Tuesday, October 23, 2018

Elevator Pitch

Elevator Pitch

Hello Professor Daun, my name is Patrick Dileo and if I can have a minute of your time I would like to talk to you about cloud computing. As you may know cloud computing is something that we encounter almost everyday but we don’t realize it. We are consistently using cloud setups such as google drive and apple icloud to save our personal information that we want to keep to ourselves. We have the ability to save one thing to our computer and then pull out a phone, tablet or laptop and open it up on their. This way we can always have our data or information no matter where we go. Cloud computing sounds great on paper with being able to access files and such from any device but there is a big problem when it comes down to it. The number one problem that not only me but others have with cloud computing is the idea of someone else hacking into the cloud and getting a hold of all your personal information. Just imagine someone hacking into a big business who keeps track of all it’s customers and employees’ personal information through the cloud. That person now knows all of everyone’s information and nothing good could come out of that. The bottom line is that cloud computing has its pros and cons but if you’re not careful enough all you hard work can be gone in a second, that’s why I would like you to help me with an ACURA project that can help protect cloud computing against cyber-attacks.

Tuesday, October 16, 2018

PB2B



Pat Dileo

PB2B: Examining the Rhetorical Features of Scholarly Articles (800+ words)

Part 1: Commit to 2 scholarly journal articles by researchers in the same discipline that examine similar phenomena.

The first scholarly journal article that I picked for my research project is “Study of Mobile Cloud Computing Security against Cyber Attacks” by Ms. Ankita S. Koleshwar, Mrs. S. S. Sherekar and V.M. Thakare. The second scholarly journal article that I picked for my research project is “Addressing Cloud Computing Security Issues” by Dimitrios Zissis.

Part 2: Focus on the content of each piece. How have these researchers studied this phenomena in similar and different ways? How have they defined/described concepts in similar or different ways? And how do they “operationalize” or measure those same concepts, if at all? Describe their research methods. What questions were posed? What’s each scholar’s argument?

The first scholarly journal article that I will focus on is “Study of Mobile Cloud Computing Security against Cyber Attacks”. The way that the three researches who wrote this article studied this topic is by reading and pulling information from other scholarly journal articles. Some questions that I have for this article specifically is how they organized all three of the writers information and brought it together to make a well flowing article. The scholars’ argument in this piece is that there are three ways to deal with attacks in network, Detection, Prevention and Countermeasures. The second scholarly journal article that I will focus on is “Addressing Cloud Computing Security Issues”. The way that the researcher of this article studied this topic was the same as the authors of the first articles, he also pulls information and data from other scholarly journal articles. The scholar’s argument for this article is that cloud computing is changing the way we use technology and we must find a way to eliminate cyber attacks.

Part 3: Focus on the construction of each piece. Describe how and why these scholarly journal articles are a unique genre. What are their conventions? Affordances and constraints? How would you describe their rhetorical features? What’s each author’s purpose? Who is their audience, and what clues tell you this? How would you characterize their writing style? And lastly, how is each piece organized/structured -- what logic is behind the writer(s) organized/structured it in the way that they did?

The reason that these scholarly journal articles are their own unique genre is because the purpose of a scholarly journal article is to provide or present new knowledge on a problem or a matter. Another reason that scholarly journal articles are their own unique genre is because of their intended audience. All scholarly journal articles share the same audience in the sense that their target audience is other scholars that are in the same field as them. After looking throughout both of the scholarly journals articles I have came to the conclusion that the authors’ purposes are to help other scholars in their field conduct their own research. The reason I came to this conclusion about the purpose is because there is so much information within the articles that the only people that would read through all of the articles has to be someone who is doing their own research and needs references. The way that both of the scholarly journal articles are organized is by having the abstract on top which contains a quick summary of what you’re about to read, followed by keywords that can be found various times throughout the articles. After the keywords, you will find the introduction, followed by the body paragraphs and closed out by the conclusion. At absolute end of the paper you will find references that the scholar has used in order to write his article.

Part 4: Which specific aspect(s) of these two scholarly articles strike you as the most important? The most interesting? And why?

One specific aspect of these two scholarly articles that strikes me as the most important and interesting is the amount of detail and clarification that is put into these scholarly articles. When I am reading these two articles the only thing I can think about is how the authors really know what they talking about and how they are summarizing their main points in a way to make sure that someone who is interested in the topic, like me, can go in and understand and learn from the article. Another thing that I found really important is that before the introduction to the article, they have an abstract and keywords section. The reason I find this really important is because for someone who is looking for a topic that is very specific, I can read the abstract to get a quick understanding about what the article is about and look at the key words and figure out whether this article is something I should read through.

Wednesday, October 10, 2018

PB2A

Part 1
The academic discipline that I find most interesting is my major, Computer Engineering. The professor that I chose to go along with my major is Qiang Duan. Professor Duan has a Ph.D. in Electrical Engineering, a M.S, in Telecommunications and Electronic Systems and a B.S. in Electrical and Computer Engineering. Some of Professor Duan's research interests include data communications and computer networking, the next generation Internet, the service-oriented architecture and network-as-a-service, Cloud computing, and Web services.
Part 2
One of the topics that Professor Duan studies that I find very intriguing is next generation internet. I don't know what next generation internet is exactly but just the name of it draws my attention and makes me want to learn more about it. This would be my top option if I had to devote a long time studying something in this field but other options include cloud computing and service oriented architecture.
Part 3
How safe is all your personal information and data when using cloud computing from cyber attacks?
How safe is all your personal information while using cloud computing compared to using a personal computer?
Part 4
Security, Server, Storage, Privacy, Information, Data, Cloud, Cyber Attacks, Iphone, Safe
Part 5
  • Zissis, Dimitrios, and Dimitrios Lekkas. "Addressing Cloud Computing Security Issues."Future Generation Computer Systems, vol. 28, no. 3, 2012, pp. 583-592.
  • Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. "Security in Cloud Computing: Opportunities and Challenges." Information Sciences, vol. 305, 2015, pp. 357-383.
  • Henry, Stefan, and Md L. ALI. "Cloud Computing Security Threats and Solutions." I-Manager's Journal on Cloud Computing, vol. 4, no. 2, 2017, pp. 1.
  • Ogigau-Neamtiu, Florin. "cloud Computing Security Issues." Journal of Defense Resources Management, vol. 3, no. 2, 2012, pp. 141-141.
  • Sudha, M. R. "Efficiency of Security Privacy in Cloud Computing." International Journal of Advanced Research in Computer Science, vol. 6, no. 8, 2015.