There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. An example of a completed task is below. Note the first response is good – so aim for something like this. The second response is not acceptable, so if you submit anything like it, you won’t pass the assignment! The reasons? Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content).
Task Find two resources that explain aspects of IT Service Management.
This resource is a blog entry discussing the differences between CoBIT and ITIL. I chose this resource as there is a lot of confusion about the way in which ITSM is applied and the distinction between the CoBIT and ITIL implementations is frequently unclear. Ibaraki explains that CoBIT provides the governance and metric structures while ITIL delivers on the actual mechanics and “how-to” processes. The author makes an interesting observation that it is wrong to simplify COBIT as providing the ‘why’ and ITIL providing the ‘how’ because both ITSM mechanisms have considerable overlap and both need to be used at the same time. I found this article very useful in explaining the differences and similarities between these two aspects of ITSM.
This pages talks about ITSM. It says that IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures – that are performed by an organization or part of an organization to plan, deliver, operate and control IT services offered to customers. It is thus concerned with the implementation of quality IT services that meet the needs of customers, and is performed by the IT service provider through an appropriate mix of people, process and information technology.
Task The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main features and applications of two mass storage technologies namely: direct-attached storage and network-attached storage.
DAS (Direct attached storage): It can be considered as a basic form of storage which is externally hard drive connected by means of USB cable. It is very much simple as it sounds to be. However it can be stated that when we consider the concept of storage the user tend to have a prospective of multiple drive which work or act together in some way. The DAS concept can be considered to be same regardless it is 24 drives or one drive and usage of different cables are focused upon. Taking into consideration a large DAS system the USB can be considered to be very much slow. The DAS is not so much used in the concept of hardware of lower level due to the factor that it is not market friendly and intuitive. When large array of storage are to be initiated then the acronym DAS are used. In this aspect to the computer the storage device can be attached without using a network infrastructure.
NAS (Network Attached Storage): A network attached Storage is relatively simple. A computer regardless of the number of storage or number of size relating to storage availability, can be considered to a NAS only if it acts in a network as a file server. In simple words the concept of network attached storage (NAS) can be stated as a computer device which shares files over any network. The main advantage of using NAS is that it is very much economical in a way of providing a large storage to many computer system at one time. It can also be used for better utilization of computer resources. The main disadvantage which is related to the concept is that it requires an IP address and basically takes up a network space. It could be also related to slower latency rate and potentially maximum issue related to data transfer.
Task Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint. Discuss the main benefits of real-time operating systems for the health sector.
Real time operating system architectures are important for medical designers. [online] Available at: https://www.newelectronics.co.uk/electronics-technology/real-time-operating-system-architecture-is-important-for-medical-designers/35970/ [Accessed 30 Jan. 2018].
The medical device manufacturer can understand the importance of the operating system (O.S) and the contrary which is related to the common practice related to the embedded design system. The medical team selects the OS first before they choose the board. The business needs which are related to the need of the OS selection are much like those of other devices and requirement like quality, cost, vendor history, track record of vendor and ecosystem. The things which should be looked forward in a good operating system are basically a quality management environment and a good process related to manufacturing for example ISO 9001. The aspect of claims related to safety which may include data testing and the concept of verification of design with attachment of proper certification such as IEC 61508 and IEC 62304. The OS can be considered as a tool that can directly provide concrete evidence related to behaviors and functionality in a system. The prospective which should be covered in this context is the system profiling, code coverage and the memory analysis artifacts. The consumer grade devices which are medical related failure implies inconvenience. Taking into consideration the devices whose failure may result in serious consequences the key OS characteristics that should be followed mainly include the concept of dependencies of the machine, multicore support, power management, platform dependencies. Since the architecture of the OS can be have an effect which is profound on the dependability of the system it should be the first concept that should be put under scrutiny. The most common RTOS architecture which can be taken into consideration are the monolithic, executive and the microkernel. Taking into consideration any system the availability of the system is very much essential for example a heart monitor that loses the connective can result in the failure of alarming which can result in dire patient consequences.
