COIT20246 Assignment: Online Resource Summaries for ICT Management
VerifiedAdded on 2022/09/29
|17
|5121
|16
Homework Assignment
AI Summary
This assignment for COIT20246, an ICT Services Management course, comprises ten tasks, each requiring the summary of an online resource related to a specific topic. Week 1 focuses on comparing MIMD and SIMD architectures, detailing their differences in instruction and data streams. Week 2 explores deadlock prevention algorithms, highlighting methods to avoid resource allocation conflicts. Week 3 delves into the application of IoT in smart farming, outlining how IoT enhances agricultural practices. Week 4 examines technologies enabling the simultaneous operation of IPv4 and IPv6. Week 6 focuses on the business model and impact of Uber. Week 7 differentiates between e-commerce and e-business, clarifying their distinct characteristics. Week 8 presents a success story of a network services company. Week 9 explores rapid application development (RAD) and its frameworks. This assignment provides a detailed exploration of various ICT concepts and technologies, showcasing the evolution and application of these technologies across different domains, and the student has provided the summaries of the resources as requested in the assignment brief.

COIT 20246 ASSIGNMENT SUBMISSION
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please ensure
you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting
of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Due date: Thursday Week 11 (2PM AEST)
Part: Written Assessment
Weighting: 30% of total assessment.
Submission: Electronic (see course website for details)
Please fill in the following details:
Student Name
Student Number
Tutor’s Name
Instructions
It will be necessary to use online resources to complete this assignment, please ensure
you cite and reference any such materials using the Harvard format.
DO NOT copy content directly from either the text or Internet resources: this
assignment is to be in your own words. You will lose marks if you do not use your
own words!
Please complete your assignment using this submission template file, inserting your
responses where indicated.
DO NOT delete the marking criteria page – changes are permitted to the formatting
of other pages including the headers and footers.
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a
table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and
information about selecting good resources, please see the assessment page on the
Moodle unit web site:
https://moodle.cqu.edu.au/mod/assign/view.php?id=965540
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Example
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a very
useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
2
The “Internet of things” is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Collect and summarise
an online resource that describes ONE example or application of the Internet of things.
Title, Link and Reference:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Lars, N 2014, ‘Connected Medical Devices, Apps: Are They Leading the IoT Revolution —
or Vice Versa?’, Wired, June 2014, viewed 1 February 2017,
https://www.wired.com/insights/2014/06/connected-medical-devices-apps-leading-iot-
revolution-vice-versa/
Note: You may use abbreviated URLs (to the website) in the reference, however you must
provide the FULL link above it that, when pasted into the Web Browser, will take the
marker directly to the resource. Using full URLs in the reference (as in this example) is fine
too.
Summary:
Connected Medical Devices, Apps: Are They Leading the IoT Revolution — or Vice Versa?
This article describes the emergence of the Internet of Things (IoT) in the context of
medical devices. I chose this article because it not only examines the applications of a very
useful class of IoT devices, but it also highlights the need for ways of collecting and
processing the data they produce.
In the article, the author describes how many medical monitoring devices are now capable
of connecting to the Internet and are becoming a normal part of patient care. These
devices allow remote monitoring of patient health wirelessly and can collect data on a wide
range of vital signs and indicators. Data can be collected from a range of sensors reading
everything from heart rate and blood pressure through to blood sugar levels and
temperature.
In addition to passive monitors, IoT medical devices provide the ability to proactively
prompt patients to do things, for example to warn them of their blood pressure or to alert
them that they need more medication. The article points out that many of these
notifications are the result of apps (software) interacting with both the devices and the
patients.
Perhaps the most interesting aspect of the article is the author’s discussion of what
happens to the data that the IoT medical devices produce. The author explains that many
devices can send data directly to the cloud for storage and analysis and that this data
constitutes a wealth of information that will potentially improve healthcare in the future.
2

I found this article useful because it not only highlighted the increasing ubiquity of
Internet-connected medical devices, but also made me think about how the data is
collected, where it is stored and how it could be used – both positively and negatively – in
the future.
