Coit 20246 Submission Assignment 2022
VerifiedAdded on 2022/10/11
|12
|5229
|14
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
ANAX: a unified MIMD-SIMD acceleration for generative adversarial networks
https://dl.acm.org/citation.cfm?id=3276603
Yazdanbakhsh, A., Samadi, K., Kim, N.S. and Esmaeilzadeh, H., 2018, June. Ganax:
A unified mimd-simd acceleration for generative adversarial networks. In
Proceedings of the 45th Annual International Symposium on Computer Architecture
(pp. 650-661). IEEE Press.
What the resource is about:
The article describes a unified kind of MIND-SIMD design intended for GANAX. This
leverages the constant patterns in computation for creating different microprograms
executing in SIDM mode concurrently. The article helps in understanding that parallel
computing can work through distinguishing huge issues to small concerns. These are
resolves simultaneously. MIMD and SIMD are distinct architectures of parallel
computing using many processors. Besides, many systems are used for processing
information. Here, SIMD denotes to the “Single Instruction stream Multiple Data
streams”. On the other hand, MIMD refers to “Multiple Instruction streams Multiple
Data streams”. MIMD and SIMD architectures are able to perform some type of
primary functions. However, they differ technically and practically.
Why it is selected:
The article is selected because The MIMD architecture helps to perform various
tasks at the same time in several pieces of information. Here, one instance is to
undertake different mathematical calculations at the same time. It occurs at the same
time to resolve complicated problems having distinct elements.
Key information covered in the resource:
In the article, the author describes that Rregarding practical differences, SIMD is
utilized or concerns need many computations with the processors that have been
performing similar tasks at the parallel line. Moreover, MIMD can be frequently
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
ANAX: a unified MIMD-SIMD acceleration for generative adversarial networks
https://dl.acm.org/citation.cfm?id=3276603
Yazdanbakhsh, A., Samadi, K., Kim, N.S. and Esmaeilzadeh, H., 2018, June. Ganax:
A unified mimd-simd acceleration for generative adversarial networks. In
Proceedings of the 45th Annual International Symposium on Computer Architecture
(pp. 650-661). IEEE Press.
What the resource is about:
The article describes a unified kind of MIND-SIMD design intended for GANAX. This
leverages the constant patterns in computation for creating different microprograms
executing in SIDM mode concurrently. The article helps in understanding that parallel
computing can work through distinguishing huge issues to small concerns. These are
resolves simultaneously. MIMD and SIMD are distinct architectures of parallel
computing using many processors. Besides, many systems are used for processing
information. Here, SIMD denotes to the “Single Instruction stream Multiple Data
streams”. On the other hand, MIMD refers to “Multiple Instruction streams Multiple
Data streams”. MIMD and SIMD architectures are able to perform some type of
primary functions. However, they differ technically and practically.
Why it is selected:
The article is selected because The MIMD architecture helps to perform various
tasks at the same time in several pieces of information. Here, one instance is to
undertake different mathematical calculations at the same time. It occurs at the same
time to resolve complicated problems having distinct elements.
Key information covered in the resource:
In the article, the author describes that Rregarding practical differences, SIMD is
utilized or concerns need many computations with the processors that have been
performing similar tasks at the parallel line. Moreover, MIMD can be frequently
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
utilized or issues breaking down the algorithms to independent and distinct elements.
Here every part assigned to distinct processor for same type of solution.
Why the resource was useful:
I found this article useful because it demonstrates that there are technical
differences. MIMD and SIMD are different from technical point of view. The SIMD
processes are faster, cheaper, smaller and simpler than the processors of MIMD.
However, MIMD is able to undertake many complex tasks. Nevertheless, the MIMD
tasks that can be accomplished by SIMD has been tending to be taking much time
having SIMD. Again, the SIMD processors should be performing complicated tasks in
sequential way.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Deadlock Avoidance Algorithms and Implementation: A Matrix Based Approach
https://www.taylorfrancis.com/books/e/9781315214665/chapters/
10.1201/9781315214665-13
Mireles Jr, J., Lewis, F., Giirel, A. and Bogdan, S., 2018. Deadlock Avoidance
Algorithms and Implementation: A Matrix Based Approach. In Deadlock Resolution in
Computer-Integrated Systems (pp. 205-254). CRC Press.
What the resource is about:
The article describes the fact that there are various approaches existing for
controlling the sequences of resource dispatching. This involves the FIFO r first-in-
first-out, FBPS or first-buffer-first-serve, LBFS or last-buffer-first-serve, EDD or
earliest-due-date, LS or least-slack and others. It is shown that rigorous assessment
of the algorithms is performed for the case of the buffer lengths that are unbounded.
It is highlighted that the yields of LBFS as bounded through the stability of buffer for
the case of one part reentrant flow-line or R. Nevertheless, for the real system of
manufacturing the lengths of buffer are finitely introducing the probability of deadlock
in the system. Here, the article shows the measure to avoid the MRF deadlock
having finite amount of buffers through limiting the WP at specifically complex
subsystems that are related to the siphon structures. It is the rigorous concept that is
related to the concept of CONWIP.
Why it is selected:
The article is selected because every calculation are done through the algorithms of
straight forward matrix that involves the computing of complex sub-parts for the RFL
of specific common class. It can be furthermore broadened for including extra logic
for rising parallelism. Here, temporary deadlocks can happen otherwise.
Key information covered in the resource:
I found this article useful because for all the stages to include more logic, more
overhead is added. Here, the resource was helpful as some of the instances involve
the broadening of super-thread mechanism of locking for considering every subset of
the present locks.
Why the resource was useful:
In the article, the author describes that the WFG or Wait-For-Graph algorithms can
track every cycle causing deadlocks that involve the temporary kind of deadlocks.
Further, heuristic algorithms never rise the parallelism to the entire spaces here
temporary deadlocks are there. Nevertheless, it comprised through solving then
2
Here every part assigned to distinct processor for same type of solution.
Why the resource was useful:
I found this article useful because it demonstrates that there are technical
differences. MIMD and SIMD are different from technical point of view. The SIMD
processes are faster, cheaper, smaller and simpler than the processors of MIMD.
However, MIMD is able to undertake many complex tasks. Nevertheless, the MIMD
tasks that can be accomplished by SIMD has been tending to be taking much time
having SIMD. Again, the SIMD processors should be performing complicated tasks in
sequential way.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Deadlock Avoidance Algorithms and Implementation: A Matrix Based Approach
https://www.taylorfrancis.com/books/e/9781315214665/chapters/
10.1201/9781315214665-13
Mireles Jr, J., Lewis, F., Giirel, A. and Bogdan, S., 2018. Deadlock Avoidance
Algorithms and Implementation: A Matrix Based Approach. In Deadlock Resolution in
Computer-Integrated Systems (pp. 205-254). CRC Press.
What the resource is about:
The article describes the fact that there are various approaches existing for
controlling the sequences of resource dispatching. This involves the FIFO r first-in-
first-out, FBPS or first-buffer-first-serve, LBFS or last-buffer-first-serve, EDD or
earliest-due-date, LS or least-slack and others. It is shown that rigorous assessment
of the algorithms is performed for the case of the buffer lengths that are unbounded.
It is highlighted that the yields of LBFS as bounded through the stability of buffer for
the case of one part reentrant flow-line or R. Nevertheless, for the real system of
manufacturing the lengths of buffer are finitely introducing the probability of deadlock
in the system. Here, the article shows the measure to avoid the MRF deadlock
having finite amount of buffers through limiting the WP at specifically complex
subsystems that are related to the siphon structures. It is the rigorous concept that is
related to the concept of CONWIP.
Why it is selected:
The article is selected because every calculation are done through the algorithms of
straight forward matrix that involves the computing of complex sub-parts for the RFL
of specific common class. It can be furthermore broadened for including extra logic
for rising parallelism. Here, temporary deadlocks can happen otherwise.
Key information covered in the resource:
I found this article useful because for all the stages to include more logic, more
overhead is added. Here, the resource was helpful as some of the instances involve
the broadening of super-thread mechanism of locking for considering every subset of
the present locks.
Why the resource was useful:
In the article, the author describes that the WFG or Wait-For-Graph algorithms can
track every cycle causing deadlocks that involve the temporary kind of deadlocks.
Further, heuristic algorithms never rise the parallelism to the entire spaces here
temporary deadlocks are there. Nevertheless, it comprised through solving then
2
insufficient sectors that the overhead or performance versus the parallelism is seen
to be acceptable.
3
to be acceptable.
3
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
https://www.mdpi.com/1424-8220/16/11/1884
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons learnt.
Sensors, 16(11), p.1884.
What the resource is about:
The article describes that the development of productivity of the farm is important to
raise the profitability of farm and meet the fast demand of growth for food. These are
fuelled through quick growth of population. This can be enhanced through rise in
forecasting and understanding the performance of crop at various environmental
situations. The recommendations of crop are at present based on the collected data
at the studies of field-based agriculture capturing performance of crop within different
conditions of environment and soil.
Why it is selected:
Nevertheless, the article is selected for analysing the collection of crop performance
has been at present highly slows. These crop analysis are performed at distributed
and remote places. Again, information is collected in manual way. Apart from this, it
is seen that the quality of the crop performance collected is highly low.
Key information covered in the resource:
I found this article useful because it helps in understanding the reason is that it never
considers the previous conditions never seen by human operators. However, it is
important to retrieve the data collected leading to various invalid conclusions.
Example of this involves, readings of solar radiation during afternoon as a short
overcast or rain is invalid and never be utilized to analyse the performance of the
crop.
Why the resource was useful:
The article is helpful to evaluate the developing IoT technologies like IoT devices,
such as weather stations that is network-connected, cameras, smartphones, wireless
type of sensor networks can be collated for huge quantity of situational and crop data
performances. This ranges from the time-series information from the sensors to the
spatial information to cameras to observations of human beings recorded and
collected through smart hone mobile apps. In order to evaluate the platform of
SmartFarmNet and the lessons and experiences learnt to develop the system is
evaluated in the article.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
A survey of transition mechanisms from IPv4 to IPv6 — Simulated test bed and
analysis
4
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
Internet of Things Platform for Smart Farming: Experiences and Lessons Learnt
https://www.mdpi.com/1424-8220/16/11/1884
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons learnt.
