Future Trends of ERP

Verified

Added on  2023/03/31

|9
|3432
|126
AI Summary
The resource discusses the emerging trends and future changes in Enterprise Resource Planning (ERP) systems. It explores how ERP systems are evolving to meet new demands and incorporate emerging technologies.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Seagate Personal Cloud 2-Bay NAS drive
https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome-
to-your-personal-cloud-2-bay/
Liu, R. and Gröger, J., Kleine Netzwerkspeicher.
Summary:
Network Attached Storage is a file storage that deals with permitting much number
of users accompanied by the heterogeneous devices that are the devices of the user
enabling to collect data from a source file such as disk and this disk can be fully
centralized. NAS is a part of the LAN but it behaves as an independent node of the
network. Unique IP address serve as the characteristics of the NAS. NAS connects
to the LAN by the help of an Ethernet connection. Three different versions of NAS
are available that are namely 4TB, 6TB and 8TB and are manufactured by the
company Seagate. Cloud backup is provided by making use of the Ethernet, fast
Ethernet and the Gb Ethernet that act as data link protocol. The data link protocol
includes interfaces for example the Ethernet 1000, USB 3.0 and USB 2.0. NAS can
work on a various number of operating systems that include Microsoft Windows
version such as 7, 8, 8.1,10 and vista, Apple MacOS x 10.7 or the later versions.
NAS operates on a single device to serve the purpose of data handling. It comprises
of some of the other elements as well for example the Seagate dashboard that helps
create backup plans. NAS can also be used in creating and handling the media
library of any system with the use of the Smart Copy technique, data back up and the
other attached networks.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
https://www.techspot.com/downloads/301-total-commander.html
Summary:
The users habituated in using Windows prefer File Manager that is normally a
default application that is provided to the user. The third party software related to the
file manager also preferred by some users owing to the additional benefits it is laced
up with. One of them is the Total Commander 9.22a that is considered to be one
amongst the various available high level file manager software linked to the utilizing
2
Document Page
the framework that exists in between the vertical frames. It can be linked with acting
as users describe it as one of the best tools that helps to share huge files on a
frequent basis. The users are able to check the progress of the files that are being
transferred that include the progress of the transfer, the option for resuming or
pausing and many more. To add to these characteristics there are different formats
related to the archive that are provided the required support by this particular tool.
The formats include the GZ, TAR, ZIP, RAR and many others. The files can be
effectively compared on the basis of synchronization, splitting of the data of the files
and merging files that are small in size. The files can be renamed by the help of this
tool and that too it can be saved with different names. The file manager allows its
users to search among the stored files that make it easy to find or open any file as
when required instead of going the set of files present. It consists of an in-built FTP
client with server to server (FXP) and the HTTP server as well.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide
Summary:
FTTP the abbreviation of Fibre to the premises is also referred to as FTTH that is
Fibre to the Home. This refers to certain system that effectively delivers internet
services to the users and is also associated end-to-end connection that is based on
fibre optics. The speed of the internet provided is faster as compared to the FTTC
that is Fibre to the Cabinet. The reason FTTC is faster is that it is fully independent of
the distance between the source and the destination. Its speed does not vary with
the distance it traverses. The downloading speed is near about 330Mbps and the
uploading speed is 30Mbps. It runs from the optical fibre cable that starts form the
telephone exchange and stops at the house of the user. Generally it is connected
outside the user’s property and with this a short length OFC also exists that
establishes the connection to the modem required for the Ethernet connection to the
router. It is more reliable than any other network as it not affected by the VDSL2 or
the ADSL. There are two layouts of FTTP architecture that include Passive Optical
Network (PON) and the Active Ethernet. Other important features that this system is
providing to its users are voice, long lifetime, physically robust and video support.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: TOR
TOR network (2019). TOR network. [ebook] cs.sjsu, p.9. Available at:
http://www.cs.sjsu.edu/faculty/pollett/masters/Semesters/Fall13/akash/Tor_Network.pdf.
3
Document Page
Summary:
TOR is regarded as the open source software that is used by people for surfing the
internet in various numbers of ways. Initially it was designed in order to be deployed
and implemented by the U.S. Naval Research Laboratory as a medium for third
generation onion routing project. This is linked to serve as a medium of protection for
the communications that are conducted by the U.S. navy. This is supported by
Microsoft Windows along with Unixlike that includes the macOS, Android and Linux.
Development of the Onion routing has been accomplished by the medium of the
application layer that exists in the communication protocol stack. TOR is linked to a
similar mechanism that includes utilizing numerous volunteer networks that are
associated with directing the traffic of the internet so as to keep user identity hidden
from any kind of interceptor. The user present at the other end is associated with
decrypting the contents and is linked with locating the next free node. This in turn
makes this a continuous process and is responsible for helping the users in order to
keep their identity hidden while they are surfing the internet.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference: Cryptojacking
https://www.cert.be/sites/default/files/crypto_brochure_en.pdf
https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-
cryptojacking-modern-cash-cow-en.pdf
Summary:
Cryptojacking generally refers to the process by which the attackers are associated
with using the computing devices of the users in a hidden manner. This type of attack
is mainly done so as to mine the crypto currency. The attackers mainly includes the
hackers and the hackers are associated with installing some kind of malicious
program to the devices of the user which in turn makes the hacker capable of mining
the crypt currency secretly. This type of incident happens when the users are
associated with visiting the malicious websites. This in turn would be responsible for
injection of the malicious contents which in turn makes the device get infected.
Cryptography is generally considered to be an illegal act which is generally outlawed
by various laws such as the IT fraud, hacking and so on. Crypto jacking is not only
associated with dealing with resources stealing of the user’s resources but is also
associated with deals with the minimization of the systems processing power. Crypto
jacking is mainly seen to be conducted by the hackers when the system of the
innocent users are in a state of rest and the reason behind this is when the system is