3
Internet-connected medical devices, but also made me think about how the data is
collected, where it is stored and how it could be used – both positively and negatively – in
the future.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 1
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures. The
resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Comparison between MIMD and SIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences. 2019. Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] [Accessed 27 Sep. 2019]. Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html.
Summary:
The following resource is all about SIMD and MIMD where MIMD stands for multiple
instruction multiple data stream while SIMD stands for single instruction multiple data
stream. SIMD and MIMD are considered to be two kinds of system organisation that is
classified by Michael Flynn. It is completely based on number of data and instruction
stream. The resources describe about difference in between SIMD and MIMD is that
MIMD comes up with many instructions which operated on various stream of data. In
the case of SIMD design, only one instruction is applied to a bunch of information or
data at required time. SIMD is found to less efficient with respect to performance in
comparison to MIMD.
I have selected this particular resource because it highlights differences between SIMD
and MIMD. SIMD is mainly needed for solving problems as it requires computation
with the processor performing the operation. MIMD used for solving a problem which
breaks down the algorithm into different parts.
Both SIMD and MIMD vary technically with respect to each other. SIMD processor are
considered to be much simple, smaller and faster in comparison to MIMD. SIMD can
perform some of the complex operation in sequential way while MIMD operation can
do in concurrent way.
Yes, the resource was beneficial as it provided us with some detail information about
SIMD and MIMD. These are two different kind of parallel processing system
architecture which makes use of different processor. It makes use of different
computers for data processing.
Week 2
4
The text discusses about different architectures for parallel processing used for
Multiprocessor Machines such as multiple-instruction stream - multiple-data stream
(MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and
summarise ONE resource that compares between MIMD and SIMD architectures. The
resource, and your summary, must focus only on MIMD and SIMD architectures.
Title, Link and Reference:
Comparison between MIMD and SIMD
https://techdifferences.com/difference-between-simd-and-mimd.html
Tech Differences. 2019. Difference between SIMD and MIMD (with Comparison
Chart) - Tech Differences. [online] [Accessed 27 Sep. 2019]. Available at:
https://techdifferences.com/difference-between-simd-and-mimd.html.
Summary:
The following resource is all about SIMD and MIMD where MIMD stands for multiple
instruction multiple data stream while SIMD stands for single instruction multiple data
stream. SIMD and MIMD are considered to be two kinds of system organisation that is
classified by Michael Flynn. It is completely based on number of data and instruction
stream. The resources describe about difference in between SIMD and MIMD is that
MIMD comes up with many instructions which operated on various stream of data. In
the case of SIMD design, only one instruction is applied to a bunch of information or
data at required time. SIMD is found to less efficient with respect to performance in
comparison to MIMD.
I have selected this particular resource because it highlights differences between SIMD
and MIMD. SIMD is mainly needed for solving problems as it requires computation
with the processor performing the operation. MIMD used for solving a problem which
breaks down the algorithm into different parts.
Both SIMD and MIMD vary technically with respect to each other. SIMD processor are
considered to be much simple, smaller and faster in comparison to MIMD. SIMD can
perform some of the complex operation in sequential way while MIMD operation can
do in concurrent way.
Yes, the resource was beneficial as it provided us with some detail information about
SIMD and MIMD. These are two different kind of parallel processing system
architecture which makes use of different processor. It makes use of different
computers for data processing.
Week 2
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The text discusses about one of the common problems that can arise during resource
allocation in operating systems, which is known as deadlock. Find and summarise
ONE resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource, and your summary, must focus on a single algorithm of either
deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
An algorithm for deadlock prevention in DBMS
https://medium.com/@jschapir/today-i-learned-deadlock-and-deadlock-prevention-
ff5041316ad0
Schapiro, J. 2019. Today I Learned: Deadlock and Deadlock Prevention. [online]
Medium [Accessed 3 Oct. 2019]. Available at: https://medium.com/@jschapir/today-i-
learned-deadlock-and-deadlock-prevention-ff5041316ad0.
Summary:
The source highlights common issues which can come into picture as a result of
resource allocation in operating system. This particular issue is defined as deadlock. A
source focus on resource for deadlock avoidance or prevention. There are various kind
of threat which is defined as deadlock. This particular feature comes into picture when
various threads are waiting for releasing the lock so that can proceed. Two threads are
waiting for each other and essential for stuck.
The source highlights two kind of threads that is A and B for object 1 and 2. For the
thread A request for object 2 and thread B for the lock for object 1. The first is defined is
defined as order locking. The simple and effective method for ensuring that deadlock
has not come into picture. Thread A aims to lock the object 1. The thread B releases the
lock for object 1 and it much wait until and unless lock on object 1 is released.
The thread A for object 1 helps in enabling the thread B for continuing the different
action. Thread A locks the object 2 and repeats the above process. In this way, deadlock
is prevented completely. It merely focuses on various kind of lock which are acting on
system. The second option that would be available is all about keeping data structure for
different kind of threads. The locks are the key which they aim to hold. Now, if the
thread looks for any lock then there is need for checking the data structure. It is mainly
done analysing if data is taking place or not.
The source was useful as it provided the clear idea regarding an algorithm for deadlock
prevention or avoidance.
5
allocation in operating systems, which is known as deadlock. Find and summarise
ONE resource that describes an algorithm of either deadlock avoidance or deadlock
prevention. The resource, and your summary, must focus on a single algorithm of either
deadlock avoidance or deadlock prevention, NOT both.
Title, Link and Reference:
An algorithm for deadlock prevention in DBMS
https://medium.com/@jschapir/today-i-learned-deadlock-and-deadlock-prevention-
ff5041316ad0
Schapiro, J. 2019. Today I Learned: Deadlock and Deadlock Prevention. [online]
Medium [Accessed 3 Oct. 2019]. Available at: https://medium.com/@jschapir/today-i-
learned-deadlock-and-deadlock-prevention-ff5041316ad0.
Summary:
The source highlights common issues which can come into picture as a result of
resource allocation in operating system. This particular issue is defined as deadlock. A
source focus on resource for deadlock avoidance or prevention. There are various kind
of threat which is defined as deadlock. This particular feature comes into picture when
various threads are waiting for releasing the lock so that can proceed. Two threads are
waiting for each other and essential for stuck.
The source highlights two kind of threads that is A and B for object 1 and 2. For the
thread A request for object 2 and thread B for the lock for object 1. The first is defined is
defined as order locking. The simple and effective method for ensuring that deadlock
has not come into picture. Thread A aims to lock the object 1. The thread B releases the
lock for object 1 and it much wait until and unless lock on object 1 is released.
The thread A for object 1 helps in enabling the thread B for continuing the different
action. Thread A locks the object 2 and repeats the above process. In this way, deadlock
is prevented completely. It merely focuses on various kind of lock which are acting on
system. The second option that would be available is all about keeping data structure for
different kind of threads. The locks are the key which they aim to hold. Now, if the
thread looks for any lock then there is need for checking the data structure. It is mainly
done analysing if data is taking place or not.
The source was useful as it provided the clear idea regarding an algorithm for deadlock
prevention or avoidance.
5

Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and summarise
ONE resource that describe applications of the Internet of things in the field of Smart
Farming. The resource, and your summary, must focus on application of IoT ONLY in
the field of smart farming.
Title, Link and Reference:
Application of Internet of things in field of smart farming
https://www.iotforall.com/iot-applications-in-agriculture/
Ravindra, S. 2019. IoT Applications in Agriculture. [online] IoT For All [Accessed 27
Sep. 2019]. Available at: https://www.iotforall.com/iot-applications-in-agriculture/
Summary:
The following resource is about IoT, connected devices and automation, which finds its
use in the agriculture domain. It will merely enhance every face. In the last few years,
farming has encountered large of changes in the last few years. Agriculture is becoming
very much technology-driven and industrialized. By using, some of the smart gadgets,
farmers tend to have much better control over process of livestock raising and growing
crops.
Smart agriculture is generally denoted by use of IoT based solutions in agriculture.
Industrial IoT in agriculture is considered to be much more advanced than being used.
