Difference between SIMD and MIMD
VerifiedAdded on 2022/10/01
|15
|3115
|21
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 1
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
1
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT 20246 2
COIT 20246
Week 1
The text discusses about different architectures for parallel processing used for Multiprocessor Machines such
as multiple-instruction stream - multiple-data stream (MIMD), single-instruction stream - multiple-data
stream (SIMD) etc. Find and summarise ONE resource that compares between MIMD and SIMD
architectures. The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and reference:
Difference between SIMD and MIMD.
https://techdifferences.com/difference-between-simd-and-mimd.htm
Tech differences 2019, Difference between SIMD and MIMD, viewed 16 July 2019,
https://techdifferences.com/difference-between-simd-and-mimd.html
Summary:
Difference between SIMD and MIMD
This article describes Michael Flynn’s classification of computer organizations based on
the number of data and instruction streams. In the article, the major difference is identifies
by their names: Single Instruction Multiple Data Stream and Multiple Instruction Multiple
Data Stream. Computers running on SIMD process single instruction over multiple data
streams while those running on MIMD process multiple instructions over multiple data
streams. I chose this article because it, in a clear way, explains the technologies involved
in each computer organization and maps out the difference between the two, a fact that
makes it a very informative article.
The most important part of the article is that which explains what data streams and
instructions streams are in light of parallel processing and computer organization. Such an
understanding is very important for anybody who want to understand the two architectures.
2
COIT 20246
Week 1
The text discusses about different architectures for parallel processing used for Multiprocessor Machines such
as multiple-instruction stream - multiple-data stream (MIMD), single-instruction stream - multiple-data
stream (SIMD) etc. Find and summarise ONE resource that compares between MIMD and SIMD
architectures. The resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and reference:
Difference between SIMD and MIMD.
https://techdifferences.com/difference-between-simd-and-mimd.htm
Tech differences 2019, Difference between SIMD and MIMD, viewed 16 July 2019,
https://techdifferences.com/difference-between-simd-and-mimd.html
Summary:
Difference between SIMD and MIMD
This article describes Michael Flynn’s classification of computer organizations based on
the number of data and instruction streams. In the article, the major difference is identifies
by their names: Single Instruction Multiple Data Stream and Multiple Instruction Multiple
Data Stream. Computers running on SIMD process single instruction over multiple data
streams while those running on MIMD process multiple instructions over multiple data
streams. I chose this article because it, in a clear way, explains the technologies involved
in each computer organization and maps out the difference between the two, a fact that
makes it a very informative article.
The most important part of the article is that which explains what data streams and
instructions streams are in light of parallel processing and computer organization. Such an
understanding is very important for anybody who want to understand the two architectures.
2
COIT 20246 3
The author describes a data stream as simply set of data made up of input and temporary
results used by instruction stream and arranged sequentially. The instruction set refers to
the sequence of instructions in execution.
The article compares the two architectures based on programming and debugging, memory
requirements, number of decoders, costs and expansion as well as synchronization,
performance and complexity. After comparing the two, the article moves forward to explain
the advantages of each technology, which can be relied on when choosing between the two.
Week 2
The text discusses about one of the common problems that can arise during resource allocation in operating
systems, which is known as deadlock. Find and summarise ONE resource that describes an algorithm of
either deadlock avoidance or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Banker’s Algorithm Detailed Explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
Mishra, A 2017, Dijkstra’s Bankers’s algorithm detailed explanation, viewed 22 July 2019,
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
3
The author describes a data stream as simply set of data made up of input and temporary
results used by instruction stream and arranged sequentially. The instruction set refers to
the sequence of instructions in execution.
The article compares the two architectures based on programming and debugging, memory
requirements, number of decoders, costs and expansion as well as synchronization,
performance and complexity. After comparing the two, the article moves forward to explain
the advantages of each technology, which can be relied on when choosing between the two.
Week 2
The text discusses about one of the common problems that can arise during resource allocation in operating
systems, which is known as deadlock. Find and summarise ONE resource that describes an algorithm of
either deadlock avoidance or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
Banker’s Algorithm Detailed Explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
Mishra, A 2017, Dijkstra’s Bankers’s algorithm detailed explanation, viewed 22 July 2019,
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
3
COIT 20246 4
Summary:
Banker’s Algorithm Detailed Explanation
In this article the author, describe banker’s algorithm, which is used to avoid deadlock
occurrences in operating systems. I chose this article particularly because it describes a
deadlock avoidance algorithm that tests the allocation of predetermined maximum possible
resources and checks the state of the system before allocating these resources.
The usefulness of this article is in the clear explanation backed-up by perfect examples.
As a deadlock avoidance algorithm, banker’s algorithm avoid deadlock using three
discrete steps: determine the resource each process could request at a maximum, determine
maximum resource that each can hold and finally determine the availability of each of the
requested resources.
4
Summary:
Banker’s Algorithm Detailed Explanation
In this article the author, describe banker’s algorithm, which is used to avoid deadlock
occurrences in operating systems. I chose this article particularly because it describes a
deadlock avoidance algorithm that tests the allocation of predetermined maximum possible
resources and checks the state of the system before allocating these resources.
The usefulness of this article is in the clear explanation backed-up by perfect examples.
As a deadlock avoidance algorithm, banker’s algorithm avoid deadlock using three
discrete steps: determine the resource each process could request at a maximum, determine
maximum resource that each can hold and finally determine the availability of each of the
requested resources.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT 20246 5
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded technologies that allow
us to monitor and control our environment. Find and summarise ONE resource that describe applications of
the Internet of things in the field of Smart Farming. The resource, and your summary, must focus on
application of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Smart Farming, or the Future of Agriculture
Sciforce 2014, Smart Farming, or the Future of Agriculture, viewed
https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-359f0089df69.
Summary:
Smart Farming, or the Future of Agriculture
This article describe the emergence of IoT and its application in agriculture. The article
describes smart farming and all the technologies including sensing, software, positioning,
and communication and hardware systems. I chose this article particularly because it
describes IoT and its application in smart farming. At the wake of technology and
increased need for food security, applications of technology in farming is a critical
consideration.
Ion this article, IoT-based farming is described as a four-phase cycle, which start at
observation, and ends with implementation. Sensors record observational data while
diagnostics feed software with predefined decision rules and models. The software
determines whether location-specific treatment is necessary in the decisions phase. At the
implementation phase, appropriate treatment is applied to cause appropriate treatment.
.
5
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded technologies that allow
us to monitor and control our environment. Find and summarise ONE resource that describe applications of
the Internet of things in the field of Smart Farming. The resource, and your summary, must focus on
application of IoT ONLY in the field of smart farming.
Title, Link and Reference:
Smart Farming, or the Future of Agriculture
Sciforce 2014, Smart Farming, or the Future of Agriculture, viewed
https://medium.com/sciforce/smart-farming-or-the-future-of-agriculture-359f0089df69.
Summary:
Smart Farming, or the Future of Agriculture
This article describe the emergence of IoT and its application in agriculture. The article
describes smart farming and all the technologies including sensing, software, positioning,
and communication and hardware systems. I chose this article particularly because it
describes IoT and its application in smart farming. At the wake of technology and
increased need for food security, applications of technology in farming is a critical
consideration.
Ion this article, IoT-based farming is described as a four-phase cycle, which start at
observation, and ends with implementation. Sensors record observational data while
diagnostics feed software with predefined decision rules and models. The software
determines whether location-specific treatment is necessary in the decisions phase. At the
implementation phase, appropriate treatment is applied to cause appropriate treatment.
.
5
COIT 20246 6
The most important part of the article is the one that describes various applications of IoT
in agriculture that range from crop to forest husbandry. IoT precision technologies are
applied in farming include automation, drome technologies in agriculture and internet of
farm and food.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol, which is in the process of superseding
IPv4. Find and summarise ONE resource that describes about the technologies that are used to run both
protocols simultaneously over the same internet infrastructure.
Title, Link and Reference:
Five ways for IPv6 and IPv4 to peacefully co-exist
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Vaughan-Nichols, S, J 2014, Five ways for IPv6 and IPv4 to peacefully co-exist, viewed
on
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Summary:
Five ways for IPv6 and IPv4 to peacefully co-exist
With the imminent exhaustion of IPv4 addresses, IPv6 addresses came into place. At the
advent of the internet technologies, network designer though that the 32-bit IPv4 was
enough for all connected devices then.
In this article, the author describes five different way that IPv4 and IPv6 do co-exist in a
networked system I chose this paper because of it describes these methods, going by the
6
The most important part of the article is the one that describes various applications of IoT
in agriculture that range from crop to forest husbandry. IoT precision technologies are
applied in farming include automation, drome technologies in agriculture and internet of
farm and food.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol, which is in the process of superseding
IPv4. Find and summarise ONE resource that describes about the technologies that are used to run both
protocols simultaneously over the same internet infrastructure.
Title, Link and Reference:
Five ways for IPv6 and IPv4 to peacefully co-exist
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Vaughan-Nichols, S, J 2014, Five ways for IPv6 and IPv4 to peacefully co-exist, viewed
on
https://www.zdnet.com/article/five-ways-for-ipv6-and-ipv4-to-peacefully-co-exist/
Summary:
Five ways for IPv6 and IPv4 to peacefully co-exist
With the imminent exhaustion of IPv4 addresses, IPv6 addresses came into place. At the
advent of the internet technologies, network designer though that the 32-bit IPv4 was
enough for all connected devices then.
In this article, the author describes five different way that IPv4 and IPv6 do co-exist in a
networked system I chose this paper because of it describes these methods, going by the
6
COIT 20246 7
fact that there are currently networks using IPv4 or IPv6 or both.
In this article, the need for IPv6 is attributed to the increased number of devices especially
with the development of internet of things, which led to the exhaustion of the ipv4
addresses.
As much as network engineers would want to have ipv4 and v6 co-exist, the article warns
that not all methods do work for all network. In dual stack method, both address types run
simultaneously while tunnelling encapsulates ipv6 packets inside ipv4 packets. Tunnelling
could either be dynamic or static using such technique as 6to4.
The most important section of the article is that which describes RFC 4213 as a document
that provides the basic ipv4-ipv6 transition mechanism for host and network devices.
Week 5
Network security has become a major concern of ICT world, and user authentication is one of the popular tools
to assure network security. Find and summarise ONE resource that describes any ONE authentication
mechanism except password. The resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Facial Recognition Technology Explained
https://www.globalme.net/blog/facial-recognition-technology-explained
Templeton, G 2019, , Facial Recognition Technology Explained, viewed on
https://www.globalme.net/blog/facial-recognition-technology-explained.
Summary:
Facial Recognition Technology Explained
In his article “Facial Recognition Technology Explained,” Templeton explains facial
7
fact that there are currently networks using IPv4 or IPv6 or both.
In this article, the need for IPv6 is attributed to the increased number of devices especially
with the development of internet of things, which led to the exhaustion of the ipv4
addresses.
As much as network engineers would want to have ipv4 and v6 co-exist, the article warns
that not all methods do work for all network. In dual stack method, both address types run
simultaneously while tunnelling encapsulates ipv6 packets inside ipv4 packets. Tunnelling
could either be dynamic or static using such technique as 6to4.
The most important section of the article is that which describes RFC 4213 as a document
that provides the basic ipv4-ipv6 transition mechanism for host and network devices.
Week 5
Network security has become a major concern of ICT world, and user authentication is one of the popular tools
to assure network security. Find and summarise ONE resource that describes any ONE authentication
mechanism except password. The resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
Title, Link and Reference:
Facial Recognition Technology Explained
https://www.globalme.net/blog/facial-recognition-technology-explained
Templeton, G 2019, , Facial Recognition Technology Explained, viewed on
https://www.globalme.net/blog/facial-recognition-technology-explained.
Summary:
Facial Recognition Technology Explained
In his article “Facial Recognition Technology Explained,” Templeton explains facial
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT 20246 8
recognition as an authentication mechanism that is very much different from the
conventional one. I chose this article because of its articulation of ideas and the fact that it
looks at new methods of solving the security quagmire that is giving many It firms and
security experts a run for their money.
Here, facial expression is displayed as a type of biometric identification that is processed by
computers in a particular way to look for important and specific set of marks. Techniques
for facial recognition include gradients, and projection. While gradient replaces image pixels
with a representation of how that pixel’s brightness compares to pixels around it, projection
method is a cast of either 2D or 3D model.
The most part of the article is in the last paragraphs through which the author explains how
facial recognition can be used in the facilitation of deep learning.
Week 6
The text discusses about a massive data breach that happened in Target company, which is referred as ‘Target
Breach’. Find and summarise ONE resource that describes another recent (within last 5 years) well-publicised
attack or security breach on a public company or government organisation. The resource, and your summary,
should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Everything We Know About Facebook's Massive Security Breach
https://www.wired.com/story/facebook-security-breach-50-million-accounts/.
Newman, LH 2018, Everything We Know About Facebook's Massive Security Breach, viewed on
https://www.wired.com/story/facebook-security-breach-50-million-accounts/.
Summary:
8
recognition as an authentication mechanism that is very much different from the
conventional one. I chose this article because of its articulation of ideas and the fact that it
looks at new methods of solving the security quagmire that is giving many It firms and
security experts a run for their money.
Here, facial expression is displayed as a type of biometric identification that is processed by
computers in a particular way to look for important and specific set of marks. Techniques
for facial recognition include gradients, and projection. While gradient replaces image pixels
with a representation of how that pixel’s brightness compares to pixels around it, projection
method is a cast of either 2D or 3D model.
The most part of the article is in the last paragraphs through which the author explains how
facial recognition can be used in the facilitation of deep learning.
Week 6
The text discusses about a massive data breach that happened in Target company, which is referred as ‘Target
Breach’. Find and summarise ONE resource that describes another recent (within last 5 years) well-publicised
attack or security breach on a public company or government organisation. The resource, and your summary,
should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Everything We Know About Facebook's Massive Security Breach
https://www.wired.com/story/facebook-security-breach-50-million-accounts/.
Newman, LH 2018, Everything We Know About Facebook's Massive Security Breach, viewed on
https://www.wired.com/story/facebook-security-breach-50-million-accounts/.
Summary:
8
COIT 20246 9
Everything We Know About Facebook's Massive Security Breach
this article describes one of the most worrying data breaches in the world- the Facebook data
breach of 2018. I chose this article because it is a perfect example of what large-scale date
breach has capability of causing and that it creates awareness among the mases and security
experts as well.
Facebook is one of the most social media platform that is widely used in the world.
However, this article describes a serious security lapse in the organization revealed private
information belonging to over 50 million Facebook users. The usefulness of this article is
the fact that ip pins out to the masses of all serious security breaches that have occurred in
the recent past in Facebook. It also show a series of steps that can be used to recover from
these errors. It is creating the awareness more.
9
Everything We Know About Facebook's Massive Security Breach
this article describes one of the most worrying data breaches in the world- the Facebook data
breach of 2018. I chose this article because it is a perfect example of what large-scale date
breach has capability of causing and that it creates awareness among the mases and security
experts as well.
Facebook is one of the most social media platform that is widely used in the world.
However, this article describes a serious security lapse in the organization revealed private
information belonging to over 50 million Facebook users. The usefulness of this article is
the fact that ip pins out to the masses of all serious security breaches that have occurred in
the recent past in Facebook. It also show a series of steps that can be used to recover from
these errors. It is creating the awareness more.
9
COIT 20246 10
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise ONE resource that discusses
the relationship between e-commerce and e-business. The resource, and your summary, should describe
similarities and difference between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
Surbhi, S 2018, Difference Between e-commerce and e-business, viewed on
https://keydifferences.com/difference-between-e-commerce-and-e-business.html.
Summary:
Difference Between e-commerce and e-business
This article describes electronic commerce and electronic business clearly comparing and
contrasting the two. I chose this article because it gives an in depth analysis of the two right
from the definition to comparison and conclusion.
In this article, e-commerce is defined as the process through which the buying, selling,
dealing, ordering and paying for the goods and services are done over the internet, without
any face-to-face interaction. E-business on the other hand refers to the online presence of a
business or a business done with the help of the internet. Types of e-business include pure
and play, brick and click while those of e-commerce are business to business, C2C, B2C,
etc. E- Commerce is a major component of e-business. This creates the impression that
money related transactions in addition to allied activities do happen in an e-business.
The article describes the e-business as ‘not being confined to’ buying and selling of goods,
but also includes service provision.
This article is useful because it not only defines the two, but also gives examples of each
types of e-commerce and e-business. It also includes a video that can be used to further
10
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise ONE resource that discusses
the relationship between e-commerce and e-business. The resource, and your summary, should describe
similarities and difference between e-commerce and e-business.
Title, Link and Reference:
Difference Between e-commerce and e-business
https://keydifferences.com/difference-between-e-commerce-and-e-business.html
Surbhi, S 2018, Difference Between e-commerce and e-business, viewed on
https://keydifferences.com/difference-between-e-commerce-and-e-business.html.
Summary:
Difference Between e-commerce and e-business
This article describes electronic commerce and electronic business clearly comparing and
contrasting the two. I chose this article because it gives an in depth analysis of the two right
from the definition to comparison and conclusion.
In this article, e-commerce is defined as the process through which the buying, selling,
dealing, ordering and paying for the goods and services are done over the internet, without
any face-to-face interaction. E-business on the other hand refers to the online presence of a
business or a business done with the help of the internet. Types of e-business include pure
and play, brick and click while those of e-commerce are business to business, C2C, B2C,
etc. E- Commerce is a major component of e-business. This creates the impression that
money related transactions in addition to allied activities do happen in an e-business.
