Resource Summaries For 10-Week Tasks

The text discusses how Central Processing Units (CPUs) function but is silent on another processing component of modern computers, the Graphics Processing Unit (GPU). Find and summarise ONE resource that describes what a GPU is and how it differs from a CPU.  The resource (and your summary) should discuss at least one non-graphics related use for GPUs.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Title and Reference:

Memon, Z.A., Samad, F., Awan, Z.R., Aziz, A. and Siddiqi, S.S., 2017. CPU-GPU Processing. International Journal of Computer Science and Network Security, 17(9), pp.188-193

Summary:

The title of this paper is CPU-GPU processing and in which the author explains the fundamental concept to of graphics processing unit and the difference between CPU and GPU. The author first describes the architecture of CPU and GPU and it is an advanced version of the computer processing unit. According to this article, CPU is the main primary device of any computer system which is used to perform arithmetic logic and input-output functions. Moreover, GPU is a special type of component which is used to display an image on the desktop. The author uses qualitative data analysis and CPU uses several cores that communicate with caches. The main difference between CPU and GPU is that CPU can perform numbers of tasks at a time but GPU perform only image rendering step. CPU is also called as the brain of computer and GPU is very latest technology which can handle complex stage. It is a very fast cache but GPU is very complex use lots of math units. Therefore, this article is completely based on CPU and GPU and the main benefit of this article is that it identified key factors of GPU.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Week 2

One of the potential next advances in Operating Systems (OSes) will be Artificial Intelligence (AI) capabilities. Find and summarise ONE resource that discusses how AI could change the way OSes function and/or interact with users.

Title and Reference:

Haq, R., and Shetty, A. (2017) A STUDY ON ARTIFICIAL INTELLIGENCE OPERATING SYSTEM, International Journal of Latest Trends in Engineering and Technology, vol. 15, no. 4, pp. 059-

Summary:

The title of this journal paper is A study on artificial intelligence operating system. The main purpose of this article is to discuss the role of AI in the field of the operating system. The author used qualitative data research to analysis concept to artificial intelligence and it is a modern innovation in computer science. This paper reviews how AI helps to improve the performance of information and technology and many organizations adopted this method because it is a more efficient process.

AI is defined as a process which is used to manage software and hardware and also provide various computer services to users. According to the writer, AI is divided into two parts such as strong and weak AI. Strong AI can present human minds in future and weak AI takes action and test their knowledge. There are many methods used in AI operating system, for example, intelligent system, fuzzy logic process, artificial neural, expert system, natural language processing. In the field of the operating system, this technology provides a platform to select the best application to open any document, image, song, and other function.

Week 3

The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud Service Provider (CSP) for Infrastructure as a Service (IaaS).  Find and summarise ONE resource that describes ONE other commercial IaaS provider that is NOT Google. The resource and your summary should describe how the IaaS differs from AWS.

Title and Reference:

Nazir, M., 2012. Cloud computing: overview & current research challenges. IOSR Journal of computer engineering, 8(1), pp.14-22.

Summary:

The title of this article is cloud computing: overview and current research challenges. This paper explains the fundamental concept of cloud-based services and how Microsoft, provide IaaS services to consumers. Cloud is an advanced technology which provides various kinds of services to many organizations and it has the ability to scale down and up their services requirement. Generally, this type of process is produced third-party sellers like Google, Amazon, and Microsoft. IaaS is infrastructure as a service which is a platform to utilize cloud-based facilities and Microsoft is another IaaS provider after Amazon and Google. In this journal, the writer identified various organizations which are providing cloud computing facilities and it is more flexible technology by which consumers can reduce cyber-attacks. Microsoft developed their IaaS which is called as Azure and it is very different from Amazon web services. AWS uses R3 optimization process but Azure uses D-series to optimize memory. AWS is an automatic process as compare to Microsoft Azure which is one common drawback of IaaS. For backup, Amazon uses third-party tools and Microsoft uses their own cloud services. Therefore, the main disadvantage of this journal paper is that it does not explain which types of technologies are used by Microsoft.    

Week 4

IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned briefly.  Find and summarise ONE resource that describes the IPv6 protocol.  The resource and your summary should describe how IPv6 differs from IPv4. 

Title and Reference:

Sailan, M.K., Hassan, R. and Patel, A., 2009, August. A comparative review of IPv4 and IPv6 for research test bed. In Electrical Engineering and Informatics, 2009. ICEEI’09. International Conference on (Vol. 2, pp. 427-433). IEEE.

Summary:

The title of this paper is A Comparative Review of IPv4 and IPv6 for Research Test Bed. This journal is completely based on internet protocol and the author describes the fundamental working mechanism principle of both IPv6 and IPv4. According to the writer, IPv6 is still very low because it is not famous as compared to IPv4. The cost of this protocol is very high by which many users are not able to adopt this advanced technology. The main goal of this paper is the review on internet protocols and makes a comparison between IPv6 and IPv4. It is identified that the main difference between in this networks is addressing formats. IPv4 utilize 32-bit address and IPv6 use 128-bit which is more efficient for a large computer network. The author describes the concept of both internet protocols and investigated that address depletion is the very common problem for IPv4 and this problem resolved by the IPv6 network. Therefore, this article provides a proper explanation about internet protocols and use primary data analysis.    

Week 5

WannaCry and NotPetya were two of the most significant malware attacks of 2017.  Find and summarise ONE resource that describes how ONE of these pieces of malware work.  Note that the resource should focus on ONE of these, NOT both.

Title and Reference:

Mohurle, S. and Patil, M., 2017. A brief study of wanna cry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), pp. 16-20.

Summary:

The title of this paper is A brief study of Wanna cry Threat: Ransomware Attack 2017. According to this journal, ransomware is one of the most common cyber-attack which is growing very fast. Wanna cry is a part of this attack in which hackers produce complex botnet process by which they can easily determine the private detail of any authorized server. The main objective of this article is to describe the issue of Wanna cry and how hackers attack any server. In this modern generation information of any organization and community is very important and many users use the unauthentic website by which they can lose their privacy. In the year 2017 around thousands of computers are a hacker by the wanncry attack and it shares traffic signals to organization websites and target employee’s personal accounts. In which many attackers send spam emails and message due to which users click on fraud links and hackers collect all private details of their networks. This research paper explained wanncry cyber-attack and the impact of this problem on human personal life. Consumers can adopt security plans and programmes by which they can reduce this type of attack.

Week 6

OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and summarise ONE resource that describes how OpenFlow works and/or how it enables SDN.

Title and Reference: Network innovation using open flow: A survey.

Lara, A., Kolasani, A., and Ramamurthy, B., 2014. Network innovation using OpenFlow: A survey. IEEE communications surveys & tutorials, 16(1), pp.493-512.

Summary:

The main purpose of this paper is to describe the role of open flow in software-defined networking and their working mechanism. In this journal, the author explains the concept of SDN and how open flow program work in this technology. Open flow is an advanced development in information technology and it uses various kinds of networks devices to control the flow of data. The main role of SDN is to manage information of two or many switches at a time. Open flow provides a platform to control the communication gap between network devices in an architecture of SDN. It is also used to produce a specification of all arithmetic logic and can be used to maintain various switches and networks. It has the ability to add security features in software-defined networking, centralized control, flow abstraction, and traffic analysis. In which the writer identified various challenges faced by open flow and how it enables software-defined networking. The main advantage of this program is that it can control security threats of SDN and maintain network system of an organization. Therefore, this article does not explain methods to improve the performance of SDN and architecture of open flow process.

Week 7

Historically, organizations have been able to improve business processes by implementing Information Systems.  However, as these systems age, they can negatively impact organizational agility and can ultimately prove problematic.  Such systems are broadly referred to as Legacy Systems. Find and summarise ONE resource that discusses the impacts of legacy systems on organizations.  The resource and your summary should clearly identify problems with maintaining legacy systems.

Title and Reference:

Srinivas, M., Ramakrishna, G., Rao, K.R. and Babu, E.S., 2016. Analysis of legacy system in software application development: a comparative survey. International Journal of Electrical and Computer Engineering (IJECE), 6(1), pp.292-297.

Summary:

This journal paper is completely based on the impact of the legacy system on an organization and in which the author explains various challenges faced by the legacy system. According to the writer, Software evolution is one of the biggest issues for any business industry and to reduce security threats and issues this technology was developed by information and communication. There are many organizations which are using this process to improve their productivity and efficiency but lack of up-to-date documentation is the very common problem with the legacy system.

According to this journal, legacy is defined as a software-based program which is outdated and it is identified that this process is not stable due to the problem of capability with traditional operating systems. The main advantage of this process is that it satisfies the requirement of any user and many organizations are suffering from the potential threats of the legacy system. The author provides mitigation tools to reduce drawbacks of this technology like refactor and modification of network systems. There are many kinds of the issue faced in the legacy system for example, very slow program, more expansive, maintenance cost is very high, lack of interface and evaluation of the legacy system is very difficult.

Week 8

With the advent of mass data collection and storage has come the use of these datasets for data mining and analysis.  Recently, Cambridge Analytica and Facebook have come under intense scrutiny for their use of user data, allegedly in order to influence the US 2016 election.  Find and summarise ONE resource that describes what Cambridge Analytica did and why their services were so controversial.

 

Summary:

On March 17, the London Observer and The New York Times detailed that UK-based information firm Cambridge Analytica procured a huge number of Facebook clients’ close to home data to construct programming that could target potential swing voters in political crusades, including US President Donald Trump’s 2016 decision offer. Around 270,000 clients consented to have their information gathered and utilized for scholastic research in return for a little installment. The Times detailed Cambridge Analytica took care of the expenses of the application, more than $800,000.

Kogan gave data from in excess of 50 million Facebook clients to Cambridge Analytica, which was utilized by the organization to make 30 million “psychographic” profiles that could then be utilized to configuration focused on political promotions. Cambridge Analytica said on March 17 it erased all information got from Kogan’s organization, Global Science Research (GSR) when it discovered it had not been gotten in accordance with Facebook’s strategies. No information from GSR was utilized by Cambridge Analytica as a major aspect of the administrations it gave to the Donald Trump 2016 presidential battle. Kogan, in the meantime, said he felt scapegoat by Facebook and Cambridge Analytica. Truly we thought we were acting splendidly suitably

Week 9

Load (or performance) testing is a critical step in the information systems development process.  The purpose of this testing is to simulate the peak expected load on a system to ensure both hardware and software can operate effectively and meet key metrics.  To do this, specialized performance testing tools are used.  Find and summarise ONE resource that describes ONE such tool.  The resource (and your summary) should include information on the principal uses and features of the tool.

Title and Reference: WebLOAD REVIEW

Finances Online (2018) WebLOAD REVIEW Test Management Software, [online] Available from: https://reviews.financesonline.com/p/webload/ [Accessed 27/09/18].

Summary:

WebLOAD is a venture scale stack testing arrangement broadly utilized and advanced even by the requesting experts and specialists in the execution and load testing scene. Created by RadView Software, WebLOAD is fit for supporting many innovations and highlights adaptable implicit scripting capacities. Besides offering broad highlights for stack testing web frameworks, WebLOAD is additionally fit for testing an assortment of big business frameworks, including Oracle, SAP, and others. With the help of this tool, clients can without much of a stretch make and view their heap content combined with the record and playback alternatives, making test creation basic and productive. The framework executes a multi-convention bolster, empowering WebLOAD to recreate stack situations that number from hundreds to thousands of clients and after that give precise and point by point examination on how the application carries on under load. WebLOAD is the device of decision for endeavors with overwhelming client load and complex testing prerequisites. It enables you to perform load and stress testing on any web application by creating load from the cloud and on-premises machines. WebLOAD’s qualities are its adaptability and convenience – empowering you to rapidly characterize the tests you require with highlights like DOM-based chronicle/playback, programmed relationship, and JavaScript scripting dialect.

Week 10

While information systems and technology deliver many benefits to society, there is a high incidence of failure in attempting to implement them.  These IS/IT implementation project failures frequently result in substantial financial losses. Find and summarise ONE resource that describes ONE example of an Australian IT/IS project that has failed.   Note that the resource should focus on ONE single example and it and your summary should clearly explain the cause(s) of the failure.

Title and Reference: Myer – a case study in who shouldn’t invest or lead retailers

Ryan, P.J., (2018) Myer – a case study in who shouldn’t invest or lead retailers [online]. Available from: https://www.insideretail.com.au/news/myer-a-case-study-in-who-shouldnt-invest-or-lead-retailers-201802 [Accessed 27/09/18].

Summary:

Australia’s greatest retail establishment, Myers, contributed a huge number of dollars on site advancement as it endeavored to help online deals. However every time the site got occupied, it slammed. Stock blowout sales have been tormented by framework blackouts, and on Boxing Day 2013, the entire site imploded. Senior administration communicated ‘dissatisfaction’ and statements of regret to clients.

Investors were informed that such framework accidents would not influence benefits. Since Myer skimmed in 2009 at a cost of $4.10 per share, the seller has seen its advertise capitalization plunge from $2.2 billion dollars to $429 million or 59 pennies for every offer. Under two years into the five-year turnaround, speculators, investigators and media beginning upsetting for change in light of an apparent absence of results and lost trust in the vision that had been upheld by the board. Australian retail needs Myer fit and sound. People require Myer ‘right-sized’ and gainful on the grounds that our retail chains generally drive a lot of market conduct and item lifecycle either emphatically or adversely relying upon their level of edginess. The main reason for this failure is the lack of resources by which they could not handle their business.