IT Services in Management
VerifiedAdded on 2023/06/07
|15
|4696
|475
AI Summary
This resource covers various topics related to IT services in management including CPU and GPU market share, artificial intelligence-based operating systems, cloud computing vendors, IPv4 to IPv6 transformation, ransomware and malware attacks, and SDN and OpenFlow network architecture. It provides a brief summary of each topic and its relevance in the field of IT services in management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: IT SERVICES IN MANGEMENT 0
IT Services in Management
Individual Assignment
Student name
9/3/2018
IT Services in Management
Individual Assignment
Student name
9/3/2018
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT Services in Management 1
Contents
Tasks...........................................................................................................................................................2
Week - 1..................................................................................................................................................2
AMD Rising: CPU and GPU Market Share Growing Rapidly.................................................................2
Week – 2.................................................................................................................................................3
Smartron unveils tronX, an artificial intelligence based operating system to assist users...................3
Week – 3.................................................................................................................................................4
The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP.......4
Week – 4.................................................................................................................................................5
ITU plan to shift internet from IPv4 to IPv6 panned by engineers.......................................................5
Week – 5.................................................................................................................................................6
How Similar Are WannaCry And Petya Ransomware?.......................................................................6
Week – 6.................................................................................................................................................7
The basics of SDN and the OpenFlow Network Architecture..............................................................7
Week – 7.................................................................................................................................................8
Reasons to move away from legacy systems.......................................................................................8
Week – 8.................................................................................................................................................9
Facebook Cambridge Analytica Scandal: 10 Questions Answered......................................................9
Week – 9................................................................................................................................................10
Apache JMeter...................................................................................................................................10
Week – 10..............................................................................................................................................11
IT disasters now part of modern life..................................................................................................11
References.................................................................................................................................................12
Contents
Tasks...........................................................................................................................................................2
Week - 1..................................................................................................................................................2
AMD Rising: CPU and GPU Market Share Growing Rapidly.................................................................2
Week – 2.................................................................................................................................................3
Smartron unveils tronX, an artificial intelligence based operating system to assist users...................3
Week – 3.................................................................................................................................................4
The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP.......4
Week – 4.................................................................................................................................................5
ITU plan to shift internet from IPv4 to IPv6 panned by engineers.......................................................5
Week – 5.................................................................................................................................................6
How Similar Are WannaCry And Petya Ransomware?.......................................................................6
Week – 6.................................................................................................................................................7
The basics of SDN and the OpenFlow Network Architecture..............................................................7
Week – 7.................................................................................................................................................8
Reasons to move away from legacy systems.......................................................................................8
Week – 8.................................................................................................................................................9
Facebook Cambridge Analytica Scandal: 10 Questions Answered......................................................9
Week – 9................................................................................................................................................10
Apache JMeter...................................................................................................................................10
Week – 10..............................................................................................................................................11
IT disasters now part of modern life..................................................................................................11
References.................................................................................................................................................12
IT Services in Management 2
Tasks
Week - 1
Week 1
Title and Reference:
AMD Rising: CPU and GPU Market Share Growing Rapidly
Alcorn, P., 2018. AMD Rising: CPU And GPU Market Share Growing Rapidly. [Online]
Available at: https://www.tomshardware.com/news/amd-cpu-gpu-market-share,36592.html
[Accessed 12 September 2018].
Summary:
This resource is about CPU and GPU market requirement. According to mention resource, it is
useful to understand about future advancement in generation of CPU (referred as central
processing unit) using AI. A graphics-processing unit (Referred as GPU) is a particular type of
microprocessor GPU is used for different purposes, such as computer gaming, HD video
decoding, medical field, and computational science.
I select this resource, because it provides information about CPU to GPU transformation. GPU,
designed for gaming. It performs multiple tasks, as it have parallel processors. It designed for
quick image rendering. Graphcore is a new chip with an intelligence-processing unit (referred as
IPU). It is used for graph computing, it also provide system to low-precision floating-point
computing. It is ten time faster than other cores.
In this resource many things are discussed about CPU and CPU. Root of GPU’s innovation is
money drives computing. Because it has a big, enough market. It is a market policy that when
any product requires in market then someone will develop the product according to market
needs. It needs huge economics to make chips, so very few organizations are working on it.
According to Moore’s law chip, size will be double in 1-2 years. In case of CPU, in a single chip
multiple cores were used for processing. Maximum processes were managed in parallelism
concept for better resource management ( Giles, 2018).
This resource is useful because this describe about CPU and GPU working as well as use of
them. Four major vendors of GPU’s are NVIDIA, AMD, IBM, and Intel. GPU’s have up to 512
cores on a single chip. It provides very high bandwidth up to 190 GB/s to graphics memory of
system. GPU’s provides multi-threading with at least eight threads per core, so pipeline problem
will not occurs. CUDA programming is use for GPU computing (Olena, 2018). I think GPU’s
are the most exciting development in the field of computer’s in last ten years.Vega is also a
much known company in this field; it is so good for integrated graphics. AMD have few
resources are impressive, it also rapidly improving in both CPU’s and GPU’s. In august 2018,
AMD is announcing that it will move to TSMC from all of its 7nm production on both CPU’s
and GPU’s.
Tasks
Week - 1
Week 1
Title and Reference:
AMD Rising: CPU and GPU Market Share Growing Rapidly
Alcorn, P., 2018. AMD Rising: CPU And GPU Market Share Growing Rapidly. [Online]
Available at: https://www.tomshardware.com/news/amd-cpu-gpu-market-share,36592.html
[Accessed 12 September 2018].
Summary:
This resource is about CPU and GPU market requirement. According to mention resource, it is
useful to understand about future advancement in generation of CPU (referred as central
processing unit) using AI. A graphics-processing unit (Referred as GPU) is a particular type of
microprocessor GPU is used for different purposes, such as computer gaming, HD video
decoding, medical field, and computational science.
