ICT Service Management Assignment 2022
VerifiedAdded on 2022/10/04
|11
|3778
|19
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences., 2019. Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html [Accessed 2
Oct. 2019].
Summary:
The article describes difference between two computer architectures SIMD and
MIMD. I have chosen this article as it provides detailed and clear description of these
two computer architectures which is easier to interpret and also provides advantages
and disadvantages of these two architectures as well.
The main differences between these two architectures is that while in SIMD, a single
instruction is applied to multiple data stream, in MIMD, multiple instruction is applied
to multiple data stream. Therefore, in MIMD memory requirement is higher than the
SIMD. While comparing these two architectures, the article has described advantage
of these architectures. Some of the advantages of the SIMD architectures are easier
interpretation and debugging of programs, enhanced inter-process communication,
integration of control flow instruction with several scalar operations within the CPU
and low implementation cost. In MIMD instruction, some of the advantages include
enhanced flexibility due to implementation of multiple threads for controlling program
execution, faster program execution and no supplementary cost as well.
The article was useful as analysis of advantages while comparing these two
architectures, makes it easier to identify which architecture should be used in which
context as features of these two architectures are discussed in details in this context.
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures.
The resource, and your summary, must focus only on MIMD and SIMD architectures.
Difference between SIMD and MIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences., 2019. Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html [Accessed 2
Oct. 2019].
Summary:
The article describes difference between two computer architectures SIMD and
MIMD. I have chosen this article as it provides detailed and clear description of these
two computer architectures which is easier to interpret and also provides advantages
and disadvantages of these two architectures as well.
The main differences between these two architectures is that while in SIMD, a single
instruction is applied to multiple data stream, in MIMD, multiple instruction is applied
to multiple data stream. Therefore, in MIMD memory requirement is higher than the
SIMD. While comparing these two architectures, the article has described advantage
of these architectures. Some of the advantages of the SIMD architectures are easier
interpretation and debugging of programs, enhanced inter-process communication,
integration of control flow instruction with several scalar operations within the CPU
and low implementation cost. In MIMD instruction, some of the advantages include
enhanced flexibility due to implementation of multiple threads for controlling program
execution, faster program execution and no supplementary cost as well.
The article was useful as analysis of advantages while comparing these two
architectures, makes it easier to identify which architecture should be used in which
context as features of these two architectures are discussed in details in this context.
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Dijkstra’s Banker’s algorithm detailed explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
Mishra, A., 2019. Dijkstra's Banker's algorithm detailed explanation | HackerEarth
Blog. [online] HackerEarth Blog. Available at:
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/ [Accessed 1 Oct. 2019].
Summary:
The article provides a detailed description of the Dijkstra’s Banker’s algorithm and its
application in the avoidance of the deadlock in OS. I have chosen this article
because it describes the algorithm through some examples which makes it easier to
analyse this algorithm and analyse the application of the algorithm as well.
The article has described the concept of banker’s algorithm through distribution of
some amount of money among some people and showed how money to those
persons is distributed while ensuring that request for resource is properly executed
without deadlock due to distribution of the resource. Then an algorithm is provided
for implementing the algorithm. The algorithm defines a maximum amount of
requesting resource, then it defines how much resource is already is acquired, and
how much resource is available is allocation which are defined by MAX, Allocated
and Available respectively.
The article was useful because it provided a detailed description of the banker’s
algorithm. Although this algorithm is explained from the banker’s perspective, it is
possible to extend it in the context of OS as well as the concept is almost similar. A
sample program for implementing the algorithm is provided as well which is another
advantage of this chosen article.
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
IoT Applications in Agriculture
https://www.iotforall.com/iot-applications-in-agriculture/
IoT For All., 2019. IoT Applications in Agriculture. [online] Available at:
2
The text discusses about one of the common problems that can arise during
resource allocation in operating systems, which is known as deadlock. Find and
summarise ONE resource that describes an algorithm of either deadlock avoidance
or deadlock prevention. The resource, and your summary, must focus on a single
algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Dijkstra’s Banker’s algorithm detailed explanation
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/
Mishra, A., 2019. Dijkstra's Banker's algorithm detailed explanation | HackerEarth
Blog. [online] HackerEarth Blog. Available at:
https://www.hackerearth.com/blog/developers/dijkstras-bankers-algorithm-detailed-
explaination/ [Accessed 1 Oct. 2019].
