Explain how eBay is using BI tools to remain successful and competitive? Tableau

Explain how eBay is using BI tools to remain successful and competitive?
Tableau is revolutionizing business analytics, and this is only the beginning. Visit the Tableau website and become familiar with the tool by watching a few of the demos. Once you have a good understanding of the tool, create three questions eBay might be using Tableau to answer, including the analysis of its sales data to find patterns, business insights and trends.
s.

Instructions The learning outcome of the unit addresses the use of auditing tool

Instructions The learning outcome of the unit addresses the use of auditing tools to determine network health. For firewalls, this generally includes an internal logging faction and tools like intrusion detection systems (IDS) and intrusion prevention systems (IPS). This unit also explores how these concepts are used in IT within practical, real-world scenarios. Assignment Instructions: Assume that you are a newly hired IT security manager. Your company has reported rapid growth but has had a hard time keeping up with security demands. Recently, unexpectedly, they lost their network administrator who also handled security. After completing your assessment of the network, the security policies, and the tools being used, you have discovered that auditing tools and logs have not been used properly. You also discovered that the company does not currently have intrusion detection systems (IDS) and intrusion prevention systems (IPS) tools. You are charged with explaining the deficiencies to senior management. You also want to justify the purchase of IDS and IPS tools for the company. Create a PowerPoint presentation of at least six slides that explains the following tools: 1. Logs: Explain the purpose of monitoring logs, their importance in understanding threats, what information the logs contain, and their relevance as an auditing tool in determining network health. 2. IDS/IPS tools: What are they, and how do they work? How may they be used as auditing tools in assessing network health? 3. Be sure to provide examples of how these tools should be used in your organization. Be sure to cite all sources used in a references slide with proper APA formatting. Title and references slides are not included in the total slide count. You may also use the speaker notes function to show how your PowerPoint would be presented and to provide a transition from one slide to the next.

Practical coursework: The coursework has two elements. A design and implementati

Practical coursework: The coursework has two elements. A design and implementation of a small database, and design and implementation of a spreadsheet model. No specific brands of software are required to be used, but typical examples would be Excel for spreadsheets and Access for databases. A student can equally use other software, for example the free to download open source desktop software available, including Apache OpenOffice https://www.openoffice.org/ or LibreOffice https://www.libreoffice.org/. two seperate documents are required, refer chapters 2, 18 and 19 on attached document

You will need to browse through this list of top professional organizations rela

You will need to browse through this list of top professional organizations related to the IT industry which grant specific certifications: • Association of Computer Engineers and the Association of Computer Engineers and Technicians (ACE – ACET). No date. ACE – ACET. https://www.ace-acet.org/ • Building Industry Consulting Services International (BICSI). No date. No title. https://www.bicsi.org/ • CompTIA. No date. No title. https://www.comptia.org/ • Global Information Assurance Certification (GIAC). No date. GIAC Certifications: The Highest Standard in Cyber Security Certifications. http://www.giac.org/ • International Association of Privacy Professionals (IAPP). No date. No title. http://www.iapp.org/ • The International Information System Security Certification Consortium (ISC)2. No date. No title. www.isc2.org • Information Systems Audit and Control Association (ISACA). No date. No title. http://www.isaca.org/ • The Open Group. No date. The Open Group: Making Standards Work. http://www.opengroup.org/ • Project Management Institute (PMI). No date. No title. https://www.pmi.org/ Please respond to the following in a substantive post (3/4–1-page): • Select three of these organizations that are most relevant to your Software Engineering goals. • Explain the purpose and focus of your three selected organizations. • Describe how joining and participating in these three organizations could help you begin your career as a Software Engineering. Be sure to provide full citations and references

1. What are the principal problems with multi-tier software architectures? Expla

1. What are the principal problems with multi-tier software architectures? Explain how a microservices architecture helps with these problems. 2. Imagine that your software includes a feature that can automatically create a contents list for a document or book. Propose tests that you might develop to test this feature. It is described by the following user stories: ***As a user, I want to automatically create a contents list for my document that includes all of the headings that I have marked up in my text. ***As a user, I want to be able to identify elements of a contents list and mark these up at different levels. 3. Explain how the use of Git and a shared public Git repository simplifies the process of managing open-source development when many developers may be working on the same code. Justify your response.