Examples of Traditional Mass Storage and NAS or SAN Storage Technologies
VerifiedAdded on 2023/04/04
|16
|4045
|292
AI Summary
This article discusses examples of traditional mass storage such as magnetic disk and solid-state drives, and explores NAS and SAN storage technologies. It provides an overview of the key features and differences between NAS and SAN.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: IT Write Up 0
IT Write Up
ICT Services Management
Student Details:
5/27/2019
IT Write Up
ICT Services Management
Student Details:
5/27/2019
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ICT Services Management
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments, they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource and your
summary must focus on either NAS or SAN, NOT BOTH.
Network Attached Storage:
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250), p.435.
Summary:
The selected resource written by (Liu & Chen, 2009) is all about network attached
storage which is a useful way of mass storage. It has been selected to understand
the key features of NAS while comparing it with other mass storage techniques like
solid-state drives, magnetic disk as well as SAN. The author of the article narrated
network attached storage technologies to explain its significance in mass storage
over a network server. Main points of this article suggest that NAS act as a data
storage device based on file-level which is linked to a TCP/IP network, or Ethernet.
The article states that NAS generally utilizes CIFS and NFS protocols, even when
the choices like HTTP are available. Additionally, key information which has been
presented by this paper suggest that NAS is exactly like an operating system (OS) as
a mutual folder through which employees and persons can access data files using
the NAS as they access from any other file on the network (Liu & Chen, 2009).
However, this resource highlighted NAS as LAN-dependent; thus if the LAN goes
down then the NAS will also go down. Apart from this, the chosen study on NAS
revealed that NAS does not work as quick as block SAN, yet high-speed LANs can
easily be utilized for overcoming every performance and latency issue. Chosen
resource highlighted the major differences amid NAS and SAN like fabric, protocols,
data processing, performance, scalability, price, and ease of management. In this
way, this resource was useful as it was detailed on NAS while offering the details of
the usability of NAS over alternative storage technologies from focusing on NAS
unique mass storage capabilities.
1
Week 1
The text discusses examples of traditional mass storage such as magnetic disk and
solid-state drives. While these still underpin most mass storage, in corporate
environments, they are often accessed via Network Attached Storage (NAS) or
Storage Area Network (SAN) technologies. Find and summarise ONE resource that
describes EITHER NAS or SAN storage technologies. The resource and your
summary must focus on either NAS or SAN, NOT BOTH.
Network Attached Storage:
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250), p.435.
Summary:
The selected resource written by (Liu & Chen, 2009) is all about network attached
storage which is a useful way of mass storage. It has been selected to understand
the key features of NAS while comparing it with other mass storage techniques like
solid-state drives, magnetic disk as well as SAN. The author of the article narrated
network attached storage technologies to explain its significance in mass storage
over a network server. Main points of this article suggest that NAS act as a data
storage device based on file-level which is linked to a TCP/IP network, or Ethernet.
The article states that NAS generally utilizes CIFS and NFS protocols, even when
the choices like HTTP are available. Additionally, key information which has been
presented by this paper suggest that NAS is exactly like an operating system (OS) as
a mutual folder through which employees and persons can access data files using
the NAS as they access from any other file on the network (Liu & Chen, 2009).
However, this resource highlighted NAS as LAN-dependent; thus if the LAN goes
down then the NAS will also go down. Apart from this, the chosen study on NAS
revealed that NAS does not work as quick as block SAN, yet high-speed LANs can
easily be utilized for overcoming every performance and latency issue. Chosen
resource highlighted the major differences amid NAS and SAN like fabric, protocols,
data processing, performance, scalability, price, and ease of management. In this
way, this resource was useful as it was detailed on NAS while offering the details of
the usability of NAS over alternative storage technologies from focusing on NAS
unique mass storage capabilities.
1
Week 2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary must focus on A SINGLE file
system.
Analysis and implementation of NTFS file system based on computer forensics :
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on
computer forensics. Second International Workshop on Educational Technology and Computer
Science, 1, pp.325-28.
Summary:
The selected resource article is about NTFS type of file system that is typically based
upon computer forensics. This article has been chosen because the author has
presented an illustrated detailed research on the analysis as well as the
implementation of NTFS files system. The analysis done in this paper has covered
the major process through which operating systems interact with mass storage
devices in the digital era. This paper has highlighted the ways in which mass data is
stowed as well as retrieved by the different kinds of the file system.
The research paper written by (Kai et al., 2010), included a study about NTFS file
system being a New Technology File System through comprising the primary
features of the NTFS file system within the different OS. While assessing the chosen
article’s main findings it has been found that name conventions of the files in NTFS
can contain up to 255 characters provided they are not case sensitive. Moreover, the
major points in the study written by (Kai et al., 2010) suggested that file names in
NTFS file system can contain all of the characters excluding / “> < * | :. On the other
hand, this paper has explained the NTFS system being a secure system for storing
files as well as folders safely for a long time. Key info covered in this study is
suggesting that stowed data in the form of files and folders are more secure than
those of the FAT file system. Hence, the selected resource was useful to understand
the key features and importance of NTFS file system over others.
2
Operating systems use file managers to interact with mass storage devices.
However, the way in which data is stored and retrieved is dictated by the file system.
There are many types of file systems used by modern operating systems. Find and
summarise ONE resource that describes ONE such file system that is NOT FAT,
FAT32 or ExFAT. The resource, and your summary must focus on A SINGLE file
system.
Analysis and implementation of NTFS file system based on computer forensics :
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system based on
computer forensics. Second International Workshop on Educational Technology and Computer
Science, 1, pp.325-28.
Summary:
The selected resource article is about NTFS type of file system that is typically based
upon computer forensics. This article has been chosen because the author has
presented an illustrated detailed research on the analysis as well as the
implementation of NTFS files system. The analysis done in this paper has covered
the major process through which operating systems interact with mass storage
devices in the digital era. This paper has highlighted the ways in which mass data is
stowed as well as retrieved by the different kinds of the file system.
The research paper written by (Kai et al., 2010), included a study about NTFS file
system being a New Technology File System through comprising the primary
features of the NTFS file system within the different OS. While assessing the chosen
article’s main findings it has been found that name conventions of the files in NTFS
can contain up to 255 characters provided they are not case sensitive. Moreover, the
major points in the study written by (Kai et al., 2010) suggested that file names in
NTFS file system can contain all of the characters excluding / “> < * | :. On the other
hand, this paper has explained the NTFS system being a secure system for storing
files as well as folders safely for a long time. Key info covered in this study is
suggesting that stowed data in the form of files and folders are more secure than
those of the FAT file system. Hence, the selected resource was useful to understand
the key features and importance of NTFS file system over others.
2
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Week 3
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Broadband policy and rural and cultural divides in Australia:
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia.
Digital divides : The new challenges and opportunities of e-inclusion, pp.107-24.
Summary:
The chosen resource is all about the new technology FTTN which is being utilized by
the National Broadband Network (referred to as NBN) for delivering Internet services
all over the region. The article written by (Ewing et al., 2015) has been chosen
because it is containing a concrete study about FTTN which is a new technology
used by broadband providers of Australia.
The authors (Ewing et al., 2015) described FTTN as Fiber to the node which is one
of the great options to provide broadband telecommunications services into multiple
destinations of Australia. In addition to that, FTTN helps in providing broadband
connections along with the rest data services through utilizing a common network
box which is often known as a node. FTTN technology is often called as fiber to the
neighborhood. Post researching the major points covered by this resource it has
been found that FTTN can easily serve a hundred customers, therefore, these must
be available in miles radiuses. Additionally, key findings of FTTN in this paper are
suggesting that consumer proximity towards the nodes and delivery protocols
decides the data rates of the internet for its users. The study revealed that both the
FTTC and FTTN provide fiber optics Internet for many of the Australian internet users
at relatively low expenses. Therefore, the selected study has covered major benefits
of FTTN as it is having the capability of delivering internet data all across efficient as
well as bigger fiber optic lines without any speed limitation.
4
The National Broadband Network (NBN) is currently being rolled-out across Australia
and there is a mix of technologies that are being used to deliver Internet services (for
example, FTTN, FTTC, FTTP, HFC, fixed wireless and satellite). Find and
summarise ONE resource that describes ONE of these delivery technologies. The
resource, and your summary, must focus on A SINGLE technology.
Broadband policy and rural and cultural divides in Australia:
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural divides in Australia.
Digital divides : The new challenges and opportunities of e-inclusion, pp.107-24.
Summary:
The chosen resource is all about the new technology FTTN which is being utilized by
the National Broadband Network (referred to as NBN) for delivering Internet services
all over the region. The article written by (Ewing et al., 2015) has been chosen
because it is containing a concrete study about FTTN which is a new technology
used by broadband providers of Australia.
The authors (Ewing et al., 2015) described FTTN as Fiber to the node which is one
of the great options to provide broadband telecommunications services into multiple
destinations of Australia. In addition to that, FTTN helps in providing broadband
connections along with the rest data services through utilizing a common network
box which is often known as a node. FTTN technology is often called as fiber to the
neighborhood. Post researching the major points covered by this resource it has
been found that FTTN can easily serve a hundred customers, therefore, these must
be available in miles radiuses. Additionally, key findings of FTTN in this paper are
suggesting that consumer proximity towards the nodes and delivery protocols
decides the data rates of the internet for its users. The study revealed that both the
FTTC and FTTN provide fiber optics Internet for many of the Australian internet users
at relatively low expenses. Therefore, the selected study has covered major benefits
of FTTN as it is having the capability of delivering internet data all across efficient as
well as bigger fiber optic lines without any speed limitation.
4
Week 4
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
An Examination of Tor Technology Based Anonymous Internet:
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet.
Proceedings of the 15th informing Science Institute International Conference.
Summary:
The chosen study was written by (Chrane & Kumar, 2015) effectively demonstrated
an examination of the Tor technology of accessing the internet anonymously. For
narrating on Tor technology, this study has been chosen for the reason that all
possible key attributes of the Tor technology being one of the finest ways for
continuing using the internet being a hidden personality. The selected resource
suggested that Tor browser unblock all websites for you while giving access to the
deep web to anyone.
Besides, Tor Services works like an online router, which is utilized for underpass the
internet connection and bounce it off from several anonymous servers those are
known as ‘nodes,’ in order to obscure an individual’s Web identity. The research
conducted in this selected resource is suggesting that Tor technology can effectively
defend a person’s identity with the help of multiple covers of anonymity. In other
words, it can be said that Tor is more hidden than other proxy servers. In proxy
servers, only one gap exists among the surfer and the server but Tor is not at all
same like proxy servers but it is a better version. This resource has explained that
Tor browser offers add-ons, however, the add-ons may seem slow relatively.
Therefore, an article written by (Chrane & Kumar, 2015) has successfully examined
the many operative ways to use Tor technology through downloading the free Tor
browser which includes Tor connection software and the browser designed for
optimizing privacy of its users.
5
The Internet is made up of many interconnected servers and networks. Users are
increasingly aware and concerned that their Internet communications can be
intercepted and monitored. Tor is one technology that allows users to obscure or
hide online their online activities. Find and summarise ONE resource that describes
what Tor is and how it works. The resource, and your summary, must focus purely on
Tor.
An Examination of Tor Technology Based Anonymous Internet:
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous Internet.
Proceedings of the 15th informing Science Institute International Conference.
Summary:
The chosen study was written by (Chrane & Kumar, 2015) effectively demonstrated
an examination of the Tor technology of accessing the internet anonymously. For
narrating on Tor technology, this study has been chosen for the reason that all
possible key attributes of the Tor technology being one of the finest ways for
continuing using the internet being a hidden personality. The selected resource
suggested that Tor browser unblock all websites for you while giving access to the
deep web to anyone.
Besides, Tor Services works like an online router, which is utilized for underpass the
internet connection and bounce it off from several anonymous servers those are
known as ‘nodes,’ in order to obscure an individual’s Web identity. The research
conducted in this selected resource is suggesting that Tor technology can effectively
defend a person’s identity with the help of multiple covers of anonymity. In other
words, it can be said that Tor is more hidden than other proxy servers. In proxy
servers, only one gap exists among the surfer and the server but Tor is not at all
same like proxy servers but it is a better version. This resource has explained that
Tor browser offers add-ons, however, the add-ons may seem slow relatively.
Therefore, an article written by (Chrane & Kumar, 2015) has successfully examined
the many operative ways to use Tor technology through downloading the free Tor
browser which includes Tor connection software and the browser designed for
optimizing privacy of its users.
5
Week 5
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary should focus purely on
cryptojacking and NO OTHER form(s) of malware.
What is cryptojacking? How it works and how to help prevent it:
Symantec Corporation, 2019. Malware. [Online] Available at: https://us.norton.com/internetsecurity-
malware-what-is-cryptojacking.html [Accessed 20 May 2019].
Summary:
This resource is about a trending form of malware, cryptojacking that is also known
as malicious cryptomining. This resource is explaining about cryptojacking and its
working as well. In this context, chosen article study majorly included the definition of
cryptojacking along with the procedure of how the malware works. Besides, the
resource has presented guidelines about preventing procedure of this malware for
keeping the data safe and secure. The author (Symantec Corporation, 2019)
explained that cryptojacking and cryptomining is clearly an unauthorized usage of a
computer, laptop, tablet, smartphone or other connected home devices by the
cybercriminals in order to mine for the cryptocurrency purposes.
