The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago, 2 Days Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
I attached file just look at the last page which is has the requirement . just one page to write .
Â
The Hashtag Agency
                                                                              Â
o Background on the company
Â
The Hashtag Agency is an organization that was founded in 2016 that specializes in collecting data from social media websites through the use of complex software and applications. The Hashtag Agency turns social media hashtags into business intelligence that can be used in several ways to fit specific needs and to gain competitive advantage by organizations. For example, organizations can track their marketing campaigns performance based on how many hits their hashtags received on social media platforms, or they can use our agencies services to find new customers based on who is using their hashtag to talk about a particular brand, person, or event, and finally they can also use our services to help solve real-time business problems that can arise from disasters such as: recalls, product delays, or any negative press. Moreover, the Hashtag Agency has found a way to measure the success of marketing campaigns by following trends and tracking how often a product, person, or an event is being hashtagged about on all the social media websites including: Facebook, Instagram, Twitter, and LinkedIN. The Hashtag Agency takes in all this unsorted data and uses complex software to analyse it and to provide specific demographics about potential clients such as: age, sex, and marital status. It also provides other useful  information such as emails, full names, addresses, job titles, phone numbers, and other hashtags found linked under their names that can help organizations cross sell products or services to clients, or to segment markets.  In addition, the Hashtag Agency provides a platform that allows users to log in and view real time updates based on their hashtags. The Hashtag Agency has made it easy for organizations to get their hands on  information that has real value without having to go out and spend company resources on building their own software and applications, or to hire additional marketing personnel to track their online marketing campaigns using traditional methods that do not provide a real-time and accurate measure of success.
o Current issues with the company’s network
Â
We need to set up an API (Application Processing Interface) connectivity to our online request service to retrieve hashtag information from social media platform databases. In addition, we need to manage our users and monitor and analyze traffic for efficiency, quality and security. Therefore we may consider to outsource the service to a provider such as MuleSoft or create an API Manager ourselves. For our clients we will develop API Checks to monitor performance, relating to service-level agreement reports (SLA) for self-service, and customer support. We need to pull hashtag data via the social media APIs. The issue is whether the social media companies such as facebook provide a hashtag feature on their Graph API using HTTP requests.
Clients need to track, analyze and report how others are using their hashtags. Therefore, we have to do a competitor analysis on other social media hashtag grabbing tool providers such as Tagboard, and Talkwalker to determine their usefulness. We also can monitor the trending hashtags on various social media platforms and keep a record of them on our database for future analysis. This record will help better understand how people interact with the hashtags on the internet.Â
Â
Â
o Companies desired future state
Â
The Hashtag Agency desired future state is to have an application that communicates with all the social media platforms, and that is also capable of communicating with an in-house database such as Microsoft MySQL to record important data. In addition, at the Hashtag Agency our hope is also to run business analytics on sorted information so that we can provide all of this business intelligence to our clients, including access to some of this information in the format of Microsoft Excel files so that they can also run their own analytics reports on the data.  Furthermore, the Hashtag Agency desires to become a business intelligence organization that can provide both analytics and quality information to all types of businesses in need of its services, thus it will revolutionize the way that organizations use hashtags to gather customer intelligence. The company will have a superb security system in the future to keep the company’s and our clients’ information safe. The security of information is a necessity for every company in this field.
                                                                                              Â
Routing Protocol Considerations
               As we go higher up the OSI design structure, it is prudent to formulate certain design considerations in the sphere of routing. Routing considerations have gained more attention in recent times when it comes to the public Internet. Regardless of this newfound interest, there are specific areas that need serious consideration. The most vital are of routing is with regards to the security of the routing model (Hartpence, 2011). The reason is because routing protocols can be attacked with intent to achieve specific objectives such as traffic redirection, router DoS, and unwarranted route prefix origination among others. Attackers may, for example, configure and modify existing routers, introduce rogue routers, and may send malformed packets to a routing process.
For a company like The Hashtag Agency that is interested providing business intelligence to clients, routing considerations are highly essential. The company would need to use routing to secure their networks and applications so as to smoothly run their devices. The routing protocol must communicate with other routers (Macfarlane, 2006). It must have the ability to tell of the routines it knows of as well as the systems linked to other routers. Moreover, it must also be able to evaluate the best route to use. It should also be able to adapt to changes in the network as this will affect whether or not it can forward packets. The Hashtag Agency will need to overcome the routing risks outlined above in a number of ways. First, the company must secure the routers so as to mitigate the configuration modification of its routers. It will not simply secure the router but all the complimentary systems like TFTP servers. It can also make use of routing system message authentication to block the introduction of rogue routers from damaging the protocol. Moreover, Hashtag can counter excess packets by using DoS countering techniques. Lastly, it can use route analytics technology to as a best practice policy as it will provide the information needed to understand all the routing protocol information to create a dynamic and accurate routing topology.
                                                              Â
                                              Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Â
Security considerations
I have to write here some information about this topic which is Security considerations. regarding for that, this the name of out project company which is The hashtag Agency . How to Security considerationswork with our company the hashtag agency. I hope it is clear.
                              Â
                                                              Â
                                              Â
                              Â
Â
Â
Â
Â
Â
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll