The resource discusses the emerging trends and future changes in Enterprise Resource Planning (ERP) systems. It explores how ERP systems are evolving to meet new demands and incorporate emerging technologies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION Due date:Thursday Week 11 (2PM AEST) Part:Written Assessment Weighting:30% of total assessment. Submission:Electronic (see course website for details) Please fill in the following details: Student Name Student Number Tutor’s Name Instructions It will be necessary to use online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format. DO NOTcopy content directly from either the text or Internet resources: this assignment is to be in your own words.You will lose marks if you do not use your own words! Please complete your assignment usingthissubmission templatefile, inserting your responses where indicated. DO NOT delete the marking criteria page– changes are permitted to the formatting of other pages including the headers and footers. Tasks There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. Note: Each resource summary should be around 200-300 words. Each summary should briefly explain: -What the resource is about -Why you selected it -What are the main points or key information covered in the resource? -Why the resource was useful. For more advice about how to complete the assignment, as well as examples and information about selecting good resources, please see the assessment page on the Moodle unit web site: https://moodle.cqu.edu.au/mod/assign/view.php?id=886270 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1 The text discusses examples of traditional mass storage such as magnetic disk and solid-state drives. While these still underpin most mass storage, in corporate environments they are often accessed via Network Attached Storage (NAS) or Storage Area Network (SAN) technologies. Find and summariseONEresource that describesEITHERNAS or SAN storage technologies. The resource, and your summary, must focus on either NAS or SAN,NOT BOTH. Title and Reference: Seagate Personal Cloud 2-Bay NAS drive https://www.seagate.com/in/en/manuals/network-storage/seagate-personal-cloud-2bay/welcome- to-your-personal-cloud-2-bay/ Liu, R. and Gröger, J., Kleine Netzwerkspeicher. Summary: Network Attached Storage is a file storage that deals with permitting much number of users accompanied by the heterogeneous devices that are the devices of the user enabling to collect data from a source file such as disk and this disk can be fully centralized. NAS is a part of the LAN but it behaves as an independent node of the network. Unique IP address serve as the characteristics of the NAS. NAS connects to the LAN by the help of an Ethernet connection. Three different versions of NAS are available that are namely 4TB, 6TB and 8TB and are manufactured by the company Seagate. Cloud backup is provided by making use of the Ethernet, fast Ethernet and the Gb Ethernet that act as data link protocol. The data link protocol includes interfaces for example the Ethernet 1000, USB 3.0 and USB 2.0. NAS can work on a various number of operating systems that include Microsoft Windows version such as 7, 8, 8.1,10 and vista, Apple MacOS x 10.7 or the later versions. NAS operates on a single device to serve the purpose of data handling. It comprises of some of the other elements as well for example the Seagate dashboard that helps create backup plans. NAS can also be used in creating and handling the media library of any system with the use of the Smart Copy technique, data back up and the other attached networks. Week 2 Operating systems use file managers to interact with mass storage devices. However, the way in which data is stored and retrieved is dictated by the file system. There are many types of file systems used by modern operating systems. Find and summariseONEresource that describesONEsuch file system that isNOTFAT, FAT32 or ExFAT. The resource, and your summary, must focus onA SINGLEfile system. Title and Reference: Total Commander 9.22a https://www.techspot.com/downloads/301-total-commander.html Summary: The users habituated in using Windows prefer File Manager that is normally a default application that is provided to the user. The third party software related to the file manager also preferred by some users owing to the additional benefits it is laced up with. One of them is the Total Commander 9.22a that is considered to be one amongst the various available high level file manager software linked to the utilizing 2
the framework that exists in between the vertical frames. It can be linked with acting as users describe it as one of the best tools that helps to share huge files on a frequent basis. The users are able to check the progress of the files that are being transferred that include the progress of the transfer, the option for resuming or pausing and many more. To add to these characteristics there are different formats related to the archive that are provided the required support by this particular tool. The formats include the GZ, TAR, ZIP, RAR and many others. The files can be effectively compared on the basis of synchronization, splitting of the data of the files and merging files that are small in size. The files can be renamed by the help of this tool and that too it can be saved with different names. The file manager allows its users to search among the stored files that make it easy to find or open any