At present, sensors are being connected to some of the cloud networks. IoT is being
applied in agriculture industry that has helped the farmers to monitor the water level in
tanks in minimum time. It merely makes the whole irrigation process much more
efficient.
Farming which is based on IoT aims to make the whole agriculture by analysing the
field in real-time. By the help of sensor and interconnection, IoT in Agriculture will not
only save time for farmers. In addition, it will make use of resource for electricity and
water. This will merely keep the different factors like temperature and soil under proper
check which provides a clear real time observation.
The source was beneficial as it provides a list of benefits for adopting IoT in Agriculture
like climatic condition and precision farming. In addition, there are some benefits like a
smart greenhouse, data analytics and drones for keeping track of ongoing agriculture.
6
Internet of things (IoT) is an emerging trend towards smart interconnected embedded
technologies that allow us to monitor and control our environment. Find and summarise
ONE resource that describe applications of the Internet of things in the field of Smart
Farming. The resource, and your summary, must focus on application of IoT ONLY in
the field of smart farming.
Title, Link and Reference:
Application of Internet of things in field of smart farming
https://www.iotforall.com/iot-applications-in-agriculture/
Ravindra, S. 2019. IoT Applications in Agriculture. [online] IoT For All [Accessed 27
Sep. 2019]. Available at: https://www.iotforall.com/iot-applications-in-agriculture/
Summary:
The following resource is about IoT, connected devices and automation, which finds its
use in the agriculture domain. It will merely enhance every face. In the last few years,
farming has encountered large of changes in the last few years. Agriculture is becoming
very much technology-driven and industrialized. By using, some of the smart gadgets,
farmers tend to have much better control over process of livestock raising and growing
crops.
Smart agriculture is generally denoted by use of IoT based solutions in agriculture.
Industrial IoT in agriculture is considered to be much more advanced than being used.
At present, sensors are being connected to some of the cloud networks. IoT is being
applied in agriculture industry that has helped the farmers to monitor the water level in
tanks in minimum time. It merely makes the whole irrigation process much more
efficient.
Farming which is based on IoT aims to make the whole agriculture by analysing the
field in real-time. By the help of sensor and interconnection, IoT in Agriculture will not
only save time for farmers. In addition, it will make use of resource for electricity and
water. This will merely keep the different factors like temperature and soil under proper
check which provides a clear real time observation.
The source was beneficial as it provides a list of benefits for adopting IoT in Agriculture
like climatic condition and precision farming. In addition, there are some benefits like a
smart greenhouse, data analytics and drones for keeping track of ongoing agriculture.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 4
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about
the technologies that are used to run both protocols simultaneously over the same
internet infrastructure.
Title, Link and Reference:
Technologies used for running IPv4 and IPv6
https://www.cloudwards.net/ipv4-vs-ipv6/
Security, O. and Security, O. 2019. IPv4 vs IPv6: How Two Protocols Run the Internet
in 2019? [online] Cloudwards. [Accessed 29 Sep. 2019]. Available at:
https://www.cloudwards.net/ipv4-vs-ipv6/.
Summary:
The source highlights how the technologies used for running both protocol how IPv4
and IPv6 protocols are being used in single technology. IPv4 works like a backbone of
internet right from the inception. It merely carries collection of four different system to
internet of things. The overall exhaustion of IPv4 address is completely predicted in the
last few years. In the year 2012, IPv6 has come into global platform. There are large
number of devices like NAT, router and agents which acts in between private network
and public like internet.
There are mainly two version of IP address that is IPv4 and IPv6. The forth version of
the TCP suite is the IPv4. In the year 1993, IPv4 was deployed on ARPNET which still
powers most of the internet. When IPv4 was deployed, then its design could anticipate
the booming of internet. The overall growth of number of user has coupled on the use of
IoT and resulted in the acceleration of IPv4 addresses.
IPv4 makes use of 32 bit addresses that is equal to 4 bytes value. It will merely limit the
address pool for the IPv4 to more than 4.3 billion unique address. It merely sounds like
a lot of factor which is estimated for 7.5 billion. Internet mainly on the overall network
address translation for IPv4 which has been exhausted. It allows only a single IP address
that is needed for recycling of IP addresses.