Sensors, 16(11), p.1884.
What the resource is about:
The article describes that the development of productivity of the farm is important to
raise the profitability of farm and meet the fast demand of growth for food. These are
fuelled through quick growth of population. This can be enhanced through rise in
forecasting and understanding the performance of crop at various environmental
situations. The recommendations of crop are at present based on the collected data
at the studies of field-based agriculture capturing performance of crop within different
conditions of environment and soil.
Why it is selected:
Nevertheless, the article is selected for analysing the collection of crop performance
has been at present highly slows. These crop analysis are performed at distributed
and remote places. Again, information is collected in manual way. Apart from this, it
is seen that the quality of the crop performance collected is highly low.
Key information covered in the resource:
I found this article useful because it helps in understanding the reason is that it never
considers the previous conditions never seen by human operators. However, it is
important to retrieve the data collected leading to various invalid conclusions.
Example of this involves, readings of solar radiation during afternoon as a short
overcast or rain is invalid and never be utilized to analyse the performance of the
crop.
Why the resource was useful:
The article is helpful to evaluate the developing IoT technologies like IoT devices,
such as weather stations that is network-connected, cameras, smartphones, wireless
type of sensor networks can be collated for huge quantity of situational and crop data
performances. This ranges from the time-series information from the sensors to the
spatial information to cameras to observations of human beings recorded and
collected through smart hone mobile apps. In order to evaluate the platform of
SmartFarmNet and the lessons and experiences learnt to develop the system is
evaluated in the article.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in
the process of superseding IPv4. Find and summarise ONE resource that describes
about the technologies that are used to run both protocols simultaneously over the
same internet infrastructure.
A survey of transition mechanisms from IPv4 to IPv6 — Simulated test bed and
analysis
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
https://ieeexplore.ieee.org/abstract/document/7054212
Kalwar, S., Bohra, N. and Memon, A.A., 2015, February. A survey of transition
mechanisms from IPv4 to IPv6—Simulated test bed and analysis. In 2015 Third
International Conference on Digital Information, Networking, and Wireless
Communications (DINWC) (pp. 30-34). IEEE.
What the resource is about:
The article describes that the development of IPv6 is able to pen various queries
having reference to the transition and adaptation from the innovation of IPv4 towards
IPv6. This is one of the important problems that are a popular subject of concern in
the current da network community. Furthermore, the authors highlight the fact that
IPv6 is able to deliver various seamless elements making that better protocol as it
gets compared to the predecessor of IPv4. Again, this a well-known reality that Pv4
as the
Defacto standard currently and is implemented in every sector of the architecture of
the Internet. Thus it can be said that the process of transition from the IPv4 towards
IPv4 is highlighted complicated.
Why it is selected:
The article is selected because in this case, for avoiding the transition and real sense
of delaying to make the delay, various techniques are been introduced like NAT and
CIDR. At first, for highlighting the challenges related to the transition from IPv4 to
IPv6. Next, to seek the mechanism of transition provided seamlessly for the end-
users in the place where they can utilize every service of IPv4. For gaining the
mentioned aims a simulated testbed is found to be implemented as MUET or
“Mehran University of Engineering and Technology” which is located at Jamshoro,
Pakistan.
Key information covered in the resource:
Here, the resource is helpful to understand the challenges and issues likely to be
faced as the transition from the IPv4 to IPv6 take place. Wireshark And GNS3 are
utilized for simulating and the DSTM has opted as the mechanism of transition for
test bed.
Why the resource was useful:
In the article, the author describes that the DSTM permits the protocols in running at
the same time and the outcomes reveal that they deliver the seamless type of
transition from the innovation of IPv4 to IPv6.
5
Kalwar, S., Bohra, N. and Memon, A.A., 2015, February. A survey of transition
mechanisms from IPv4 to IPv6—Simulated test bed and analysis. In 2015 Third
International Conference on Digital Information, Networking, and Wireless
Communications (DINWC) (pp. 30-34). IEEE.
What the resource is about:
The article describes that the development of IPv6 is able to pen various queries
having reference to the transition and adaptation from the innovation of IPv4 towards
IPv6. This is one of the important problems that are a popular subject of concern in
the current da network community. Furthermore, the authors highlight the fact that
IPv6 is able to deliver various seamless elements making that better protocol as it
gets compared to the predecessor of IPv4. Again, this a well-known reality that Pv4
as the
Defacto standard currently and is implemented in every sector of the architecture of
the Internet. Thus it can be said that the process of transition from the IPv4 towards
IPv4 is highlighted complicated.
Why it is selected:
The article is selected because in this case, for avoiding the transition and real sense
of delaying to make the delay, various techniques are been introduced like NAT and
CIDR. At first, for highlighting the challenges related to the transition from IPv4 to
IPv6. Next, to seek the mechanism of transition provided seamlessly for the end-
users in the place where they can utilize every service of IPv4. For gaining the
mentioned aims a simulated testbed is found to be implemented as MUET or
“Mehran University of Engineering and Technology” which is located at Jamshoro,
Pakistan.
Key information covered in the resource:
Here, the resource is helpful to understand the challenges and issues likely to be
faced as the transition from the IPv4 to IPv6 take place. Wireshark And GNS3 are
utilized for simulating and the DSTM has opted as the mechanism of transition for
test bed.
Why the resource was useful:
In the article, the author describes that the DSTM permits the protocols in running at
the same time and the outcomes reveal that they deliver the seamless type of
transition from the innovation of IPv4 to IPv6.
5
Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
The Top 6 Authentication Mechanisms
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html
Pingidentity.com (2019). The Top 6 Authentication Mechanisms. [online] Available at:
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html [Accessed 26 Sep. 2019].
What the resource is about:
The article describes that the contextual authentication is involved in gathering
signals. Example of this include the IP addresses, geolocation, and time of day for
helping to deploy the guarantee that the resent user is valid.
Why it is selected:
The resource is chosen to understand the current context of the user can be
compared to the prior established contexts like the whitelists and blacklists. The
checks are found to be invisible to the user authorized. Hence, there are no issues
with usability. Nonetheless, they are able to generate notable limitations to the
attackers. For instance, the confirmation mechanism of the mobile location of VISA
seeks the lace of the phone of users mobile. This is to verify that the user has been
near the location physically. Here, the credit card is used. There are scopes of
fraudulent transaction to be higher as the transaction occurs in the places of various
location from the system
Key information covered in the resource:
In the article, the author describes that there are instances to compare the contextual
signals of the channel of application for the contextual signals having distinct channel
of authentication. This is to find effective fraud. Moreover, the contextual signals can
be gathered through web pages where authentication is done, different mobile
systems utilized for the MFA , additional hardware of network, application or the
gateway in the front, additional sensors that are been in proximity to users like
smartwatches, wearable and so on.
Why the resource was useful:
The article is helpful to analyse that as aggregated and collected, the server of
authentication is able to assess the signals for looking into various types of
anomalous patterns. This denotes the fraudulent behaviour and attack. The
assessment can be performed through contextual way that denotes the comparison
on any provided signal value towards the prescribed lists of prohibited or permitted
values. Next, it can be behavioural as compared to the provided signal value to the
expected one on the basis of prior pattern established.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes
6
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
The Top 6 Authentication Mechanisms
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html
Pingidentity.com (2019). The Top 6 Authentication Mechanisms. [online] Available at:
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html [Accessed 26 Sep. 2019].
What the resource is about:
The article describes that the contextual authentication is involved in gathering
signals. Example of this include the IP addresses, geolocation, and time of day for
helping to deploy the guarantee that the resent user is valid.
Why it is selected:
The resource is chosen to understand the current context of the user can be
compared to the prior established contexts like the whitelists and blacklists. The
checks are found to be invisible to the user authorized. Hence, there are no issues
with usability. Nonetheless, they are able to generate notable limitations to the
attackers. For instance, the confirmation mechanism of the mobile location of VISA
seeks the lace of the phone of users mobile. This is to verify that the user has been
near the location physically. Here, the credit card is used. There are scopes of
fraudulent transaction to be higher as the transaction occurs in the places of various
location from the system
Key information covered in the resource:
In the article, the author describes that there are instances to compare the contextual
signals of the channel of application for the contextual signals having distinct channel
of authentication. This is to find effective fraud. Moreover, the contextual signals can
be gathered through web pages where authentication is done, different mobile
systems utilized for the MFA , additional hardware of network, application or the
gateway in the front, additional sensors that are been in proximity to users like
smartwatches, wearable and so on.
Why the resource was useful:
The article is helpful to analyse that as aggregated and collected, the server of
authentication is able to assess the signals for looking into various types of
anomalous patterns. This denotes the fraudulent behaviour and attack. The
assessment can be performed through contextual way that denotes the comparison
on any provided signal value towards the prescribed lists of prohibited or permitted
values. Next, it can be behavioural as compared to the provided signal value to the
expected one on the basis of prior pattern established.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
In Home Depot Breach, Investigation Focuses on Self-Checkout Lanes
6
https://krebsonsecurity.com/tag/target-data-breach/
Krebsonsecurity.com (2019). target data breach — Krebs on Security. [online]
Available at: https://krebsonsecurity.com/tag/target-data-breach/ [Accessed 27 Sep.
2019].
What the resource is about:
The article describes that the malicious software used by unknown thieves for
stealing debit and credit card numbers in data breach occurring at Home Depot
current year. This was installed primarily on the system of payments under the lanes
of self-checkout. It has been occurring at various stores of retails as per the various
sources near to the analysis. Here, the investigation indicates that the thieves have
stolen some cards as almost the five-months of breach than they have otherwise.
Why it is selected:
The article is selected to investigate the case of breach at Home Depot initially broke
during September 2, the publication is seen to be inconsistent contact having
numerous economic institutions. They are found to be nearly controlling the regular
alerts from the MasterCard and Visa for the reports regarding latest batches of
accounts. It is also seen that different banks have been embracing for economic hi
bigger than the disclosure related to the Target breach. This lasted just for 3 weeks
and revealing about forty million cards. Nevertheless, it is witnessed till date that as
per the banking sources, the MasterCard and Visa are reported lesser amounts of
cards compromised than intended with the particular length of the exposure of Home
Depot.