Additionally, this study has contained the results of Symantec’s internet security
report about cryptojacking threats. Various important ways into which cryptojacking
occurs have been explained in this paper. In this way, we found that by using
malicious emails are used to install cryptomining codes on a computer so that
cryptojacking can be done. The resource written by the author (Symantec
Corporation, 2019) has narrated the important ways of detecting cryptojacking
through assessing their symptoms for the prevention and treatment. Besides, the
main findings of this resource suggested that a high processor usage or overheating
of the devices are the signs of a cryptojacking act (Symantec Corporation, 2019).
Therefore through highlighting the cryptomining activities, this paper has presented
solutions for many of them. Hence, the author of this resource has explained about
the malware protection software use in order to prevent cryptojacking or
cryptomining.
Week 6
6
An emerging form of malware is cryptojacking (also known as malicious
cryptomining). Find and summarise ONE resource that describes what cryptojacking
is and how it works. The resource, and your summary should focus purely on
cryptojacking and NO OTHER form(s) of malware.
What is cryptojacking? How it works and how to help prevent it:
Symantec Corporation, 2019. Malware. [Online] Available at: https://us.norton.com/internetsecurity-
malware-what-is-cryptojacking.html [Accessed 20 May 2019].
Summary:
This resource is about a trending form of malware, cryptojacking that is also known
as malicious cryptomining. This resource is explaining about cryptojacking and its
working as well. In this context, chosen article study majorly included the definition of
cryptojacking along with the procedure of how the malware works. Besides, the
resource has presented guidelines about preventing procedure of this malware for
keeping the data safe and secure. The author (Symantec Corporation, 2019)
explained that cryptojacking and cryptomining is clearly an unauthorized usage of a
computer, laptop, tablet, smartphone or other connected home devices by the
cybercriminals in order to mine for the cryptocurrency purposes.
Additionally, this study has contained the results of Symantec’s internet security
report about cryptojacking threats. Various important ways into which cryptojacking
occurs have been explained in this paper. In this way, we found that by using
malicious emails are used to install cryptomining codes on a computer so that
cryptojacking can be done. The resource written by the author (Symantec
Corporation, 2019) has narrated the important ways of detecting cryptojacking
through assessing their symptoms for the prevention and treatment. Besides, the
main findings of this resource suggested that a high processor usage or overheating
of the devices are the signs of a cryptojacking act (Symantec Corporation, 2019).
Therefore through highlighting the cryptomining activities, this paper has presented
solutions for many of them. Hence, the author of this resource has explained about
the malware protection software use in order to prevent cryptojacking or
cryptomining.
Week 6
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Redundancy is a critical aspect of network design, implemented in order to cope link
or equipment failure. One frequent cause of failure is damage to fiber optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
City of Meadville responsible for fiber optic cable cut that has caused widespread
phone outages:
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut that has caused
widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-for-fiber-optic-
cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html [Accessed 20 May 2019].
Summary:
The selected resource is all about redundancy which is a modern engineering
concept. In general, redundancy is the replication of important devices as well as
functions of any system in order to increase the reliability of that system. Besides,
this paper has represented the redundancy concept as the backup or fail-safe, for
considerably improving real system performance. In this context, the selected study
successfully demonstrated a real example of redundancy while focusing on the
aspects of network designing of connecting continents and countries. In other words,
it can be said that redundancy is important for making the whole system reliable
through advance planning and preparation. Hence, the chosen resource has
highlighted an example where a fiber optics cable got down or damaged due to
cutting and damage occurred during some work.
The above example of this incident is depicting that even when adhering to proper
maintenance agendas, fiber optic cable may easily get down in some critical
circumstances (The Meadville Tribune, 2014). For an instance, the Meadville Tribune
presented a case that narrated upon the efforts of fixing a fiber optics cable which
was damaged by the city officials during a road maintenance act within the city of
Meadville, PA. Thus, the selected article explained an incident of the City of
Meadville where fiber optic cable got damaged and hence caused severe mobile
phone outages in the city and outside (The Meadville Tribune, 2014). Therefore, this
selected resource has effectively demonstrated the major importance of the concept
of redundancy within a network inter-connecting countries or continents worldwide.