Task Mobile Cloud computing has gained a wide acceptance for organisations as well as individuals by introducing computation, storage and software based services. Explain the security and privacy issues in relation to the use of the mobile Cloud computing in the finance sector.
The security aspect which is related to the cloud can be done in two levels. One can be on the level of the provider and another on the level of the user. The service provider of the cloud should take into consideration that the server is very well secured. A cloud service can be considered to be an appropriate technology if security aspects are meet. In the financial sector if the data is lost from the cloud it could lead to a big problem. The cloud providers always ensure that the cloud gives the maximum security to the user but uncertain conditions are faced majorly which cannot be ignored. Such situation can include natural disaster or fire. Due to this reason the user cannot access the data when they need it. If the cloud provider due to some problem related to financial problem or legal issue it can be a big problem and it could lead to data losses which can sometimes be permanent. The concept of data stealing can be also considered as a problem where the hackers tend to retrieve the data of the user and use them for their own benefit. Many of the cloud providers in this context do not have their own server instead they use the server of other providers due to the concept of cost effectiveness and flexibility. In the end it can said that the main issue which can be faced by the cloud providers relating to financial sector could be data issue, infected applications, privacy issue. The concept of cloud computing can be considered to be point of debate in most of the cases. Regardless to the concept there is a tremendous rise in the adaptation of the concept of cloud computing in the financial sector.
Task TCP/IP is consists of communication protocols used to transfer packets between computer hosts within the network. In TCP/IP, the transport layer is responsible for providing the application layer with session and datagram communication services. Discuss the common standards at the transport layer.
The transport layer is responsible for the control and the segmentation of the different communication streams. On the other hand it is also responsible for the assembly which is related to the communication which is at the end of the receiver. In the TCP/IP protocol suite there are basically two protocols which are TCP (Transmission control protocol) and UDP (user datagram protocol). Along with these protocol there are various other protocol which control them.
The User Datagram Protocol (UDP) is basically used when the communication stream does not depend fully on the connection aspect. This basically means that one end of the connection can be connected to the network and the other end might be temporarily down. The concept of communication does not have to be on stream for it to be working properly. This can be termed as unreliable transport. Some of the applications which can be included in this concept are the DNS (Domain Name system) which mainly involve how the devices resolve the IP address to names and the Voice over IP which basically facilitates making of calls over the network and also achieve the concept of video streaming. The UDP works at the port number 69.
Taking into consideration the transmission control protocol in order to work properly the connection has to be established successfully. This means that both the ends the senders and well as the receiver should be online to work properly. The utilization of the reliable transport is done in this protocol. Some of the application which can be implemented using the concept of TCP includes HTTP and HTTPS for the aspect of website, email using POP and SMTP and file transfer concept using FTP. The TCP works at the port number 80.
Task The Internet of Things (IoT) is a system of interrelated computing devices that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Discuss the cyber security challenges faced by the health sector in this IoT era.
The concept of the internet can revolutionize the technology aspect of the world. This concept can also be applied to the features which are related to the health care sector. The main concern for the medical expert, hospital and the doctors are the cyber security risks which are associated with the concept. The growth which is related internet of things devices is very much staggering. According to a recent survey it can be stated that by the end of 2020 the internet of things market would be reaching a mark of $117 billion which basically expands at a rate of 15 percent average per year. Asia can be considered to be one of the leader in this field with the sector of health care being one of the top 5 industries. One of the concern which can be involved in the technology is the vulnerability which is relating to the devices. Adding up with this concept is the patch of cycles which may be extremely lone to never. Fortunately many technological means are valuable to combat the risk factors. The Singapore national university hospital has majorly undertaken trails in order to access the viability which is related to the remote health care sector. The main aim of the trail was to monitor the patients with the help of smart devices at homes to be sure that interventions can be provided if it is needed. This basically improves the aspect of continuous monitoring of the patient at the same time reduce the amount of visit needed at the hospital. In order to achieve the safety in IoT devices few of the concepts which should be incorporated are good communication, strong authentication, secure protocol and segmentation of the network. Frequent assessment of the vulnerability and the risks can help protect the patient s and their network.