Key information covered in the resource:
In the article, the author describes that as stated recently by KrebsOnSecurity that in
a notable conference call with different current-day financial institutions, the officials
of MasterCard has been sharing various upgrades from the current forensic
evaluation to the breach at the countrywide improvement of home store chain. As
reported by the card brand that the banks have been believing that the terminals of
self-checkout are affected in that breach.
Why the resource was useful:
I found this article useful because it attempts to analyse the report by Mastercard that
the pieces of evidence of compromise have been about 17,00 to about 2,200 U.S.
stores with other stress present in Canada that are affected potentially.
7
Krebsonsecurity.com (2019). target data breach — Krebs on Security. [online]
Available at: https://krebsonsecurity.com/tag/target-data-breach/ [Accessed 27 Sep.
2019].
What the resource is about:
The article describes that the malicious software used by unknown thieves for
stealing debit and credit card numbers in data breach occurring at Home Depot
current year. This was installed primarily on the system of payments under the lanes
of self-checkout. It has been occurring at various stores of retails as per the various
sources near to the analysis. Here, the investigation indicates that the thieves have
stolen some cards as almost the five-months of breach than they have otherwise.
Why it is selected:
The article is selected to investigate the case of breach at Home Depot initially broke
during September 2, the publication is seen to be inconsistent contact having
numerous economic institutions. They are found to be nearly controlling the regular
alerts from the MasterCard and Visa for the reports regarding latest batches of
accounts. It is also seen that different banks have been embracing for economic hi
bigger than the disclosure related to the Target breach. This lasted just for 3 weeks
and revealing about forty million cards. Nevertheless, it is witnessed till date that as
per the banking sources, the MasterCard and Visa are reported lesser amounts of
cards compromised than intended with the particular length of the exposure of Home
Depot.
Key information covered in the resource:
In the article, the author describes that as stated recently by KrebsOnSecurity that in
a notable conference call with different current-day financial institutions, the officials
of MasterCard has been sharing various upgrades from the current forensic
evaluation to the breach at the countrywide improvement of home store chain. As
reported by the card brand that the banks have been believing that the terminals of
self-checkout are affected in that breach.
Why the resource was useful:
I found this article useful because it attempts to analyse the report by Mastercard that
the pieces of evidence of compromise have been about 17,00 to about 2,200 U.S.
stores with other stress present in Canada that are affected potentially.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
E-Business vs E-Commerce, Know The Differences
https://medium.com/@Magento_expert/e-business-vs-e-commerce-know-the-
differences-151ec9baf0fe
Medium (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that the selling and buying various things over the Internet is
referred to as e-commerce. Again, e-business is never limited to only selling and
buying things. Every task of the business conducted through Online us seen as e-
business.
Why it is selected:
The report is helpful to examine the computing and information technologies, for
example are used for developing the business. E-commerce is a primary part of e-
business. It is agreed by some that as the business sis totally has done with
electronic type of medium, it is seen as e-business. No necessity s there that e-
business comprises of physical presence in market. As any organization owns any
office with the physical presence carrying the business tasks through Internet, it is
denoted as e-commerce. Further, e-commerce involves any sort of transaction of
business related to money and on the other hand, this involves allied and monetary
activities.
Key information covered in the resource:
I found this article useful because the author describes that e-commerce requires the
Internet to be connected to the residual part of the world. On the other hand, e-
business uses more than that. Both of them helps to reduce the time and sent for
business. Both consist of flexible business hours and eradicate the restriction of
location. Besides, one can simply track the growth of business. Next, it is helpful to
reach the customer quickly.
Why the resource was useful:
Moreover, the article shows the fact that quicker one can reach the clients as they
require, it is better for them. Having the chat and email features, it is simper for the e-
business to fulfil the necessity. As it comes to e-business and e-commerce, the
resource was helpful as all the business owners and customers are able to reap
every benefit. Apart from this, e-commerce is an important element of e-business.
This can also be concluded by saying the e-commerce is just e-business.
Nevertheless, e-business is never necessarily e-commerce.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
8
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
E-Business vs E-Commerce, Know The Differences
https://medium.com/@Magento_expert/e-business-vs-e-commerce-know-the-
differences-151ec9baf0fe
Medium (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that the selling and buying various things over the Internet is
referred to as e-commerce. Again, e-business is never limited to only selling and
buying things. Every task of the business conducted through Online us seen as e-
business.
Why it is selected:
The report is helpful to examine the computing and information technologies, for
example are used for developing the business. E-commerce is a primary part of e-
business. It is agreed by some that as the business sis totally has done with
electronic type of medium, it is seen as e-business. No necessity s there that e-
business comprises of physical presence in market. As any organization owns any
office with the physical presence carrying the business tasks through Internet, it is
denoted as e-commerce. Further, e-commerce involves any sort of transaction of
business related to money and on the other hand, this involves allied and monetary
activities.
