150+ word reply to the following: Managing virtual machines There is a lot more to virtual machines besides just installing them. They do require a good deal of managing. A few of the management requirements are adding and registering virtual machines, changing power states, and removing or deleting virtual machines. While some virtual machines can be created from scratch in the system you can also get pre-created virtual machines. The problem with the pre-created VM’s is that you are required to put a registration code. Registering a VM allows it to be accessed in the vCenter Server. Registering a virtual machine is important because it allows you to see performance metrics and the storage system. Power states are very important when managing virtual machines. There are 4 initial power states as well as 2 additional guest power states power on/off, suspend, reset, shut down guest, and restart guest. Power on/off and reset are standard. Suspend allows you to close the machine and start it back up at a later date right where you left off. The guest power states are only available with VMware Tools. Sometimes removing or deleting a virtual machine will be needed. Although it seems similar the 2 actions actually entail different things. Removing a virtual machine means you want to keep the VM but dont necessarily need it listed in the inventory. Removing it allows you to keep the files while removing it from the inventory list. To re-add the removed VM you simply follow the regular adding or registering process. Deleting a VM is when the entirety of the virtual machine is no longer needed. It wont be listed in the inventory and it wont keep your files in the datastore. Unlike removing a VM, deleting is permanent. While there are other ways to manage a virtual machine, such as modifying them, these are among the simple but important ones.
The increased awareness of information security has provided an opportunity to learn more about specific incidents in the media. Find a newspaper or magazine article from the past three months that shows a conviction or the ongoing prosecution of a cyber crime perpetrator. Write a 600-1000 word reflection describing the crime and the conviction or ongoing investigation. In the References, make sure to cite the article using APA format.
Watch the documentary Cyberwars – Invisible Warfare. Give yourself time to watch it, as it is about 49 minutes long. It is suggested that you take notes as you are watching. Answer the following questions in 600-1000 words: Here is the link to the video: https://youtu.be/65hQnzIo59s 1.) What is a cyberwar, and how is it different from a traditional war? 2.) Can you prepare for a cyberwar? If so, what can you do? 3.) Describe what you learned about the countries and leaders involved? 4.) Describe at least two of the major policy changes that have resulted from the threat of cyberwars.
In this project, you will be expected to do a comprehensive literature search and survey, select and study a specific topic in one subject area of data mining and its applications in business intelligence and analytics (BIA), and write a research paper on the selected topic by yourself. The research paper you are required to write can be a detailed comprehensive study on some specific topic or the original research work that will have been done by yourself. Requirements and Instructions for the Research Paper: 1. The objective of the paper should be very clear about subject, scope, domain, and the goals to be achieved. 2. The paper should address the important advanced and critical issues in a specific area of data mining and its applications in business intelligence and analytics. Your research paper should emphasize not only breadth of coverage, but also depth of coverage in the specific area. 3. The research paper should give the measurable conclusions and future research directions (this is your contribution). 4. It might be beneficial to review or browse through about 15 to 20 relevant technical articles before you make decision on the topic of the research project. 5. The research paper can be: a. Literature review papers on data mining techniques and their applications for business intelligence and analytics. b. Study and examination of data mining techniques in depth with technical details. c. Applied research that applies a data mining method to solve a real world application in terms of the domain of BIA. 6. The research paper should reflect the quality at certain academic research level. 7. The paper should be about at least 3000-3500 words double space. 8. The paper should include adequate abstraction or introduction, and reference list. 9. Please write the paper in your words and statements, and please give the names of references, citations, and resources of reference materials if you want to use the statements from other reference articles. 10. From the systematic study point of view, you may want to read a list of technical papers from relevant magazines, journals, conference proceedings and theses in the area of the topic you choose. Suggested and Possible Topics for Written Report (But Not Limited) Supervised Learning Methods: Classification Methods: Regression Methods Multiple Linear Regression Logistic Regression Ordered Logistic and Ordered Probit Regression Models Multinomial Logistic Regression Model Poisson and Negative Binomial Regression Models Bayesian Classification Naïve Bayes Method k Nearest Neighbors Decision Trees ID3 (Iterative Dichotomiser 3) C4.5 and C5.0 CART (Classification and Regression Trees) Scalable Decision Tree Techniques Neural Network-Based Methods Back Propagation Neural Network Supervised Learning Bayes Belief Network Rule-Based Methods Generating Rules from a Decision Tree Generating Rules from a Neural Net Generating Rules without Decision Tree or Neural Net Support Vector Machine AdaBoost (Adaptive Boosting) XGBoost GBM Ensemble Methods Bagging and Boosting Random Forest RainForest Fuzzy Set and Rough Set Methods Unsupervised Learning Methods: Clustering Methods: Partition Based Methods Squared Error Clustering K-Means Clustering (Centroid-Based Technique) K-Medoids Method (Partition Around Medoids, Representative Object-Based Technique) Bond Energy Hierarchical Methods Agnes(Agglomerative vs. Divisive Hierarchical Clustering) BIRCH (Balanced Iterative Reducing and Clustering Using Hierarchies) Chameleon (Hierarchical Clustering using Dynamic Modeling) CLARANS (Clustering Large Applications Based Upon Randomized Search) CURE (Clustering Using REpresentatives) Density Based Methods DBSCAN (Density Based Spatial Clustering of Applications with Noise, Density Based Clustering Based on Connected Regions with High Density) OPTICS (Ordering Points to Identity the Clustering Structure) DENCLUE (DENsity Based CLUstEring, Clustering Based on Density Distribution Functions) Grid-Based Methods STING (Statistical Information Grid) CLIQUE (Clustering In QUEst, An Apriori-like Subspace Clustering Method) Probabilistic Model Based Clustering Clustering Graph and Network Data (For Example, Social Networks) Self-Organized Map Technique Evaluation and Performance Measurement of Clustering Methods Assessing Clustering Technology Determining the Number of Clusters Measuring Clustering Quality Association Rule Mining Evolution Based Methods: Genetic Algorithms Applications: Data Mining Applications for Business Intelligence and Analytics Text Mining Spatial Mining Temporal Mining Web Mining Others: Over fitting and Under fitting issues Outliers Performance Evaluation and Measurement Confusion Matrix ROC (Receiver Operating Characteristic) AUC (Area Under the Curve) Data Mining Tools XLMiner RapdiMiner Weka NodeXL TensorFlow
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.