User:S0r47737/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1

 * Article title - Agile contracts
 * Article Evaluation:
 * Lead Section - the lead section does not address the article’s major sections.
 * Content - the article's content seems relevant to the topic. However, the content of the article seems to be out-of-date. The Approaches to Agile Contracts area does not explain that the items discussed are in fact the three types of Agile contracts.
 * Sources - the article’s sources are limited and dated. And, as such would benefit from adding more recent sources.
 * Organization and writing quality - the article is legible, and the information provided is helpful. However, the article would benefit from having sentences that served as bridge sentences to connect one point with another. The article does not appear to have grammatical or spelling errors. The article needs to restructure the information provided to allow for an easier to read format.
 * Talk page discussion – to this date, there is no commentary on the discussion talk page.
 * Overall impressions - the article is in its development stage and needs improvement. The article seems to be underdeveloped. The article needs to be improved by citing more recent sources.


 * Sources:
 * Balter, B. J. (2011). Toward a More Agile Government: The Case for Rebooting Federal IT Procurement. Public Contract Law Journal, 41(1), 149-171. Retrieved from http://proxymu.wrlc.org/login?url=https://www-proquest-com.proxymu.wrlc.org/scholarly-journals/toward-more-agile-government-case-rebooting/docview/913401491
 * Robert G. Cooper (2016) Agile–Stage-Gate Hybrids, Research-Technology Management, 59:1, 21-29, DOI: 10.1080/08956308.2016.1117317

Option 2

 * Article title - Big Data
 * Article Evaluation
 * Lead Section - the lead section does not address the article’s major sections and includes information that is not present in the article. The article does not really have an exhaustive definition of what Big Data is.
 * Content - the article's content seems to be all over the place. This article would benefit from delineating sub-topic areas that are summarized and hyperlink the different subtopics to their own page. As, it seems like a lot of the information included in this article page should be standalone article pages.
 * Tone and Balance- the article seems opinionated in some areas which gives the impression that it is biased towards a particular position. In addition, there are areas that are underrepresented, such as the Case Studies area.
 * Sources - the article has many sources to include current sources. The links provided in the article, for the most part, are working.
 * Organization and writing quality - the article is not well organized. Therefore, it is not easy to read.
 * Images and Media – the article does include images. However, one could argue that some of the images do not enhance the understanding of the topic. The images are well-captioned.
 * Talk page discussion – the discussion talk page has many comments some of which indicate the article has been written around mainstream opinions. And that due to the size of the article, the article needs to be reassessed.
 * Overall impressions - the article is poorly developed.


 * Sources
 * Farah, B. N. (2016). Big data - what data and why? Journal of Management Policy and Practice, 17(1), 11-17. Retrieved from http://proxymu.wrlc.org/login?url=https://www-proquest-com.proxymu.wrlc.org/scholarly-journals/big-data-what-why/docview/1788513651
 * Strang, K. D., & Zhaohao, S. (2017). Big data paradigm: What is the status of privacy and security? Annals of Data Science, 4(1), 1-17. doi: http://dx.doi.org.proxymu.wrlc.org/10.1007/s40745-016-0096-6
 * Strong, C. (2014). The challenge of “Big data”: What does it mean for the qualitative research industry? Qualitative Market Research, 17(4), 336-342. doi: http://dx.doi.org.proxymu.wrlc.org/10.1108/QMR-10-2013-0076

Option 3

 * Article title - Continuous Data Protection
 * Article Evaluation
 * Lead Section - the lead section does not address the article’s major sections and includes information that is not present in the article.
 * Content - the article's content is relevant to the topic. The content would benefit from having more up-to-date information. As noted on the talk page, the article would benefit by explaining how different regions are implementing continuous data protection.
 * Tone and Balance- the article appears to be written from a neutral point of view. But would benefit from including other viewpoints.
 * Sources - the article has few sources. In addition, the sources used are not based on the peer-reviewed publications or scholarly books. Some of the links provided are not working.
 * Organization and writing quality - the article is not concise. Although it does not have grammatical errors, it is not well organized and as such does not explain the topic well.
 * Images and Media – the article does not include images.
 * Talk page discussion – the discussion talk page is limited but has good recommendations on how to expand on the topic.
 * Overall impressions – I consider the article to be underdeveloped, it needs more work. In addition, it needs better sources.


 * Sources
 * N. Zhu and T. Chiueh, "Portable and Efficient Continuous Data Protection for Network File Servers," 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), 2007, pp. 687-697, doi: 10.1109/DSN.2007.74.
 * W. Xiao, J. Ren and Q. Yang, "A Case for Continuous Data Protection at Block Level in Disk Array Storages," in IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 898-911, June 2009, doi: 10.1109/TPDS.2008.154.
 * Yu, X., Tan, Ya., Sun, Z. et al. A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Human Comput 10, 2945–2954 (2019). https://doi.org/10.1007/s12652-018-0726-2
 * X. Li, C. Xie and Q. Yang, "Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel," 2008 International Conference on Networking, Architecture, and Storage, 2008, pp. 28-35, doi: 10.1109/NAS.2008.44.

Option 4

 * Article title
 * Article Evaluation
 * Sources
 * Sources
 * Sources

Option 5

 * Article title
 * Article Evaluation
 * Sources
 * Sources
 * Sources