resting the chances related to the tracking of the crypto jacking operations would be
highly reduced.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
Cables are associated with acting as one of the major medium which is responsible
for delivering the online services from the side of the ISP (Internet Service Provider)
to the user. SO any type tampering or damage of the cables would be leading to the
disruption of the entire connection which in turn leads to interception of numerous
operations of the human world which are also important. Six major reasons exists
which are responsible for causing this type of problem and includes the following:
animals,
vandalism,
vehicle damage,
little old ladies and a
Acts of God.
Example of damage by animal was witnessed in the case of Time Warner Cable
which exists in the Western New York. In that incident almost 87 miles of the cables
had to be replaced because the cables were chewed by the squirrel and this incident
took place in the year of 2011. Besides this there are also other animals who are
responsible for damaging the cables like the monkeys, and rats and so on. Another
reason behind the damage to the cables is because of the vehicles having longer
heights where they unknowingly are associated with damaging the cables initially
leading to the service disruption. Natural disaster is one of the major reason lying
behind the harming or damaging of the cables by means of cutting off the connection
which is provided by the cables.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP
https://www.signitysolutions.com/blog/5-trends-2019-shape-future-erp-solutions/
https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83
Summary:
The future trends of ERP are as follows:
Choosing of the cloud by the ERP clients: The traditional ERP systems are
seen to be lacking the integration of the cloud computing method and for this
reason it is expected that many users would be switching to the usage of the
clouds for the purpose of gaining more advantage along with being
associated with the development of the business growth of the organization.
The cloud based ERP is having the capability of providing different kind of
advantages for the comprehensive system by means of minimizing the
number of human resources. It addition to this is also expected that by the
year of 2020 the cloud based industry would be crossing the amount of
around US $411. The cloud based ERP would also be allowing the Enterprise
in having mobility solutions.
5
Document Page
Being ready for sudden updates- Due to the expectations that the system
would be converted to a cloud based one, along with being more developed
and availability of more frequent updates which should necessarily be
implemented by the business. For this reason the business should always be
ready of installing the new updates so as to gain the benefits of the updates
and for being capable of holding a stronger position in this world of
competition.
The blockchain: Implementation of Blockchain technology into the ERP
system, would initially led to making this one of the trusted platform each and
every transactional operations can be conducted in an efficient way.
Additionally the usage of the blockchain technology would be responsible for
the supply chain management activation along with the customer acquisition.
Artificial Intelligence (AI): ERP systems of the future is also going to be
integrated with another technology which would be increasing the
effectiveness of the systems and this technology is machine learning.
Machine learning would be responsible for the services which along with
being free of errors would also be quick. This in turn would be responsible for
helping the associated officials to focus upon the core business activities
which in turn would led to growth of business and organizations development.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference: Exactis data breach incident
https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know
Summary:
one example of cyber-attack which took place in 2018 in the month of June upon
the organization Exacti. This organization is a marketing and aggregation based
organization located in the Palm Coast of Florida. The database of this organization
is having around information of 3.5 billion clients. Vinny Troia an IT expert of the
organization discovered that there has been a breach of data by making use of the
tool known as the Shodan. Additionally he also discovered that almost 7000 of their
databases were provided public access. The breach had led to the exposure of
around 340 million records of the organization. The breached data mainly included
the records included the full details of the stakeholders and personal identity,
hobbies, contacts and so on.
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum
6
Document Page
https://www.scrum.org/resources/what-is-scrum
Summary:
Scrum is agile framework which is mainly associated with emphasizing upon the
management pof the knowledge by putting special attention towards the
development of a software. Despite of the wide spread application of this framework
in the other field it is still having a slow starting which needs to be explored by the
traditional project teams. Scrum is also considered to be light weight process which
is very difficult to master but is user friendly. Additionally the framework is also
responsible for providing of a brief description of the innovative techniques used by a
product which are seen to be flexible along with being durable, feasible and holistic.
This is mainly because of the existence of collaboration between the team members
while operating together for a same product. Some of the key features of scrum
includes the following:
Minimum documentation
Iterative process
Prioritized resources in terms of the business values and the updates
available
Self-organized along with focusing upon customer satisfaction
High customer Involvement
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
https://www.apm.org.uk/sites/default/files/protected/project%20governance%20slides.pdf
Summary:
Project Governance is defined as the critical element of any of the project because of
the accountability and the responsibilities which are associated with the business of
an organization. This is the management framework within which the decisions of the
project are generally made. Due to all this reason it can be stated that the main
function of the project governance is associate dwith including an efficient along with
efficient decision making for any kind of project which in turn is associated with
helping in the business operations development along with the productivity. In
addition to this the project governance is also responsible for providing of
governance to the investments made by an organization regarding the techniques
which along with being logical are also repeatable and robust in nature. There exists
three pillars in project governance which is involves the people, information and the
structure along with four major principles which includes the following:
Existence of a single point of accountability for the success of the project
Availability of Free Project ownership in terms of the assets and services
Segregating the decision-making operations and the stakeholder management
Segregating the organizational governance layout and the project governance.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
Document Page
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]