Medical technologies

After witnessing your presentation to the staff of the multi-specialty group practice the office manager and physicians are impressed and asks you to conduct more in-service training regarding the future of health information technology in the office.
Choose and discuss three medical technologies from the following list that are forecast to improve or otherwise change in the future. Give at least one example of how each might be applied in medical situations.
Computer hardware
Data storage
Wireless technology
Networking bandwidths and data compression
Data storage retrieval
Security and encryption
Internet
3-D computing
Database software
Sensors
Social media

How embedded computers and the IoT impacted your daily life

 

 

How have embedded computers and the IoT impacted your daily life? What additional uses can you see yourself using? What security or other risks might you encounter with IoT? Provide significant discussion information with APA citations for quotes or paraphrases and provide the research link that you have used to help you understand the question.

Cluster Analysis: Advanced Concepts and Algorithms

For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
Describe the change in the time complexity of K-means as the number of clusters to be found increases.
Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
Explain the difference between likelihood and probability.
Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Use of elements and principles of design

As you learned from the Module Two resources, the use of elements and principles of design can make or break the success of a visual message. For your initial discussion post, find a web banner, magazine layout, print advertisement, or flyer that either uses elements and principles of design effectively, or that uses elements and principles of design poorly. Then, address the following questions:
• Which elements and principles of design were used well? Why do you believe they were used well?
• Which elements and principles of design were used poorly? Why do you believe they were used poorly?
• What is the message the visual communication is intending to convey? Do you feel it is successful?

Configuration Management

 

In a paper of approximately 500 words (2 pages), double-spaced and in APA format, address the following topics. Your paper should be based on the articles by Boehm et al. and Saleem et al.
What does configuration management do?
What configuration tools were implemented in the situations described in the articles?
Why do you think the configuration tools used in the studies were chosen?
What is software dependability?
Provide examples of software dependability.
How does software dependability affect return on investment (ROI) as presented in the Boehm et al. article?

Computer forensic incident.

Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.

View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.

Instructions

Write a 2–3 page paper in which you:

Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.

Moving to the cloud

Take on the role of a Cloud Consultant explaining to a client why they should or should not consider moving to the cloud. You can choose the type of business that the client runs. Create a two-page (double-spaced, APA format) justification to support your position of moving (or not moving) to the cloud by addressing the following issues at a minimum:
Security
Cost
Support
Maintenance
Replacement
Updates
Personnel Expenses
Infrastructure Expenses

 

 

 

Pieces of software that you use or want to learn to use

Consider two pieces of software that you use or want to learn to use (you cannot consider Word, PowerPoint, or Excel® for the purposes of this assignment). Is the software you chose proprietary, or is it open source? How do you know? If it is proprietary, find an open-source alternative (For example, if you are looking for a proprietary word processing program, you might choose OpenOffice Writer.).

What are the benefits and drawbacks of using proprietary software?

What are the benefits and drawbacks of using open-source software?

Are there any drawbacks or benefits that are particular to the software you wrote about?