Task Internet of Things (IoT) Cloud is a model designed to facilitate the information society, enabling advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies through ennoblement of ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Explain the importance of real time data capture capability, data visualisation, data analytics, and API protocols in the application of IoT Cloud
The concept of real time data capture can be considered to a vital aspect when relating to the IoT cloud. This can be considered as a data in the real time with real time data execution. The concept of real time data collection basically enables the service providers and the user relating to the data to achieve an efficient output from the system. The data visualization can be considered to be tangible element and noticeable aspect for the IoT cloud platform. This basically makes it a trending technology for the world which expands from the concept of grocery chain to car elements. The concept of data analytics allows the sensor to exchange signals which may include the information without any obstacle involved in the process. The concept of API control and other interfaces can be helpful in the process of management of the data exchange and the commands by the sensors or the gateways. The concept needs more than one API for the process of real time data collection and simultaneously executing the data. The IoT application platform by the DGLogik offers more than just the concept of virtualization that can be used for any sort of applications. These are basically the technology which are boosting thenconecpt of different technology and these provide the user with the effective and efficient output whch is the primary requirement of the user.
Task A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests, backgrounds, and activities. However, there are different security and privacy threats that target every user of social networking sites. Provide five solutions to deal with these security threats.
1.Create a social media policy: the process of social media policy can be helpful to keep any brand safe while ensuring employee participation. Taking into account the policy it can be changing and each of the company can have their own policy. The policy can be very much helpful for organizations that operate on social media sites.
2.Media training: The training should be very important aspect which basically deals with the security aspects. The threats which are over the concept of the internet should be very much important to be addressed for the proper working of the organization. Training helps an employee to identify crises situation and provides a basic framework which helps them to face the problem.
3.Social media access limited: the right of the person who is publishing the information over the internet should have a basic idea of the information. The access should be restricted so that everyone does have the access permission of putting a content over the internet.
4.Putting someone in charge: in this context it can be stated that too many cooks can spoil the broth. Similarly taking into consideration the concept of social media one person should lead the team so that there are no confusion in the near future. If everybody is given the authority do everything it can be a huger problem.
5.Secure technology: The technology which is used in this context should be secured. The most important aspect in this mainly involve the protection of the data. The password and the user name of the authority should not be published so that anyone can get access to the data and the content.
Task Big data has been considered to be a breakthrough technological development over recent years. Big data is based on large volumes of extensively varied data that are generated, captured, and processed at high velocity. Discuss the main challenges as well as the social and economic values for organizations in adopting big data.
The main challenges which are faced within the concept of adaptation of big data is the infrastructure problem. This challenges can be broken down into two major parts such as storage and how the data is basically stored. The implementation of the analytics relating to big data are deployed within the organization can be considered to be very much organic. In many of the situations the companies run in multiple nodes. Taking into consideration the vendors they use the concept of powerful parallel processing and increased memory to compensate with the large volume of data which is generated. On the other hand another process which can be Implemented is putting the big chunk of data in memory by means of grid computing approach where many machines can be used for the purpose of resolving the problem. More than 80% of information which is generated form the Social media, ERP data, social media, customer transaction, video, images and email is unstructured. Due to this factor it is very much difficult to handle and manage this type of data. The concept of virtualization can also be considered to be big problem in this scenario. Taking into consideration the role of data analytics millions of row of data can be a big headache for them. Legacy problem is another problem which is majorly faced in the concept. These type of issue are mainly two folded which are legacy architecture and legacy culture. It basically involve the concept of learning and unlearning of the processes related to the working with the data..
Task There has been a growing interest in the application of agile and lean practices for software development. Discuss the benefits of agile and lean practices and their impacts on project constraints.
Lean: Lean can be considered as a management and improvement philosophy that began in the concept of manufacturing. The principles which are related to the concept can be applied to any process. The focus point is on the concept of reduction of the waste while creating an environment of better workplace by means of “respect to humanity”. The implementation of the reduction of waste can result in the improvement in the production time, quality and cost. In the process of project management there can be waste of various types like excessive planning, excessive documentation and control, avoidable reworks, unproductive multi-tasking process. The concept of lean project management can eliminates these types of waste.