I select this resource, because it provides information about CPU to GPU transformation. GPU,
designed for gaming. It performs multiple tasks, as it have parallel processors. It designed for
quick image rendering. Graphcore is a new chip with an intelligence-processing unit (referred as
IPU). It is used for graph computing, it also provide system to low-precision floating-point
computing. It is ten time faster than other cores.
In this resource many things are discussed about CPU and CPU. Root of GPU’s innovation is
money drives computing. Because it has a big, enough market. It is a market policy that when
any product requires in market then someone will develop the product according to market
needs. It needs huge economics to make chips, so very few organizations are working on it.
According to Moore’s law chip, size will be double in 1-2 years. In case of CPU, in a single chip
multiple cores were used for processing. Maximum processes were managed in parallelism
concept for better resource management ( Giles, 2018).
This resource is useful because this describe about CPU and GPU working as well as use of
them. Four major vendors of GPU’s are NVIDIA, AMD, IBM, and Intel. GPU’s have up to 512
cores on a single chip. It provides very high bandwidth up to 190 GB/s to graphics memory of
system. GPU’s provides multi-threading with at least eight threads per core, so pipeline problem
will not occurs. CUDA programming is use for GPU computing (Olena, 2018). I think GPU’s
are the most exciting development in the field of computer’s in last ten years.Vega is also a
much known company in this field; it is so good for integrated graphics. AMD have few
resources are impressive, it also rapidly improving in both CPU’s and GPU’s. In august 2018,
AMD is announcing that it will move to TSMC from all of its 7nm production on both CPU’s
and GPU’s.
IT Services in Management 3
Week – 2
Week 2
Title and Reference:
Smartron unveils tronX, an artificial intelligence based operating system to assist users
Firstpost, 2018. Smartron unveils tronX, an artificial intelligence based operating system to
assist users. [Online]
Available at: https://www.firstpost.com/tech/news-analysis/smartron-unveils-tronx-an-artificial-
intelligence-based-operating-system-to-assist-users-3942083.html [Accessed 12 September
2018].
Summary:
This resource is about artificial intelligence uses in operating systems and all connecting other
devices. Combination of artificial intelligence and computer with IoT is latest technology, also
known as terming. TronX is an intelligent ecosystem that helps to connect different devices to
computer system. It make easy to handling of all devices, whether you are at home. It connects
and access to data from cloud and all content, which are related to particular services. Smartron
company is working on it from last two years. They also provide tronX Health, tronX Home,
and tronX infra.
I select this resource for knowledge about artificial intelligence and different uses of it.
Artificial intelligence based applications provide better functionality to operating systems, such
as reliability, security, scalability, and integrity including safety from threats and malicious
softwares. Artificial intelligence is moving to internet applications in computer system. It is also
use in various fields, such as medical intelligent diagnostic systems, robotics, and legal
intellectual systems. For better security in operating system all the above requirements means,
“authorized actions”. System life cycle have three phases: development, production and
functioning.
In this resource many advance and future technologies was discussed. Artificial intelligence
provides deferent features of machine learning and deep processing environments for operating
systems. Machine learning makes operating system faster and makes it more powerful in terms
of complex calculations. The main work of artificial intelligence is making internal softwares,
such as speech synthesizers for operating systems. Integration of different expert system, which
are based on artificial intelligence with operating system.
Artificial intelligence helps to integrate all outside systems with operating system for better use.
There are many tools for integration, such as OpenAIR protocol, Psyclone AIOS, Elvin, and
CORBA. Main requirements of artificial intelligence based operating systems are dependability
and security. Different concept are tied with both things like:
Maintainability
Integrity
Reliability
Week – 2
Week 2
Title and Reference:
Smartron unveils tronX, an artificial intelligence based operating system to assist users
Firstpost, 2018. Smartron unveils tronX, an artificial intelligence based operating system to
assist users. [Online]
Available at: https://www.firstpost.com/tech/news-analysis/smartron-unveils-tronx-an-artificial-
intelligence-based-operating-system-to-assist-users-3942083.html [Accessed 12 September
2018].
Summary:
This resource is about artificial intelligence uses in operating systems and all connecting other
devices. Combination of artificial intelligence and computer with IoT is latest technology, also
known as terming. TronX is an intelligent ecosystem that helps to connect different devices to
computer system. It make easy to handling of all devices, whether you are at home. It connects
and access to data from cloud and all content, which are related to particular services. Smartron
company is working on it from last two years. They also provide tronX Health, tronX Home,
and tronX infra.
I select this resource for knowledge about artificial intelligence and different uses of it.
Artificial intelligence based applications provide better functionality to operating systems, such
as reliability, security, scalability, and integrity including safety from threats and malicious
softwares. Artificial intelligence is moving to internet applications in computer system. It is also
use in various fields, such as medical intelligent diagnostic systems, robotics, and legal
intellectual systems. For better security in operating system all the above requirements means,
“authorized actions”. System life cycle have three phases: development, production and
functioning.
In this resource many advance and future technologies was discussed. Artificial intelligence
provides deferent features of machine learning and deep processing environments for operating
systems. Machine learning makes operating system faster and makes it more powerful in terms
of complex calculations. The main work of artificial intelligence is making internal softwares,
such as speech synthesizers for operating systems. Integration of different expert system, which
are based on artificial intelligence with operating system.
Artificial intelligence helps to integrate all outside systems with operating system for better use.
There are many tools for integration, such as OpenAIR protocol, Psyclone AIOS, Elvin, and
CORBA. Main requirements of artificial intelligence based operating systems are dependability
and security. Different concept are tied with both things like:
Maintainability
Integrity
Reliability
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT Services in Management 4
Confidentiality
Week – 3
Week 3
Title and Reference:
The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP
Evans, B., 2017. The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4
Salesforce, #5 SAP. [Online] Available at:
https://www.forbes.com/sites/bobevans1/2017/11/07/the-top-5-cloud-computing-vendors-1-
microsoft-2-amazon-3-ibm-4-salesforce-5-sap/#4adccb5f6f2e [Accessed 18 September 2018].
Summary:
This source is about Microsoft Azure and other four top cloud service vendors according to
Forbes. Infrastructure as a service (referred as IaaS) is a new computing frame for managing
data over the internet. IaaS provide online services to manage your data and avoid your own
physical servers. AI-driven competitive advantages are provided by IaaS.
I select this resource for knowledge about cloud computing and its services. IaaS provide many
facilities to organization, such as Website hosting, test and development, storage, and backup
with big data analysis and high-performance computing.
What are the main points or key information covered in the resource
Infrastructure as a service is a service based on cloud infrastructure. They are self-service
models, which are provides different types of services to vendors. Services of a IaaS are:
Accessing and storage of data
Monitoring Data centers
Managing remote datacenter
Networking services
This resource is describe about Azure and its services to different organizations.
Azure is IaaS of Microsoft. It has many advantages. It also provide Software as a Service
( referred as a SaaS), as well as Platform as a Service ( referred as PaaS) and provide many
types of programming languages, frameworks, and software tools different platforms, such as
third party software and Microsoft specific systems. Mr. Neil Hunt is chief product officer of
Netflix organization, has revealed that the all infrastructure work will be handing over to
Amazon Web Services (AWS). It is too difficult to maintain infrastructure from employees of
Netflix, so they just hire AWS for that infrastructure. AWS was in the top ten companies, which
provide cloud services or infrastructure for storing lot of data in different forms. Today Netflix
is having highest volume of data on cloud. Microsoft Azure is an example of IaaS, which is
charge according to per minutes.
Confidentiality
Week – 3
Week 3
Title and Reference:
The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP
Evans, B., 2017. The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4
Salesforce, #5 SAP. [Online] Available at:
https://www.forbes.com/sites/bobevans1/2017/11/07/the-top-5-cloud-computing-vendors-1-
microsoft-2-amazon-3-ibm-4-salesforce-5-sap/#4adccb5f6f2e [Accessed 18 September 2018].
Summary:
This source is about Microsoft Azure and other four top cloud service vendors according to
Forbes. Infrastructure as a service (referred as IaaS) is a new computing frame for managing
data over the internet. IaaS provide online services to manage your data and avoid your own
physical servers. AI-driven competitive advantages are provided by IaaS.
I select this resource for knowledge about cloud computing and its services. IaaS provide many
facilities to organization, such as Website hosting, test and development, storage, and backup
with big data analysis and high-performance computing.
What are the main points or key information covered in the resource
Infrastructure as a service is a service based on cloud infrastructure. They are self-service
models, which are provides different types of services to vendors. Services of a IaaS are:
Accessing and storage of data
Monitoring Data centers
Managing remote datacenter
Networking services
This resource is describe about Azure and its services to different organizations.
Azure is IaaS of Microsoft. It has many advantages. It also provide Software as a Service
( referred as a SaaS), as well as Platform as a Service ( referred as PaaS) and provide many
types of programming languages, frameworks, and software tools different platforms, such as
third party software and Microsoft specific systems. Mr. Neil Hunt is chief product officer of
Netflix organization, has revealed that the all infrastructure work will be handing over to
Amazon Web Services (AWS). It is too difficult to maintain infrastructure from employees of
Netflix, so they just hire AWS for that infrastructure. AWS was in the top ten companies, which
provide cloud services or infrastructure for storing lot of data in different forms. Today Netflix
is having highest volume of data on cloud. Microsoft Azure is an example of IaaS, which is
charge according to per minutes.
IT Services in Management 5
Week – 4
Week 4
Title and Reference:
ITU plan to shift internet from IPv4 to IPv6 panned by engineers
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online]
Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-
ipv4-to-ipv6-panned-by-engineers[Accessed 11 September 2018].
Summary:
This source is about changes from IPv4 to IPv6 and its advantages and disadvantages.
According to ITU, 1:1 mapping worked and it will solve many recent problems.
I select this resource because its describe about internet protocol version transformation.
IPv4 is an internet protocol, which is use to transfer data between different workstations. IPv6 is
next version of IPv4. IPv4 version had a 4.2 billion addresses capacity. Now internet users are
highly increased, so classless internet model developed, still facing same problem for address
and networks for different organizations. IPv6 is supports 128 bits addresses that means 2128
addresses. Length of the header of IPv6 is 40 bytes. It provides internet protocol security
(referred as IPsec) as network security is mandatory. This has better quality of services. It is
auto configuration enable protocol version.
This resource is describe uses of IPv6 over IPv4. As IPv6 supports multicasting, it does not
need to define any broadcast address. IPv4 and IPv6 differences are:
S. N. IPv4 IPv6
1. Address length is 32 bits It have 128 bits for addresses
2. It have decimal representation It have hexadecimal representation
3. IPsec is optional It have inbuilt IPsec
4. DHCP configuration. Auto-configuration and renumbering.
5. Encryption and Authentication is
not Provided
Encryption and Authentication is
Provided
6. Fragmentation performed by
Sender and forwarding routers
Fragmentation performed by Only by
the sender
7. Broadcast messages are available Broadcast messages are not available.
8. Checksum field is available in
IPv4 header
Checksum field is not available in
IPv6 header
Week – 4
Week 4
Title and Reference:
ITU plan to shift internet from IPv4 to IPv6 panned by engineers
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online]
Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-
ipv4-to-ipv6-panned-by-engineers[Accessed 11 September 2018].
Summary:
This source is about changes from IPv4 to IPv6 and its advantages and disadvantages.
According to ITU, 1:1 mapping worked and it will solve many recent problems.
I select this resource because its describe about internet protocol version transformation.