The resource was useful has it provided some clear details about devices like ISP and
mobile carrier. These two particular technologies are mainly responsible for taking
most of the IPv6 into picture. Both large enterprises, data centres which will highlight
their own migration. It can be stated that both IPv4 and IPv6 that exist in most of the
parallel networks.
7
The text discusses about IPv4, however, IPv6 is the emerging protocol which is in the
process of superseding IPv4. Find and summarise ONE resource that describes about
the technologies that are used to run both protocols simultaneously over the same
internet infrastructure.
Title, Link and Reference:
Technologies used for running IPv4 and IPv6
https://www.cloudwards.net/ipv4-vs-ipv6/
Security, O. and Security, O. 2019. IPv4 vs IPv6: How Two Protocols Run the Internet
in 2019? [online] Cloudwards. [Accessed 29 Sep. 2019]. Available at:
https://www.cloudwards.net/ipv4-vs-ipv6/.
Summary:
The source highlights how the technologies used for running both protocol how IPv4
and IPv6 protocols are being used in single technology. IPv4 works like a backbone of
internet right from the inception. It merely carries collection of four different system to
internet of things. The overall exhaustion of IPv4 address is completely predicted in the
last few years. In the year 2012, IPv6 has come into global platform. There are large
number of devices like NAT, router and agents which acts in between private network
and public like internet.
There are mainly two version of IP address that is IPv4 and IPv6. The forth version of
the TCP suite is the IPv4. In the year 1993, IPv4 was deployed on ARPNET which still
powers most of the internet. When IPv4 was deployed, then its design could anticipate
the booming of internet. The overall growth of number of user has coupled on the use of
IoT and resulted in the acceleration of IPv4 addresses.
IPv4 makes use of 32 bit addresses that is equal to 4 bytes value. It will merely limit the
address pool for the IPv4 to more than 4.3 billion unique address. It merely sounds like
a lot of factor which is estimated for 7.5 billion. Internet mainly on the overall network
address translation for IPv4 which has been exhausted. It allows only a single IP address
that is needed for recycling of IP addresses.
The resource was useful has it provided some clear details about devices like ISP and
mobile carrier. These two particular technologies are mainly responsible for taking
most of the IPv6 into picture. Both large enterprises, data centres which will highlight
their own migration. It can be stated that both IPv4 and IPv6 that exist in most of the
parallel networks.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 5
Network security has become a major concern of ICT world, and user authentication is
one of the popular tools to assure network security. Find and summarise ONE resource
that describes any ONE authentication mechanism except password. The resource, and
your summary, should focus purely on ONLY ONE type of authentication mechanism.
Title, Link and Reference:
Soft Tokens
https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained
Ltd, S. 2019. Soft Tokens - Two Factor Authentication | SecurEnvoy. [online]
Securenvoy.com [Accessed 27 Sep. 2019]. Available at:
https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained
Summary:
The following source is all about soft token application which is available for range of
devices like blackberry, Mac, windows phone and Microsoft windows. It merely helps
in moving in between the devices in secure way which does not require any additional
cost. Soft tokens provides rapid deployment for most of the user. It handles most of
changes for international time zones at the time of travelling. In addition, it helps in
improved copy protection.
The updated SecurEnvoy V7 helps the user in providing a better choice for security
which is token less SMS two factor authentication. In addition, it can be used for
providing securing blackberry mails, voice call or even soft token download option.
There are many kind of charge add on for end products of SecurEnvoy suite. User can
easily select a required soft token application for Google or SecurEnvoy. Most of the
soft tokens can be enrolled in the similar application or even multiple one.
In this, user is given the freedom to easily migrate a new mobile model by enrolment of
new mobile phone. User can easily their old phone application or SMS so that they can
provide two factor authentication for the enrolment portal. In this, user can simply scan
the QR code for provision of new mobile phone. Security server aims to automatically
delete the records of old phone.