Agile: The concept of Agile can be considered to be quick and lightly. It was associated with the agile software development process. The approach involves minimizing the risk by means of performing iterations related to the project that delivers results which are meaningful. Communication in this process is very much quick, real time and informal and preferably done in a face to face basis. The autonomy in this context is very much significant relating to project participants.
Both the concept of agile and lean recognize the need which is related to open mindedness that basically appreciates the complex interplay relating to communication, self-managed team and the commitment to success. There is a tendency by the people to latch onto the good system as cure-alls. Combining the best part of the approach which is multiple requires work against process fundamentals and creativity. The approach in this context is moderate and the analytical approach keep the process of continuous improvement active. Both the processes impact on the project can be vast and it can be implemented according to the need of the project.
Task The availability and implementation of information and communication technologies (ICT) is increasingly vital to all dimensions of a nation’s inclusive, equitable and sustainable economic development and growth strategies. Discuss how ICT is fundamentally changing the nature of economic, environmental, and social relationships globally
The relation which exist between the ICT and the environments is very much multifaceted and complex. This is due to the factor that the concept of the ICT can play a positive as well as negative role. The positive impact in this concept can come from online delivery, dematerialization, travel substitution and transport. The negative concept come from material which are used and the energy consumption and distribution of the equipment’s relating to ICT. The impact which is put forward by the ICT on the environment can be classified as indirect and direct. The direct impact may include e waste and energy consumption and indirect impact may include intelligent system of transport, smart grids and building. The ICT also plays a vital role in the data protection. The location of the storage of the data can also be considered as a big factor. It is seen in most of the cases the data of the user are not available for their access since they are located in other servers which are not accessible by them. The data of the user should be available for their access at any time when they need to do so The economic impact by the ICT can be on the sector of automotive electronics. It can be stated that it can also have an impact on the sector of energy efficiency and the resources relating to social relation which can be termed as global. Nevertheless there have been many studies which state that the difficulties in this approach in order to avoid effects of rebound and realizing the potential benefits.
References
Ibaraki, S 2014, online, COBIT versus ITIL, viewed 29/01/2015, <https://blogs.technet.com/b/cdnitmanagers/archive/2014/04/06/cobit-versus-itil.aspx>.
https://en.wikipedia.org/wiki/IT_service_management
Understanding SAN vs NAS vs DAS.. [online] Vanilla Video. Available at: https://vanillavideo.com/blog/2014/started-storage-understanding-san-nas-das [Accessed 30 Jan. 2018].
Cite a Website – Cite This For Me. [online] Available at: https://www.ijastems.org/wp-content/uploads/2017/03/v3.si1_.39.Cloud-Computing-Security-Issues-Challenges-and-its-Solutions-in-Financial-Sectors.pdf [Accessed 30 Jan. 2018].
Transport layer | CCNA Blog. <https://www.ccnablog.com/transport-layer/>.
Cybersecurity implications of IoT in the healthcare industry. [online] Available at: https://www.enterpriseinnovation.net/article/cybersecurity-implications-iot-healthcare-industry-451803924 [Accessed 31 Jan. 2018].
What is IoT Cloud (Salesforce IoT Cloud)? – Definition from WhatIs.com. [online] Available at: <https://searchsalesforce.techtarget.com/definition/IoT-Cloud> [Accessed 31 Jan. 2018].
Social Media Security Risks and How to Avoid Them. [online] Available at: https://blog.hootsuite.com/social-media-security-for-business/ [Accessed 31 Jan. 2018].:
Big Data: The 10 Big challenges that are hindering its adoption. [online] TECHSEEN. Available at: https://techseen.com/2016/04/27/big-data-the-10-big-challenges-that-are-hindering-its-adoption/ [Accessed 31 Jan. 2018].
Cite a Website – Cite This For Me. [online] Available at: https://www.oecd.org/ict/4d/44005687.pdf [Accessed 31 Jan. 2018]
Agile and lean project management : the right formality for your project. [online] Available at: https://www.pmi.org/learning/library/agile-lean-project-management-formality-7992 [Accessed 31 Jan. 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download