file as when required instead of going the set of files present. It consists of an in-built FTP client with server to server (FXP) and the HTTP server as well. Week 3 The National Broadband Network (NBN) is currently being rolled-out across Australia and there is a mix of technologies that are being used to deliver Internet services (for example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and summariseONEresource that describesONEof these delivery technologies. The resource, and your summary, must focus onA SINGLEtechnology. Title and Reference: FTTP broadband https://www.thinkbroadband.com/guides/fibre-fttc-ftth-broadband-guide Summary: FTTP the abbreviation of Fibre to the premises is also referred to as FTTH that is Fibre to the Home. This refers to certain system that effectively delivers internet services to the users and is also associated end-to-end connection that is based on fibre optics. The speed of the internet provided is faster as compared to the FTTC that is Fibre to the Cabinet. The reason FTTC is faster is that it is fully independent of the distance between the source and the destination. Its speed does not vary with the distance it traverses. The downloading speed is near about 330Mbps and the uploading speed is 30Mbps. It runs from the optical fibre cable that starts form the telephone exchange and stops at the house of the user. Generally it is connected outside the user’s property and with this a short length OFC also exists that establishes the connection to the modem required for the Ethernet connection to the router. It is more reliable than any other network as it not affected by the VDSL2 or the ADSL. There are two layouts of FTTP architecture that include Passive Optical Network (PON) and the Active Ethernet. Other important features that this system is providing to its users are voice, long lifetime, physically robust and video support. Week 4 The Internet is made up of many interconnected servers and networks. Users are increasingly aware and concerned that their Internet communications can be intercepted and monitored.Toris one technology that allows users to obscure or hide online their online activities. Find and summariseONEresource that describes what Tor is and how it works. The resource, and your summary, must focus purely on Tor. Title and Reference: TOR TOR network (2019).TOR network. [ebook] cs.sjsu, p.9. Available at: http://www.cs.sjsu.edu/faculty/pollett/masters/Semesters/Fall13/akash/Tor_Network.pdf. 3
Summary: TOR is regarded as the open source software that is used by people for surfing the internet in various numbers of ways. Initially it was designed in order to be deployed and implemented by the U.S. Naval Research Laboratory as a medium for third generation onion routing project. This is linked to serve as a medium of protection for the communications that are conducted by the U.S. navy. This is supported by Microsoft Windows along with Unixlike that includes the macOS, Android and Linux. Development of the Onion routing has been accomplished by the medium of the application layer that exists in the communication protocol stack. TOR is linked to a similar mechanism that includes utilizing numerous volunteer networks that are associated with directing the traffic of the internet so as to keep user identity hidden from any kind of interceptor. The user present at the other end is associated with decrypting the contents and is linked with locating the next free node. This in turn makes this a continuous process and is responsible for helping the users in order to keep their identity hidden while they are surfing the internet. Week 5 An emerging form of malware is cryptojacking (also known as malicious cryptomining). Find and summariseONEresource that describes what cryptojacking is and how it works. The resource, and your summary, should focus purely on cryptojacking andNO OTHERform(s) of malware. Title and Reference: Cryptojacking https://www.cert.be/sites/default/files/crypto_brochure_en.pdf https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr- cryptojacking-modern-cash-cow-en.pdf Summary: Cryptojacking generally refers to the process by which the attackers are associated with using the computing devices of the users in a hidden manner. This type of attack is mainly done so as to mine the crypto currency. The attackers mainly includes the hackers and the hackers are associated with installing some kind of malicious program to the devices of the user which in turn makes the hacker capable of mining the crypt currency secretly. This type of incident happens when the users are associated with visiting the malicious websites. This in turn would be responsible for injection of the malicious contents which in turn makes the device get infected. Cryptography is generally considered to be an illegal act which is generally outlawed by various laws such as the IT fraud, hacking and so on. Crypto jacking is not only associated with dealing with resources stealing of the user’s resources but is also associated with deals with the minimization of the systems processing power. Crypto jacking is mainly seen to be conducted by the hackers when the system of the innocent users are in a state of rest and the reason behind this is when the system is resting the chances related to the tracking of the crypto jacking operations would be highly reduced. Week 6 Redundancy is a critical aspect of network design, implemented in order to cope link or equipment failure. One frequent cause of failure is damage to fibre optic cables that connect countries and/or continents. Find and summariseONEresource that describesONEexample of such a cable being cut or damaged. The resource, and your summary, should describe the impacts ofA SINGLE EXAMPLEof a link failure. 