Identify problems with maintaining legacy systems

Assignment Help Computer Networking
Reference no: EM132096911 , Length: word count:2500

Tasks

There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task.

Each task requires you to collect and summarise one (1) publicly available online resource. The resource summaryshould be around 200-300 words.

You should collect interesting and relevant resources that address the task. The resources should be easy to read and describe the topic/technology concisely and simply.

The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics). These can include (but are not limited to) online magazine/news articles, technical reports or documentation.

Note: Each resource summary should be around 200-300 words.

Week 1
The text discusses how Central Processing Units (CPUs) function but is silent on another processing component of modern computers, the Graphics Processing Unit (GPU). Find and summarise ONE resource that describes what a GPU is and how it differs from a CPU. The resource (and your summary) should discuss at least one non-graphics related use for GPUs.

Week 2
One of the potential next advances in Operating Systems (OSes) will be Artificial Intelligence (AI) capabilities. Find and summarise ONE resource that discusses how AI could change the way OSes function and/or interact with users.

Week 3
The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud Service Provider (CSP) for Infrastructure as a Service (IaaS). Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google. The resource and your summary should describe how the IaaS differs from AWS.

Week 4
IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned briefly. Find and summarise ONE resource that describes the IPv6 protocol. The resource and your summary should describe how IPv6 differs from IPv4.

Week 5
WannaCry and NotPetya were two of the most significant malware attacks of 2017. Find and summarise ONE resource that describes how ONE of these pieces of malware work. Note that the resource should focus on ONE of these, NOT both.

Week 6
OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and summarise ONE resource that describes how OpenFlow works and/or how it enables SDN.

Week 7
Historically, organisations have been able to improve business processes by implementing Information Systems. However, as these systems age they can negatively impact on organisational agility and can ultimately prove problematic. Such systems are broadly referred to as Legacy Systems. Find and summarise ONE resource that discusses the impacts of legacy systems on organisations. The resource and your summary should clearly identify problems with maintaining legacy systems.

Week 8
With the advent of mass data collection and storage has come the use of these datasets for data mining and analysis. Recently, Cambridge Analytica and Facebook have come under intense scrutiny for their use of user data, allegedly in order to influence the US 2016 election. Find and summarise ONE resource that describes what Cambridge Analytica did and why their services were so controversial.

Week 9
Load (or performance) testing is a critical step in the information systems development process. The purpose of this testing is to simulate the peak expected load on a system to ensure both hardware and software can operate effectively and meet key metrics. To do this, specialised performance testing tools are used. Find and summarise ONE resource that describes ONEsuch tool. The resource (and your summary) should include information on the principle uses and features of the tool.

Week 10
While information systems and technology deliver many benefits to society, there is a high incidence of failure in attempting to implement them. These IS/IT implementation project failures frequently result in substantial financial losses. Find and summarise ONE resource that describesONE example of an Australian IT/IS project that has failed. Note that the resource should focus on ONE single example and it and your summary should clearly explain the cause(s) of the failure.

Attachment:- Template.zip

Reference no: EM132096911

Questions Cloud

Perform analytical research to best guide their action : Utilizing an objective stance, you will take on the role as a consultant for a new small restaurant chain located in your home state.
The majority of which command large market shares : BEC has been around for more than 50 years and has many well-known brands, the majority of which command large market shares.
Identify a cyber incident or an international situation : Identify a cyber incident or an international situation that contains significant cyber issue. Assess and provide some contextual information that helps.
Discusses some common budget busters : Discusses some common "budget busters" and makes the case for discipline in planning a production.
Identify problems with maintaining legacy systems : COIT20246 - ICT Services Management - cq university - Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google
Describe the process you and your project team would follow : Develop a "Lesson Learned" document for your organization and for your project stakeholders.
What are some best practices for project selection : What are some best practices for project selection? What leads to project success? What leads to project failure?
Identify cyber related issue that require closer examination : Within INTL 647 you are required to identify a cyber-related issue that requires a solution. In this case, you will select a topic or issue as it relates.
List current vulnerabilities under the vulnerability column : Consider the vulnerability gaps associated with the chosen organization; these include vulnerabilities associated with crime trends, terrain.

Reviews

len2096911

8/27/2018 2:00:32 AM

Important - Academic resources such as journals, conference papers or books willgenerally be unsuitable for this assignment as they are generally not publicly available, are not concise, are not necessarily easy to read and often don’t focus specifically on the assignment topic(s). The resources should be substantial (producing a 300 word summary from a 400 - 500 word resource is inappropriate) and only contain information directly pertinent to the task. You cannot use the resource more than once in the assignment.

len2096911

8/27/2018 2:00:21 AM

What do I need to do? Download the template. There are ten (10) tasks, one for each week: the tasks are detailed below (and in the template file). Each task requires you to collect and summarise one (1) publicly available online resource. The resource summaryshould be around 200-300 words. You should collect interesting and relevant resources that address the task. The resources should be easy to read and describe the topic/technology concisely and simply. The resources must be specific to the topic (i.e. just focus on a single technology or topic and not be about multiple topics). These can include (but are not limited to) online magazine/news articles, technical reports or documentation.

len2096911

8/27/2018 2:00:09 AM

It will be necessary for students to use online resources to complete this assignment, so please ensure you cite and reference any such materials using the Harvard format. Plagiarism detection will be used in this assessment. It is VERY important that you do not copy content directly from either the text or Internet resources: this assignment is to be in your own words. You will lose marks if you do not use your own words! Suspected plagiarism will result in the instigation of the student misconduct process.

len2096911

8/27/2018 2:00:03 AM

Note that late penalties apply (5% of the total available marks per calendar day late or part thereof). Assignments received 14 days or more after the due date will not be marked and will receive zero. Students may apply for extensions but must provide documentary evidence to support their request (for example, a medical certificate). Short extensions of one to two days may be considered if students include their nearly completed assignment (i.e. one or two tasks to yet be completed) in their extension request.

len2096911

8/27/2018 1:59:55 AM

The purpose of this assignment is to select and discuss relevant online resources that exemplify the application of the topic(s) nominated each week (1 - 10). There are ten (10) tasks, one for each week: these are detailed below and in the template. This assignment can (and should!) be completed progressively (i.e. one task each week). The assignment is marked out of 30 and forms 30% of your total unit marks.

len2096911

8/27/2018 1:59:00 AM

One last thing - remember, the resources you choose must be public, freely available resources. The link you provide to them must not rely on being authenticated by a username and password or require you to buy the resource. Markers will be checking each resource and if they cannot get to them from the URL you provide, you will receive zero for the task. If you have doubts about a resource, please discuss it with your tutor, post to the Q&A forum or email the unit coordinator.

len2096911

8/27/2018 1:58:54 AM

3) When you’ve finished reading the resource, do you feel you have gained a good understanding of the topic? If you don’t understand the resource or you are confused, the resource isn’t a good one. 4) Would you give the resource to a family member? Pick the member of your family who has the least knowledge of technology. Would you be able to give them your summary of the resource, and the link to the resource, and would they gain some understanding from it?

len2096911

8/27/2018 1:58:47 AM

This is why you need to avoid the academic literature and find accessible, interesting resources. You should be able to find these using a few Google searches. When you are choosing resources, ask yourself the following questions: 1) Is the resource simple to read? If the resource uses highly technical language that you keep having to do other Google searches on, then it probably isn’t ideal. 2) Is the resource very short or very long? If the resource is barely 500 or 600 words, it is nearly certain that it hasn’t gone into a topic in enough depth. However, if the resource is several thousand words (like a book chapter or academic article), then it is likely that it isn’t a concise explanation, moreover, it is impossible to summarise something so long into 300 words.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd