, and according to Ewan Mcleish the author of ââ¬Å"Overcrowded World, (16)â⬠he stated that it made 40% of the national population. Today, overpopulation is a nationalRead MoreFree Trade Agreement With Asian Countries1134 Words à |à 5 Pagesis extremely wasteful and providing any country with large populations that dwarfs the United States is an incredibly bad idea. The current population of the world consumes the worldââ¬â¢s renewable resources 15 percent faster than they can be replaced (Safina). The population of the world is expected to double in size by the end of this century requiring an additional 15 percent more of what already cannot be supplied (Safina). The world resources can only sustain 10 billion people living in huts
Wednesday, December 11, 2019
Concept of Business Intelligence
Question: Discuss about the Business Intelligence. Answer: Introduction This report is based on concept of business intelligence. BI is considered as a term that talk about variety of software applications that are required to use evaluation of organizational raw data. There are several related activities that build business intelligence such as data mining, reporting, online analytical processing and querying. Now in this report, we will emphasize on different topics related to business intelligence. These topics will help to understand important and usage of business intelligence. Discussion In this segment of report we will analyze three different articles related to business intelligence. Article-1: Synergy hones agile delivery with BI According to provided information in this article, Synergy is a Western Australian energy provider and it is using business intelligence and digital projects to improve capabilities of agile delivery. It will be done under CIO of Synergy. According to CIO, they are implementing two main programs to benefit from the agile drive. The first program is related to business intelligence stream of work to add value to the implementation of SAP HANA and another program is regarding digital stream to improve the way of interaction of customers with Synergy online. According to CIO of Synergy, agile methodology is a real journey for them and they are focusing on driving projects, products and services via the web by using agile methodology (Technet.microsoft.com, 2017). From analysis of business intelligence, we found four major capabilities of it that have potential to make BI effort work together. In next segment we will discuss that how these capabilities are helpful to make effort of BI together. The four synergistic capabilities of business intelligence are listed as below (Crozier and Crozier, 2017): Organizational Memory Information Integration Insight Creation Presentation Capability Organizational Memory This capability of business intelligence is related to the information storage and knowledge in easier to access form. Historical information and explicit knowledge accumulated over time in case of organizational memory. There are some factors that are necessary for organizational memory capability and those factors are technological progress, extensiveness of computers for creating and improving documents, presentations, to enhance use of emails, social media, and improvements in knowledge management technologies. This Business Intelligence capability is useful to make the BI effort work together in a way that it is associated with the ability of searching large enterprise content across multiple different databases. Other three capabilities depend on this BI capability directly and indirectly, because these capabilities can use knowledge over time, real-time content for decision making and for creating insights (Google Books, 2017). Information Integration This business intelligence capability is used to link past structured and unstructured data from different sources of information. As we know that, first capability of BI i.e. Organizational Memory is connected with past information. Therefore, Information Integration capability depends on Organizational Memory. In this linking process of data, some essential factors are included by information integration capability such as knowledge and structured information from ERP, systems related to transactions and knowledge sources, external knowledge and information from web mining and environmental scanning and unstructured knowledge and information from text mining and digital content management systems (SelectHub, 2017). This business intelligence capability is highly preferred to produce content from different sources that can be used further to produce insights which is next capability of BI. In this way, Information Integration capability also shows its togetherness with other BI capa bilities and from this it is cleared that BI effort work together. Insight Creation Insight creation is facilitated by Information Integration capability and Organizational Memory to create insight creations by providing integrated data, information and knowledge that establish the raw materials required for long-term and short term decision making and insight. Insight Creation Capability provides three kinds of outputs that is description of what happened, an understanding of what happened and a prediction regarding future behavior. For Example, the creation of insights can be used for BI efforts by an organization to identify the answers for questions like What supplementary products could be vending to our customers? and Which customers company is most likely to lose?. The input of insight creation capability is further used in next BI capability that is presentation capability. Presentation Capability This BI capability is used for appropriate reporting and balanced scoreboard tools, so that Business Intelligence can become more valuable to its users. Presentation capability is actually point of contact between BI solution and its user. This BI capability is focused on convenient features of the BI solution that include presentation of results in a customized and user-friendly form. For example: An airlines company has made excellent use of presentation capability of BI by using an effective Flight Management Dashboard. This interactive graphical user interface, together enable the operational staff to detect issues in network of flights and also manage flights accordingly to enhance customer satisfaction. It is a best use of BI efforts by Airline Company. On the behalf of above discussion, we can say that BI capabilities work together in above ways to make BI effort work together. Article-2: Netflix Purposely Designed House of Cards to be a Major HitHeres How They Did It On the behalf of above article, we will discuss that how Netflix was able to get it right but not Amazon for a TV show? There is no doubt that behind our TV shows, efforts of creative geniuses contribute a lot. But is it possible to attribute some of their popularities to data analysis as well? According to Munich based data scientist Wernicke said that optimum results are not always produce by data analysis. To prove this, Netflix and Amazon are served as examples here. Here are two shows which were made strategically with data analysis methods. One show worked on Netflixs House of Card and went on to score of 9.1 on rating curve. Another show worked on Amazons Alpha House and fell short and went on score of 7.5 on the rating curve. It was considered an average show. Both companies are competitive data-savvy companies and connecting millions of data points. But one company did well and another did not (Mazenko, 2017). Why it happened? Eventually, when Amazon set out for making data driven show then it held a competition. By Amazon, a number of ideas of shows were analyzed and eight of them were selected (OLAP.com, 2017). After doing all these things, an experimental episode created for each and also made available online free of cost. The episode was watched by millions of people and data regarding total number of viewers of this episode, how long this episode watched by them and which parts skipped by viewers, used by Amazon to create a show (SearchDataManagement, 2017). On another side, at same time Netflix was preparing something similar. But the difference here is instead of using a competition, Netflix viewed other platforms such as ratings, viewing history etc. This data was further used to discover small bits that what is actually liked by users. This was the main reason that show was successful on Netflixs House of Cards, not on Amazons Alpha House. On this, Mr. Wernicke gave explanation that Amazons show was not successful because they used data all the way. But Netflix concentrated on point that what users like the most and used that insight to think about a concept. That is why Netflixs show was a big hit. Here Insight Creation capability of Business Intelligence helps a lot of Netflix (Fda.gov, 2017). Article 3: Six Ways big Data is Driving Personalized Medicine Revolution In this segment we will emphasize on an essential question that how Business Intelligence can integrate safe clinical and personalized medicine to all stakeholders. As we know in field of medicine, drugs are expensive, difficult to research and hard to get approved. According to a report, it is found that most of drugs do not work on large parts of the population. In these case, pharmaceutical companies have pressure to research drugs that can be effective for people and must have highest probability of turning profit. But this can be done by IT and Big Data. Both technologies are putting major impacts on the way of researching drugs by creating more effective trails (InformationWeek, 2017). In the journal Nature represents that 10-highest best prescribing drugs in U.S work on only one patient among four. Multiple reasons are provided by Nature Journal, but the main reason is that, different genetic makeups, proteins in our body and body flora effect on working of drugs. After knowin g about these issues, drug companies are trying to address these criticism and try to make more accurate drugs. In this case business intelligence can also help in following ways (SearchBusinessAnalytics, 2017): Through BI, analytical modeling of biological processes is possible and through this drugs can become more sophisticated and widespread. Analytical modeling can help to identify new potential candidate fragments that has highest probability to being successful in development of drugs (Lazzaro, 2017). To identify safety or operational signals that are required to neglect important issues of unnecessary delays and argumentative events, the trials of medicine can be monitored in real time. (McKinsey Company, 2017). With the help of Big Data as BI application, the way of trails of designing and administrating treatments are changing. By using Big Data, correct and modified medicines are introduced to drug trails and research that reduces cost and improve outcomes.In this way BI can be used to integrate safe clinical medicines. References Crozier, R. and Crozier, R. (2017). Synergy hones agile delivery with BI, digital projects. [online] iTnews. Available at: https://www.itnews.com.au/news/synergy-hones-agile-delivery-with-bi-digital-projects-421297 [Accessed 12 Apr. 2017]. Technet.microsoft.com. (2017). Business Intelligence: Planning Your First Microsoft BI Solution | TechNet Magazine. [online] Available at: https://technet.microsoft.com/en-us/library/gg413261.aspx [Accessed 12 Apr. 2017]. Mazenko, E. (2017). Tableau Software Review. [online] Better Buys. Available at: https://www.betterbuys.com/bi/reviews/tableau-business-intelligence/ [Accessed 12 Apr. 2017]. SearchBusinessAnalytics. (2017). Collaborative business intelligence brings users together on BI. [online] Available at: https://searchbusinessanalytics.techtarget.com/feature/Collaborative-business-intelligence-brings-users-together-on-BI [Accessed 12 Apr. 2017]. Google Books. (2017). Business Intelligence. [online] Available at: https://books.google.co.in/books?id=T-JvPdEcm0oCpg=PA46lpg=PA46dq=how+four+bi+capabilities+work+together+to+make+BI+effort+work+togethersource=blots=Z3zzZt2SUVsig=TtvETNhoBwm_Q1Pma2epobT4fYwhl=ensa=Xved=0ahUKEwjVsf6htp7TAhUFpo8KHWiuDDgQ6AEIHzAB#v=onepageq=BI%20effort%20work%20togtherf=false [Accessed 12 Apr. 2017]. SelectHub. (2017). BI Capabilities List | Business Intelligence Capabilities. [online] Available at: https://selecthub.com/business-intelligence/list-bi-capabilities/ [Accessed 12 Apr. 2017]. SearchDataManagement. (2017). What is business intelligence (BI)? - Definition from WhatIs.com. [online] Available at: https://searchdatamanagement.techtarget.com/definition/business-intelligence [Accessed 12 Apr. 2017]. OLAP.com. (2017). What is Business Intelligence? BI Definition. [online] Available at: https://olap.com/learn-bi-olap/olap-bi-definitions/business-intelligence/ [Accessed 12 Apr. 2017]. Lazzaro, S. (2017). Netflix Purposely Designed House of Cards to Be a Major HitHeres How They Did It. [online] Observer. Available at: https://observer.com/2016/01/can-we-use-big-data-to-create-hit-tv-shows-as-addictive-as-breaking-bad/ [Accessed 12 Apr. 2017]. McKinsey Company. (2017). How big data can revolutionize pharmaceutical RD. [online] Available at: https://www.mckinsey.com/industries/pharmaceuticals-and-medical-products/our-insights/how-big-data-can-revolutionize-pharmaceutical-r-and-d [Accessed 12 Apr. 2017]. Fda.gov. (2017). Drug Safety Priorities 2016: Initiatives and Innovation. [online] Available at: https://www.fda.gov/Drugs/DrugSafety/ucm522941.htm [Accessed 12 Apr. 2017]. InformationWeek. (2017). 6 Ways Big Data Is Driving Personalized Medicine Revolution - InformationWeek. [online] Available at: https://www.informationweek.com/healthcare/analytics/6-ways-big-data-is-driving-personalizedmedicine-revolution/d/d-id/1322755 [Accessed 12 Apr. 2017].
Wednesday, December 4, 2019
Data Warehousing and Data Mining over Cloud â⬠MyAssignmenthelp.com
Question: Discuss about the Data Warehousing and Data Mining over Cloud. Answer: Introduction Kentico is an organization that is based out of Australia and deals in the domains of e-commerce along with online marketing. It provides web solutions and services to its customers which involves huge clusters of information. In order to deal with the information sets and streamline the activities, it has been decided by the senior management to move the database of the organization to cloud/NoSQL. It will provide enhanced storage options and will also carry out the operations on the data easily. SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis of the project has been explained and discussed in the report. Description ofcurrent/newICT service: In order to deal with the information sets and streamline the activities, it has been decided by the senior management to move the database of the organization to cloud/NoSQL. It will provide enhanced storage options and will also carry out the operations on the data easily. The volumes of information that Kentico deals with is dynamic in nature which may show sudden rise and drops in a specified period of time. It is essential that the design of the database is done in such a manner that the database is flexible and scalable in nature. The recommended cloud and NoSQL databases will fulfill the need and the feature of scalability will be present in the same. There are several users of the information that is associated with Kentico. These users may be internal to the organization and may also be external to the organization. The user privileges would therefore be required to be defined to control the access associated with each of the user type. Cloud and NoSQL databases will provide the opportunity as administration on the data will be convenient. The data in the database will be easily monitored and there would be automated backing up of the data that would be allowed with the use of cloud and NoSQL database. There will also be enhanced disaster recovery mechanisms installed with the use of the database. The management and financial team of the organization is efficient to carry out a detailed cost benefit analysis on the changes and will conclude that there will be a lot of cost savings with the implementation of the system. Due to the presence of traditional databases, there are a number of operational issues and errors that come which bring down the morale of the employees. With the involvement of cloud databases, these errors will be avoided which will not only enhance the levels of employee satisfaction but will also increase the level of productivity and efficiency. It is not always easy to accept the changes and adapt easily to them. There will be many changes that will be introduced with the implementation of cloud or NoSQL databases which will bring a lot many changes in terms of strategy, methodology along with operations. The employees may show resistance to adapt to the new system in the initial stages. There will be an extra share of costs that would be required to be spent towards training of the employees. Without providing the employees with the required amount of training, there will be confusion in their minds. It would therefore be necessary to spend on trainings. There may be chances wherein the specific skill sets required for the cloud databases and related operations may not be present in the organization. It will demand external hiring which will turn out to be an expensive procedure. The change in the database may be attacked with a lot many security risks and concerns which may become difficult to deal with (Hashizume, Rosado, Fernndez-Medina, Fernandez, 2013). Migration from the traditional systems to the new system will not take place in a few minutes. It will require a considerable amount of time which may be considered as a downtime for the system as there will be a lot of maintenance activities that will also be carried out. System availability may get impacted negatively due to these reasons. The processing speed associated with the data and data operations will improve and there will also be better streamlining of the information that will be observed. In spite of spending on the trainings of the employees, there will be a lot of cost saving that will be achieved with the medium of adaptation to the advanced databases. Cloud databases and NoSQL databases have a huge demand in the market. It would therefore be beneficial for the employees to acquire the skills associated with the same to enhance their worth in the market. The ability to carry out data related operations will become easy and convenient in case of Kentico which will provide the organization with a competitive edge above the rest of the organizations in the market. Time and effort that is currently involved in certain unnecessary activities will be available to be applied to rest of the important functions and activities to enhance the quality and availability of the system for better user experience Cloud databases along with NoSQL databases will bring in a lot many access points. These access points may be used by the attackers to gain unauthorized entry to the databases which may result in the security threat of information breaching (Amato, 2016). Many of the malware have been developed to attack the cloud databases which may be launched and triggered to cause damage to the information present in the database of Kentico (Jansen, 2016). The information will be exchanged frequently over the network which may bring in another threat in the form of information loss or information leakage. Networks will be actively involved with the inclusion of cloud databases which will lead to the emergence of the network security risks and attacks such as man in the middle attack, spoofing attacks, integrity attacks and many more (Pearson Benameur, 2016). Database availability will be desired by the end users and it will be mandatory for the