7
or equipment failure. One frequent cause of failure is damage to fiber optic cables
that connect countries and/or continents. Find and summarise ONE resource that
describes ONE example of such a cable being cut or damaged. The resource, and
your summary should describe the impacts of A SINGLE EXAMPLE of a link failure.
Note that the failure must relate to a link that connects countries and/or continents.
City of Meadville responsible for fiber optic cable cut that has caused widespread
phone outages:
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut that has caused
widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-for-fiber-optic-
cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html [Accessed 20 May 2019].
Summary:
The selected resource is all about redundancy which is a modern engineering
concept. In general, redundancy is the replication of important devices as well as
functions of any system in order to increase the reliability of that system. Besides,
this paper has represented the redundancy concept as the backup or fail-safe, for
considerably improving real system performance. In this context, the selected study
successfully demonstrated a real example of redundancy while focusing on the
aspects of network designing of connecting continents and countries. In other words,
it can be said that redundancy is important for making the whole system reliable
through advance planning and preparation. Hence, the chosen resource has
highlighted an example where a fiber optics cable got down or damaged due to
cutting and damage occurred during some work.
The above example of this incident is depicting that even when adhering to proper
maintenance agendas, fiber optic cable may easily get down in some critical
circumstances (The Meadville Tribune, 2014). For an instance, the Meadville Tribune
presented a case that narrated upon the efforts of fixing a fiber optics cable which
was damaged by the city officials during a road maintenance act within the city of
Meadville, PA. Thus, the selected article explained an incident of the City of
Meadville where fiber optic cable got damaged and hence caused severe mobile
phone outages in the city and outside (The Meadville Tribune, 2014). Therefore, this
selected resource has effectively demonstrated the major importance of the concept
of redundancy within a network inter-connecting countries or continents worldwide.
7
Week 7
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation of modern organizations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are or are about to, change.
Title and Reference:
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in
Indian manufacturing enterprises: an exploratory analysis of strategic benefits. The international
journal of advanced manufacturing technology, 88(1-4), pp.369-80.
Summary:
The chosen resource is all about enterprise systems which are often termed as
enterprise resource planning systems. The author of this article has highlighted the
significance of the ERP systems for the day-to-day operations in modern global
organizations (Ranjan et al., 2017). It has been found that ERPs have completely
changed as well as continuously changing in response to novel demands and
trending technologies. We have selected these resources as it is covering all major
findingsof ERP systems as per the updated resources and research. In addition,
many important emerging trends in the context of ES within modern organizations
have been covered. In this way, a major significance of the article is that identifying
the emerging trends in ES will offer several opportunities of learning about what
people should do in their workplaces in order to achieve the preferred responses with
the help of an ERP system implementation (Ranjan et al., 2017). In this context, an
important trend is demands based ERP purchases so that requirements can be
fulfilled effectively. The discussion took place in a chosen resource has also
highlighted another trend that CRM is at the highest priority in a recent global
business environment. Apart from this, the author has done an increasing focus on
business intelligence ERPs being an emerging trend in technology-oriented
organizations.
In this way, the paper’s findings suggested that cumulative needs for specialized
ERP services are trending in these days which require ERP implementation to be
8
Since the 1990s, Enterprise Systems (also known as Enterprise Resource Planning
systems) have become critical to the operation of modern organizations. Over this
time, ES/ERPs have evolved and continue to change in response to new demands
and emerging technologies. Find and summarise ONE resource that discusses
emerging or future trends for ES/ERPs. The resource should be recent (published
since the beginning of 2017) and it and your summary should clearly identify how
ES/ERPs are or are about to, change.
Title and Reference:
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP implementation in
Indian manufacturing enterprises: an exploratory analysis of strategic benefits. The international
journal of advanced manufacturing technology, 88(1-4), pp.369-80.
Summary:
The chosen resource is all about enterprise systems which are often termed as
enterprise resource planning systems. The author of this article has highlighted the
significance of the ERP systems for the day-to-day operations in modern global
organizations (Ranjan et al., 2017). It has been found that ERPs have completely
changed as well as continuously changing in response to novel demands and
trending technologies. We have selected these resources as it is covering all major
findingsof ERP systems as per the updated resources and research. In addition,
many important emerging trends in the context of ES within modern organizations
have been covered. In this way, a major significance of the article is that identifying
the emerging trends in ES will offer several opportunities of learning about what
people should do in their workplaces in order to achieve the preferred responses with
the help of an ERP system implementation (Ranjan et al., 2017). In this context, an
important trend is demands based ERP purchases so that requirements can be
fulfilled effectively. The discussion took place in a chosen resource has also
highlighted another trend that CRM is at the highest priority in a recent global
business environment. Apart from this, the author has done an increasing focus on
business intelligence ERPs being an emerging trend in technology-oriented
organizations.