Summary:
The article provides a detailed description of the Dijkstra’s Banker’s algorithm and its
application in the avoidance of the deadlock in OS. I have chosen this article
because it describes the algorithm through some examples which makes it easier to
analyse this algorithm and analyse the application of the algorithm as well.
The article has described the concept of banker’s algorithm through distribution of
some amount of money among some people and showed how money to those
persons is distributed while ensuring that request for resource is properly executed
without deadlock due to distribution of the resource. Then an algorithm is provided
for implementing the algorithm. The algorithm defines a maximum amount of
requesting resource, then it defines how much resource is already is acquired, and
how much resource is available is allocation which are defined by MAX, Allocated
and Available respectively.
The article was useful because it provided a detailed description of the banker’s
algorithm. Although this algorithm is explained from the banker’s perspective, it is
possible to extend it in the context of OS as well as the concept is almost similar. A
sample program for implementing the algorithm is provided as well which is another
advantage of this chosen article.
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and
summarise ONE resource that describe applications of the Internet of things in the
field of Smart Farming. The resource, and your summary, must focus on application
of IoT ONLY in the field of smart farming.
IoT Applications in Agriculture
https://www.iotforall.com/iot-applications-in-agriculture/
IoT For All., 2019. IoT Applications in Agriculture. [online] Available at:
2
https://www.iotforall.com/iot-applications-in-agriculture/ [Accessed 1 Oct. 2019].
Summary:
The article describes the application of IoT in smart firming. I chose this article
because, the article explores one specific application of IoT and that is in the context
of smart firming and therefore, it provides a detailed description of the application
which include explanation of how data is collected and how the process of firming is
automated through data driven decision making process.
The article first describes how IoT is applied in firming. IoT collects data through
application of sensors and then processing these data through advanced data
analytics technology helps to track important natural factors for the firming for
example the climate change, soil composition, and weather forecast as well.
The article then discusses about some of the important contribution of IoT in firming
of which precision firming is a significant application of IoT which include sensors,
robots, systems of control, and autonomous vehicles. Drone technology which
makes it easier for crop management is another important application of IoT in this
context. IoT also provides assistance to farmers to choose pesticides that are
environment friendly and helps in greenhouse firming as well.
The article was useful for me as this not only described about the potential of IoT, but
it has also included which specific software are to be considered for processing data
collected through the IoT sensors, therefore, helps in choosing the required software
for IoT applications.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about
the technologies that are used to run both protocols simultaneously over the same
internet infrastructure.
IPv6: Dual stack where you can; tunnel where you must
https://www.networkworld.com/article/2285078/ipv6-dual-stack-where-you-can-tunnel-
where-you-must.html
Hogg, S., 2019. IPv6: Dual stack where you can; tunnel where you must. Retrieved 1
October 2019, from https://www.networkworld.com/article/2285078/ipv6-dual-stack-
where-you-can-tunnel-where-you-must.html
3
Summary:
The article describes the application of IoT in smart firming. I chose this article
because, the article explores one specific application of IoT and that is in the context
of smart firming and therefore, it provides a detailed description of the application
which include explanation of how data is collected and how the process of firming is
automated through data driven decision making process.
The article first describes how IoT is applied in firming. IoT collects data through
application of sensors and then processing these data through advanced data
analytics technology helps to track important natural factors for the firming for
example the climate change, soil composition, and weather forecast as well.
The article then discusses about some of the important contribution of IoT in firming
of which precision firming is a significant application of IoT which include sensors,
robots, systems of control, and autonomous vehicles. Drone technology which
makes it easier for crop management is another important application of IoT in this
context. IoT also provides assistance to farmers to choose pesticides that are
environment friendly and helps in greenhouse firming as well.
The article was useful for me as this not only described about the potential of IoT, but
it has also included which specific software are to be considered for processing data
collected through the IoT sensors, therefore, helps in choosing the required software
for IoT applications.
Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about
the technologies that are used to run both protocols simultaneously over the same
internet infrastructure.
IPv6: Dual stack where you can; tunnel where you must
https://www.networkworld.com/article/2285078/ipv6-dual-stack-where-you-can-tunnel-
where-you-must.html
Hogg, S., 2019. IPv6: Dual stack where you can; tunnel where you must. Retrieved 1
October 2019, from https://www.networkworld.com/article/2285078/ipv6-dual-stack-
where-you-can-tunnel-where-you-must.html
3
Summary:
The article describes about the required technologies for implementing the IPv4 and
IPv6 protocol on the same internet infrastructure. I chose this article because it
describes the chosen architecture in details and providing a comprehensive overview of
the features of the architecture without making the explanation too complex through
technical descriptions.
The article has first considered dual stack technology for integrating the IPv4 and IPv6
protocol on the same internet infrastructure. It transit from wan core routers to the
computers system which are the end devices of the infrastructure.
The article then considers tunnel and it allows for carrying one protocol into others and
execute this two protocols simultaneously. In this technology, IPv6 packets are first sent
through the tunnel and then encapsulated into IPv4 packets for sending those packets to
those portion of the network where IPv6 is not yet implemented. Another technique
considered in the article for the application is network address translation–protocol
translation (NAT-PT) which translates IPv6 packets into IPv4 packets to ensure
communication through IPv6 and IPv4 as well.
The article was useful because it provided a range of technologies for implementing the
IPv4 and IPv6 protocol on the same internet infrastructure and described those
technologies in details with proper explanation for implementation as well. This will help
to choose the effective and efficient technology is this context.
4
The article describes about the required technologies for implementing the IPv4 and
IPv6 protocol on the same internet infrastructure. I chose this article because it
describes the chosen architecture in details and providing a comprehensive overview of
the features of the architecture without making the explanation too complex through
technical descriptions.
The article has first considered dual stack technology for integrating the IPv4 and IPv6
protocol on the same internet infrastructure. It transit from wan core routers to the
computers system which are the end devices of the infrastructure.
The article then considers tunnel and it allows for carrying one protocol into others and
execute this two protocols simultaneously. In this technology, IPv6 packets are first sent
through the tunnel and then encapsulated into IPv4 packets for sending those packets to
those portion of the network where IPv6 is not yet implemented. Another technique
considered in the article for the application is network address translation–protocol
translation (NAT-PT) which translates IPv6 packets into IPv4 packets to ensure
communication through IPv6 and IPv4 as well.
The article was useful because it provided a range of technologies for implementing the
IPv4 and IPv6 protocol on the same internet infrastructure and described those
technologies in details with proper explanation for implementation as well. This will help
to choose the effective and efficient technology is this context.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Week 5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
What is Biometric Authentication?
https://www.jumio.com/what-is-biometric-authentication/
NICOLLS, D., 2019. What is Biometric Authentication?. Retrieved 1 October 2019,
from https://www.jumio.com/what-is-biometric-authentication/
Summary:
The article has described about the application of biometric technology for ensuring
authentication in the network. I chose this article because it has described about the
biometric technology for authentication and this is one of the most advance and
popular technology right now in the world.
The article first discusses about the traditional authentication process for example
password, knowledge-based authentication and token. Biometric technology
compares data of the user with the biometric data stored, confirmed and
authenticated in the database. However, these two datasets needs to be identical, as
100% similarity is not possible. The article has considered facial recognition for
biometric authentication and this include various steps for implementation. This
includes capturing ID document provided by the government, talking picture of the
person, creating 3D map from that, and after that an online account is created and
along with that an ongoing user authentication system is implemented for verification
of the user each time that person logins to the system for enhancing the network
security.
The article is useful because it not only describes about the authentication
techniques, but provides detailed description regarding how to implement this
technology for enhancing network security and therefore considered in this context
as well.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Capital One Data Breach Compromises Data of Over 100 Million
https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html?
module=inline
Flitter, E. and Weise, K., 2019. Capital One Data Breach Compromises Data of Over
100 Million. [online] Nytimes.com. Available at:
5
Network security has become a major concern of ICT world, and user authentication
is one of the popular tools to assure network security. Find and summarise ONE
resource that describes any ONE authentication mechanism except password. The
resource, and your summary, should focus purely on ONLY ONE type of
authentication mechanism.
What is Biometric Authentication?
https://www.jumio.com/what-is-biometric-authentication/
NICOLLS, D., 2019. What is Biometric Authentication?. Retrieved 1 October 2019,
from https://www.jumio.com/what-is-biometric-authentication/
Summary:
The article has described about the application of biometric technology for ensuring
authentication in the network. I chose this article because it has described about the
biometric technology for authentication and this is one of the most advance and
popular technology right now in the world.
The article first discusses about the traditional authentication process for example
password, knowledge-based authentication and token. Biometric technology
compares data of the user with the biometric data stored, confirmed and
authenticated in the database. However, these two datasets needs to be identical, as
100% similarity is not possible. The article has considered facial recognition for
biometric authentication and this include various steps for implementation. This
includes capturing ID document provided by the government, talking picture of the
person, creating 3D map from that, and after that an online account is created and
along with that an ongoing user authentication system is implemented for verification
of the user each time that person logins to the system for enhancing the network
security.
The article is useful because it not only describes about the authentication
techniques, but provides detailed description regarding how to implement this
technology for enhancing network security and therefore considered in this context
as well.
Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Capital One Data Breach Compromises Data of Over 100 Million
https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html?
module=inline
Flitter, E. and Weise, K., 2019. Capital One Data Breach Compromises Data of Over
100 Million. [online] Nytimes.com. Available at:
5
https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html?
module=inline [Accessed 1 Oct. 2019].
Summary:
The article has described about a recent data breach in the Capital One bank where
data of over 100 million consumers were accessed illegally and without any
authorization. The article is chosen by me because it is being regarded as one of the
largest known bank data theft and therefore, this is significant to analyse this security
breach in this context.
The article has provided a detailed description of the incident explaining how this
security breach was executed. According to the FBI report, a software engineer
named Paige Thompson hacked the server of the bank where information regarding
the consumers of the bank were stored. According to the court papers and capital
One, 140,000 Social Security numbers and 80,000 bank account numbers were
stolen in the breach, which might cost the company $150 according to the estimation
of the bank, however, the actual cost might be higher compared to previous data
breach reports, where, in such an incident, data of 147 million consumers were
stolen and it cost the company $650 million.
The article was useful as it provided a comprehensive idea regarding how security
issues might cost companies millions and what are the possible ways to exploit the
security, therefore it will help in analysing security issues and sources of security
issues as well.
6
module=inline [Accessed 1 Oct. 2019].
Summary:
The article has described about a recent data breach in the Capital One bank where
data of over 100 million consumers were accessed illegally and without any
authorization. The article is chosen by me because it is being regarded as one of the
largest known bank data theft and therefore, this is significant to analyse this security
breach in this context.
The article has provided a detailed description of the incident explaining how this
security breach was executed. According to the FBI report, a software engineer
named Paige Thompson hacked the server of the bank where information regarding
the consumers of the bank were stored. According to the court papers and capital
One, 140,000 Social Security numbers and 80,000 bank account numbers were
stolen in the breach, which might cost the company $150 according to the estimation
of the bank, however, the actual cost might be higher compared to previous data
breach reports, where, in such an incident, data of 147 million consumers were
stolen and it cost the company $650 million.
The article was useful as it provided a comprehensive idea regarding how security
issues might cost companies millions and what are the possible ways to exploit the
security, therefore it will help in analysing security issues and sources of security
issues as well.
6
Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
The difference between e-business and e-commerce
https://www.computerworld.com/article/2588708/e-commerce-the-difference-
between-e-business-and-e-commerce.html
Bartels, A., 2019. The difference between e-business and e-commerce. [online]
Computerworld. Available at: https://www.computerworld.com/article/2588708/e-
commerce-the-difference-between-e-business-and-e-commerce.html [Accessed 1
Oct. 2019].
Summary:
The article has described about the similarities and differences between e-commerce
and e-business. The reason why i chose the article is that it provided a logical
discussion for each of the similarities and differences rather than some general
overview regarding similarities and differences between e-commerce and e-bisiness.
The article makes it clear that e-commerce and e-business are similar because they
considers technologies related to the electronic network, which include internet and
electronic data exchange. E-commerce is included in e-business, but there are some
extra features that makes e-business different from the e-commerce. This include
some internal processes for example production, inventory management, product
development, risk management, finance, knowledge management and human
resources. Therefore, implementing e-business is often more complex than e-
commerce and requires strategic planning for ensuring success in the business
process. However, the article describes that some companies, especially companies
with large infrastructure support require to move their business beyond e-commerce
and e-business strategies in order to enhance their business process in digital
business context as well.
I found this article useful in this context because it not only described similarities and
differences between e-commerce and e-business, but also provided logical
explanation regarding why there is a similarity or why it is different while considering
a specific feature for comparison between e-commerce and e-business. Therefore, it
has enhanced the knowledge regarding this topic through proper description as well.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
SAP HANA Migration: Our LB Foster Success Story
7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference
between e-commerce and e-business.
The difference between e-business and e-commerce
https://www.computerworld.com/article/2588708/e-commerce-the-difference-
between-e-business-and-e-commerce.html
Bartels, A., 2019. The difference between e-business and e-commerce. [online]
Computerworld. Available at: https://www.computerworld.com/article/2588708/e-
commerce-the-difference-between-e-business-and-e-commerce.html [Accessed 1
Oct. 2019].
Summary:
The article has described about the similarities and differences between e-commerce
and e-business. The reason why i chose the article is that it provided a logical
discussion for each of the similarities and differences rather than some general
overview regarding similarities and differences between e-commerce and e-bisiness.
The article makes it clear that e-commerce and e-business are similar because they
considers technologies related to the electronic network, which include internet and
electronic data exchange. E-commerce is included in e-business, but there are some
extra features that makes e-business different from the e-commerce. This include
some internal processes for example production, inventory management, product
development, risk management, finance, knowledge management and human
resources. Therefore, implementing e-business is often more complex than e-
commerce and requires strategic planning for ensuring success in the business
process. However, the article describes that some companies, especially companies
with large infrastructure support require to move their business beyond e-commerce
and e-business strategies in order to enhance their business process in digital
business context as well.
I found this article useful in this context because it not only described similarities and
differences between e-commerce and e-business, but also provided logical
explanation regarding why there is a similarity or why it is different while considering
a specific feature for comparison between e-commerce and e-business. Therefore, it
has enhanced the knowledge regarding this topic through proper description as well.
Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find
and summarise ONE resource that describes the success story of adapting SAP
HANA by another local or international company. The resource, and your summary,
should focus on the story about ONE single company (which is not ARI company).
SAP HANA Migration: Our LB Foster Success Story
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
https://www.protera.com/sap-blog/sap-hana-migration-lb-foster
Krutikov, A.,2019. SAP HANA Migration Case Study: Our LB Foster Success Story.
[online] Protera Technologies. Available at: https://www.protera.com/sap-blog/sap-
hana-migration-lb-foster [Accessed 1 Oct. 2019].
Summary:
The article discusses about the success story of implementing SAP HANA in LB
foster, which provides infrastructure solution for the railway companies.
I chose this article because it describes each and every step that was considered for
implementing the SAP HANA solution which made it easier to analyze the success
story. Not only the success story, challenges in implementing the project was also
described in details, which has enhanced the authenticity and quality of the content
as well.
