COIT 20246 Assignment: Research on AI, Cloud Computing, and Security
VerifiedAdded on 2023/06/04
|12
|3986
|357
Homework Assignment
AI Summary
This assignment solution for COIT 20246 addresses several key technology areas, each explored through the summary of a relevant resource. Week 1 examines GPUs, contrasting them with CPUs and highlighting their non-graphics applications, like in scientific research. Week 2 discusses AI's potential impact on operating systems, focusing on how AI could transform user interactions and application design. Week 3 compares IaaS providers AWS and Azure, detailing their differences in pricing and features. Week 4 explains the IPv6 protocol, contrasting it with IPv4 and highlighting its advantages. Week 5 explores the WannaCry ransomware, detailing its infection methods and impact. Week 6 introduces OpenFlow and its role in Software-Defined Networking (SDN), emphasizing its function in controlling network traffic. Week 7 discusses the impact of legacy systems on organizational agility, identifying problems in maintaining such systems. Each task includes a resource summary of approximately 200-300 words, providing a detailed overview of the selected topic.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Instructions
It will be necessary to use literature/online resources to complete this assignment,
please ensure you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use
your own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the
formatting of other pages including the headers and footers.
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how Central Processing Units (CPUs) function but is silent on
another processing component of modern computers, the Graphics Processing Unit
(GPU). Find and summarise ONE resource that describes what a GPU is and how it
differs from a CPU. The resource (and your summary) should discuss at least one
non-graphics related use for GPUs.
Title and Reference:
The Official NVIDIA Blog. (2018). What's the Difference Between a CPU and
a GPU? | The Official NVIDIA Blog. [online] Available at:
https://blogs.nvidia.com/blog/2009/12/16/whats-the-difference-between-a-cpu-
and-a-gpu/ [Accessed 25 Sep. 2018].
Summary:
Every computer is consist of different chip sets that render the display images to the
connected monitor. However, not every chips are created equally. CPU is considered
as a brain of the pc, in this case, GPU is used to enhance the brain as it act as a
soul. GPU can be define as a powerful computational device capable of providing far
beyond basic graphics controller functions. The advanced capability of the GPU were
originally utilized for 3D game rendering. But now those competences are being
yoked more sketchily to speed up computational workloads in areas such as financial
modelling, cutting-edge scientific research and gas and oil exploration. According to
a recent business week article GPUs are capable of taking enormous batches of
information and carrying out the similar operation over and over. Unlike CPU
microprocessors which tends to skip all over the place. The key difference of the
CPU and GPU is, CPU is comprised with few cores with lots of cache memory and
on other hand GPU is comprised with lots of cores which can handle thousands of
threads instantaneously unlike the CPUs. This key difference provide a significant
gap as GPU is capable of accelerate the same software by 100x over CPU.
Week 2
One of the potential next advances in Operating Systems (OSes) will be Artificial
Intelligence (AI) capabilities. Find and summarise ONE resource that discusses how
AI could change the way OSes function and/or interact with users.
Title and Reference:
Medium. (2018). AI and the Future of Operating Systems – Rodolfo Rosini –
Medium. [online] Available at: https://medium.com/@rodolfor/the-future-of-
operating-systems-and-weaveos-e4c9bc3f23d7 [Accessed 25 Sep. 2018].
There are ten (10) tasks, one for each week: the tasks are detailed below. There is
a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how Central Processing Units (CPUs) function but is silent on
another processing component of modern computers, the Graphics Processing Unit
(GPU). Find and summarise ONE resource that describes what a GPU is and how it
differs from a CPU. The resource (and your summary) should discuss at least one
non-graphics related use for GPUs.
Title and Reference:
The Official NVIDIA Blog. (2018). What's the Difference Between a CPU and
a GPU? | The Official NVIDIA Blog. [online] Available at:
https://blogs.nvidia.com/blog/2009/12/16/whats-the-difference-between-a-cpu-
and-a-gpu/ [Accessed 25 Sep. 2018].