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Note that the failure must relate to a link that connects countries and/or continents. Title and Reference: Link failure due to the damage of cable https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks Summary: Cables are associated with acting as one of the major medium which is responsible for delivering the online services from the side of the ISP (Internet Service Provider) to the user. SO any type tampering or damage of the cables would be leading to the disruption of the entire connection which in turn leads to interception of numerous operations of the human world which are also important. Six major reasons exists which are responsible for causing this type of problem and includes the following: animals, vandalism, vehicle damage, little old ladies and a Acts of God. Example of damage by animal was witnessed in the case of Time Warner Cable which exists in the Western New York. In that incident almost 87 miles of the cables had to be replaced because the cables were chewed by the squirrel and this incident took place in the year of 2011. Besides this there are also other animals who are responsible for damaging the cables like the monkeys, and rats and so on. Another reason behind the damage to the cables is because of the vehicles having longer heights where they unknowingly are associated with damaging the cables initially leading to the service disruption. Natural disaster is one of the major reason lying behind the harming or damaging of the cables by means of cutting off the connection which is provided by the cables. Week 7 Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning systems) have become critical to the operation modern organisations. Over this time, ES/ERPs have evolved and continue to change in response to new demands and emerging technologies. Find and summariseONEresource that discusses emerging or future trends for ES/ERPs. The resource should be recent (published since the beginning of 2017) and it and your summary should clearly identify how ES/ERPs are, or are about to, change. Title and Reference: Future trends of ERP https://www.signitysolutions.com/blog/5-trends-2019-shape-future-erp-solutions/ https://medium.com/@gracesam989/future-trends-in-erp-systems-42b0fe582b83 Summary: The future trends of ERP are as follows: Choosing of the cloud by the ERP clients: The traditional ERP systems are seen to be lacking the integration of the cloud computing method and for this reason it is expected that many users would be switching to the usage of the clouds for the purpose of gaining more advantage along with being associated with the development of the business growth of the organization. The cloud based ERP is having the capability of providing different kind of advantages for the comprehensive system by means of minimizing the number of human resources. It addition to this is also expected that by the year of 2020 the cloud based industry would be crossing the amount of around US $411. The cloud based ERP would also be allowing the Enterprise in having mobility solutions. 5
Being ready for sudden updates- Due to the expectations that the system would be converted to a cloud based one, along with being more developed and availability of more frequent updates which should necessarily be implemented by the business. For this reason the business should always be ready of installing the new updates so as to gain the benefits of the updates and for being capable of holding a stronger position in this world of competition. The blockchain: Implementation of Blockchain technology into the ERP system, would initially led to making this one of the trusted platform each and every transactional operations can be conducted in an efficient way. Additionally the usage of the blockchain technology would be responsible for the supply chain management activation along with the customer acquisition. Artificial Intelligence (AI): ERP systems of the future is also going to be integrated with another technology which would be increasing the effectiveness of the systems and this technology is machine learning. Machine learning would be responsible for the services which along with being free of errors would also be quick. This in turn would be responsible for helping the associated officials to focus upon the core business activities which in turn would led to growth of business and organizations development. Week 8 Databases, mass data storage and interrogation technologies underpin virtually all Information Systems and applications. However, the same tools also make it easier for data breaches to occur in government departments or private companies/organisations. In simple terms, a data breach is where private information is illegally obtained or disclosed.Find and summariseONEresource that describesONEexample of a data breach that has occurred since the beginning of 2017.The resource, and your summary, should focus purely onA SINGLE EXAMPLEof a data breach. Title and Reference: Exactis data breach incident https://blog.infoarmor.com/employees/the-exactis-breach-5-things-you-need-to-know