Importance of Network Attached Storage (NAS) in Corporate Environments
VerifiedAdded on  2023/03/30
|9
|3464
|318
AI Summary
This article discusses the importance of Network Attached Storage (NAS) in corporate environments. NAS is a file-level computer data storage server connected to a computer network, providing better data access to a group of customers. It allows for centralized data collection and offers various storage capacities. NAS is independent of network nodes and provides cloud backup options. It is a reliable and flexible solution for managing network-related storage.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please
ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource?
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=886270
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Network attached storage
SearchStorage. (2019). What is network-attached storage (NAS)? - Definition from
WhatIs.com. [online] Available at:
https://searchstorage.techtarget.com/definition/network-attached-storage [Accessed
30 May 2019].
https://searchstorage.techtarget.com/definition/network-attached-storage
The article describes about the network attached storage in details. Network-
attached storage (NAS) is mainly referred to the file-level computer data storage
server that is connected to a computer network for the purpose of providing better
data access to a various group of customers. NAS is dedicated for the purpose of
allocating files either by its hardware or with the help of software. Network attached
storage is mainly referred to the file storage type that allows the users to collect the
data from a centralised disk.
ï‚· The NAS tends to be independent of network node that are further
determined with the help of identical IP addresses.
ï‚· This are mainly in the form of storing devices that are used for the purpose of
storing data related to the customers and organizations.
ï‚· The connections are mainly available in different three variants that are 4TB,
8TB and 6TB respectively. In addition to this in order to provide cloud backup
towards the network that takes backup from Ethernet, Gb Ethernet and the
fast Ethernet that acts as a link.
The major components that are associated with the system includes creating a
dashboard that will help in providing better support towards the media and will
ensure better way of managing the system. Thus from the above description it can
be concluded that the system offers better way of managing the network related
storage.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
Thornton, B. (2019). Total Commander 9.22a - System & Desktop Tools -
Downloads. [online] Tech Advisor. Available at:
https://www.techadvisor.co.uk/download/system-desktop-tools/total-commander-
922a-3249862/ [Accessed 30 May 2019].
2
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource, and your
summary, must focus on either NAS or SAN, NOT BOTH.
Title and Reference: Network attached storage
SearchStorage. (2019). What is network-attached storage (NAS)? - Definition from
WhatIs.com. [online] Available at:
https://searchstorage.techtarget.com/definition/network-attached-storage [Accessed
30 May 2019].
https://searchstorage.techtarget.com/definition/network-attached-storage
The article describes about the network attached storage in details. Network-
attached storage (NAS) is mainly referred to the file-level computer data storage
server that is connected to a computer network for the purpose of providing better
data access to a various group of customers. NAS is dedicated for the purpose of
allocating files either by its hardware or with the help of software. Network attached
storage is mainly referred to the file storage type that allows the users to collect the
data from a centralised disk.
ï‚· The NAS tends to be independent of network node that are further
determined with the help of identical IP addresses.
ï‚· This are mainly in the form of storing devices that are used for the purpose of
storing data related to the customers and organizations.
ï‚· The connections are mainly available in different three variants that are 4TB,
8TB and 6TB respectively. In addition to this in order to provide cloud backup
towards the network that takes backup from Ethernet, Gb Ethernet and the
fast Ethernet that acts as a link.
The major components that are associated with the system includes creating a
dashboard that will help in providing better support towards the media and will
ensure better way of managing the system. Thus from the above description it can
be concluded that the system offers better way of managing the network related
storage.
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary, must focus on A SINGLE file
system.
Title and Reference: Total Commander 9.22a
Thornton, B. (2019). Total Commander 9.22a - System & Desktop Tools -
Downloads. [online] Tech Advisor. Available at:
https://www.techadvisor.co.uk/download/system-desktop-tools/total-commander-
922a-3249862/ [Accessed 30 May 2019].
2
https://www.techadvisor.co.uk/download/system-desktop-tools/total-commander-
922a-3249862/
Summary:
This article has described the importance of total commander 9.22a. It is observed
that the windows users prefer the default file manager as compared to other
manager for handling the files. This part is going to described about the importance
of total commander 9.22a. Total commander 9.22a is one of the high level file
manager software that helps in utilizing the frameworks effectively from two vertical
frames. One of the major benefits that is offered with the use of this file manager is
that it helps in comparing the files with respect to the file synchronization process,
splits up the big contents and merges the files for ensuring better storage. The users
have provided with the facility to user proper resources for managing the huge file
effectively. The different file formats that are supported with this software include the
RAR, ZIP, GZ and TAR and many more formats. The main reason behind choosing
this article is that it has highlighted the importance of using total commander 9.22a.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
Broadbandchoices.co.uk. (2019). FTTP vs FTTP broadband | broadbandchoices.
[online] Available at: https://www.broadbandchoices.co.uk/guides/broadband/fttp-vs-
fttc [Accessed 30 May 2019].
https://www.broadbandchoices.co.uk/guides/broadband/fttp-vs-fttc
Summary:
The above article has described about the use of FTTP broadband in networks.
FTTP stands for fiver to the home that is purely a fibre-optic cable connection
provided you to words the users home or business. FTTP is mainly a process of
delivering the products that are encrypted to end to end connection. The major two
outlets that are offered with FTTP are passive optical network and active Ethernet.
Benefits that are offered with fibre to the premises include a faster connection
speeds are provided towards the transmission. These offers better carrying capacity
as compared to other conductors it. This makes the connection more reliable to
words the users and also offers a great flexibility to words the customers. This has
the potential to deliver the product quickly without any problems. The main reason
behind faster transmission is that the fibre to the premises is independent of the
distance that helps in transferring the data effectively without any loss. Speed offered
with the Internet does not get hampered due to the distance and hence it is most
preferred by the customers. The fibre are generally connected with the users at the
peripheral of the office premises or houses that are further connected with the short
OFC that provides better Internet connection towards the broadband router.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
3
922a-3249862/
Summary:
This article has described the importance of total commander 9.22a. It is observed
that the windows users prefer the default file manager as compared to other
manager for handling the files. This part is going to described about the importance
of total commander 9.22a. Total commander 9.22a is one of the high level file
manager software that helps in utilizing the frameworks effectively from two vertical
frames. One of the major benefits that is offered with the use of this file manager is
that it helps in comparing the files with respect to the file synchronization process,
splits up the big contents and merges the files for ensuring better storage. The users
have provided with the facility to user proper resources for managing the huge file
effectively. The different file formats that are supported with this software include the
RAR, ZIP, GZ and TAR and many more formats. The main reason behind choosing
this article is that it has highlighted the importance of using total commander 9.22a.
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Title and Reference: FTTP broadband
Broadbandchoices.co.uk. (2019). FTTP vs FTTP broadband | broadbandchoices.
[online] Available at: https://www.broadbandchoices.co.uk/guides/broadband/fttp-vs-
fttc [Accessed 30 May 2019].
https://www.broadbandchoices.co.uk/guides/broadband/fttp-vs-fttc
Summary:
The above article has described about the use of FTTP broadband in networks.
FTTP stands for fiver to the home that is purely a fibre-optic cable connection
provided you to words the users home or business. FTTP is mainly a process of
delivering the products that are encrypted to end to end connection. The major two
outlets that are offered with FTTP are passive optical network and active Ethernet.
Benefits that are offered with fibre to the premises include a faster connection
speeds are provided towards the transmission. These offers better carrying capacity
as compared to other conductors it. This makes the connection more reliable to
words the users and also offers a great flexibility to words the customers. This has
the potential to deliver the product quickly without any problems. The main reason
behind faster transmission is that the fibre to the premises is independent of the
distance that helps in transferring the data effectively without any loss. Speed offered
with the Internet does not get hampered due to the distance and hence it is most
preferred by the customers. The fibre are generally connected with the users at the
peripheral of the office premises or houses that are further connected with the short
OFC that provides better Internet connection towards the broadband router.
Week 4
The Internet is made up of many interconnected servers and networks. Users are
3
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: TOR
BleepingComputer.com. (2019). Is Tor totally safe? - General Security. [online]
Available at: https://www.bleepingcomputer.com/forums/t/627540/is-tor-totally-safe/
[Accessed 30 May 2019].
https://www.bleepingcomputer.com/forums/t/627540/is-tor-totally-safe/
Summary:
TOR is one of the open source software that utilizes the Internet for providing better
surfing facility towards the users. Tor helps in protecting the user’s privacy by
providing better support towards the surfing history. The major weaknesses that are
identified with the Tor is that it does not have the potential to protect the network from
traffic by early monitoring the system. However Tor is considered to be one of the
most resilient systems for fingerprinting techniques within the website.
The levels of security that are identified within the tor browsers include the low level
security that provides the most usable ability towards the users. The medium level
applies proper mechanism for better security towards the users. The high level
security includes javascript default on the sites. The major benefits that are identified
within the system is that it ensures better way of reducing risks that can takes place
maliciously attacks. This includes onion routing for the purpose of including
encryption within the applications layer. The file transmission becomes easy as the
client associated with the transfer protocol ensures that the task is being conducted
effectively without any error. Thus from the above description it can be stated that the
TOR offers a better way of transferring the data.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference:Cryptojacking
Nadeau, M. (2019). What is cryptojacking? How to prevent, detect, and recover from
it. [online] CSO Online. Available at:
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html [Accessed 30 May 2019].
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html
Summary:
Cryptojacking is referred towards the technology that provides the user with secret
access towards the devices. In crypto jacking attack the hacker install’s program
within the victims system without their knowledge. This hampers the performance of
the system and leads to complete disruption. Crypto jacking is one of the emerging
form of malware attack that hides themselves within the devices and steals all the
4
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
Title and Reference: TOR
BleepingComputer.com. (2019). Is Tor totally safe? - General Security. [online]
Available at: https://www.bleepingcomputer.com/forums/t/627540/is-tor-totally-safe/
[Accessed 30 May 2019].
https://www.bleepingcomputer.com/forums/t/627540/is-tor-totally-safe/
Summary:
TOR is one of the open source software that utilizes the Internet for providing better
surfing facility towards the users. Tor helps in protecting the user’s privacy by
providing better support towards the surfing history. The major weaknesses that are
identified with the Tor is that it does not have the potential to protect the network from
traffic by early monitoring the system. However Tor is considered to be one of the
most resilient systems for fingerprinting techniques within the website.
The levels of security that are identified within the tor browsers include the low level
security that provides the most usable ability towards the users. The medium level
applies proper mechanism for better security towards the users. The high level
security includes javascript default on the sites. The major benefits that are identified
within the system is that it ensures better way of reducing risks that can takes place
maliciously attacks. This includes onion routing for the purpose of including
encryption within the applications layer. The file transmission becomes easy as the
client associated with the transfer protocol ensures that the task is being conducted
effectively without any error. Thus from the above description it can be stated that the
TOR offers a better way of transferring the data.
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary, should focus purely on
cryptojacking and NO OTHER form(s) of malware.
Title and Reference:Cryptojacking
Nadeau, M. (2019). What is cryptojacking? How to prevent, detect, and recover from
it. [online] CSO Online. Available at:
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html [Accessed 30 May 2019].
https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html
Summary:
Cryptojacking is referred towards the technology that provides the user with secret
access towards the devices. In crypto jacking attack the hacker install’s program
within the victims system without their knowledge. This hampers the performance of
the system and leads to complete disruption. Crypto jacking is one of the emerging
form of malware attack that hides themselves within the devices and steals all the
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
computing sources stored within the system and impacts the online currencies like
bitcoins. Cryptojacking can be installed within a system by different forms. This can
be through the use of script or with the help of malicious contents that are being
obtained directly from the website. Cryptojacking is mainly referred to the illegal
operations that can lead huge problems within an organisation. The main reason
behind using this approach for hacking the victims system is that it is one of the
cheapest way to perform the attacks. Cryptojacking has great influence on a person
data and it becomes quite difficult to identify the hackers as the chances of tracking
the attackers get reduced. This provides better opportunity towards the attackers.
Thus it can be stated that cryptojacking is one of the emerging threats that are
needed to be mitigated.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
Byrne, J. (2019). The six biggest causes of damage to fiber networks. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/the-six-biggest-causes-of-
damage-to-fiber-networks [Accessed 30 May 2019].
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
There are several cases in which the link failure occurs that hampers the
overall performance of the system. This possesses the ability to minimize the
efficiency offered by the cables towards their respective users. This part will focus on
describing the example of link failure. Cable plays a primary role in the delivery
process. This ensures that proper transmission is taking place between the user and
the online services. This ensures that proper transmission is taking without any
interruption. Damages within the cable can lead to impacting the operations of the
line hugely.
The damages can be a result of external interference or someone tampering it
from inside for causing data loss. This damage can occur due to animals, vandalism,
due to vehicles, changes in weathers and if someone tries to tamper the cable. One
of the main reasons behind failure of the links is that the interruption caused due to
natural disasters. This has the potential to impact the overall performance of the
remission. The incident of 2011, one of the Armenians residence tampered with the
cable that lead to internet disruptions for 5 hours. This leads to impacting the
transmission process and also has the potential to impact the overall performance of
Armenians.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
5
bitcoins. Cryptojacking can be installed within a system by different forms. This can
be through the use of script or with the help of malicious contents that are being
obtained directly from the website. Cryptojacking is mainly referred to the illegal
operations that can lead huge problems within an organisation. The main reason
behind using this approach for hacking the victims system is that it is one of the
cheapest way to perform the attacks. Cryptojacking has great influence on a person
data and it becomes quite difficult to identify the hackers as the chances of tracking
the attackers get reduced. This provides better opportunity towards the attackers.
Thus it can be stated that cryptojacking is one of the emerging threats that are
needed to be mitigated.
Week 6
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fibre optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary, should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
Title and Reference: Link failure due to the damage of cable
Byrne, J. (2019). The six biggest causes of damage to fiber networks. [online] Ppc-
online.com. Available at: https://www.ppc-online.com/blog/the-six-biggest-causes-of-
damage-to-fiber-networks [Accessed 30 May 2019].
https://www.ppc-online.com/blog/the-six-biggest-causes-of-damage-to-fiber-networks
Summary:
There are several cases in which the link failure occurs that hampers the
overall performance of the system. This possesses the ability to minimize the
efficiency offered by the cables towards their respective users. This part will focus on
describing the example of link failure. Cable plays a primary role in the delivery
process. This ensures that proper transmission is taking place between the user and
the online services. This ensures that proper transmission is taking without any
interruption. Damages within the cable can lead to impacting the operations of the
line hugely.
The damages can be a result of external interference or someone tampering it
from inside for causing data loss. This damage can occur due to animals, vandalism,
due to vehicles, changes in weathers and if someone tries to tamper the cable. One
of the main reasons behind failure of the links is that the interruption caused due to
natural disasters. This has the potential to impact the overall performance of the
remission. The incident of 2011, one of the Armenians residence tampered with the
cable that lead to internet disruptions for 5 hours. This leads to impacting the
transmission process and also has the potential to impact the overall performance of
Armenians.
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation modern organisations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
5
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP systems
Skyward Techno Blog. (2019). 10 Steps to Successful ERP Implementation -
Skyward Techno Blog. [online] Available at: http://www.skywardtechno.com/blog/erp-
implementation-steps/ [Accessed 30 May 2019].
http://www.skywardtechno.com/blog/erp-implementation-steps/
Summary:
ERP system is mainly implemented for the purpose of enhancing the business
growth rate. Main feature that is offered with an ERP system includes sharing their
database is it that supported the multiple functions used between different business
units. The ERP system provides a use advantages to words the organization. This
improves the productivity, increase is the efficiency and streamlines the proceeds by
decreasing the cost associated with the project. Future implications that an
associated we eat ERP are described below:
ï‚· Businesses are prepared for emergency purposes and ensure that proper
control is it gained over the system. The block chain introduced within the
ERP system as it will help me in performing the transaction effective live
without any doubt.
ï‚· The system has also implement artificial intelligence for understanding the
services provided by the organisation. The major advantages that are offered
with ERP include greater productivity, efficient working, ensures better way of
managing the costs and the processes can be streamlined properly.
ï‚· It is being expected that in future it will become easy to maintain update for
the organization as the system is going to be developed based on the cloud.
This will provide frequent updates towards the users. Thus with the ERP
implementation within an organization it can be stated that the functioning of
the organization will get improved.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference:Exactis data breach incident
PYMNTS.com. (2019). | PYMNTS.com. [online] Available at:
https://www.pymnts.com/legal/2018/exactis-data-breach-class-action-lawsuit/
[Accessed 30 May 2019].
https://www.pymnts.com/legal/2018/exactis-data-breach-class-action-lawsuit/
Summary:
With the growing technology it has been observed that the issues with data safety
have also increased hugely. Data breaches have became one of the major concern
6
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are, or are about to, change.