SecurEnvoy soft tokens are required for both mobile phones or desktop so that one time
password can be generated easily. The password can be used for providing two-factor
authentication which can be analysed by goggle cloud login and SecurEnvoy. Quick
response codes are considered to be excellent for bar code matrix for deployment. In
this, user just need to scan QR code for mobile cameras for ensuring an automatic
enrolment.
8
Network security has become a major concern of ICT world, and user authentication is
one of the popular tools to assure network security. Find and summarise ONE resource
that describes any ONE authentication mechanism except password. The resource, and
your summary, should focus purely on ONLY ONE type of authentication mechanism.
Title, Link and Reference:
Soft Tokens
https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained
Ltd, S. 2019. Soft Tokens - Two Factor Authentication | SecurEnvoy. [online]
Securenvoy.com [Accessed 27 Sep. 2019]. Available at:
https://www.securenvoy.com/en-gb/two-factor-authentication/soft-tokens-explained
Summary:
The following source is all about soft token application which is available for range of
devices like blackberry, Mac, windows phone and Microsoft windows. It merely helps
in moving in between the devices in secure way which does not require any additional
cost. Soft tokens provides rapid deployment for most of the user. It handles most of
changes for international time zones at the time of travelling. In addition, it helps in
improved copy protection.
The updated SecurEnvoy V7 helps the user in providing a better choice for security
which is token less SMS two factor authentication. In addition, it can be used for
providing securing blackberry mails, voice call or even soft token download option.
There are many kind of charge add on for end products of SecurEnvoy suite. User can
easily select a required soft token application for Google or SecurEnvoy. Most of the
soft tokens can be enrolled in the similar application or even multiple one.
In this, user is given the freedom to easily migrate a new mobile model by enrolment of
new mobile phone. User can easily their old phone application or SMS so that they can
provide two factor authentication for the enrolment portal. In this, user can simply scan
the QR code for provision of new mobile phone. Security server aims to automatically
delete the records of old phone.
SecurEnvoy soft tokens are required for both mobile phones or desktop so that one time
password can be generated easily. The password can be used for providing two-factor
authentication which can be analysed by goggle cloud login and SecurEnvoy. Quick
response codes are considered to be excellent for bar code matrix for deployment. In
this, user just need to scan QR code for mobile cameras for ensuring an automatic
enrolment.
8

Week 6
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Data Breach at Uber affecting 57 million riders and drivers
https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-
breach-and-cover-up.html
Salinas, S. 2019. Uber will pay $148 million in connection with a 2016 data
breach and cover-up. [online] CNBC [Accessed 27 Sep. 2019]. Available at:
https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-
breach-and-cover-up.html
Summary:
The source highlights the Uber data breach which provided access to the vital
information of more than 57 million drivers and riders. The organization has
agreed to pay ransom value of around 100,000 million for deleting the collected
data of different. In addition, the organization has focused on keeping the data
breach quite instead of reporting the incident. The decision of the organization to
keep the details of data breach is an incident of violation of public trust.
The following source has been selected as it provides detail information about the
data breach at Uber. For most of the Uber riders, the organization has agreed to pay
around 148 million dollars. The breach resulted the hacker to have an easy access
to most of the personal information for 57 million riders and drivers. The
organization has successfully monitored the affected accounts. In addition, it has
provided addition fraud protection.
Uber has failed to safeguard the user data and notify different authorities for its
exposure. Consistency for the corporate culture in times can swipe the breach
under the rug which is as per the disregard of the law. Hacker stole all the personal
information which is inclusive of names and driver information. The attack result
in breach of details of around 600,000 drivers in united states. It also lead to the
compromising with email address and phone number of different drivers.
The resource was useful as it clearly stated the people who are behind the data
breach at Uber. The organization has claimed that two people who does not work
for organization accessed the data on third party cloud service used by Uber.
Cybercriminal have make an attempt for launching phishing attack that appears to
9
The text discusses about a massive data breach that happened in Target company,
which is referred as ‘Target Breach’. Find and summarise ONE resource that
describes another recent (within last 5 years) well-publicised attack or security
breach on a public company or government organisation. The resource, and your
summary, should describe about A SINGLE EXAMPLE of security breach.