Summary:
Every computer is consist of different chip sets that render the display images to the
connected monitor. However, not every chips are created equally. CPU is considered
as a brain of the pc, in this case, GPU is used to enhance the brain as it act as a
soul. GPU can be define as a powerful computational device capable of providing far
beyond basic graphics controller functions. The advanced capability of the GPU were
originally utilized for 3D game rendering. But now those competences are being
yoked more sketchily to speed up computational workloads in areas such as financial
modelling, cutting-edge scientific research and gas and oil exploration. According to
a recent business week article GPUs are capable of taking enormous batches of
information and carrying out the similar operation over and over. Unlike CPU
microprocessors which tends to skip all over the place. The key difference of the
CPU and GPU is, CPU is comprised with few cores with lots of cache memory and
on other hand GPU is comprised with lots of cores which can handle thousands of
threads instantaneously unlike the CPUs. This key difference provide a significant
gap as GPU is capable of accelerate the same software by 100x over CPU.
Week 2
One of the potential next advances in Operating Systems (OSes) will be Artificial
Intelligence (AI) capabilities. Find and summarise ONE resource that discusses how
AI could change the way OSes function and/or interact with users.
Title and Reference:
Medium. (2018). AI and the Future of Operating Systems – Rodolfo Rosini –
Medium. [online] Available at: https://medium.com/@rodolfor/the-future-of-
operating-systems-and-weaveos-e4c9bc3f23d7 [Accessed 25 Sep. 2018].

Summary: Experts are believing oses will dominant the next 30 years of computing
as it is providing as it is transforming the interactions and apps to influence the AI
capabilities of different devices. The current state of apps and oses were all about
the interpreting the collaboration vocabulary to a touch screen and smaller device. It
is enabling useful functionality to plan actions and recognize the intent. As the
technology is evolving, the need of better productive tools is also increasing as well.
Generally, multiple applications are opened at a sometime as a result data form one
app can be copied onto other app while reading steams of communication data. The
rapid evolution of artificial intelligence technologies increased the productivity on
several devices. Experts believes, Google Now and Window metro are notable
examples of true next generation OS. Window Metro was an empty UI where the
cards represents of current folders and did not offer any benefit over a more
traditional display but it had the disadvantage of altering a user workflow. Experts
also believes the next OS system will be based on cards which will represent a micro
format with contextual intention, visualization data and dynamic data.
as it is providing as it is transforming the interactions and apps to influence the AI
capabilities of different devices. The current state of apps and oses were all about
the interpreting the collaboration vocabulary to a touch screen and smaller device. It
is enabling useful functionality to plan actions and recognize the intent. As the
technology is evolving, the need of better productive tools is also increasing as well.
Generally, multiple applications are opened at a sometime as a result data form one
app can be copied onto other app while reading steams of communication data. The
rapid evolution of artificial intelligence technologies increased the productivity on
several devices. Experts believes, Google Now and Window metro are notable
examples of true next generation OS. Window Metro was an empty UI where the
cards represents of current folders and did not offer any benefit over a more
traditional display but it had the disadvantage of altering a user workflow. Experts
also believes the next OS system will be based on cards which will represent a micro
format with contextual intention, visualization data and dynamic data.

Week 3
The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud
Service Provider (CSP) for Infrastructure as a Service (IaaS). Find and summarise
ONE resource that describes ONE other commercial IaaS provider that is NOT
Google. The resource and your summary should describe how the IaaS differs from
AWS.
Title and Reference:
Spiceworks, I. (2018). AWS vs Azure in 2017: IaaS Similarities and
Differences. [online] The Spiceworks Community. Available at:
https://community.spiceworks.com/cloud/articles/2496-aws-vs-azure-in-2017-
iaas-similarities-and-differences [Accessed 25 Sep. 2018].
Summary:
Before migrate their database to AWS, Netflix was working on DVD by mail service.
Nowadays, they serve over 8,60,00,000 members from 190 countries and current
steams about 15,00,00,000 hours of video content per hour. Usually, users from
different locations stream videos which are located in data centers within the network
of internet service provider (AWS). Where traffic is distributed to different Verizon,
comcast, AT & T and similar network operators. When users clicks on play button the
video delivered to them. Before pressing the play button, user must search for their
desired content (Spiceworks 2018). The searching process was handled by AWS.
Netfilx takes seven year to migrate to the AWS, experts believes they rebuilt their
entire software platform to leverage AES cloud network to maximum limit.
Microsoft azure operates on an IaaS platform which provides access to vast amount
of computing resources located in data centers throughout the world. Even though
the first major player in the cloud computing game was AWS, Microsoft Azure
matches up to its functionality. Now, they are stiff competitor and constantly
changing their approaches, feature set and price (Spiceworks 2018). AWS charges
their user according to the use per hour where azure charged by minute. For
instance, If user uses Amazon web service for one hour and five minute. They need
to pay for two hour as AWS round up to the next hour.
Week 4
IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned
briefly. Find and summarise ONE resource that describes the IPv6 protocol. The
resource and your summary should describe how IPv6 differs from IPv4.
Title and Reference:
Webopedia.com. (2018). What is The Difference Between IPv6 and IPv4? -
Webopedia.com. [online] Available at:
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html
[Accessed 25 Sep. 2018].
32b Summary:
Ipv4 and IPv6 both are the two version of internet protocol. Ipv6 is considered as a
revolutionary upgrade to the internet protocol. It is the sixth revision of the internet
protocol. It is deployed to provide more internet address. The IPv4 uses 32 bit of
The text discusses how Netflix uses Amazon Web Services (AWS) as a Cloud
Service Provider (CSP) for Infrastructure as a Service (IaaS). Find and summarise
ONE resource that describes ONE other commercial IaaS provider that is NOT
Google. The resource and your summary should describe how the IaaS differs from
AWS.
Title and Reference:
Spiceworks, I. (2018). AWS vs Azure in 2017: IaaS Similarities and
Differences. [online] The Spiceworks Community. Available at:
https://community.spiceworks.com/cloud/articles/2496-aws-vs-azure-in-2017-
iaas-similarities-and-differences [Accessed 25 Sep. 2018].
Summary:
Before migrate their database to AWS, Netflix was working on DVD by mail service.
Nowadays, they serve over 8,60,00,000 members from 190 countries and current
steams about 15,00,00,000 hours of video content per hour. Usually, users from
different locations stream videos which are located in data centers within the network
of internet service provider (AWS). Where traffic is distributed to different Verizon,
comcast, AT & T and similar network operators. When users clicks on play button the
video delivered to them. Before pressing the play button, user must search for their
desired content (Spiceworks 2018). The searching process was handled by AWS.
Netfilx takes seven year to migrate to the AWS, experts believes they rebuilt their
entire software platform to leverage AES cloud network to maximum limit.
Microsoft azure operates on an IaaS platform which provides access to vast amount
of computing resources located in data centers throughout the world. Even though
the first major player in the cloud computing game was AWS, Microsoft Azure
matches up to its functionality. Now, they are stiff competitor and constantly
changing their approaches, feature set and price (Spiceworks 2018). AWS charges
their user according to the use per hour where azure charged by minute. For
instance, If user uses Amazon web service for one hour and five minute. They need
to pay for two hour as AWS round up to the next hour.
Week 4
IPv4 is discussed in the text, yet the emerging IPv6 protocol is only mentioned
briefly. Find and summarise ONE resource that describes the IPv6 protocol. The
resource and your summary should describe how IPv6 differs from IPv4.
Title and Reference:
Webopedia.com. (2018). What is The Difference Between IPv6 and IPv4? -
Webopedia.com. [online] Available at:
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html
[Accessed 25 Sep. 2018].
32b Summary:
Ipv4 and IPv6 both are the two version of internet protocol. Ipv6 is considered as a
revolutionary upgrade to the internet protocol. It is the sixth revision of the internet
protocol. It is deployed to provide more internet address. The IPv4 uses 32 bit of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

address schema which allow sum of 2*32 address. As the internet users are
increasing day by day, IPv6 is deployed to full fill the requirement. The ipv4 consist of
32 bit numeric binary address separated by periods. Each number can be from o to
255. While IPv6 address are 128 bit written in hexadecimal and divided by colons.
Example of ipv4 ip address is 192.168.10.1 and example of ipv6 address is
2001:0db8:85a3:0000:0000:8a2e:0370:7334. There are also other several
advantages of IPv6 over ipV4. While increasing the pool of address, it offers other
advantages such as Easier administration, Flexible options and extensions, True
quality of service (QoS), Built-in authentication and privacy support also called "flow
labelling, Better multicast routing, Simplified, more effective routing, Simpler header
format, , No more private address collisions, No more NAT (Network Address
Translation) and auto configuration. It is designed with taking consideration of the
older IPv4 as ipv6 is capable of coexist with it. It allows steady grow as it provides a
huge nuber4 of host connection along with data traffic transmission.
,
Week 5
WannaCry and NotPetya were two of the most significant malware attacks of 2017.
Find and summarise ONE resource that describes how ONE of these pieces of
malware work. Note that the resource should focus on ONE of these, NOT both.