In this way, the paper’s findings suggested that cumulative needs for specialized
ERP services are trending in these days which require ERP implementation to be
8
adopted from the perspective of better growth of the modern organizations.
Week 8
Databases, mass data storage, and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organizations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource and your summary should focus purely on A SINGLE
EXAMPLE of a data breach.
Equifax and the latest round of identity theft roulette:
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer, 50(12), pp.72-76.
Summary:
In the era of digital technologies containing online databases, mass data as well as
interrogation technologies, the selected resource is mainly about a real-time data
breach. Here, (Berghel, 2017) researched one of the huge data breaches which have
been occurred in 2017. The author of this article (Berghel, 2017) conveyed a data
breach of Equifax which has shaken the whole nation’s trust and faith. In this context,
during September 2017, the American credit monitoring firm Equifax has been
exposed a huge data and info breach that majorly influenced more than 143 million
consumers of the Equifax. Key information covered in this study is suggesting that
data breach by Equifax was happened beacause of a vulnerability in within an open
source software (OSS) utilised by the firm Equifax (Berghel, 2017). The vulnerable
open source software as allowed attackers and hackers for retrieving the confidential
data files as well as important info about the Equifax company. In addition to that,
Equifax breached info was including customer names, Social Security numbers,
addresses, birth dates. This discussion has explained that more than 200,000 credit
card numbers along with their 200,000 documents containing personal-identifying
data about the consumers have been exposed to hackers in this mass data breach
(Berghel, 2017). It has been found that post the disclosure of the Equifax data
breach, the CEO, Richard Smith, published a video of confession and apology
(Berghel, 2017). In this way, this article has detailed the fact that data breach of the
Equifax company has not been handled well and hence hugely criticized by the all
9
Week 8
Databases, mass data storage, and interrogation technologies underpin virtually all
Information Systems and applications. However, the same tools also make it easier
for data breaches to occur in government departments or private
companies/organizations. In simple terms, a data breach is where private
information is illegally obtained or disclosed. Find and summarise ONE resource that
describes ONE example of a data breach that has occurred since the beginning of
2017. The resource and your summary should focus purely on A SINGLE
EXAMPLE of a data breach.
Equifax and the latest round of identity theft roulette:
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer, 50(12), pp.72-76.
Summary:
In the era of digital technologies containing online databases, mass data as well as
interrogation technologies, the selected resource is mainly about a real-time data
breach. Here, (Berghel, 2017) researched one of the huge data breaches which have
been occurred in 2017. The author of this article (Berghel, 2017) conveyed a data
breach of Equifax which has shaken the whole nation’s trust and faith. In this context,
during September 2017, the American credit monitoring firm Equifax has been
exposed a huge data and info breach that majorly influenced more than 143 million
consumers of the Equifax. Key information covered in this study is suggesting that
data breach by Equifax was happened beacause of a vulnerability in within an open
source software (OSS) utilised by the firm Equifax (Berghel, 2017). The vulnerable
open source software as allowed attackers and hackers for retrieving the confidential
data files as well as important info about the Equifax company. In addition to that,
Equifax breached info was including customer names, Social Security numbers,
addresses, birth dates. This discussion has explained that more than 200,000 credit
card numbers along with their 200,000 documents containing personal-identifying
data about the consumers have been exposed to hackers in this mass data breach
(Berghel, 2017). It has been found that post the disclosure of the Equifax data
breach, the CEO, Richard Smith, published a video of confession and apology
(Berghel, 2017). In this way, this article has detailed the fact that data breach of the
Equifax company has not been handled well and hence hugely criticized by the all
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
nation’s public.
10
10
Week 9
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary should focus purely on
Scrum and discuss some of its key features and attributes.
Requirements engineering in Scrum framework:
Darwish, N. & Megahed, S., 2016. Requirements engineering in Scrum framework. International
Journal of Computer Applications, 149(8).