Title and Reference: Future trends of ERP systems
Skyward Techno Blog. (2019). 10 Steps to Successful ERP Implementation -
Skyward Techno Blog. [online] Available at: http://www.skywardtechno.com/blog/erp-
implementation-steps/ [Accessed 30 May 2019].
http://www.skywardtechno.com/blog/erp-implementation-steps/
Summary:
ERP system is mainly implemented for the purpose of enhancing the business
growth rate. Main feature that is offered with an ERP system includes sharing their
database is it that supported the multiple functions used between different business
units. The ERP system provides a use advantages to words the organization. This
improves the productivity, increase is the efficiency and streamlines the proceeds by
decreasing the cost associated with the project. Future implications that an
associated we eat ERP are described below:
ï‚· Businesses are prepared for emergency purposes and ensure that proper
control is it gained over the system. The block chain introduced within the
ERP system as it will help me in performing the transaction effective live
without any doubt.
ï‚· The system has also implement artificial intelligence for understanding the
services provided by the organisation. The major advantages that are offered
with ERP include greater productivity, efficient working, ensures better way of
managing the costs and the processes can be streamlined properly.
ï‚· It is being expected that in future it will become easy to maintain update for
the organization as the system is going to be developed based on the cloud.
This will provide frequent updates towards the users. Thus with the ERP
implementation within an organization it can be stated that the functioning of
the organization will get improved.
Week 8
Databases, mass data storage and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organisations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource, and your summary, should focus purely on A SINGLE
EXAMPLE of a data breach.
Title and Reference:Exactis data breach incident
PYMNTS.com. (2019). | PYMNTS.com. [online] Available at:
https://www.pymnts.com/legal/2018/exactis-data-breach-class-action-lawsuit/
[Accessed 30 May 2019].
https://www.pymnts.com/legal/2018/exactis-data-breach-class-action-lawsuit/
Summary:
With the growing technology it has been observed that the issues with data safety
have also increased hugely. Data breaches have became one of the major concern
6
of every organisation. This is referred to the type of attack that can hamper the
overall performance of an organisation and also possesses the ability to impact the
customer. Database basically stores huge data and information related to the
organisation and about the customers. Thus it becomes a sensual to implement
proper measures for awarding such breaches.
Exactica is data marketing and aggregation organisation that is located in the
Palm coast, Florida. In last year the organisation faced a huge data breach that
impacted millions of peoples associated with the organisation. When the breach took
place the organisation contained data of around 3.5 billion users. This data got
beached that contained details regarding the customers bank id and other
confidential data. This data breach was considered as one of the biggest data
breaches that impacted the overall performance or the organisation. After the data
got breached it was identified that the system contained data of more than million
peoples from which around 340 million records got hacked. This contained details
regarding the customers including house details and bank data.
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum methodology
Scrummethodology.com. (2019). An Empirical Framework For Learning (Not a
Methodology). [online] Available at: http://scrummethodology.com/ [Accessed 30 May
2019].
http://scrummethodology.com/
Summary:
Scrum methodology is a project management methodology that helps in
managing the project that are mainly related to software development. Scrum follows
agile framework for the purpose of managing the knowledge associated with the
work. The scrum methodologyis developed on the basis of scum principles. The
major principles that are associated with scrum include time boxing, iterative
development process, empirical process control, self organisation, collaboration and
value-based prioritisation. Scrum principles acts as a core guideline for scrum
framework and it becomes essential to use diesel principle while conducting a project
based on scrum methodology.Scrum methodology is light and offers a flexible
architecture towards the developer. Thus it is considered by maximum project
manager for developing their projects.
The major features associated with the scrum methodology are that it requires a
minimum documentation process that helps in enhancing the product. Scrum tends
to follow iterative process and includes high customer’s involvement rate. This
development process mainly focuses on improving the customer satisfaction rate by
providing flexible way of handling the project. The scrum methodology is considered
as the most innovative technique that offers better support towards. The customers
along with better interfaces. Thus it can be stated that the scrum methodology is one
of the best adapted methodology for the project managers.
7
overall performance of an organisation and also possesses the ability to impact the
customer. Database basically stores huge data and information related to the
organisation and about the customers. Thus it becomes a sensual to implement
proper measures for awarding such breaches.
Exactica is data marketing and aggregation organisation that is located in the
Palm coast, Florida. In last year the organisation faced a huge data breach that
impacted millions of peoples associated with the organisation. When the breach took
place the organisation contained data of around 3.5 billion users. This data got
beached that contained details regarding the customers bank id and other
confidential data. This data breach was considered as one of the biggest data
breaches that impacted the overall performance or the organisation. After the data
got breached it was identified that the system contained data of more than million
peoples from which around 340 million records got hacked. This contained details
regarding the customers including house details and bank data.
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary, should focus purely on
Scrum and discuss some of its key features and attributes.
Title and Reference: Scrum methodology
Scrummethodology.com. (2019). An Empirical Framework For Learning (Not a
Methodology). [online] Available at: http://scrummethodology.com/ [Accessed 30 May
2019].
http://scrummethodology.com/
Summary:
Scrum methodology is a project management methodology that helps in
managing the project that are mainly related to software development. Scrum follows
agile framework for the purpose of managing the knowledge associated with the
work. The scrum methodologyis developed on the basis of scum principles. The
major principles that are associated with scrum include time boxing, iterative
development process, empirical process control, self organisation, collaboration and
value-based prioritisation. Scrum principles acts as a core guideline for scrum
framework and it becomes essential to use diesel principle while conducting a project
based on scrum methodology.Scrum methodology is light and offers a flexible
architecture towards the developer. Thus it is considered by maximum project
manager for developing their projects.
The major features associated with the scrum methodology are that it requires a
minimum documentation process that helps in enhancing the product. Scrum tends
to follow iterative process and includes high customer’s involvement rate. This
development process mainly focuses on improving the customer satisfaction rate by
providing flexible way of handling the project. The scrum methodology is considered
as the most innovative technique that offers better support towards. The customers
along with better interfaces. Thus it can be stated that the scrum methodology is one
of the best adapted methodology for the project managers.
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
Pmi.org.(2019). Project governance. [online] Available at:
https://www.pmi.org/learning/library/project-governance-critical-success-9945
[Accessed 30 May 2019].
https://www.pmi.org/learning/library/project-governance-critical-success-9945
Summary:
Project management focuses mainly on delivering the project with implementing
proper objectives. This helps in completing the project within the given budget and
cost. Project governance focuses mainly on creating an effective framework that will
provide better support towards the development process and will ensure that proper
right is provided towards the people. Project governance helps in making effective
decision that will be beneficial for maximum people. With the help of an effective
project governance framework it becomes easy to handle the decision making
process and also ensures that the project is being developed with necessary
requirements.
The major components associated with the project governance includes with the
governance model, accountability and responsibilities, stakeholder engagement,
communication taking place between the stakeholders, issues related to
management, as students and proper project management control processes.
Project governance ensures that proper policies are being developed for the
organisation conducting the project so that it can change the tasks effectively. The
principle that is followed by the project governance includes proper surety about a
single point accountability associated with the project success. This also ensures that
proper divisions is made for performing the stakeholders engagement efficiently.
Thus it can be stated that project governance plays a crucial role in the development
of a project.
8
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary, should focus purely
on project governance.
Title and Reference: Project governance
Pmi.org.(2019). Project governance. [online] Available at:
https://www.pmi.org/learning/library/project-governance-critical-success-9945
[Accessed 30 May 2019].
https://www.pmi.org/learning/library/project-governance-critical-success-9945
Summary:
Project management focuses mainly on delivering the project with implementing
proper objectives. This helps in completing the project within the given budget and
cost. Project governance focuses mainly on creating an effective framework that will
provide better support towards the development process and will ensure that proper
right is provided towards the people. Project governance helps in making effective
decision that will be beneficial for maximum people. With the help of an effective
project governance framework it becomes easy to handle the decision making
process and also ensures that the project is being developed with necessary
requirements.
The major components associated with the project governance includes with the
governance model, accountability and responsibilities, stakeholder engagement,
communication taking place between the stakeholders, issues related to
management, as students and proper project management control processes.
Project governance ensures that proper policies are being developed for the
organisation conducting the project so that it can change the tasks effectively. The
principle that is followed by the project governance includes proper surety about a
single point accountability associated with the project success. This also ensures that
proper divisions is made for performing the stakeholders engagement efficiently.
Thus it can be stated that project governance plays a crucial role in the development
of a project.
8
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent,but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
9
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.