Title and Reference:
Fruhlinger, J. (2018). What is WannaCry ransomware, how does it infect, and
who was responsible?. [online] CSO Online. Available at:
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html [Accessed 25
Sep. 2018].
Summary:
Wannacry is rensomware which infects multiple pcs in May 2017. After infecting on a
windows device, it encrypts users’ files and ask for ransom to access them. It was
spread through multiple country as Britain National Health Service. It was first
discovered by unites states national security agency. They believes the malware was
designed by a cyber crime organization connected with north Korean government.
Wannacry composed with multiple components which are an application to encrypt
and decrypt data, encrypted keys and a copy of tor. It acts as a dropper when arrived
on system and locate encrypted file such as mp3s, docx and other files. After
locating certain files, it encrypts those files and asks for $300 bitcoin to enable
access. User’s would not be able to access those files without paying the
ransomware. (Fruhlinger 2018). Wannacry used eternal Blue to infect computers.
Windows was able to provide a patch after one month to protect from wannacry but
multiple system stay effected by the wannacry. After injecting into the system, it does
not necessarily start encrypt files. First, it searches for larger files and gibberish URL.
If it would be able to access the domain, it automatic shuts itself. Experts are still
unaware of the full functionality of the wannacry.
increasing day by day, IPv6 is deployed to full fill the requirement. The ipv4 consist of
32 bit numeric binary address separated by periods. Each number can be from o to
255. While IPv6 address are 128 bit written in hexadecimal and divided by colons.
Example of ipv4 ip address is 192.168.10.1 and example of ipv6 address is
2001:0db8:85a3:0000:0000:8a2e:0370:7334. There are also other several
advantages of IPv6 over ipV4. While increasing the pool of address, it offers other
advantages such as Easier administration, Flexible options and extensions, True
quality of service (QoS), Built-in authentication and privacy support also called "flow
labelling, Better multicast routing, Simplified, more effective routing, Simpler header
format, , No more private address collisions, No more NAT (Network Address
Translation) and auto configuration. It is designed with taking consideration of the
older IPv4 as ipv6 is capable of coexist with it. It allows steady grow as it provides a
huge nuber4 of host connection along with data traffic transmission.
,
Week 5
WannaCry and NotPetya were two of the most significant malware attacks of 2017.
Find and summarise ONE resource that describes how ONE of these pieces of
malware work. Note that the resource should focus on ONE of these, NOT both.
Title and Reference:
Fruhlinger, J. (2018). What is WannaCry ransomware, how does it infect, and
who was responsible?. [online] CSO Online. Available at:
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html [Accessed 25
Sep. 2018].
Summary:
Wannacry is rensomware which infects multiple pcs in May 2017. After infecting on a
windows device, it encrypts users’ files and ask for ransom to access them. It was
spread through multiple country as Britain National Health Service. It was first
discovered by unites states national security agency. They believes the malware was
designed by a cyber crime organization connected with north Korean government.
Wannacry composed with multiple components which are an application to encrypt
and decrypt data, encrypted keys and a copy of tor. It acts as a dropper when arrived
on system and locate encrypted file such as mp3s, docx and other files. After
locating certain files, it encrypts those files and asks for $300 bitcoin to enable
access. User’s would not be able to access those files without paying the
ransomware. (Fruhlinger 2018). Wannacry used eternal Blue to infect computers.
Windows was able to provide a patch after one month to protect from wannacry but
multiple system stay effected by the wannacry. After injecting into the system, it does
not necessarily start encrypt files. First, it searches for larger files and gibberish URL.
If it would be able to access the domain, it automatic shuts itself. Experts are still
unaware of the full functionality of the wannacry.


Week 6
OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and
summarise ONE resource that describes how OpenFlow works and/or how it enables
SDN.
Title and Reference:
Cisco. (2018). Software-Defined Networks and OpenFlow - The Internet
Protocol Journal, Volume 16, No. 1. [online] Available at:
https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-
issues/table-contents-59/161-sdn.html [Accessed 25 Sep. 2018].
Summary:
OpenFlow is a software defined networking standards which defines the
communication protocol. It enables to communication and direct interaction between
SDN controller and physical and virtual network devices such as router, switch as
business necessary. SDN divides the control functions from the data of network
devices as switches, router and other network devices with well-defined API
(Application programming Interface) between them. In most of the organization, data
and functionalities are encompass both, the network infrastructure is hard to control
at large scale addition of the virtual networks, virtual machines and end systems.