Summary: one example of cyber-attack which took place in 2018 in the month of June upon the organization Exacti. This organization is a marketing and aggregation based organization located in the Palm Coast of Florida. The database of this organization is having around information of 3.5 billion clients. Vinny Troia an IT expert of the organization discovered that there has been a breach of data by making use of the tool known as the Shodan. Additionally he also discovered that almost 7000 of their databases were provided public access. The breach had led to the exposure of around 340 million records of the organization. The breached data mainly included the records included the full details of the stakeholders and personal identity, hobbies, contacts and so on. Week 9 Agile development is an iterative and incremental approach to delivering systems - it is particularly useful where the requirements are unclear or evolving. Scrum is a framework for undertaking agile development. Find and summariseONEresource that describesScrum. The resource, and your summary, should focus purely on Scrum and discuss some of its key features and attributes. Title and Reference: Scrum 6
https://www.scrum.org/resources/what-is-scrum Summary: Scrum is agile framework which is mainly associated with emphasizing upon the management pof the knowledge by putting special attention towards the development of a software. Despite of the wide spread application of this framework in the other field it is still having a slow starting which needs to be explored by the traditional project teams. Scrum is also considered to be light weight process which is very difficult to master but is user friendly. Additionally the framework is also responsible for providing of a brief description of the innovative techniques used by a product which are seen to be flexible along with being durable, feasible and holistic. This is mainly because of the existence of collaboration between the team members while operating together for a same product. Some of the key features of scrum includes the following: Minimum documentation Iterative process Prioritized resources in terms of the business values and the updates available Self-organized along with focusing upon customer satisfaction High customer Involvement Week 10 The textbook discusses activities associated with project management. However, it could be argued that project governance is equally important, especially in very large projects. Find and summariseONEresource that describes what project governance is and what activities it entails. The resource, and your summary, should focus purely on project governance. Title and Reference: Project governance https://www.apm.org.uk/sites/default/files/protected/project%20governance%20slides.pdf Summary: Project Governance is defined as the critical element of any of the project because of the accountability and the responsibilities which are associated with the business of an organization. This is the management framework within which the decisions of the project are generally made. Due to all this reason it can be stated that the main function of the project governance is associate dwith including an efficient along with efficient decision making for any kind of project which in turn is associated with helping in the business operations development along with the productivity. In addition to this the project governance is also responsible for providing of governance to the investments made by an organization regarding the techniques which along with being logical are also repeatable and robust in nature. There exists three pillars in project governance which is involves the people, information and the structure along with four major principles which includes the following: Existence of a single point of accountability for the success of the project Availability of Free Project ownership in terms of the assets and services Segregating the decision-making operations and the stakeholder management Segregating the organizational governance layout and the project governance. 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
MARKING SHEET - DO NOT DELETE Criteria 0No Response <=1Poor resource selection; resource is too broad or lacks relevance to the task; summary fails to explain what the resource was about; the relevance and/or usefulness of the resource has not been explained. <=2Good resource selection; resource is relevant to the task; summary is adequate but may require either more detail or is too long; the relevance and/or usefulness of the resource has been explained to some extent, but needs additional information. <=3Excellent resource selection; resource is highly relevant to the task (the resource is probably highly specialised); summary is detailed yet concise; the relevance and usefulness of the resource selection has been clearly explained. Key Deductions -3 -2 -1 Reference/URL provided does not link to resource (and resource cannot be located or determined from details provided) OR Reference/URL provided does not relate to the summary (i.e. summary is not of resource content/contains content not contained in the resource) OR Multiple resources used for a single task Resource is generic AND/OR covers multiple technologies/examples rather than focuses on a single technology/example Resource not referenced correctly/not in Harvard format WeekMarks Awarded 1 2 3 4 5 6 7 8 9 10 TOTAL Comments: 9