execution of certain functions and operations. However, there may be attacks on the availability of the database which may bring down the levels of satisfaction of the end users (Kshetri, 2016) There are a lot many resources that are engaged with Kentico and these resources will be provided with the access to the database along with varied privilege on the same to perform data related operations. Some of the employees may take advantage of the privileges granted to them and may pass on the critical information to the malicious entities for their personal benefits. These attacks will come under the category of insider threats and will cause a lot of damage to the organization (Aws, 2016). Access and identity management are some of measures that are adapted to enhance the basic security of the system and any loopholes present in these measures will cause a lot of damage to the organization (Jing, 2014). It would be required to immediately create a training plan for the resources engaged with Kentico to allow the employees, management along with the heads of the departments to be clear on the features and functions of the new database that will be implemented. Security framework associated with the database and information sets will also be required to be modified with immediate actions taken on the security plan modification along with implementation of changes in the security strategy. It will be extremely necessary to ensure that the training plan and the security strategy that is created in the initial phase is implemented successfully and there are measures taken to bring improvements to the same by collecting the feedback from the users at regular intervals. Maintenance will be an ongoing process in the case of cloud databases along with that of the NoSQL databases. A detailed assessment of the level of improvements that will be necessary in terms of maintenance and support will be required to be done. The overall security infrastructure along with the security framework will also be required to be re-designed so that the latest measures can be adopted to enhance the basic as well as the advanced security of the database (Ryan, 2016). It would also be necessary to make sure that verification and validation activities are carried out in a frequent manner. Cloud Database and Associated Database Operations Expansion of cloud and NoSQL databases in the market has been rapid and there are a lot many organizations that are moving to these databases from the traditional ones. Cloud databases are the ones that make use of cloud computing for data storage along with the data management. NoSQL databases are the ones that do not involve the use of SQL queries and statements (Takabi, 2016). Due to the presence of traditional databases, there are a number of operational issues and errors that come which bring down the morale of the employees. With the involvement of cloud databases, these errors will be avoided which will not only enhance the levels of employee satisfaction but will also increase the level of productivity and efficiency. The volumes of information that an organization deals with is dynamic in nature which may show sudden rise and drops in a specified period of time. It is essential that the design of the database is done in such a manner that the database is flexible and scalable in nature. The recommended cloud and NoSQL databases will fulfill the need and the feature of scalability will be present in the same. Cloud databases and NoSQL databases have a huge demand in the market. It would therefore be beneficial for the employees to acquire the skills associated with the same to enhance their worth in the market. The ability to carry out data related operations will become easy and convenient in case of organizational implementation which will provide the organization with a competitive edge above the rest of the organizations in the market. Time and effort that is currently involved in certain unnecessary activities will be available to be applied to rest of the important functions and activities to enhance the quality and availability of the system for better user experience Data Warehousing and Data Mining over Cloud Business intelligence is an umbrella that comprises of numerous technologies and concepts within it. Two of the essential technologies that come under Business Intelligence are data mining and data warehousing. These technologies allow the user to carry out a detailed analysis of the data that is associated with the organization and to also manage the data easily and efficiently. Cloud databases also support the use and implementation of logical data warehouses which are also termed as Logical DW. There are several properties, attributes and parameters that are associated with the data sets stored in the database. Logical DW will provide a logical view of the entire information sets which will allow the administrators and data managers to carry out the tasks of monitoring and maintenance easily. Also, the analysis on the data will be easily carried out through the medium of these tools which will reveal a lot many trends and patterns associated with the data. There are several risks and attacks that are associated with the cloud and NoSQL databases in terms of the security of the data and information (Sen, 2016). Cloud databases along with NoSQL databases will bring in a lot many access points. These access points may be used by the attackers to gain unauthorized entry to the databases which may result in the security threat of information breaching. Many of the malware have been developed to attack the cloud databases which may be launched and triggered to cause damage to the information present in the database of an organization. The information will be exchanged frequently over the network which may bring in another threat in the form of information loss or information leakage. Networks will be actively involved with the inclusion of cloud databases which will lead to the emergence of the network security risks and attacks such as man