OpenFlow has become a standard to implement SDN successfully. First, SDN
controller defines the data flows and each flow must be permitted from the controller
according to the network policy. In OF environment, SDN controller must support
Open Flow protocol in order to communicate with other network devices. Through
this interface, the SDN Controller impulses alterations to the router/switch flow-table
on order to allow network administrators to control flows, partition traffic, for optimal
performance, and start testing new applications and configurations. The OpenFlow
specification defines three types of tables in the logical switch architecture. A Flow
Table matches incoming packets to a particular flow and specifies the functions that
are to be performed on the packets.
Week 7
Historically, organisations have been able to improve business processes by
implementing Information Systems. However, as these systems age they can
negatively impact on organisational agility and can ultimately prove problematic.
Such systems are broadly referred to as Legacy Systems. Find and summarise ONE
resource that discusses the impacts of legacy systems on organisations. The
resource and your summary should clearly identify problems with maintaining legacy
systems.
Title and Reference:
Trinisys.com. (2018). Understanding the Organizational Costs of Legacy Systems |
Trinisys.com. [online] Available at: https://www.trinisys.com/2018/07/understanding-
the-organizational-costs-of-legacy-systems/ [Accessed 26 Sep. 2018].
Summary:
Older legacy, often homegrown, IT systems are limiting organizations and their ability
to adapt to modern day productivity, security, and privacy requirements. A legacy
OpenFlow is a protocol that enables Software-Defined Networking (SDN). Find and
summarise ONE resource that describes how OpenFlow works and/or how it enables
SDN.
Title and Reference:
Cisco. (2018). Software-Defined Networks and OpenFlow - The Internet
Protocol Journal, Volume 16, No. 1. [online] Available at:
https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-
issues/table-contents-59/161-sdn.html [Accessed 25 Sep. 2018].
Summary:
OpenFlow is a software defined networking standards which defines the
communication protocol. It enables to communication and direct interaction between
SDN controller and physical and virtual network devices such as router, switch as
business necessary. SDN divides the control functions from the data of network
devices as switches, router and other network devices with well-defined API
(Application programming Interface) between them. In most of the organization, data
and functionalities are encompass both, the network infrastructure is hard to control
at large scale addition of the virtual networks, virtual machines and end systems.
OpenFlow has become a standard to implement SDN successfully. First, SDN
controller defines the data flows and each flow must be permitted from the controller
according to the network policy. In OF environment, SDN controller must support
Open Flow protocol in order to communicate with other network devices. Through
this interface, the SDN Controller impulses alterations to the router/switch flow-table
on order to allow network administrators to control flows, partition traffic, for optimal
performance, and start testing new applications and configurations. The OpenFlow
specification defines three types of tables in the logical switch architecture. A Flow
Table matches incoming packets to a particular flow and specifies the functions that
are to be performed on the packets.
Week 7
Historically, organisations have been able to improve business processes by
implementing Information Systems. However, as these systems age they can
negatively impact on organisational agility and can ultimately prove problematic.
Such systems are broadly referred to as Legacy Systems. Find and summarise ONE
resource that discusses the impacts of legacy systems on organisations. The
resource and your summary should clearly identify problems with maintaining legacy
systems.
Title and Reference:
Trinisys.com. (2018). Understanding the Organizational Costs of Legacy Systems |
Trinisys.com. [online] Available at: https://www.trinisys.com/2018/07/understanding-
the-organizational-costs-of-legacy-systems/ [Accessed 26 Sep. 2018].
Summary:
Older legacy, often homegrown, IT systems are limiting organizations and their ability
to adapt to modern day productivity, security, and privacy requirements. A legacy
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

system is an existing and outdated IT infrastructure, sometimes it is homegrown.
A homegrown system is an existing infrastructure that is developed internally, often
hand-coded and put together over time. With each system, the biggest vulnerability
falling to an organization’s security posture, it becomes increasingly difficult to justify
operating in maintenance mode, which is a higher expenditure of time and money.
Other drawbacks of the legacy system is followed:
Older software that is no longer supported or patched
Unreliable system, as a result of several different developers and approaches
Unavailable skill sets required for older technologies
Incomplete, outdated, inaccurate, or lack of documentation
Outdated, obsolete technology or best practices
With legacy IT systems operating with outdated technologies, organizations also risk
defaulting on service level agreements (SLAs). This can damage business
relationships with customers and partners. To make matters worse, a legacy IT
system can weaken an organization’s security posture, leading to unnecessary
security and compliance vulnerabilities for an entire network. Another problem with
using legacy systems is that your organization will be less safe and secure as a
result.
