Development Of Computing Architecture, OS, Network, Protocol, Hacker, Future Technology, Social Platform & Data Mining

Task 1: Computing Architecture Development

This particular resource is about the history of computers that has included the different stages that the computer architecture has gone through. Several different phases of development and induction of various technologies have been mentioned in this article. The main reason for the selection of this particular article is that the various stages of development and advancements the computer system and architecture has gone through has been described from beginning of its origin. The main points that have been covered in this resource material are related to the invention of basic systems of fast calculations.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Moreover, the development of first generation of computers by Charles Babbage has been discussed about in this article along with its various advantages and disadvantages. Another major content of this resource is the constant development of computers in terms of speed, capacity and size. The five generations of computer architecture including a significant contribution made by John Von Neumann is an interesting area to focus on in this particular article. The concepts introduced by Neumann remained the base for operations of different computer architectures and systems. The most significant contribution was Electronic Discrete Variable Automatic Computer or EDVAC. The resource was helpful because of detailed description of different computer architecture development stages.

The considered resource is about the invention of a revolutionary Operating System called Linux. It is also about the different advantages of using these operating systems in various business processes and organisations. The article has been chosen because it has described the development of Linux Operating System from the early stages. The resource has described the origin of Linux and its development by Linus Torvalds. The idea of developing a Kernel called Linux originated from a Non free system called Minix which was a Unix like System.

The non free nature of this system encouraged Linus Torvalds to develop a free operating system. He developed device drivers access protocols for hard drives. The basic design of Linux Operating System came out in existence in September, 1991 and was termed by Torvalds as Version 0.01. This was followed by the induction of Version 0.12 of Linux in January, 1992 that possessed a much stable Kernel. Finally, the introduction of Version 2.4 of Linux OS has been mentioned that was compatible with 64 bit processors manufactured by Intel. The most helpful content of this resource was the discussion of different advancements and up gradation in Linux OS with every new version.

Task 2: Operating System Development

This particular article discusses about the history of internet from the initial ARPANET to the modern Internet along with its different sub techniques. This article is selected as it chronologically describes the evolution of internet. These sub techniques are associated with the network in making a much more convenient usage of the Internet and that is affordable for users. ARPANET was designed in order to develop a communication between terminals in ARPA computer. The technology of ARPANET allowed transferring information via ‘packets’ of small units. However, ARPANET was a closed computer network that is transformed in the open network system on modern age Internet. IP/TCP Protocols were developed in 1982.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Along with this, expanders and developers were able to expanding the spectrum of network. ARPANET was then handed over to the military network of US. Following this, six domains were created and in 1990, the first incarnation of World Wide Web occurred. Foundation of Yahoo, and followed by Google also occurred at this time as per this news article. This article is much helpful in understanding the evolution of modern age internet from primitive ARPANET network. It has also mentioned the explicit contribution of ARPANET in the evolution of Internet.

This article deals with the evolution and issues related to the Layer 2 and Layer 3 switches associated with high speed connectivity in between the end stations of data link layer. It also describes the different concepts of design of LAN and issues that are raised in the process of evolution of Layer 2 and Layer 3 switches. By focussing on the Layer 2 switches, it has been observed that bridging technology in involved in Layer 2 of LAN that addresses each port and passes the MAC frames. 

As mentioned in this article, Layer 2 in Cisco LAN consists of Access Layer, Distribution Layer and Core Layer. Access Layer is the base level layer comprising its accessibility to computers and smart phones. Distribution layer deals with the control of traffics on switch configuration and is a bit advanced than the access layer. Core layer comprise the most advanced part of Layer 2 switch involving swift switching to any network. Technology is evolutionary; however, the modified version has its core in the original version. Same thing is applicable for Layer 3 switch that is an advanced part of the Layer 2 switch. This journal has helped in making an idea of the Layer 2 switches in a Cisco LAN. Features as well as benefits of the same are discussed.  

Task 3: Network Development

The considered article is about the most popular hackers that have done something unbelievable in terms of computers and network security. This has talked about the different hackers and the chaos made by them in the internet and networking world. As per this article, Kevin Mitnick who is also known as the self styled “Hacker poster boy” who was also declared as the most wanted cyber criminal in the history of United States of America. The miscreant activities of Kevin includes the hacking of some of the most secure computer systems and networks of some leading companies in the world like Motorola, Fujitsu and Nokia.