Summary:
The selected resource is all about a scrum framework in order to understand agile
development. In this era, agile development is an incremental method of delivering
the requirements which are evolving and unclear. The research article written by
(Darwish & Megahed, 2016) has been chosen because it has covered all important
points and information about the Scrum framework. the discussion conducted by
(Darwish & Megahed, 2016) is suggesting that the scrum framework evolves sustain
complex products effectively. The author also presented that scrum is a framework
where individuals may resolve complex adaptive problems, through productively as
well as creatively delivering products which carry maximum possible values. In
addition to that, the chosen resource has successfully explained the Scrum
framework being a procedural framework that can be used for accomplishing
complex and sustainable product development. It has been found that Scrum is a
tactic of developing sustainable products; at the same time with the help of this
framework, one can service above than 2 processes and techniques.
As per the study conducted by (Darwish & Megahed, 2016), the Scrum framework
generates the relative efficacy of any product’s management as well as growth
development practices for improving organizational revenues. Apart from this, the
main finding of this paper is suggesting that the Scrum framework contains Scrum
teams with the associated roles, events, artifacts, and rules as well. Thus, post
studying the chosen resource it can be summarised that Scrum being a process-
oriented framework describes particular events and roles in the context of agile
development. Therefore, the Scrum framework might be adapted from any
organization, based on their requirements, provided that elementary scrum rules, as
11
Agile development is an iterative and incremental approach to delivering systems - it
is particularly useful where the requirements are unclear or evolving. Scrum is a
framework for undertaking agile development. Find and summarise ONE resource
that describes Scrum. The resource, and your summary should focus purely on
Scrum and discuss some of its key features and attributes.
Requirements engineering in Scrum framework:
Darwish, N. & Megahed, S., 2016. Requirements engineering in Scrum framework. International
Journal of Computer Applications, 149(8).
Summary:
The selected resource is all about a scrum framework in order to understand agile
development. In this era, agile development is an incremental method of delivering
the requirements which are evolving and unclear. The research article written by
(Darwish & Megahed, 2016) has been chosen because it has covered all important
points and information about the Scrum framework. the discussion conducted by
(Darwish & Megahed, 2016) is suggesting that the scrum framework evolves sustain
complex products effectively. The author also presented that scrum is a framework
where individuals may resolve complex adaptive problems, through productively as
well as creatively delivering products which carry maximum possible values. In
addition to that, the chosen resource has successfully explained the Scrum
framework being a procedural framework that can be used for accomplishing
complex and sustainable product development. It has been found that Scrum is a
tactic of developing sustainable products; at the same time with the help of this
framework, one can service above than 2 processes and techniques.
As per the study conducted by (Darwish & Megahed, 2016), the Scrum framework
generates the relative efficacy of any product’s management as well as growth
development practices for improving organizational revenues. Apart from this, the
main finding of this paper is suggesting that the Scrum framework contains Scrum
teams with the associated roles, events, artifacts, and rules as well. Thus, post
studying the chosen resource it can be summarised that Scrum being a process-
oriented framework describes particular events and roles in the context of agile
development. Therefore, the Scrum framework might be adapted from any
organization, based on their requirements, provided that elementary scrum rules, as
11
well as regulations, are not breached.
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary should focus purely
on project governance.
What is project governance and what are its origins? :
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins?
International Journal of Project Management, 32(8), pp.1321-32.
Summary:
The article chosen over the topic project governance has described the main concept
of PG as well as its origins. The selected article is written by (Ahola et al., 2014) and
it seemed useful because it explained the PG concept being set of three key
functions contains set directions, makes directions and project oversights. While
using chosen research study findings, (Ahola et al., 2014) has explained the
significance of a leader into the process of PG for any big or small project
completion. A leader knows the right thing to do for the successful achievement of
the projects.
In addition to that, the research paper focused on the requirements of setting
direction by considering small-term as well as long-term goals. The author states that
PG includes tools of governance in order to effectively ensure compliance while
using an implementation standard (Ahola et al., 2014). Besides, this study revealed
that PG mechanism is usually ineffective if there is no relation among groups that are
tangled into a relevant project. The main findings of this article are suggesting that
the roles of PG framework are listing three PG entailments containing executive
sponsor, steering committee, as well as project manager (Ahola et al., 2014). In this
way, this study has successfully demonstrated an understanding of the concept of
PG from the perspective of modern organizational projects (Ahola et al., 2014).
Furthermore, it has been found that PG is a basic process for accomplishing a
project successfully and within the set timelines.
12
Week 10
The textbook discusses activities associated with project management. However, it
could be argued that project governance is equally important, especially in very large
projects. Find and summarise ONE resource that describes what project governance
is and what activities it entails. The resource, and your summary should focus purely
on project governance.