Key information covered in the resource:
I found this article useful because the author describes that e-commerce requires the
Internet to be connected to the residual part of the world. On the other hand, e-
business uses more than that. Both of them helps to reduce the time and sent for
business. Both consist of flexible business hours and eradicate the restriction of
location. Besides, one can simply track the growth of business. Next, it is helpful to
reach the customer quickly.
Why the resource was useful:
Moreover, the article shows the fact that quicker one can reach the clients as they
require, it is better for them. Having the chat and email features, it is simper for the e-
business to fulfil the necessity. As it comes to e-business and e-commerce, the
resource was helpful as all the business owners and customers are able to reap
every benefit. Apart from this, e-commerce is an important element of e-business.
This can also be concluded by saying the e-commerce is just e-business.
Nevertheless, e-business is never necessarily e-commerce.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
8
Network Services Company
in Electronics and High Tech, Trade, Wholesale and Distribution
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/
Stories, C. and Company, N. (2019). Success Story: SAP HANA implementation by
itelligence. [online] itelligence India. Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes the SAP HANA deployment by Network Services Company.
The CFO of Network Service Company, Michael Johnson stated they are impressed
through their skills that they determined with the intelligence as the partner of
hosting. Internally, little is known about innovation.
Why it is selected:
Here, the resource is selected to understand the challenges involved in the total
migration of SAP HANA in cloud. Further, there are problems with upgrading ECC
from the EHP3 to the EHP7 and all the systems are to be updated to become
compatible with SAP HANA. This involves the eCommerce (CDI), Paymetric, Esker,
Vertex, MDM, Portal and PI. Moreover, there are problems with database or
hardware migration to SAP HANA for BW and ECC.
Key information covered in the resource:
In the article, the author describes that the process of routine and the T-codes of
SAP comprise of response times of long-running along with long-running BW query
times that restricts the usages of the reporting and analytics. Again, there is no in-
house expertise for SAP HANA. However, the benefits involve the performance
developments to the on-premise SAP ECC system and managing of greater volumes
of transactions. Then, it helps the staffs to work on the financial applications through
expediting the report generation and execution. Again, it helps to reduce the times of
query against the installation of BW.
Why the resource was useful:
I found this article useful because here the modernizing of the SAP investments and
various applications through updating to the more developed Enhancement PACK 7.
Besides, there are managed cloud or hosted environment spreading the economic
costs in due time permitting the constant updates towards further solutions. Next,
there are advantages with the managed cloud hosting. Here, the Pay As You Grow
pricing model is able to avoid the alliance of SAP HANA and the purchase of server
on-premise and within their DR Data Center.
9
in Electronics and High Tech, Trade, Wholesale and Distribution
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/
Stories, C. and Company, N. (2019). Success Story: SAP HANA implementation by
itelligence. [online] itelligence India. Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes the SAP HANA deployment by Network Services Company.
The CFO of Network Service Company, Michael Johnson stated they are impressed
through their skills that they determined with the intelligence as the partner of
hosting. Internally, little is known about innovation.
Why it is selected:
Here, the resource is selected to understand the challenges involved in the total
migration of SAP HANA in cloud. Further, there are problems with upgrading ECC
from the EHP3 to the EHP7 and all the systems are to be updated to become
compatible with SAP HANA. This involves the eCommerce (CDI), Paymetric, Esker,
Vertex, MDM, Portal and PI. Moreover, there are problems with database or
hardware migration to SAP HANA for BW and ECC.
Key information covered in the resource:
In the article, the author describes that the process of routine and the T-codes of
SAP comprise of response times of long-running along with long-running BW query
times that restricts the usages of the reporting and analytics. Again, there is no in-
house expertise for SAP HANA. However, the benefits involve the performance
developments to the on-premise SAP ECC system and managing of greater volumes
of transactions. Then, it helps the staffs to work on the financial applications through
expediting the report generation and execution. Again, it helps to reduce the times of
query against the installation of BW.
Why the resource was useful:
I found this article useful because here the modernizing of the SAP investments and
various applications through updating to the more developed Enhancement PACK 7.
Besides, there are managed cloud or hosted environment spreading the economic
costs in due time permitting the constant updates towards further solutions. Next,
there are advantages with the managed cloud hosting. Here, the Pay As You Grow
pricing model is able to avoid the alliance of SAP HANA and the purchase of server
on-premise and within their DR Data Center.
9
Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Build Enterprise-Grade Apps Fast
https://www.outsystems.com/
Outsystems.com (2019). The #1 Low-Code Platform for Digital Transformation.
[online] Available at: https://www.outsystems.com/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that the OutSystem is one of the low-code platforms for helping
to innovate quicker and provide the actual value of business. It helps to visually
enhance the applications and simply integrate with any kind of systems, including the
individual custom code as one requires that and change the applications at the
business speed. As one requires to perform the custom build, the initial aspect that
decides is the OutSystems as per the Enterprise Architect at Albert Heijn, Robert
Majoor.
Why it is selected:
The article is selected to understand this area, where this the platform of standard
development and one can utilize for the innovations. Moreover, OutSystems is a type
of platform for low-code. This is to develop the enterprise web and the applications of
mobile. This run-in clouds, in hybrid environment and on-premises. Here, the present
version is denoted as 11.