The article describes the e-business as ‘not being confined to’ buying and selling of goods,
but also includes service provision.
This article is useful because it not only defines the two, but also gives examples of each
types of e-commerce and e-business. It also includes a video that can be used to further
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT 20246 11
explain the two and ends by showing the key differences between them all.
Week 8
The text book discusses about the success story of ARI (Automotive Resources International) company after
implementing SAP BusinessObjects Explorer and integrating it with HANA. HANA is SAP’s in-memory
computing platform that is deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP HANA by another local or
international company. The resource, and your summary, should focus on the story about ONE single
company (which is not ARI company).
Title, Link and Reference:
SAP HANA Migration: Our LB Foster Success Story
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Krutikov, A 2019, SAP HANA Migration: Our LB Foster Success Story, viewed on
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Summary:
SAP HANA Migration: Our LB Foster Success Story.
This article describes SAP HANA migration in discrete and understandable steps. I chose
this article because it describes the process by using a successful case study: LB Foster to
illustrate t pre-migration preparations, challenges, how to overcome them, and later
implementing the migration plan.
LB Foster is an international company that majors with the provision of infrastructure
solutions used in the construction of railways. The company also provides energy
infrastructures and was founded in 1902. In this cases study, LB Foster was looking for a
complete migration that would transform its service delivery over a short time. Protera, a
software development company was given this task.
successful migration was started by first understanding what LB Foster is and the type of
11
explain the two and ends by showing the key differences between them all.
Week 8
The text book discusses about the success story of ARI (Automotive Resources International) company after
implementing SAP BusinessObjects Explorer and integrating it with HANA. HANA is SAP’s in-memory
computing platform that is deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP HANA by another local or
international company. The resource, and your summary, should focus on the story about ONE single
company (which is not ARI company).
Title, Link and Reference:
SAP HANA Migration: Our LB Foster Success Story
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Krutikov, A 2019, SAP HANA Migration: Our LB Foster Success Story, viewed on
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Summary:
SAP HANA Migration: Our LB Foster Success Story.
This article describes SAP HANA migration in discrete and understandable steps. I chose
this article because it describes the process by using a successful case study: LB Foster to
illustrate t pre-migration preparations, challenges, how to overcome them, and later
implementing the migration plan.
LB Foster is an international company that majors with the provision of infrastructure
solutions used in the construction of railways. The company also provides energy
infrastructures and was founded in 1902. In this cases study, LB Foster was looking for a
complete migration that would transform its service delivery over a short time. Protera, a
software development company was given this task.
successful migration was started by first understanding what LB Foster is and the type of
11
COIT 20246 12
business activities it does. As a large and complex business, Protera was ready for
traditional risks that include low visibility, decision paralysis, delays, and uncertainty over
results. To overcome these challenges, the company provide a free and complete audit for
the clients system, a step that eliminated low visibility and reduced the uncertainty regarding
the project goals.
I found this paper particularly useful because it gives a pre-migration picture- describing
what should be done before a complete system overhaul is done.
12
business activities it does. As a large and complex business, Protera was ready for
traditional risks that include low visibility, decision paralysis, delays, and uncertainty over
results. To overcome these challenges, the company provide a free and complete audit for
the clients system, a step that eliminated low visibility and reduced the uncertainty regarding
the project goals.
I found this paper particularly useful because it gives a pre-migration picture- describing
what should be done before a complete system overhaul is done.
12
COIT 20246 13
Week 9
Rapid application development (RAD) is a process of creating a workable system in a very short period of
time. There are few recently developed frameworks available in market to undertake RAD. Find and
summarise ONE recent (within last two years) resource that describes and recommends about ONE
framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Kissflow 2018, How to Boost App Development With RAD Framework, viewed on
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Summary:
How to Boost App Development With RAD Framework
This article describes the process of boosting app development with RAD framework and
recommends one development framework. I chose this article because it first introduces
RAD framework and development boosting steps.
The author defines RAD as a set of libraries, functions, classes, and reusable objects based
on rapid application development methodology. RAD frameworks help save time, as well as
organize and streamline development. Instead of having to develop libraries and functions
from scratch, frameworks accelerate the process. Its steps include requirement analysis,
development of rapid prototypes, receiving of feedback from end users, testing and finally
launching.
The article’s usefulness is in the recommendation of one such framework; kissflow. This
framework is best suited for the no-code developers since it uses a drag and drop design and
13
Week 9
Rapid application development (RAD) is a process of creating a workable system in a very short period of
time. There are few recently developed frameworks available in market to undertake RAD. Find and
summarise ONE recent (within last two years) resource that describes and recommends about ONE
framework for RAD.
Title, Link and Reference:
How to Boost App Development With RAD Framework
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Kissflow 2018, How to Boost App Development With RAD Framework, viewed on
https://kissflow.com/rad/rapid-application-development-framework-to-boost-app-
development/
Summary:
How to Boost App Development With RAD Framework
This article describes the process of boosting app development with RAD framework and
recommends one development framework. I chose this article because it first introduces
RAD framework and development boosting steps.
The author defines RAD as a set of libraries, functions, classes, and reusable objects based
on rapid application development methodology. RAD frameworks help save time, as well as
organize and streamline development. Instead of having to develop libraries and functions
from scratch, frameworks accelerate the process. Its steps include requirement analysis,
development of rapid prototypes, receiving of feedback from end users, testing and finally
launching.
The article’s usefulness is in the recommendation of one such framework; kissflow. This
framework is best suited for the no-code developers since it uses a drag and drop design and
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT 20246 14
development environment, integrates well with other applications and includes a visual
modelling functionality. In addition to these features are user management roles in which
each system user can be assigned responsibilities and roles and privileges.
The reporting and monitoring feature is an in-built feature that can be used to analyse and
create reports on the app. This way, performance can easily be monitored as well as the
app’s efficiency.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many previously successful
companies. Find and summarise ONE resource that describes few reasons of implementation failure for large
scale IS. The resource, and your summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Kurleto M n.d., 10 Reasons why your new IT system implementation failed, viewed on
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Summary:
10 Reasons why your new IT system implementation failed
It is the dream of every business to implement an information system that can really
transform their way of doing business by optimizing on resources available, and
streamlining its services. Unfortunately, this does not happen to many organizations since IT
projects fail due to one reason or another or a combination of many reasons. I chose this
article because it explains the various reasons that lead to IT project failure.
In the article, lack of well defined, measurable goals is identified as a reason for project
failure. Changes in IT infrastructure are goal driven. It is therefore important for
14
development environment, integrates well with other applications and includes a visual
modelling functionality. In addition to these features are user management roles in which
each system user can be assigned responsibilities and roles and privileges.
The reporting and monitoring feature is an in-built feature that can be used to analyse and
create reports on the app. This way, performance can easily be monitored as well as the
app’s efficiency.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many previously successful
companies. Find and summarise ONE resource that describes few reasons of implementation failure for large
scale IS. The resource, and your summary, should analyse at least three reasons of the failure.
Title, Link and Reference:
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Kurleto M n.d., 10 Reasons why your new IT system implementation failed, viewed on
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Summary:
10 Reasons why your new IT system implementation failed
It is the dream of every business to implement an information system that can really
transform their way of doing business by optimizing on resources available, and
streamlining its services. Unfortunately, this does not happen to many organizations since IT
projects fail due to one reason or another or a combination of many reasons. I chose this
article because it explains the various reasons that lead to IT project failure.
In the article, lack of well defined, measurable goals is identified as a reason for project
failure. Changes in IT infrastructure are goal driven. It is therefore important for
14
COIT 20246 15
organizations to establish measurable goals that match their businesses’ needs.
Another reason that IT projects fail is letting employees to determine systems’ requirement.
This is not always the best option for organizations seeking to optimize their processes since
people lie or are misguided. Requirement elicitation should be done in collaboration with
end users, and must be future-oriented.
The project management triangle is used to describe how budget, scope and schedule
constraints are bounded together. It calls for project managers to constantly freeze the
schedule, change the budget and project scope for a successful IT implementation.
Requirements do change and so all the three constraints should be changed to adapt to new
requirements.
15
organizations to establish measurable goals that match their businesses’ needs.
Another reason that IT projects fail is letting employees to determine systems’ requirement.
This is not always the best option for organizations seeking to optimize their processes since
people lie or are misguided. Requirement elicitation should be done in collaboration with
end users, and must be future-oriented.
The project management triangle is used to describe how budget, scope and schedule
constraints are bounded together. It calls for project managers to constantly freeze the
schedule, change the budget and project scope for a successful IT implementation.
Requirements do change and so all the three constraints should be changed to adapt to new
requirements.
15
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.