Review on cloud computing and edge computing

Assignment Help Computer Engineering
Reference no: EM133759257 , Length: word count:4000

Assessment Literature Review

Report & Presentation

Assignment Title: Literature Review on Emerging Topics in Information Technology

Topic: Cloud Computing and Edge Computing

Assignment Overview:

This group assignment requires you to research and conduct a literature review on an emerging topic in Information Technology (IT). The aim is to produce a comprehensive 4000-word report that encapsulates current research, applications, benefits, challenges, and future directions of the chosen topic. This assignment will enhance your research, analytical, and collaborative skills, and deepen your understanding of the selected IT topic.

Report Structure:
The report should be structured as follows:
Executive Summary:
A brief overview of the report's content, highlighting the key findings and conclusions.

Table of Contents (TOC):
A detailed list of sections and sub-sections with corresponding page numbers.

Introduction:
An overview of the chosen emerging topic in Information Technology.
State the purpose and scope of the literature review.
The significance of the topic and its relevance to current trends and future developments.

Literature Review Methodology:
Describe the methodology used to select and review the literature.
Include search strategies, databases used, inclusion/exclusion criteria, and the number of sources reviewed.
Themes of Topic for Application of Technology:
Identify and discuss key themes related to the application of the technology.
Each theme should be supported by relevant literature.
Analysis of how these themes is addressed in the literature.
Examples of real-world applications and potential future developments.

Benefits and Challenges:
Analyse the benefits and potential challenges associated with the technology.
Use evidence from the literature to support your analysis.

Conclusion:
Summarise the key findings from the literature review.
Discuss the implications for future research and practical application.

Reference List:
A comprehensive list of all sources cited in the report, formatted according to the specified citation style. (e.g., APA, MLA, Harvard).

Instructions for Students:
Form groups of 3-4 members.
Select an emerging topic in Information Technology.

Conduct a thorough literature review using academic journals, conference papers, and other credible sources.
Ensure that your report is well-structured, clearly written, and free from plagiarism.

Prepare a PowerPoint presentation for 15 - 20 minutes which then will be presented in Week 10 Tutorial class.

Word Count: 4000 words

Reference should be in APA7 And journals should be in google scholar and IEEE.

Reference no: EM133759257

Questions Cloud

What research has already been done in identified design : What research has already been done in this identified design challenge? What did you learn from this research that might be helpful to you?
Present a plan for how you will reach desired profit goal : Present a plan for how you will reach the desired profit goal. As you formulate your plan, remember that it costs money to make money.
How do you think earths seasons would change : How do you think Earth's seasons would change if the Sun was more luminous? How would the seasons differ if the Sun was less luminous?
About the accessibility of healthy food options : Question Question A challenge arose when addressing misconceptions about the accessibility of healthy food options in undeserved communities
Review on cloud computing and edge computing : Literature Review on Emerging Topics in Information Technology and Describe the methodology used to select and review the literature
Discuss why the specific osh program area was selected : OSH 3301- Discuss why the specific OSH program area was selected. Explain how you would identify and assess the hazards related to this program area.
Explain what steps you have taken or will need to take : Explain what steps you have taken, or will need to take, to become more aware of how these values and biases influence your interactions.
Identify challenges in terms of sustainability and risk : Identify challenges in terms of sustainability and risk. Interpret and critically analyse organisational risk and sustainability practice
Explain the immediate transition to begin working remotely : BUS 100- Explain the immediate transition to begin working remotely, including follow-up employee instructions and activation of the remote work policy.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd