Discusses the concept of virtualisation

Assignment Help Computer Networking
Reference no: EM131503485

General Information -

The purpose of this assignment is to select and discuss relevant online resources that exemplify the application of the topic(s) nominated each week (1 - 10). This assignment can (and should!) be completed progressively (i.e. each week). There are ten (10) tasks, one for each week: these are detailed and in the template (attached).

What do I need to do?

There are ten (10) tasks, one for each week:  the tasks are detailed below (and in the template file).

Each task requires you to collect and summarise one (1) publicly available online resource. The resource summary should be around 200-300 words. You should collect interesting and relevant resources that address the task. The resources should be easy to read and describe the topic/technology concisely and simply.   The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics).  These can include (but are not limited to) online magazine/news articles, technical reports or documentation.

Your summary should briefly explain:

  • What the resource is about.
  • Why you selected it.
  • What are the main points or key information covered in the resources.
  • Why the resource was useful.

Tasks -

1. The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers.  Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).

2. The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up "Linux Distribution" if you don't know what that means). Find and summarise a resource that describes the features and advantages of ONE of these distributions.

3. The text discusses the concept of virtualisation. There are several "type 2" or hosted virtualisation products (software) on the market (both commercial and open source).  Find and summarise a resource that describes the features and advantages of ONE of these products.

4. TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).

5. Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.

6. Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure.  Find and summarise a resource that describes ONE example of an organisation's ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations.  For example, you might want to search for "data centre fire" or "network cable earthquake" to find suitable resources.

7. The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal.  Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.

8. With the advent of mass data collection and storage has come a surge of instances of data theft.  Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.

9. The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies.  Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.

10. Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.

Attachment:- Assignment File.rar

Reference no: EM131503485

Questions Cloud

An anti-virus software running on your machine : Identify whether you have an anti-virus software running on your machine and from which company.
Comments in the general declarations section : For this project, create a new application and apply what you learned in this unit to the new application. Be sure to add the following to your interface:
Demonstrates mastery of understanding foundations and models : Design a 10-15 slide digital presentation that demonstrates mastery of understanding Foundations and models and Teaching strategies for students with EDB.
Create a new application : Create a new application and apply what you learned in this unit to the new application. Be sure to add the following to your interface:
Discusses the concept of virtualisation : The text discusses the concept of virtualisation. There are several "type 2" or hosted virtualisation products (software) on the market
Develop a survey to collect feedback from the employees : Develop a customer service training implementation plan and determine the method of training.Develop a survey to collect feedback from the employees.
Means of supporting their local university information : Can-D decided to involve a summer intern as a means of supporting their local university information technology program.
Number of objects in the file : You should assume that you do not know the number of objects in the file and detect the end of file when an EOFException is thrown by the readObject method.
Abstract superclass encapsulating a vehicle : Write an abstract superclass encapsulating a vehicle: A vehicle has two attributes: its owner's name and its number of wheels.

Reviews

len1503485

5/22/2017 3:31:03 AM

Australian student, need all the weeks to be done as per the guidelines. You are required to submit a single document in Microsoft Word format (.doc or .docx). Use the template as the basis for your submission. Apart from providing your response to the weekly tasks, do not modify the document - especially do not delete the marking sheet. It will be necessary for students to use online resources to complete this assignment, so please ensure you cite and reference any such materials using the Harvard format.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd