Tasks There are ten (10) tasks, one for each week: the tasks are detailed below.
ID: 3876036 • Letter: T
Question
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. An example of a completed task is below. Note the first response is good – so aim for something like this. The second response is not acceptable, so if you submit anything like it, you won’t pass the assignment! The reasons? Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content).
Example
Task
Find two resources that explain aspects of IT Service Management.
(Good Response)
Title and Reference:
COBIT versus ITIL
Ibaraki, S 2014, online, COBIT versus ITIL, viewed 29/01/2015, <http://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-versus-itil.aspx>.
Summary:
This resource is a blog entry discussing the differences between CoBIT and ITIL. I chose this resource as there is a lot of confusion about the way in which ITSM is applied and the distinction between the CoBIT and ITIL implementations is frequently unclear. Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and “how-to” processes. The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why’ and ITIL providing the ‘how’ because both ITSM mechanisms have considerable overlap and both need to be used at the same time. I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.
(Bad Response)
Title and Reference:
http://en.wikipedia.org/wiki/IT_service_management
Summary:
This pages talks about ITSM.It says that IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers, and is performed by the IT service provider through an appropriate mix of people, process and information technology.
Note: Each resource summary should be a maximum of 300 words.
Week 1
Task
The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main featuresand applications of two mass storage technologies namely: direct-attachedstorageand network-attached storage.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 2
Task
Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint.Discuss the main benefits of real-time operating systems for the health sector.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 3
Task
Mobile Cloud computing has gained a wide acceptance for organisations as well as individuals by introducing computation, storage and software based services. Explain the security and privacy issues in relation to the use of the mobile Cloud computing in the finance sector.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 4
Task
TCP/IPis consists of communication protocols used to transfer packets between computer hosts within the network. In TCP/IP, the transport layer is responsible for providing the application layer with session and datagram communication services. Discuss the common standards at the transport layer.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 5
Task
The Internet of Things (IoT) is a system of interrelated computing devices that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.Discuss the cyber security challenges faced by the health sector in thisIoT era.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 6
Task
Internet of Things (IoT) Cloud is a model designed to facilitate the information society, enabling advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies through ennoblement of ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Explain the importance of real time data capture capability, data visualisation, data analytics, and API protocols in the application of IoT Cloud.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 7
Task
A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests, backgrounds, and activities.However, there are different security and privacy threats that target every user of social networking sites. Provide five solutions to deal with these security threats.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 8
Task
Big data has been considered to be a breakthrough technological development over recent years. Big data is based on large volumes of extensively varied data that are generated, captured, and processed at high velocity. Discuss the main challenges as well as the social and economic values for organisations in adopting big data.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 9
Task
There has been a growing interest in the application of agile and lean practices for software development. Discuss the benefits of agile and lean practices and their impacts on project constraints.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 300 words discussing what the resource is about and why it is relevant to the task here>
Week 10
Task
The availability and implementation of information and communication technologies (ICT) is increasingly vital to all dimensions of a nation’s inclusive, equitable and sustainable economic development and growth strategies. Discuss how ICT is fundamentally changing the nature of economic, environmental, and social relationships globally.
Summary
Title and Reference:
<Provide the Title of the resource and full Harvard reference here. This should include the URL of the resource>
Summary:
<Provide a summary of no more than 150 words discussing what the resource is about and why it is relevant to the task here>
Example
Task
Find two resources that explain aspects of IT Service Management.
(Good Response)
Title and Reference:
COBIT versus ITIL
Ibaraki, S 2014, online, COBIT versus ITIL, viewed 29/01/2015, <http://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-versus-itil.aspx>.
Summary:
This resource is a blog entry discussing the differences between CoBIT and ITIL. I chose this resource as there is a lot of confusion about the way in which ITSM is applied and the distinction between the CoBIT and ITIL implementations is frequently unclear. Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and “how-to” processes. The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why’ and ITIL providing the ‘how’ because both ITSM mechanisms have considerable overlap and both need to be used at the same time. I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.
(Bad Response)
Title and Reference:
http://en.wikipedia.org/wiki/IT_service_management
Summary:
This pages talks about ITSM.It says that IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers, and is performed by the IT service provider through an appropriate mix of people, process and information technology.
Explanation / Answer
Dear student,
PFB the answer,
Week 1:
Summary:
Title = direct-attachedstorageand network-attached storage (https://en.wikipedia.org/wiki/Direct-attached_storage ,https://en.wikipedia.org/wiki/Network-attached_storage)
Summary =
1. Direct-attached_storage = Is a storage system where servers are directly connected to the storage device. In DAS, block-level access protocol is used to access data by applications. And in this article we will know little more about “Direct Attached Storage” and its type.
Some of the examples of Direct Attached Storage (DAS) are tape libraries, directly connected external hard disk, internal HDD of server, etc. Even home personal computers has direct-attach storage in the form of internal HDD.
2. Network-attached storage (NAS) = It is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration. It is often manufactured as a computer appliance – a purpose-built specialized computer. NAS systems are networked appliances which contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.
----------------------------------------------------------------------------------------------------------------------------------------
Week 2:
Summary:
Title = Real-time operating systems for the health sector. (https://hitinfrastructure.com/news/real-time-operating-systems-support-healthcare-iot)
Summary =
There is no doubt that real time operating system are beneficial wherever they are used, but they need to be designed properly. But particularly for monitoring equipment, it is essential to use an RTOS, preferably with communications disabled until software uodates are to be installed under personal supervision, because the implications of rogue software in health systems can be fatal.
Advantages include:
• development in a good manufacturing process/quality management environment (for example, ISO 9001)
• validation of functional safety claims, including testing data, proven in use data and design verification, with the appropriate certification (such as IEC 61508 and IEC 62304)
• a tool set that can provide concrete evidence of functionality and behaviours in a given system: code coverage, system profiling and memory analysis artefacts.
----------------------------------------------------------------------------------------------------------------------------------------
Week 3:
Summary:
Title = Security and privacy issues in relation to the use of the mobile Cloud computing in the finance sector. (https://dl.acm.org/citation.cfm?id=3067300.3067315)
Summary =
1) Authorized user access: the potential risk of
exposing organizational data over an external processing
platform, due to the limited physical, logical and personal
controls outside the organizational boundaries.
2) Conformance to regulations: Processing data
outside the organizational boundaries is still subject to
accountability measures, for instance in case of auditing
an external third-party space.
3) Storage space: cloud customer has no clue
about the exact location of their data that requires service
provider commitment to comply with privacy
restrictions.
4) Data separation: clouds hold the customers’
data over a shared place where data segments are not
stored in sequential manner, for that a reliable and welltested
encryption schemes are needed.
5) Recovery: service providers are supposed to make it
clear how they will handle disasters and failures.
6) Investigation: breach or intrusion attempts are hard to
be tracked and spotted over the cloud due to the
dispersion of the data and resources. While in some
cases it could be impossible because of the high
complexity level.
7) Long-term viability: if a rare case of service provider
bankruptcy or acquisition occurs there should be a
guarantee of data availability. An organization needs to be
sure that it will not lose a huge amount of important data
on the long-run.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.