The article has described justification for this project. Due to demand for large scale
projects, it was required for LB foster to adopt SAP HANA to improve their production
process. Then the article has discussed about challenges of implementing SAP
HANA which include lack of project visibility, project delays along with lack of proper
decision regarding end product. In order to ensure that implementation of SAP HANA
is successful, a prototype system was provided to the company and after that a SAP
model was provided to them for integrating technological changes to the business
process of the company for effective integration of the business process with the
SAP HANA technology.
The thing that I found most useful about the article is that along with description of
challenges of implementing SAP HANA in enterprise context, it has also provided
strategies for identifying the challenge and manage those challenges properly that
will help in ensuring success in these type of projects.
8
Krutikov, A.,2019. SAP HANA Migration Case Study: Our LB Foster Success Story.
[online] Protera Technologies. Available at: https://www.protera.com/sap-blog/sap-
hana-migration-lb-foster [Accessed 1 Oct. 2019].
Summary:
The article discusses about the success story of implementing SAP HANA in LB
foster, which provides infrastructure solution for the railway companies.
I chose this article because it describes each and every step that was considered for
implementing the SAP HANA solution which made it easier to analyze the success
story. Not only the success story, challenges in implementing the project was also
described in details, which has enhanced the authenticity and quality of the content
as well.
The article has described justification for this project. Due to demand for large scale
projects, it was required for LB foster to adopt SAP HANA to improve their production
process. Then the article has discussed about challenges of implementing SAP
HANA which include lack of project visibility, project delays along with lack of proper
decision regarding end product. In order to ensure that implementation of SAP HANA
is successful, a prototype system was provided to the company and after that a SAP
model was provided to them for integrating technological changes to the business
process of the company for effective integration of the business process with the
SAP HANA technology.
The thing that I found most useful about the article is that along with description of
challenges of implementing SAP HANA in enterprise context, it has also provided
strategies for identifying the challenge and manage those challenges properly that
will help in ensuring success in these type of projects.
8
Week 9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Li3 — most RAD development framework for PHP
https://medium.com/@bhadreshlaiya/li3-most-rad-development-framework-for-php-
2aaef2b1087e
Laiya, B., 2019. Li3 — most RAD development framework for PHP. [online] Medium.
Available at: https://medium.com/@bhadreshlaiya/li3-most-rad-development-
framework-for-php-2aaef2b1087e [Accessed 1 Oct. 2019].
Summary:
The article describes the application of Li3 framework for integrating RAD in system
development. It not only describes features of the framework, but also defines why
these features are important for RAD implementation. Therefore, this article is
chosen in this context.
The article first describes the concept of RAD frameworks along with its features to
provide a comprehensive overview regarding the concept. RAD frameworks define a
set of libraries, functions, classes, and reusable objects with reference to the rapid
application development methodology. RAD frameworks not only helps in reducing
time for system development, but also helps in organizing and streamlining the
development process as well. Another important feature that is described by the
article is that there is no requirement for developing libraries and functions and that
too from scratch, instead these frameworks are considered for acceleration of the
process.
The article then describes why Li3 framework is considered as one of the best
frameworks for RAD implementation. The API of the framework is designed in such
that it is possible to integrate it with the custom code out of the framework. Li3
provides innovative method filter system for combining framework method calls,
intercepts parameters before and return values after. Along with this, Li3 also allows
for dynamic modification of internal features of the framework according to the
requirements of the system development and this according to the article is one of
the best features of the framework.
The reason that I have chosen this article is that it not only describes about the
features of the framework, but also describes features that are exclusive to this
chosen framework and therefore makes the choice for the framework easier.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Kurleto, M., 2019. 10 Reasons why your new IT system implementation failed –
9
Rapid application development (RAD) is a process of creating a workable system in
a very short period of time. There are few recently developed frameworks available in
market to undertake RAD. Find and summarise ONE recent (within last two years)
resource that describes and recommends about ONE framework for RAD.