Key information covered in the resource:
I found this article useful because the author describes that this is intended for both
the unpaid and paid versions. At this place the developers are allowed for the
permitted personal environments of clouds for using the platform despite any
change. This comprises of unbeatable speed.
Why the resource was useful:
The article is useful to evaluate the development of the apps of full-stack to be
incredibly quick and implement with a single click. Changes can be made and then
redeployed in short period of time. Here, integration can be done with everything
where one can easily connect the applications with any systems. Besides, there are
low codes despite any constraints. Here, one can extend the application with the
individual front-end and back-end code without any lock-in. The built-in security
comprises of more than 200 features of security to place their applications to run
securely. Besides, regarding massive scalability, the scale applications have been
ranging from ten to 10,000,000 users with simplicity. Next, there are unbreakable
deployments that involve the error-free implementation of the applications around the
on-premise and cloud environments. Ultimately, this has been beyond the platform
where the biggest ecosystem of reusable, partners and developers and various
reusable components and applications are present.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
10
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Build Enterprise-Grade Apps Fast
https://www.outsystems.com/
Outsystems.com (2019). The #1 Low-Code Platform for Digital Transformation.
[online] Available at: https://www.outsystems.com/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that the OutSystem is one of the low-code platforms for helping
to innovate quicker and provide the actual value of business. It helps to visually
enhance the applications and simply integrate with any kind of systems, including the
individual custom code as one requires that and change the applications at the
business speed. As one requires to perform the custom build, the initial aspect that
decides is the OutSystems as per the Enterprise Architect at Albert Heijn, Robert
Majoor.
Why it is selected:
The article is selected to understand this area, where this the platform of standard
development and one can utilize for the innovations. Moreover, OutSystems is a type
of platform for low-code. This is to develop the enterprise web and the applications of
mobile. This run-in clouds, in hybrid environment and on-premises. Here, the present
version is denoted as 11.
Key information covered in the resource:
I found this article useful because the author describes that this is intended for both
the unpaid and paid versions. At this place the developers are allowed for the
permitted personal environments of clouds for using the platform despite any
change. This comprises of unbeatable speed.
Why the resource was useful:
The article is useful to evaluate the development of the apps of full-stack to be
incredibly quick and implement with a single click. Changes can be made and then
redeployed in short period of time. Here, integration can be done with everything
where one can easily connect the applications with any systems. Besides, there are
low codes despite any constraints. Here, one can extend the application with the
individual front-end and back-end code without any lock-in. The built-in security
comprises of more than 200 features of security to place their applications to run
securely. Besides, regarding massive scalability, the scale applications have been
ranging from ten to 10,000,000 users with simplicity. Next, there are unbreakable
deployments that involve the error-free implementation of the applications around the
on-premise and cloud environments. Ultimately, this has been beyond the platform
where the biggest ecosystem of reusable, partners and developers and various
reusable components and applications are present.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Kurleto, M (2019). 10 Reasons why your new IT system implementation failed –
Software House That Helps You Innovate - Neoteric. [online] Software House That
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that as any business considers the BI systems, Workflow,
CRM, ERP or any custom solution of IT, they must assure that they never follow the
following reasons of failure. During this present age of develops, relevant
management techniques, agile developments, the IT project failure is something
more. Previously, the failures of information systems have indicated the flops of high-
price having broad-scale implementation of software that goes too long and over the
estimated budget. These failures can also happen.
Why it is selected:
I found this article useful because the author describes that this is the reason why the
article is selected as the current IT failure has been distinct that it has been in the
past. This occurs as the DevOps, agile, constant delivery and fails fast movement
can change the kind the way the IT can handle the project. Here, the iterative
management philosophies and methodologies indicate the decrease of the scopes of
projects. These projects are fund to turning to be spectacularly awry.
Key information covered in the resource:
Nonetheless, the report helps in understanding that the fact of matter is that IT
projects can also fail. This can occur in one in at many times in insidious manner.
The causes of failure involve the fact the business has never deployed the goals that
are measurable. Besides, letting the employees define requirements, skipping,
FIT/GAP assessment or letting the software vendor perform that is another reason
for failure.
Why the resource was useful:
Besides, one must never deploy the measurable perquisites and freeze the budget
and schedule to change the scope every time can lead to failure. Moreover, not
preparing test cases and test data and considering the Commercial Off The shelf or
COTS solutions is another issue. Apart from this, lack of customization and
considering just the cost of deployment and not calculating ROI is another factor
here.
11
Software House That Helps You Innovate - Neoteric. [online] Software House That
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 27 Sep. 2019].
What the resource is about:
The article describes that as any business considers the BI systems, Workflow,
CRM, ERP or any custom solution of IT, they must assure that they never follow the
following reasons of failure. During this present age of develops, relevant
management techniques, agile developments, the IT project failure is something
more. Previously, the failures of information systems have indicated the flops of high-
price having broad-scale implementation of software that goes too long and over the
estimated budget. These failures can also happen.
Why it is selected:
I found this article useful because the author describes that this is the reason why the
article is selected as the current IT failure has been distinct that it has been in the
past. This occurs as the DevOps, agile, constant delivery and fails fast movement
can change the kind the way the IT can handle the project. Here, the iterative
management philosophies and methodologies indicate the decrease of the scopes of
projects. These projects are fund to turning to be spectacularly awry.
Key information covered in the resource:
Nonetheless, the report helps in understanding that the fact of matter is that IT
projects can also fail. This can occur in one in at many times in insidious manner.
The causes of failure involve the fact the business has never deployed the goals that
are measurable. Besides, letting the employees define requirements, skipping,
FIT/GAP assessment or letting the software vendor perform that is another reason
for failure.
Why the resource was useful:
Besides, one must never deploy the measurable perquisites and freeze the budget
and schedule to change the scope every time can lead to failure. Moreover, not
preparing test cases and test data and considering the Commercial Off The shelf or
COTS solutions is another issue. Apart from this, lack of customization and
considering just the cost of deployment and not calculating ROI is another factor
here.
11
References:
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons learnt.
Sensors, 16(11), p.1884.
Kalwar, S., Bohra, N. and Memon, A.A., 2015, February. A survey of transition
mechanisms from IPv4 to IPv6—Simulated test bed and analysis. In 2015 Third
International Conference on Digital Information, Networking, and Wireless
Communications (DINWC) (pp. 30-34). IEEE.
Krebsonsecurity.com (2019). target data breach — Krebs on Security. [online]
Available at: https://krebsonsecurity.com/tag/target-data-breach/ [Accessed 27 Sep.
2019].
Kurleto, M (2019). 10 Reasons why your new IT system implementation failed –
Software House That Helps You Innovate - Neoteric. [online] Software House That
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 27 Sep. 2019].
Medium (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 27 Sep. 2019].
Mireles Jr, J., Lewis, F., Giirel, A. and Bogdan, S., 2018. Deadlock Avoidance
Algorithms and Implementation: A Matrix Based Approach. In Deadlock Resolution in
Computer-Integrated Systems (pp. 205-254). CRC Press.
Outsystems.com (2019). The #1 Low-Code Platform for Digital Transformation.
[online] Available at: https://www.outsystems.com/ [Accessed 27 Sep. 2019].
Pingidentity.com (2019). The Top 6 Authentication Mechanisms. [online] Available at:
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html [Accessed 26 Sep. 2019].
Stories, C. and Company, N. (2019). Success Story: SAP HANA implementation by
itelligence. [online] itelligence India. Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/ [Accessed 27 Sep. 2019].
Yazdanbakhsh, A., Samadi, K., Kim, N.S. and Esmaeilzadeh, H., 2018, June. Ganax:
A unified mimd-simd acceleration for generative adversarial networks. In
Proceedings of the 45th Annual International Symposium on Computer Architecture
(pp. 650-661). IEEE Press.
12
Jayaraman, P., Yavari, A., Georgakopoulos, D., Morshed, A. and Zaslavsky, A.,
2016. Internet of things platform for smart farming: Experiences and lessons learnt.
Sensors, 16(11), p.1884.
Kalwar, S., Bohra, N. and Memon, A.A., 2015, February. A survey of transition
mechanisms from IPv4 to IPv6—Simulated test bed and analysis. In 2015 Third
International Conference on Digital Information, Networking, and Wireless
Communications (DINWC) (pp. 30-34). IEEE.
Krebsonsecurity.com (2019). target data breach — Krebs on Security. [online]
Available at: https://krebsonsecurity.com/tag/target-data-breach/ [Accessed 27 Sep.
2019].
Kurleto, M (2019). 10 Reasons why your new IT system implementation failed –
Software House That Helps You Innovate - Neoteric. [online] Software House That
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 27 Sep. 2019].
Medium (2019). E-Business vs E-Commerce, Know The Differences. [online]
Available at: https://medium.com/@Magento_expert/e-business-vs-e-commerce-
know-the-differences-151ec9baf0fe [Accessed 27 Sep. 2019].
Mireles Jr, J., Lewis, F., Giirel, A. and Bogdan, S., 2018. Deadlock Avoidance
Algorithms and Implementation: A Matrix Based Approach. In Deadlock Resolution in
Computer-Integrated Systems (pp. 205-254). CRC Press.
Outsystems.com (2019). The #1 Low-Code Platform for Digital Transformation.
[online] Available at: https://www.outsystems.com/ [Accessed 27 Sep. 2019].
Pingidentity.com (2019). The Top 6 Authentication Mechanisms. [online] Available at:
https://www.pingidentity.com/en/company/blog/posts/2016/the-top-6-authentication-
mechanisms.html [Accessed 26 Sep. 2019].
Stories, C. and Company, N. (2019). Success Story: SAP HANA implementation by
itelligence. [online] itelligence India. Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/ [Accessed 27 Sep. 2019].
Yazdanbakhsh, A., Samadi, K., Kim, N.S. and Esmaeilzadeh, H., 2018, June. Ganax:
A unified mimd-simd acceleration for generative adversarial networks. In
Proceedings of the 45th Annual International Symposium on Computer Architecture
(pp. 650-661). IEEE Press.
12
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.