IPv4 is an internet protocol, which is use to transfer data between different workstations. IPv6 is
next version of IPv4. IPv4 version had a 4.2 billion addresses capacity. Now internet users are
highly increased, so classless internet model developed, still facing same problem for address
and networks for different organizations. IPv6 is supports 128 bits addresses that means 2128
addresses. Length of the header of IPv6 is 40 bytes. It provides internet protocol security
(referred as IPsec) as network security is mandatory. This has better quality of services. It is
auto configuration enable protocol version.
This resource is describe uses of IPv6 over IPv4. As IPv6 supports multicasting, it does not
need to define any broadcast address. IPv4 and IPv6 differences are:
S. N. IPv4 IPv6
1. Address length is 32 bits It have 128 bits for addresses
2. It have decimal representation It have hexadecimal representation
3. IPsec is optional It have inbuilt IPsec
4. DHCP configuration. Auto-configuration and renumbering.
5. Encryption and Authentication is
not Provided
Encryption and Authentication is
Provided
6. Fragmentation performed by
Sender and forwarding routers
Fragmentation performed by Only by
the sender
7. Broadcast messages are available Broadcast messages are not available.
8. Checksum field is available in
IPv4 header
Checksum field is not available in
IPv6 header
IT Services in Management 6
Week – 5
Week 5
Title and Reference:
How Similar Are WannaCry And Petya Ransomware?
Forbes, 2017. How Similar Are WannaCry And Petya Ransomware?. [Online]
Available at: https://www.forbes.com/sites/quora/2017/07/05/how-similar-are-wannacry-and-
petya-ransomware/#25289b8446eb [Accessed 18 Sepetember 2018].
Summary:
This resource is about ransomware and malware attacks. This resource explains about both
ransomware and malware attacks. WannaCry appeared first time on 12 may 2017. WannaCry is
a worm of ransomware type that damages a number of networks rapidly in May of 2017. It
encrypts files of windows computers hard disks.
WannaCry is a ransomware, which converts files in to different formats with append .wcry to
the end of the file name. First time, it was encrypted 176 different files in a computer system
and asked user to pay Bitcoin of worth $3000. In addition, that note indicates that money will
be doubled after 3 days and if payment is not done then encrypted files will be deleted after
seven days. However, no such type of code found in those files for deletion.
Microsoft already launched patches for this type of attack. It is highly increased on Monday, as
employees returned to office after the weekend. WannaCry propagated through “EternalBlue”,
an exploit in Windows systems. Microsoft had already released patches for this type of attack,
but some organizations had not applied these patches to their systems. This attack was stopped
within a week, as Microsoft released patches for that type of attack.
Some security agencies believed from evolution of the threat that the worm originated from
agencies working for the North Korea. Petya and NotPetya are malware that affected lots of
computer systems in 2016 and 2017. NotPetya encrypt the files of infected system. It was
targeting various computer systems in the hospitals, hotels, and government departments also.
Week – 5
Week 5
Title and Reference:
How Similar Are WannaCry And Petya Ransomware?
Forbes, 2017. How Similar Are WannaCry And Petya Ransomware?. [Online]
Available at: https://www.forbes.com/sites/quora/2017/07/05/how-similar-are-wannacry-and-
petya-ransomware/#25289b8446eb [Accessed 18 Sepetember 2018].
Summary:
This resource is about ransomware and malware attacks. This resource explains about both
ransomware and malware attacks. WannaCry appeared first time on 12 may 2017. WannaCry is
a worm of ransomware type that damages a number of networks rapidly in May of 2017. It
encrypts files of windows computers hard disks.
WannaCry is a ransomware, which converts files in to different formats with append .wcry to
the end of the file name. First time, it was encrypted 176 different files in a computer system
and asked user to pay Bitcoin of worth $3000. In addition, that note indicates that money will
be doubled after 3 days and if payment is not done then encrypted files will be deleted after
seven days. However, no such type of code found in those files for deletion.
Microsoft already launched patches for this type of attack. It is highly increased on Monday, as
employees returned to office after the weekend. WannaCry propagated through “EternalBlue”,
an exploit in Windows systems. Microsoft had already released patches for this type of attack,
but some organizations had not applied these patches to their systems. This attack was stopped
within a week, as Microsoft released patches for that type of attack.
Some security agencies believed from evolution of the threat that the worm originated from
agencies working for the North Korea. Petya and NotPetya are malware that affected lots of
computer systems in 2016 and 2017. NotPetya encrypt the files of infected system. It was
targeting various computer systems in the hospitals, hotels, and government departments also.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT Services in Management 7
Week – 6
Week 6
Title and Reference:
The basics of SDN and the OpenFlow Network Architecture
LeClerc, . M., 2018. The basics of SDN and the OpenFlow Network Architecture. [Online]
Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/
[Accessed 18 September 2018].
Summary:
This resource is about Software Defined Networking (referred as SDN) and uses of OpenFLow.
This resource is described about complete architecture of SDN. It is designed to manage data
flow and internetworking devices. SDN architecture have three layers are:
Application layer – it provide communication services for end-user boniness
applications
Control Layer – it consist the logically centralized functionality
Infrastructure Layer – it provides packet switching and message forwarding
In this resource technical description is well defined. SDN has logically centralized intelligence,
which provides decision-making facility to domain. It is also controlled by software. There are
many Application-programming interfaces to interact with the network. SDN control layer is
also providing abstraction for business applications. In the field of networking OpenFlow-
enabled SDN, provide several benefits such as multi-vendor networking. OpenFlow is provides
connection between different geographical domains for managing operations and complaints.
Speed and Automation – Centralized control and programmatic API’s manage streamline
operations. Efficiency – Minimization and optimization of traffic using OpenFlow increase
efficiency of network, it also enables multi-layer path computation.
Operator innovation – It provides access to network operator to differentiate their services and
make their own service model using a standard information model. Now a day’s operator needs
their transport networks with high bandwidth and shifting traffic patterns. SDN provides all
these facilities to maintain network according to their needs.