Older, unsupported systems are much more vulnerable to security breaches and
attacks. Once a system is unsupported, the company behind it will no longer be
releasing security patches and updates to protect it from threats.
Week 8
With the advent of mass data collection and storage has come the use of these
datasets for data mining and analysis. Recently, Cambridge Analytica and Facebook
have come under intense scrutiny for their use of user data, allegedly in order to
influence the US 2016 election. Find and summarise ONE resource that describes
what Cambridge Analytica did and why their services were so controversial.
Title and Reference:
Kirchgaessner, S. (2018). Cambridge Analytica used data from Facebook and
Politico to help Trump. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2017/oct/26/cambridge-analytica-
used-data-from-facebook-and-politico-to-help-trump [Accessed 26 Sep. 2018].
Summary:
Cambridge Analytica was on controversy long with Facebook during the last
election. Experts believed, they had a huge influence on the election as they assist
Donald Trump by manipulating data. During tramp campaign, massive database of
consumer and demographic information is used to profile and target voters. This
datasets are believed to be extracted from Facebook and Cambridge Analytica. Data
privacy has become one of the most critical aspect of this timeline as millions of data
compromised only in U.S from social media In a statement on Wednesday, Glassner
said that the Trump campaign relied on voter data owned by the Republican National
Committee to help elect the president. Hillary Clinton is also used its own database
and voter information collected from Facebook and news publishers in its effort to
help elect Donald Trump, despite a claim by a top campaign official who has
downplayed the company’s role in the election. The data analysis company, which
uses a massive database of consumer and demographic information to profile and
target voters, has come under the scrutiny of congressional investigators who are
examining the Trump campaign.
A homegrown system is an existing infrastructure that is developed internally, often
hand-coded and put together over time. With each system, the biggest vulnerability
falling to an organization’s security posture, it becomes increasingly difficult to justify
operating in maintenance mode, which is a higher expenditure of time and money.
Other drawbacks of the legacy system is followed:
Older software that is no longer supported or patched
Unreliable system, as a result of several different developers and approaches
Unavailable skill sets required for older technologies
Incomplete, outdated, inaccurate, or lack of documentation
Outdated, obsolete technology or best practices
With legacy IT systems operating with outdated technologies, organizations also risk
defaulting on service level agreements (SLAs). This can damage business
relationships with customers and partners. To make matters worse, a legacy IT
system can weaken an organization’s security posture, leading to unnecessary
security and compliance vulnerabilities for an entire network. Another problem with
using legacy systems is that your organization will be less safe and secure as a
result.
Older, unsupported systems are much more vulnerable to security breaches and
attacks. Once a system is unsupported, the company behind it will no longer be
releasing security patches and updates to protect it from threats.
Week 8
With the advent of mass data collection and storage has come the use of these
datasets for data mining and analysis. Recently, Cambridge Analytica and Facebook
have come under intense scrutiny for their use of user data, allegedly in order to
influence the US 2016 election. Find and summarise ONE resource that describes
what Cambridge Analytica did and why their services were so controversial.
Title and Reference:
Kirchgaessner, S. (2018). Cambridge Analytica used data from Facebook and
Politico to help Trump. [online] the Guardian. Available at:
https://www.theguardian.com/technology/2017/oct/26/cambridge-analytica-
used-data-from-facebook-and-politico-to-help-trump [Accessed 26 Sep. 2018].
Summary:
Cambridge Analytica was on controversy long with Facebook during the last
election. Experts believed, they had a huge influence on the election as they assist
Donald Trump by manipulating data. During tramp campaign, massive database of
consumer and demographic information is used to profile and target voters. This
datasets are believed to be extracted from Facebook and Cambridge Analytica. Data
privacy has become one of the most critical aspect of this timeline as millions of data
compromised only in U.S from social media In a statement on Wednesday, Glassner
said that the Trump campaign relied on voter data owned by the Republican National
Committee to help elect the president. Hillary Clinton is also used its own database
and voter information collected from Facebook and news publishers in its effort to
help elect Donald Trump, despite a claim by a top campaign official who has
downplayed the company’s role in the election. The data analysis company, which
uses a massive database of consumer and demographic information to profile and
target voters, has come under the scrutiny of congressional investigators who are
examining the Trump campaign.

This week, the group became the focus of a new controversy after the Daily Beast
reported that the company’s chief executive, Alexander Nix, had contacted Julian
Assange last year. Nix allegedly asked the WikiLeaks founder whether he could
assist in releasing thousands of emails that had gone missing on a private server
that had been used by Hillary Clinton. Assange confirmed the contact but said the
offer was rejected. Data privacy has become one of the most critical aspect of this
timeline as millions of data compromised only in U.S from social media. //Data
privacy has become an increasingly important issue since massive breaches
compromised the personal information of millions of U.S. internet and social media
users, as well as breaches involving large retailers and credit reporting agency
Equifax Inc. In a statement on Wednesday, Glassner said that the Trump campaign
relied on voter data owned by the Republican National Committee to help elect the
president.
reported that the company’s chief executive, Alexander Nix, had contacted Julian
Assange last year. Nix allegedly asked the WikiLeaks founder whether he could
assist in releasing thousands of emails that had gone missing on a private server
that had been used by Hillary Clinton. Assange confirmed the contact but said the
offer was rejected. Data privacy has become one of the most critical aspect of this
timeline as millions of data compromised only in U.S from social media. //Data
privacy has become an increasingly important issue since massive breaches
compromised the personal information of millions of U.S. internet and social media
users, as well as breaches involving large retailers and credit reporting agency
Equifax Inc. In a statement on Wednesday, Glassner said that the Trump campaign
relied on voter data owned by the Republican National Committee to help elect the
president.

Week 9
Load (or performance) testing is a critical step in the information systems
development process. The purpose of this testing is to simulate the peak expected
load on a system to ensure both hardware and software can operate effectively and
meet key metrics. To do this, specialised performance testing tools are used. Find
and summarise ONE resource that describes ONE such tool. The resource (and
your summary) should include information on the principle uses and features of the
tool.
Title and Reference:
Smartbear.com. (2018). API Load Testing for REST and SOAP | LoadUI Pro.
[online] Available at:
https://smartbear.com/product/ready-api/loadui/overview/?sr=guru99
[Accessed 26 Sep. 2018].
Summary:
LoadUI Pro is a quick load testing tool as it allows sophisticated load tests. It also
distributes them on cloud while utilizing load agents. This assist to monitor
performance while increasing the load on servers. LoadUI also allows users to
access the detail report and has the capability to automate the load test on multiple
frameworks. It’s also enables features such as Script less Load test creation, Quick
conversion of functional tests from SoapUI as load tests, Sophisticated analytics and
statists features for reporting, Drag and drop load tests on distribution agents on
cloud, Preconfigured load test templates like smoke, stress, baseline spike. LoadUi
is considered as a one of the most sophisticated tools available in the market. It also
support MQTT, JMS, SOAP and REST. It is very easy to configure and does ot take
much time for building test by hand. By this way, user can spend more time on
analysing the results. Global and local distributed loadnagents can be conducted for
required load testing scenario. LoadUI NG Pro easily allows you to reuse your
existing functional test cases from SoapUI and SoapUI NG Pro. With just three clicks
you can transform your SoapUI NG Protest cases into sophisticated performance
tests.
Week 10
While information systems and technology deliver many benefits to society, there is a
high incidence of failure in attempting to implement them. These IS/IT
implementation project failures frequently result in substantial financial losses. Find
and summarise ONE resource that describes ONE example of an Australian IT/IS
project that has failed. Note that the resource should focus on ONE single example
and it and your summary should clearly explain the cause(s) of the failure.
Title and Reference:
techAU. (2018). Myer website failure costing millions in lost sales. [online]
Available at: https://techau.com.au/myer-website-failure-costing-millions-in-
lost-sales/ [Accessed 26 Sep. 2018].
Summary:
Load (or performance) testing is a critical step in the information systems
development process. The purpose of this testing is to simulate the peak expected
load on a system to ensure both hardware and software can operate effectively and
meet key metrics. To do this, specialised performance testing tools are used. Find
and summarise ONE resource that describes ONE such tool. The resource (and
your summary) should include information on the principle uses and features of the
tool.
Title and Reference:
Smartbear.com. (2018). API Load Testing for REST and SOAP | LoadUI Pro.
[online] Available at:
https://smartbear.com/product/ready-api/loadui/overview/?sr=guru99
[Accessed 26 Sep. 2018].