in the middle attack, spoofing attacks, integrity attacks and many more (Bhabad, 2015). Database availability will be desired by the end users and it will be mandatory for the execution of certain functions and operations. However, there may be attacks on the availability of the database which may bring down the levels of satisfaction of the end users (Mahmoud, 2015). There are a lot many resources that are engaged with an organization and these resources will be provided with the access to the database along with varied privilege on the same to perform data related operations. Some of the employees may take advantage of the privileges granted to them and may pass on the critical information to the malicious entities for their personal benefits. These attacks will come under the category of insider threats and will cause a lot of damage to the organization. Access and identity management are some of measures that are adapted to enhance the basic security of the system and any loopholes present in these measures will cause a lot of damage to the organization (Sun, Zhang, Xiong, Zhu, 2014). Countermeasures to Data Security The security risks and threats that have been defined above can be controlled, prevented and detected with the application of a lot many security countermeasures (Lu, 2014). The primary step to security would be in the form of enhancement of the basic security of the database which will include the use of automated tools and equipment such as that of anti-malware packages along with anti-denial tools. It will also be necessary to install proxy servers and firewalls to control the access. The next step would include the enhancement of advanced security. The security strategy that shall be designed in this regard shall include the countermeasures in three categories as administrative, logical and physical controls. There shall be use of automated tools for evaluation and auditing purposes to make sure that any of the deviations are immediately tracked (Panetta, 2016). There shall also be application of logical and technical controls that shall be done on the database. These controls will include use of intrusion detection and prevention systems, implementation of encryption of information, authorized monitoring of the network and so on (Wood, 2016). Physical security is something that is usually not paid much attention; however, the case shall not be the same over here and physical security shall be enhanced across all the entry and exit points (Microsoft, 2016). Conclusion Data and information are the assets for any organization and it is extremely necessary to make sure that there is no damage caused to these assets and the operations that are executed around them are done in a smooth manner. The use of traditional databases in the organizations is creating a lot many problems in terms of handling, management and execution. It is therefore necessary to migrate to the cloud databases and NoSQL databases for efficient data management along with enhanced storage of the data. These databases will bring in a lot many benefits to the users in terms of processing speed, security framework, storage options, data backup and recovery measures and many more. Also, these are now being synced with the Business Intelligence and Big Data tools to enhance the quality and performance of the same. References Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 3 May 2017, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html Aws. (2016). Overview of Security Processes. Retrieved 3 May 2017, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf Bhabad, M. (2015). Internet of Things: Architecture, Security Issues and Countermeasures. Retrieved 3 May 2017, from https://www.ijcaonline.org/research/volume125/number14/bhabad-2015-ijca-906251.pdf Hashizume, K., Rosado, D., Fernndez-Medina, E., Fernandez, E. (2013). An analysis of security issues for cloud computing. J Internet Serv Appl, 4(1), 5. https://dx.doi.org/10.1186/1869-0238-4-5 Jansen, W. (2016). Cloud Hooks: Security and Privacy Issues in Cloud Computing. Retrieved 3 May 2017, from https://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-03-01.pdf Jing, Q. (2014). Security of the Internet of Things: perspectives and challenges. Retrieved 3 May 2017, from https://csi.dgist.ac.kr/uploads/Seminar/1407_IoT_SSH.pdf Kshetri, N. (2016). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Sciencedirect.com. Retrieved 3 May 2017, from https://www.sciencedirect.com/science/article/pii/S0308596112000717 Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Retrieved 3 May 2017, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures - IEEE Xplore Document. Ieeexplore.ieee.org. Retrieved 3 May 2017, from https://ieeexplore.ieee.org/document/7412116/ Microsoft. (2016). Core Infrastructure Optimization: IT Security Processes - Best Practices for Business IT. Retrieved 3 May 2017, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 3 May 2017, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/ Pearson, S. Benameur, A. (2016). Privacy, Security and Trust Issues Arising from Cloud Computing. Retrieved 3 May 2017, from https://barbie.uta.edu/~hdfeng/CloudComputing/cc/cc05.pdf Ryan, M. (2016). Cloud Computing Privacy Concerns on Our Doorstep. Cacm.acm.org. Retrieved 3 May 2017, from https://cacm.acm.org/magazines/2011/1/103200-cloud-computing-privacy-concerns-on-our-doorstep/fulltext Sen, J. (2016). Security and Privacy Issues in Cloud Computing. Retrieved 3 May 2017, from https://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf Sun, Y., Zhang, J., Xiong, Y., Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal Of Distributed Sensor Networks, 2014, 1-9. https://dx.doi.org/10.1155/2014/190903 Takabi, H. (2016). Security and Privacy Challenges in Cloud Computing Environments. Retrieved 3 May 2017, from https://csis.pace.edu/~marchese/SE765/Paper/security2.pdf Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 3 May 2017, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security
Subscribe to:
Posts (Atom)