Kevin managed to stay out of the reach of world’s top level security agencies including FBI for a long time. However, after a high level long pursuit, he was arrested by FBI in 1995 when he confessed to a number of charges against him. He was sentenced for 5 years imprisonment by the Federal Court. Kevin started a computer security agency after he was released in 2000 on parole. As per Kevin, hacking activities are actually “Social Engineering”. This article is very useful as it has mentioned the hijacking activities of several most wanted hackers.

This specific article is about the different technologies that are under developmental phase and are likely to appear in the near future. These technologies are likely to impact the human lifestyle and way of browsing in a very significant manner. The article has been selected because of the different upcoming technologies that are about to change the way of human operations in the internet world. The most interesting technology that has been mentioned in this article is the No Touch Interfaces in machine operations.

The article has given examples of Apple’s Siri and Project Glass of Google. This article states that human will manage to control most of the machines without even touching it. There are developments that are going on to make the basic machines especially electronic devices operate through hand gestures and voices. It can be said that Artificial Intelligence has a big role to play in the development of this technology. Project Jarvis from Facebook aims at interlinking several smart electronic devices and command them by voice. The article can be considered as a very helpful one as it has stated numerous technologies that are about to emerge and have the potential to change human lifestyle entirely.

Task 4: Layer 2 Protocol

The article is about the different social media platforms that are widely used by internet users around the world. It has discussed how social media platforms like Google+, Facebook, Twitter, Instagram and many more has become an integral part of the lifestyle of any person. The main reason for selecting the article is that the usage and development of these social media platforms have been described along with the advantages and disadvantages of the same.

The major focus of this article has been the three most popular social media platforms also known as the “Big Three” that includes Twitter, Google+ and Facebook. In the modern time, most of the celebrities, politicians as well as businessmen use Twitter as the mode of expressing their thoughts. This platform is used by common people too as it allows them to follow the people they want to and interact with them in a remote manner. Twitter was developed as an application that uses 140 characters as a message that is displayed on the homepage of people’s twitter account that follow them. This article was very useful because of the detailed description of the roles and significances of three most widely used social media platforms.

This article deals with the success story of three young people, whose has caused a significant development of mobile application. The article mentions about three youngsters such as Jess Wilson, Ben Burton and Mitch Hills, who have developed some innovative mobile applications that are user friendly and increases credibility of smart phones. Jess Wilson is a 24-year-old creator of Stashd. This application allows its users to browse different trends of fashion rather than brands. Purchase process is also made simpler. Just a right swipe allows the users to select and purchase the item desired by them. The article discusses about Ben Burton, a 25-year-old man, who is the founder of Zeppee.

This app was launched in early 2017, which allows its users to adopt animals on choosing via the application and by swiping on the right. There is also an option of receiving guidance from potential adopters via another website. The article mentions about Mitch Hills, a 21 years old youngster, who launched Aroundabout. This app allows a user to acknowledge the whereabouts regarding seeing, eating and doing in a particular area. This article is of much useful as it provides the learner with the success stories of three different youngsters who have significant contribution in mobile app development.    

The selected article is about the different side effects that are caused to humans due to the advancements in technology. The article has stated in the beginning itself that no technology is good or bad. It only depends on how the user chooses to use it and implement it in his or her daily lifestyle. The main reason for selecting this particular article is that it has talked about the various difficulties that are being faced by human due to the emergence of technology based operations and applications. The most considerable adverse effect among the mentioned ones in the article is the Gaming applications. This has caused huge loss to the human society, especially the children.

The computer games have been designed to keep the children glued to their computers. This has become successful to a great extent also. The different outdoor games like football, basketball and many others were being played by many children earlier. However, the ratio has tremendously decreased after the existence of video games. This is causing several physical issues to children including heart problems, bones issues, damage to eyes and variations in emotions. The article was very helpful as to have discussed the different issues caused by advancement in technology.

Reference

Human-kinetics.com. (2017). Technology can have positive or negative impact on social interactions. Available from: https://www.humankinetics.com/excerpts/excerpts/technology-can-have-positive-and-negative-impact-on-social-interactions [Accessed on 25 Aug. 2017].