Title, Link and Reference:
Data Breach at Uber affecting 57 million riders and drivers
https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-
breach-and-cover-up.html
Salinas, S. 2019. Uber will pay $148 million in connection with a 2016 data
breach and cover-up. [online] CNBC [Accessed 27 Sep. 2019]. Available at:
https://www.cnbc.com/2018/09/26/uber-to-pay-148-million-for-2016-data-
breach-and-cover-up.html
Summary:
The source highlights the Uber data breach which provided access to the vital
information of more than 57 million drivers and riders. The organization has
agreed to pay ransom value of around 100,000 million for deleting the collected
data of different. In addition, the organization has focused on keeping the data
breach quite instead of reporting the incident. The decision of the organization to
keep the details of data breach is an incident of violation of public trust.
The following source has been selected as it provides detail information about the
data breach at Uber. For most of the Uber riders, the organization has agreed to pay
around 148 million dollars. The breach resulted the hacker to have an easy access
to most of the personal information for 57 million riders and drivers. The
organization has successfully monitored the affected accounts. In addition, it has
provided addition fraud protection.
Uber has failed to safeguard the user data and notify different authorities for its
exposure. Consistency for the corporate culture in times can swipe the breach
under the rug which is as per the disregard of the law. Hacker stole all the personal
information which is inclusive of names and driver information. The attack result
in breach of details of around 600,000 drivers in united states. It also lead to the
compromising with email address and phone number of different drivers.
The resource was useful as it clearly stated the people who are behind the data
breach at Uber. The organization has claimed that two people who does not work
for organization accessed the data on third party cloud service used by Uber.
Cybercriminal have make an attempt for launching phishing attack that appears to
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Uber. It merely helps in trick any unsuspecting customer from providing personal
information like credential or payment card details.
10
information like credential or payment card details.
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 7
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference between
e-commerce and e-business.
Title, Link and Reference:
Relationship in between e-commerce and e-business
https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-
31030.html
Richards, L. 2019. The Similarities Between E-business & E-commerce. [online]
Smallbusiness.chron.com [Accessed 27 Sep. 2019]. Available at:
https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-
31030.html
Summary:
The source highlights the relationship in between e-business and e-commerce. The
development of internet has created a path for different business model. Most of the
organization around the globe have used it effectively. Both the terms that are easily
interchangeable but it has some amount of difference in between.
This source has been selected as it provided all the similarities and difference in
between e-business and e-commerce. E-commerce is about online transaction that
requires purchase of certain goods and services. E-business is all about covering various
online transaction for e-commerce. The sale of books on amazon website is an e-
commerce activity. E-business aims to cover different online transaction for e-
commerce.
The resource highlights small business can easily expand their business model in e-
commerce platform. Everything can reach to different customer without the overall cost
for good. E-business activity is merely inclusive of different elements for business
running that has moved to online setting. E-business is merely inclusive of certain
number of customer based activities like processing order and marketing of products.
Most of the business are asking their customer to rate potential new colour products. On
the internet platform, there is a variety of business-business to based activities.
Yes, the resource was useful as it provided us all the detail requirement like similarities
and difference in between e-business and e-commerce. There are many new
opportunities for which the business is developing a much strong online presence. E-
commerce can be defined as the subset of e-business. The activities are merely inclusive
of different elements which are required for running business.
11
The text briefly discusses about e-commerce and e-business. Find and summarise
ONE resource that discusses the relationship between e-commerce and e-business.
The resource, and your summary, should describe similarities and difference between
e-commerce and e-business.
Title, Link and Reference:
Relationship in between e-commerce and e-business
https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-
31030.html
Richards, L. 2019. The Similarities Between E-business & E-commerce. [online]
Smallbusiness.chron.com [Accessed 27 Sep. 2019]. Available at:
https://smallbusiness.chron.com/similarities-between-ebusiness-ecommerce-
31030.html
Summary:
The source highlights the relationship in between e-business and e-commerce. The
development of internet has created a path for different business model. Most of the
organization around the globe have used it effectively. Both the terms that are easily
interchangeable but it has some amount of difference in between.