What is project governance and what are its origins? :
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what are its origins?
International Journal of Project Management, 32(8), pp.1321-32.
Summary:
The article chosen over the topic project governance has described the main concept
of PG as well as its origins. The selected article is written by (Ahola et al., 2014) and
it seemed useful because it explained the PG concept being set of three key
functions contains set directions, makes directions and project oversights. While
using chosen research study findings, (Ahola et al., 2014) has explained the
significance of a leader into the process of PG for any big or small project
completion. A leader knows the right thing to do for the successful achievement of
the projects.
In addition to that, the research paper focused on the requirements of setting
direction by considering small-term as well as long-term goals. The author states that
PG includes tools of governance in order to effectively ensure compliance while
using an implementation standard (Ahola et al., 2014). Besides, this study revealed
that PG mechanism is usually ineffective if there is no relation among groups that are
tangled into a relevant project. The main findings of this article are suggesting that
the roles of PG framework are listing three PG entailments containing executive
sponsor, steering committee, as well as project manager (Ahola et al., 2014). In this
way, this study has successfully demonstrated an understanding of the concept of
PG from the perspective of modern organizational projects (Ahola et al., 2014).
Furthermore, it has been found that PG is a basic process for accomplishing a
project successfully and within the set timelines.
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what
are its origins? International Journal of Project Management, 32(8), pp.1321-32.
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer,
50(12), pp.72-76.
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous
Internet. Proceedings of the 15th informing Science Institute International
Conference.
Darwish, N. & Megahed, S., 2016. Requirements engineering in scrum framework.
International Journal of Computer Applications, 149(8).
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural
divides in Australia. Digital divides : The new challenges and opportunities of e-
inclusion, pp.107-24.
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system
based on computer forensics. Second International Workshop on Educational
Technology and Computer Science, 1, pp.325-28.
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250),
p.435.
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP
implementation in Indian manufacturing enterprises: an exploratory analysis of
strategic benefits. The international journal of advamced manufacturing technology,
88(1-4), pp.369-80.
Symantec Corporation, 2019. Malware. [Online] Available at:
https://us.norton.com/internetsecurity-malware-what-is-cryptojacking.html
[Accessed 20 May 2019].
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut
that has caused widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-
for-fiber-optic-cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html
[Accessed 20 May 2019].
13
Ahola, T., Ruuska, I., Artto, K. & Kujala, J., 2014. What is project governance and what
are its origins? International Journal of Project Management, 32(8), pp.1321-32.
Berghel, H., 2017. Equifax and the latest round of identity theft roulette. Computer,
50(12), pp.72-76.
Chrane, C. & Kumar, S., 2015. An Examination of Tor Technology Based Anonymous
Internet. Proceedings of the 15th informing Science Institute International
Conference.
Darwish, N. & Megahed, S., 2016. Requirements engineering in scrum framework.
International Journal of Computer Applications, 149(8).
Ewing, S., Rennie, E. & Thomas, J., 2015. Broadband policy and rural and cultural
divides in Australia. Digital divides : The new challenges and opportunities of e-
inclusion, pp.107-24.
Kai, Z., En, C. & Qinquan, G., 2010. Analysis and implementation of NTFS file system
based on computer forensics. Second International Workshop on Educational
Technology and Computer Science, 1, pp.325-28.
Liu, C. & Chen, H., 2009. Network Attached Storage. U.S. Patent Application, 29(250),
p.435.
Ranjan, S., Jha, V. & Pal, P., 2017. Application of emerging technologies in ERP
implementation in Indian manufacturing enterprises: an exploratory analysis of
strategic benefits. The international journal of advamced manufacturing technology,
88(1-4), pp.369-80.
Symantec Corporation, 2019. Malware. [Online] Available at:
https://us.norton.com/internetsecurity-malware-what-is-cryptojacking.html
[Accessed 20 May 2019].
The Meadville Tribune, 2014. City of Meadville responsible for fiber optic cable cut
that has caused widespread phone outages. [Online] Available at:
https://www.meadvilletribune.com/news/local_news/city-of-meadville-responsible-
for-fiber-optic-cable-cut-that/article_62cdbdd5-7481-5dbc-9dd2-0704a77f4c84.html
[Accessed 20 May 2019].
13
MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
14
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content/contains content not contained in the resource) OR
Multiple resources used for a single task
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
14
5
6
7
8
9
10
TOTAL
Comments:
15
6
7
8
9
10
TOTAL
Comments:
15
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.