Summary:
LoadUI Pro is a quick load testing tool as it allows sophisticated load tests. It also
distributes them on cloud while utilizing load agents. This assist to monitor
performance while increasing the load on servers. LoadUI also allows users to
access the detail report and has the capability to automate the load test on multiple
frameworks. It’s also enables features such as Script less Load test creation, Quick
conversion of functional tests from SoapUI as load tests, Sophisticated analytics and
statists features for reporting, Drag and drop load tests on distribution agents on
cloud, Preconfigured load test templates like smoke, stress, baseline spike. LoadUi
is considered as a one of the most sophisticated tools available in the market. It also
support MQTT, JMS, SOAP and REST. It is very easy to configure and does ot take
much time for building test by hand. By this way, user can spend more time on
analysing the results. Global and local distributed loadnagents can be conducted for
required load testing scenario. LoadUI NG Pro easily allows you to reuse your
existing functional test cases from SoapUI and SoapUI NG Pro. With just three clicks
you can transform your SoapUI NG Protest cases into sophisticated performance
tests.
Week 10
While information systems and technology deliver many benefits to society, there is a
high incidence of failure in attempting to implement them. These IS/IT
implementation project failures frequently result in substantial financial losses. Find
and summarise ONE resource that describes ONE example of an Australian IT/IS
project that has failed. Note that the resource should focus on ONE single example
and it and your summary should clearly explain the cause(s) of the failure.
Title and Reference:
techAU. (2018). Myer website failure costing millions in lost sales. [online]
Available at: https://techau.com.au/myer-website-failure-costing-millions-in-
lost-sales/ [Accessed 26 Sep. 2018].
Summary:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Myer’s online store disaster is one of the most significant IT failure as their online
store was down for five days. During the busiest time of the year, their website were
offline, this disaster effects their sells and faced expenses as well. Myer’s online
store was powered by the IBM WebSphere software. Their CEO Bernie conformed
the IT failure and tries to get it back as soon as possible. Most of the ecommerce
website adopt Amazon EC2 or Microsoft’s Azure platform in Australia as these
provides faster, real able and efficient IT service with optimal support. Myer didn’t get
the memo. It is considered as a difficult task to deliver a real able and fast website
while maintain high traffic on servers. During Christmas time, the traffic increase to
peak points where servers would not able to handle the requests made by enormous
number of potential buyer. This was the case with the Myer’s website as their server
was unable to control the traffic and results in website failure. It is rigid to visualize
anything else than a team of developers surrounded by suited execs, arms crossed
and yelling profusely at the damn internets.
store was down for five days. During the busiest time of the year, their website were
offline, this disaster effects their sells and faced expenses as well. Myer’s online
store was powered by the IBM WebSphere software. Their CEO Bernie conformed
the IT failure and tries to get it back as soon as possible. Most of the ecommerce
website adopt Amazon EC2 or Microsoft’s Azure platform in Australia as these
provides faster, real able and efficient IT service with optimal support. Myer didn’t get
the memo. It is considered as a difficult task to deliver a real able and fast website
while maintain high traffic on servers. During Christmas time, the traffic increase to
peak points where servers would not able to handle the requests made by enormous
number of potential buyer. This was the case with the Myer’s website as their server
was unable to control the traffic and results in website failure. It is rigid to visualize
anything else than a team of developers surrounded by suited execs, arms crossed
and yelling profusely at the damn internets.

MARKING SHEET - DO NOT DELETE
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Link URL to resource not provided / does not work OR
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
Criteria
0 No Response
<=1 Poor resource selection; resource is too broad or lacks relevance to the
task; summary fails to explain what the resource was about; the relevance
and/or usefulness of the resource has not been explained.
<=2 Good resource selection; resource is relevant to the task; summary is
adequate but may require either more detail or is too long; the relevance
and/or usefulness of the resource has been explained to some extent, but
needs additional information.
<=3 Excellent resource selection; resource is highly relevant to the task (the
resource is probably highly specialised); summary is detailed yet concise;
the relevance and usefulness of the resource selection has been clearly
explained.
Key
Deductions
-3
-2
-1
Link URL to resource not provided / does not work OR
Reference/URL provided does not link to resource (and resource cannot
be located or determined from details provided) OR
Reference/URL provided does not relate to the summary (i.e. summary is
not of resource content / contains content not contained in the resource)
Resource is generic AND/OR covers multiple technologies/examples
rather than focuses on a single technology/example
Resource not referenced correctly/not in Harvard format
Week Marks Awarded
1
2
3
4
5
6
7
8
9
10
TOTAL
Comments:
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.