Li3 — most RAD development framework for PHP
https://medium.com/@bhadreshlaiya/li3-most-rad-development-framework-for-php-
2aaef2b1087e
Laiya, B., 2019. Li3 — most RAD development framework for PHP. [online] Medium.
Available at: https://medium.com/@bhadreshlaiya/li3-most-rad-development-
framework-for-php-2aaef2b1087e [Accessed 1 Oct. 2019].
Summary:
The article describes the application of Li3 framework for integrating RAD in system
development. It not only describes features of the framework, but also defines why
these features are important for RAD implementation. Therefore, this article is
chosen in this context.
The article first describes the concept of RAD frameworks along with its features to
provide a comprehensive overview regarding the concept. RAD frameworks define a
set of libraries, functions, classes, and reusable objects with reference to the rapid
application development methodology. RAD frameworks not only helps in reducing
time for system development, but also helps in organizing and streamlining the
development process as well. Another important feature that is described by the
article is that there is no requirement for developing libraries and functions and that
too from scratch, instead these frameworks are considered for acceleration of the
process.
The article then describes why Li3 framework is considered as one of the best
frameworks for RAD implementation. The API of the framework is designed in such
that it is possible to integrate it with the custom code out of the framework. Li3
provides innovative method filter system for combining framework method calls,
intercepts parameters before and return values after. Along with this, Li3 also allows
for dynamic modification of internal features of the framework according to the
requirements of the system development and this according to the article is one of
the best features of the framework.
The reason that I have chosen this article is that it not only describes about the
features of the framework, but also describes features that are exclusive to this
chosen framework and therefore makes the choice for the framework easier.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many
previously successful companies. Find and summarise ONE resource that describes
few reasons of implementation failure for large scale IS. The resource, and your
summary, should analyse at least three reasons of the failure.
10 Reasons why your new IT system implementation failed
https://neoteric.eu/blog/10-reasons-why-your-new-it-system-implementation-failed/
Kurleto, M., 2019. 10 Reasons why your new IT system implementation failed –
9
Software House That Helps You Innovate - Neoteric. [online] Software House That
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 1 Oct. 2019].
Summary:
The article has described reasons why some of the large scale information system
projects fails. I have chosen this article because the article provides an in-depth
explanation of information system project issues rather than some general discussion
on the topic and also described how to analyze those issues properly while
implementing projects regarding implementation of information system for
organizations.
According to the article most of the time large IT system implementation is not that
effective because the requirements for the project is not well defined and employees
are not involved into it. Along with this analysis of the requirement is not also proper.
some other important aspects why IS projects are not successful are not defining
measurable requirements for the project, improper budget, schedule and project
scope definition, lack of test data and test cases along with lack of customization and
proper plan for considering ROI of the project and lack of variety in software selection
as well.
The article was useful to me as this not only described about the challenges that
affects information system project, but also provides description of how to identify
those issues in the project. Therefore it will help in ensuring success in these type of
projects as well.
10
Helps You Innovate - Neoteric. Available at: https://neoteric.eu/blog/10-reasons-why-
your-new-it-system-implementation-failed/ [Accessed 1 Oct. 2019].
Summary:
The article has described reasons why some of the large scale information system
projects fails. I have chosen this article because the article provides an in-depth
explanation of information system project issues rather than some general discussion
on the topic and also described how to analyze those issues properly while
implementing projects regarding implementation of information system for
organizations.
According to the article most of the time large IT system implementation is not that
effective because the requirements for the project is not well defined and employees
are not involved into it. Along with this analysis of the requirement is not also proper.
some other important aspects why IS projects are not successful are not defining
measurable requirements for the project, improper budget, schedule and project
scope definition, lack of test data and test cases along with lack of customization and
proper plan for considering ROI of the project and lack of variety in software selection
as well.
The article was useful to me as this not only described about the challenges that
affects information system project, but also provides description of how to identify
those issues in the project. Therefore it will help in ensuring success in these type of
projects as well.
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
11
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
11
1 out of 11
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.