This source has been selected as it provided all the similarities and difference in
between e-business and e-commerce. E-commerce is about online transaction that
requires purchase of certain goods and services. E-business is all about covering various
online transaction for e-commerce. The sale of books on amazon website is an e-
commerce activity. E-business aims to cover different online transaction for e-
commerce.
The resource highlights small business can easily expand their business model in e-
commerce platform. Everything can reach to different customer without the overall cost
for good. E-business activity is merely inclusive of different elements for business
running that has moved to online setting. E-business is merely inclusive of certain
number of customer based activities like processing order and marketing of products.
Most of the business are asking their customer to rate potential new colour products. On
the internet platform, there is a variety of business-business to based activities.
Yes, the resource was useful as it provided us all the detail requirement like similarities
and difference in between e-business and e-commerce. There are many new
opportunities for which the business is developing a much strong online presence. E-
commerce can be defined as the subset of e-business. The activities are merely inclusive
of different elements which are required for running business.
11

Week 8
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find and
summarise ONE resource that describes the success story of adapting SAP HANA by
another local or international company. The resource, and your summary, should focus
on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
Success story of adapting SAP HANA
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/
Stories, C. and Company, N. 2019. Success Story: SAP HANA implementation by
itelligence. [Online] itelligence India. [Accessed 27 Sep. 2019].Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company
Summary:
The following source is all about the successful implementation of SAP HANA in
intelligence group. Network service organization is considered to be flexible,
distribution solution which enhances overall supply chain efficiency. The system of this
organization focuses on some of the single resources of the organization that focus on
local market presence on international platform.
Centralized account management aims to provide much better control while the
network distribution aims to deliver flexibility and category expertise. With the
adaptation of SAP HANA network, the organization has gained huge amount of
production gains. In some cases, it results in huge amount of improvement. It is
generally achieving a hosting platform where the network freed is around 30 TB.
The network SAP HANA does not have any plan for cloud support. Instead of that
executives understand the standard of the organization in case of on premise approach.
This will merely help them in continuing a proper route. However, there are some
changes in opinion where decision makers make an evaluation with respect to certain
number of factors like cost analysis.
The source was useful as it provided complete details about the organization about how
it become success after migrating to SAP HANA. The organization aim to experience
positive result after implementation.
12
The text book discusses about the success story of ARI (Automotive Resources
International) company after implementing SAP BusinessObjects Explorer and
integrating it with HANA. HANA is SAP’s in-memory computing platform that is
deployable as an on-premise hardware and software appliance or in the cloud. Find and
summarise ONE resource that describes the success story of adapting SAP HANA by
another local or international company. The resource, and your summary, should focus
on the story about ONE single company (which is not ARI company).
Title, Link and Reference:
Success story of adapting SAP HANA
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company/
Stories, C. and Company, N. 2019. Success Story: SAP HANA implementation by
itelligence. [Online] itelligence India. [Accessed 27 Sep. 2019].Available at:
https://itelligencegroup.com/in-en/success-stories/successstory-network-services-
company
Summary:
The following source is all about the successful implementation of SAP HANA in
intelligence group. Network service organization is considered to be flexible,
distribution solution which enhances overall supply chain efficiency. The system of this
organization focuses on some of the single resources of the organization that focus on
local market presence on international platform.
Centralized account management aims to provide much better control while the
network distribution aims to deliver flexibility and category expertise. With the
adaptation of SAP HANA network, the organization has gained huge amount of
production gains. In some cases, it results in huge amount of improvement. It is
generally achieving a hosting platform where the network freed is around 30 TB.
The network SAP HANA does not have any plan for cloud support. Instead of that
executives understand the standard of the organization in case of on premise approach.
This will merely help them in continuing a proper route. However, there are some
changes in opinion where decision makers make an evaluation with respect to certain
number of factors like cost analysis.
The source was useful as it provided complete details about the organization about how
it become success after migrating to SAP HANA. The organization aim to experience
positive result after implementation.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