Week – 6
Week 6
Title and Reference:
The basics of SDN and the OpenFlow Network Architecture
LeClerc, . M., 2018. The basics of SDN and the OpenFlow Network Architecture. [Online]
Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/
[Accessed 18 September 2018].
Summary:
This resource is about Software Defined Networking (referred as SDN) and uses of OpenFLow.
This resource is described about complete architecture of SDN. It is designed to manage data
flow and internetworking devices. SDN architecture have three layers are:
Application layer – it provide communication services for end-user boniness
applications
Control Layer – it consist the logically centralized functionality
Infrastructure Layer – it provides packet switching and message forwarding
In this resource technical description is well defined. SDN has logically centralized intelligence,
which provides decision-making facility to domain. It is also controlled by software. There are
many Application-programming interfaces to interact with the network. SDN control layer is
also providing abstraction for business applications. In the field of networking OpenFlow-
enabled SDN, provide several benefits such as multi-vendor networking. OpenFlow is provides
connection between different geographical domains for managing operations and complaints.
Speed and Automation – Centralized control and programmatic API’s manage streamline
operations. Efficiency – Minimization and optimization of traffic using OpenFlow increase
efficiency of network, it also enables multi-layer path computation.
Operator innovation – It provides access to network operator to differentiate their services and
make their own service model using a standard information model. Now a day’s operator needs
their transport networks with high bandwidth and shifting traffic patterns. SDN provides all
these facilities to maintain network according to their needs.
IT Services in Management 8
Week – 7
Week 7
Title and Reference:
Reasons to move away from legacy systems
arrkgroup, 2018. Reasons to move away from legacy systems. [Online]
Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-from-
legacy-systems/ [Accessed 03 09 2018].
Summary:
This resource is explains about Legacy systems and about their managing problems. Sometimes
organizations do not have a choice to continue their legacy systems. For business development
and industrial strength, it is necessary to replacing core systems. I select this resource because it
is provide issues of legacy systems. Legacy systems are too costly to maintaining and upgrading
now days. Without upgrading the current system sometimes, reflect on business losses. Legacy
systems have supporting unique business. It also provides invaluable knowledge with historical
data. Due to cost-effective technology, many IT systems are working on older legacy systems.
It is difficult to hire qualified programmers to maintain legacy systems, because legacy systems
working on old technologies. When a change in legacy systems requires a major expenditure
and management does not approve many times. It is too difficult to change such massive
systems, because they are changing business climate and they have high risk of failure.
Changing in legacy system take more time as calculated previously and vice versa costing also
increase.
Many systems are useless without IT systems as legacy systems have old technologies to
maintain data and process that will be a big task to modern system to embed these old systems
with new modern IT technologies. Migration of these legacy systems is best suited for
organisations looking to implement an Internet-based business model. Maintenance and
migration are too cost effective for legacy systems. IT systems makes better to an organization
working process and change business growth of an organization. Information technologies
attach previous or current system to mobile phones for easy and fast access from anywhere.
Week – 7
Week 7
Title and Reference:
Reasons to move away from legacy systems
arrkgroup, 2018. Reasons to move away from legacy systems. [Online]
Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-from-
legacy-systems/ [Accessed 03 09 2018].
Summary:
This resource is explains about Legacy systems and about their managing problems. Sometimes
organizations do not have a choice to continue their legacy systems. For business development
and industrial strength, it is necessary to replacing core systems. I select this resource because it
is provide issues of legacy systems. Legacy systems are too costly to maintaining and upgrading
now days. Without upgrading the current system sometimes, reflect on business losses. Legacy
systems have supporting unique business. It also provides invaluable knowledge with historical
data. Due to cost-effective technology, many IT systems are working on older legacy systems.
It is difficult to hire qualified programmers to maintain legacy systems, because legacy systems
working on old technologies. When a change in legacy systems requires a major expenditure
and management does not approve many times. It is too difficult to change such massive
systems, because they are changing business climate and they have high risk of failure.
Changing in legacy system take more time as calculated previously and vice versa costing also
increase.
Many systems are useless without IT systems as legacy systems have old technologies to
maintain data and process that will be a big task to modern system to embed these old systems
with new modern IT technologies. Migration of these legacy systems is best suited for
organisations looking to implement an Internet-based business model. Maintenance and
migration are too cost effective for legacy systems. IT systems makes better to an organization
working process and change business growth of an organization. Information technologies
attach previous or current system to mobile phones for easy and fast access from anywhere.
IT Services in Management 9
Week – 8
Week 8
Title and Reference:
Facebook Cambridge Analytica Scandal: 10 Questions Answered
Bloomberg, 2018. Facebook Cambridge Analytica Scandal: 10 Questions Answered. [Online]
Available at: http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
[Accessed 05 09 2018].
Summary:
This resource is about Facebook Cambridge Analytica Scandal. Aleksandr Kogan was created
an application for digital survey. He is an American researcher work in the well-known
company “Cambridge Analytica”. Kogan makes an application for a digital survey from
Facebook users for their Digital life. 50 millions of Facebook users are involved in this survey
according to different agencies. That app violated Facebook terms and conditions collect data of
users and their friends. Kogan took permissions from Facebook. Facebook allows Kogan to
collect data of users and their friends if their privacy settings allowed it. According to
Facebook, Kogan lied to Facebook by saying he was collecting the information for research
purposes.
According to this resource the Cambridge Analytica all data was deleted provided by Kogan.
According to Times report Cambridge Analytica pay Kogan more than $800,000 for creating
his app and keep a copy for his own research. After this incident Facebook, change many
settings. No one can search any person from his or her phone number and email id. Facebook
make it easier for users to change their settings according to their needs. Cambridge Analytica
had suspended Alexander Nix, who is chief executive officer. According to many secret agency
data was used in campaign for psychotic test of different users of Facebook.
Week – 8
Week 8
Title and Reference:
Facebook Cambridge Analytica Scandal: 10 Questions Answered
Bloomberg, 2018. Facebook Cambridge Analytica Scandal: 10 Questions Answered. [Online]
Available at: http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
[Accessed 05 09 2018].
Summary:
This resource is about Facebook Cambridge Analytica Scandal. Aleksandr Kogan was created
an application for digital survey. He is an American researcher work in the well-known
company “Cambridge Analytica”. Kogan makes an application for a digital survey from
Facebook users for their Digital life. 50 millions of Facebook users are involved in this survey
according to different agencies. That app violated Facebook terms and conditions collect data of
users and their friends. Kogan took permissions from Facebook. Facebook allows Kogan to
collect data of users and their friends if their privacy settings allowed it. According to
Facebook, Kogan lied to Facebook by saying he was collecting the information for research
purposes.
According to this resource the Cambridge Analytica all data was deleted provided by Kogan.
According to Times report Cambridge Analytica pay Kogan more than $800,000 for creating
his app and keep a copy for his own research. After this incident Facebook, change many
settings. No one can search any person from his or her phone number and email id. Facebook
make it easier for users to change their settings according to their needs. Cambridge Analytica
had suspended Alexander Nix, who is chief executive officer. According to many secret agency
data was used in campaign for psychotic test of different users of Facebook.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT Services in Management 10
Week – 9
Week 9
Title and Reference:
Apache JMeter
JMeter, A., 2018. Apache JMeter™. [Online]
Available at: https://jmeter.apache.org/index.html
[Accessed 5 september 2018].
Summary:
This resource is about testing and performance tool. I am taking JMeter as a tool for performance
testing. It is free of cost. JMeter is open source software designed by Apache software
foundation. It is used for performance testing of different application. This is a pure java
application to load test of software. It is showing functional behavior and measure performance
in different aspects. Apache JMeter may be used to static and dynamic resources performance
testing.It has ability to load testing and measure performance of many sources, such as web
application, databases, and java objects. It provides dynamic HTML report. It is not a browser; it
is software, which works at protocol level. For testing any web application, server, and protocol,
runs JMeter in GUI mode. After that go to File menu and start recording. This is first step of test
plan building next step is load testing, in which configure the injectors that will run JMeter.
JMeter requires java environments and java development kit.
I select this resource because it is explain about JMeter in brief and in useful way.JMeter version
4.0 is computable with jdk 8 and jdk 9. Some optional requirements of JMeter are java compiler,
SAX XML parser, Email Support, SSL Encryption, JDBC driver, JMS client, and libraries for
Active MQJMS. To run JMeter, different files to run according to operating systems, such as in
case of windows, you should run jmeter.bat or in case of Unix should run JMeter file from bin
directory. After some time GUI should appear. That will be easy to monitor and manage
resources. JMeter tested complete application and show different graph for performance
measurement.
Week – 9
Week 9
Title and Reference:
Apache JMeter
JMeter, A., 2018. Apache JMeter™. [Online]
Available at: https://jmeter.apache.org/index.html
[Accessed 5 september 2018].
Summary:
This resource is about testing and performance tool. I am taking JMeter as a tool for performance
testing. It is free of cost. JMeter is open source software designed by Apache software
foundation. It is used for performance testing of different application. This is a pure java
application to load test of software. It is showing functional behavior and measure performance
in different aspects. Apache JMeter may be used to static and dynamic resources performance
testing.It has ability to load testing and measure performance of many sources, such as web
application, databases, and java objects. It provides dynamic HTML report. It is not a browser; it
is software, which works at protocol level. For testing any web application, server, and protocol,
runs JMeter in GUI mode. After that go to File menu and start recording. This is first step of test
plan building next step is load testing, in which configure the injectors that will run JMeter.
JMeter requires java environments and java development kit.
I select this resource because it is explain about JMeter in brief and in useful way.JMeter version
4.0 is computable with jdk 8 and jdk 9. Some optional requirements of JMeter are java compiler,
SAX XML parser, Email Support, SSL Encryption, JDBC driver, JMS client, and libraries for
Active MQJMS. To run JMeter, different files to run according to operating systems, such as in
case of windows, you should run jmeter.bat or in case of Unix should run JMeter file from bin
directory. After some time GUI should appear. That will be easy to monitor and manage
resources. JMeter tested complete application and show different graph for performance
measurement.
IT Services in Management 11
Week – 10
Week 10
Title and Reference:
IT disasters now part of modern life
AFR, 2016. IT disasters now part of modern life. [Online]
Available at: https://www.afr.com/technology/it-disasters-now-part-of-modern-life-20160628-
gptyw6 [Accessed 18 September 2018].
Summary:
This resource is about failure of payroll system of Queensland Health Department. I select this
resource because its explain each and everything about that failure of IT project. I am taking a
case of Queensland Health department. They want to implement a new roistering and payroll
system. IBM Australia was selected as prime contractor for implementation of that project. The
outcome of that project was described as a failure in many aspects, such as performance issues,
high delay in project delivery, incorrect distribution of payment, and over budget. IBM charged
$21 million for that payroll system project, which is four times more than contract price. Failure
can be attributed in different terms, as unclear business requirements, ineffective project
governance, and poor management for development process. By this project, failure 75000
employees are affected. This project was around 18 month late from given deadline. There are
many other reasons also for failure of this payroll system. In that project identified some
problems were;
Inaccurate payroll payments – some time they pay double to employees
Defective functionality – incorrectly calculation of leaves
Upgrade process was failed – data transfer between SAP and workbrain take long time
Not properly migration of data from legacy system- 20000 forms are not processed
Data Error – Time code identifier could not processed other files, which are created at
same time
It is so necessary to understand about requirement by the organization, so software company
analyze according to that and make a suitable application as per requirement.
References
Alcorn, . P., 2018. AMD Rising: CPU And GPU Market Share Growing Rapidly. [Online]
Available at: https://www.tomshardware.com/news/amd-cpu-gpu-market-share,36592.html
[Accessed 12 September 2018].
Week – 10
Week 10
Title and Reference:
IT disasters now part of modern life
AFR, 2016. IT disasters now part of modern life. [Online]
Available at: https://www.afr.com/technology/it-disasters-now-part-of-modern-life-20160628-
gptyw6 [Accessed 18 September 2018].
Summary:
This resource is about failure of payroll system of Queensland Health Department. I select this
resource because its explain each and everything about that failure of IT project. I am taking a
case of Queensland Health department. They want to implement a new roistering and payroll
system. IBM Australia was selected as prime contractor for implementation of that project. The
outcome of that project was described as a failure in many aspects, such as performance issues,
high delay in project delivery, incorrect distribution of payment, and over budget. IBM charged
$21 million for that payroll system project, which is four times more than contract price. Failure
can be attributed in different terms, as unclear business requirements, ineffective project
governance, and poor management for development process. By this project, failure 75000
employees are affected. This project was around 18 month late from given deadline. There are
many other reasons also for failure of this payroll system. In that project identified some
problems were;
Inaccurate payroll payments – some time they pay double to employees
Defective functionality – incorrectly calculation of leaves
Upgrade process was failed – data transfer between SAP and workbrain take long time
Not properly migration of data from legacy system- 20000 forms are not processed
Data Error – Time code identifier could not processed other files, which are created at
same time
It is so necessary to understand about requirement by the organization, so software company
analyze according to that and make a suitable application as per requirement.
References
Alcorn, . P., 2018. AMD Rising: CPU And GPU Market Share Growing Rapidly. [Online]
Available at: https://www.tomshardware.com/news/amd-cpu-gpu-market-share,36592.html
[Accessed 12 September 2018].
IT Services in Management 12
Auster, M., 2013. OpenFlow-enabled. [Online]
Available at: https://www.opennetworking.org/wp-content/uploads/2013/05/sb-of-enabled-
transport-sdn.pdf
[Accessed 03 09 2018].
Evans, B., 2017. The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4
Salesforce, #5 SAP. [Online]
Available at: https://www.forbes.com/sites/bobevans1/2017/11/07/the-top-5-cloud-computing-
vendors-1-microsoft-2-amazon-3-ibm-4-salesforce-5-sap/#4adccb5f6f2e
[Accessed 18 September 2018].
Giles, M., 2018. CPUs and GPUs. [Online]
Available at: people.maths.ox.ac.uk/gilesm/cuda/lecs/lec0.pdf
[Accessed 04 09 2018].
Korneev, S., 2017. Artificial Intelligence Operating System. [Online]
Available at:
https://www.researchgate.net/publication/320173364_Artificial_Intelligence_Operating_System
[Accessed 04 09 2018].
Lopez, D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
McLean , A., 2016. Netflix to hand infrastructure heavy lifting to AWS. [Online]
Available at: https://www.zdnet.com/article/netflix-to-hand-infrastructure-heavy-lifting-to-aws/
[Accessed 04 09 2018].
Mubashir , V. P., 2013. IP Address Classes and Ranges Explained with Subnet Mask. [Online]
Available at: http://www.smartpctricks.com/2013/03/ip-address-classes-and-ranges-explained-
with-subnet-mask.html
[Accessed 29 08 2018].
Stallings, W., 2018. Software-Defined Networks and OpenFlow - The Internet Protocol Journal,
Volume 16, No. 1. [Online]
Available at: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/
table-contents-59/161-sdn.html
[Accessed 03 09 2018].
Stokel-Walker, C., 2018. Move over CPUs and GPUs, the Intelligence Processing Unit is the
super-smart chip of the future. [Online]
Available at: https://www.wired.co.uk/article/graphcore-ai-ipu-chip-nigel-toon
[Accessed 12 september 2018].
AFR, 2016. IT disasters now part of modern life. [Online]
Available at: https://www.afr.com/technology/it-disasters-now-part-of-modern-life-20160628-
Auster, M., 2013. OpenFlow-enabled. [Online]
Available at: https://www.opennetworking.org/wp-content/uploads/2013/05/sb-of-enabled-
transport-sdn.pdf
[Accessed 03 09 2018].
Evans, B., 2017. The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4
Salesforce, #5 SAP. [Online]
Available at: https://www.forbes.com/sites/bobevans1/2017/11/07/the-top-5-cloud-computing-
vendors-1-microsoft-2-amazon-3-ibm-4-salesforce-5-sap/#4adccb5f6f2e
[Accessed 18 September 2018].
Giles, M., 2018. CPUs and GPUs. [Online]
Available at: people.maths.ox.ac.uk/gilesm/cuda/lecs/lec0.pdf
[Accessed 04 09 2018].
Korneev, S., 2017. Artificial Intelligence Operating System. [Online]
Available at:
https://www.researchgate.net/publication/320173364_Artificial_Intelligence_Operating_System
[Accessed 04 09 2018].
Lopez, D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
McLean , A., 2016. Netflix to hand infrastructure heavy lifting to AWS. [Online]
Available at: https://www.zdnet.com/article/netflix-to-hand-infrastructure-heavy-lifting-to-aws/
[Accessed 04 09 2018].
Mubashir , V. P., 2013. IP Address Classes and Ranges Explained with Subnet Mask. [Online]
Available at: http://www.smartpctricks.com/2013/03/ip-address-classes-and-ranges-explained-
with-subnet-mask.html
[Accessed 29 08 2018].
Stallings, W., 2018. Software-Defined Networks and OpenFlow - The Internet Protocol Journal,
Volume 16, No. 1. [Online]
Available at: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/
table-contents-59/161-sdn.html
[Accessed 03 09 2018].
Stokel-Walker, C., 2018. Move over CPUs and GPUs, the Intelligence Processing Unit is the
super-smart chip of the future. [Online]
Available at: https://www.wired.co.uk/article/graphcore-ai-ipu-chip-nigel-toon
[Accessed 12 september 2018].
AFR, 2016. IT disasters now part of modern life. [Online]
Available at: https://www.afr.com/technology/it-disasters-now-part-of-modern-life-20160628-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT Services in Management 13
gptyw6
[Accessed 18 September 2018].
arrkgroup, 2018. Reasons to move away from legacy systems. [Online]
Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-from-
legacy-systems/
[Accessed 03 09 2018].
Bloomberg, 2018. Facebook Cambridge Analytica Scandal: 10 Questions Answered. [Online]
Available at: http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
[Accessed 05 09 2018].
Certiology, 2018. IPV6 vs IPV4. [Online]
Available at: http://www.certiology.com/computing/computer-networking/ipv6-vs-ipv4.html
[Accessed 04 09 2018].
Firstpost, 2018. Smartron unveils tronX, an artificial intelligence based operating system to
assist users. [Online]
Available at: https://www.firstpost.com/tech/news-analysis/smartron-unveils-tronx-an-artificial-
intelligence-based-operating-system-to-assist-users-3942083.html
[Accessed 12 September 2018].
Forbes, 2017. How Similar Are WannaCry And Petya Ransomware?. [Online]
Available at: https://www.forbes.com/sites/quora/2017/07/05/how-similar-are-wannacry-and-
petya-ransomware/#25289b8446eb
[Accessed 18 Sepetember 2018].
Fruhlinger, J., 2018. What is WannaCry ransomware, how does it infect, and who was
responsible?. [Online]
Available at: https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html
[Accessed 03 09 2018].
JMeter, A., 2018. Apache JMeter™. [Online]
Available at: https://jmeter.apache.org/index.html
[Accessed 5 september 2018].
LeClerc, . M., 2018. The basics of SDN and the OpenFlow Network Architecture. [Online]
Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/
[Accessed 18 September 2018].
Manongdo, R., 2018. Queensland Health Payroll System - a case study on Business Process
Management and application Enterprise Integration. [Online]
Available at: http://www.academia.edu/8096282/Queensland_Health_Payroll_System_-
gptyw6
[Accessed 18 September 2018].
arrkgroup, 2018. Reasons to move away from legacy systems. [Online]
Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-from-
legacy-systems/
[Accessed 03 09 2018].
Bloomberg, 2018. Facebook Cambridge Analytica Scandal: 10 Questions Answered. [Online]
Available at: http://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/
[Accessed 05 09 2018].
Certiology, 2018. IPV6 vs IPV4. [Online]
Available at: http://www.certiology.com/computing/computer-networking/ipv6-vs-ipv4.html
[Accessed 04 09 2018].
Firstpost, 2018. Smartron unveils tronX, an artificial intelligence based operating system to
assist users. [Online]
Available at: https://www.firstpost.com/tech/news-analysis/smartron-unveils-tronx-an-artificial-
intelligence-based-operating-system-to-assist-users-3942083.html
[Accessed 12 September 2018].
Forbes, 2017. How Similar Are WannaCry And Petya Ransomware?. [Online]
Available at: https://www.forbes.com/sites/quora/2017/07/05/how-similar-are-wannacry-and-
petya-ransomware/#25289b8446eb
[Accessed 18 Sepetember 2018].
Fruhlinger, J., 2018. What is WannaCry ransomware, how does it infect, and who was
responsible?. [Online]
Available at: https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html
[Accessed 03 09 2018].
JMeter, A., 2018. Apache JMeter™. [Online]
Available at: https://jmeter.apache.org/index.html
[Accessed 5 september 2018].
LeClerc, . M., 2018. The basics of SDN and the OpenFlow Network Architecture. [Online]
Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/
[Accessed 18 September 2018].
Manongdo, R., 2018. Queensland Health Payroll System - a case study on Business Process
Management and application Enterprise Integration. [Online]
Available at: http://www.academia.edu/8096282/Queensland_Health_Payroll_System_-
IT Services in Management 14
_a_case_study_on_Business_Process_Management_and_application_Enterprise_Integration
[Accessed 5 september 2018].
Microsoft, 2018. Microsoft Azure for Research Overview. [Online]
Available at: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/microsoft-
azure-for-research-overview.pdf
[Accessed 12 September 2018].
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online]
Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-
ipv4-to-ipv6-panned-by-engineers
[Accessed 11 September 2018].
Olena, 2018. GPU vs CPU Computing: What to choose?. [Online]
Available at: https://medium.com/altumea/gpu-vs-cpu-computing-what-to-choose-a9788a2370c4
[Accessed 04 09 2018].
Security Response Team, 2017. What you need to know about the WannaCry Ransomware.
[Online]
Available at: https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack
[Accessed 04 09 2018].
Zoufaly, F., 2002. Issues and Challenges Facing Legacy Systems. [Online]
Available at: https://www.developer.com/mgmt/article.php/1492531/Issues-and-Challenges-
Facing-Legacy-Systems.htm
[Accessed 05 09 2018].
_a_case_study_on_Business_Process_Management_and_application_Enterprise_Integration
[Accessed 5 september 2018].
Microsoft, 2018. Microsoft Azure for Research Overview. [Online]
Available at: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/microsoft-
azure-for-research-overview.pdf
[Accessed 12 September 2018].
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online]
Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-
ipv4-to-ipv6-panned-by-engineers
[Accessed 11 September 2018].
Olena, 2018. GPU vs CPU Computing: What to choose?. [Online]
Available at: https://medium.com/altumea/gpu-vs-cpu-computing-what-to-choose-a9788a2370c4
[Accessed 04 09 2018].
Security Response Team, 2017. What you need to know about the WannaCry Ransomware.
[Online]
Available at: https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack
[Accessed 04 09 2018].
Zoufaly, F., 2002. Issues and Challenges Facing Legacy Systems. [Online]
Available at: https://www.developer.com/mgmt/article.php/1492531/Issues-and-Challenges-
Facing-Legacy-Systems.htm
[Accessed 05 09 2018].
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.