COIT20246: ICT Service Management - Weekly Online Resources

Verified

Added on  2023/06/07

|16
|4150
|320
Homework Assignment
AI Summary
This assignment provides a comprehensive overview of various ICT service management topics through weekly analysis of online resources. Week 1 discusses the increasing importance of GPUs in the era of AI. Week 2 explores cognitive hubs as future operating systems for workplaces. Week 3 compares Azure and AWS cloud services. Week 4 explains the IPv6 protocol and its advantages over IPv4. Week 5 examines the WannaCry ransomware attack, its infection methods, and responsible parties. Week 6 delves into Software Defined Networking (SDN) and the OpenFlow Network Architecture. Week 7 outlines the reasons for moving away from legacy systems. Week 8 touches on Cambridge Analytica's role in the US 2016 election. Week 9 presents an overview of the LoadComplete tool. Finally, Week 10 reflects on the Qld Health payroll fiasco, offering insights into IT project management failures. Desklib offers a wealth of similar assignments and study tools for students.
Document Page
Running Head: ICT SERVICE MANAGEMENT 0
ICT Service Management
Individual Assignment
Student name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ICT Service Management 1
Contents
Week 1........................................................................................................................................................2
In The Era Of Artificial Intelligence, GPUs Are The New CPUs........................................................2
Week -2.......................................................................................................................................................3
Cognitive Hub: the Operating System for the Workplace of the Future..............................................3
Week 3........................................................................................................................................................4
Azure vs. AWS Cloud Service Comparison: Which One is Better?........................................................4
Week – 4......................................................................................................................................................5
What is IPv6?.......................................................................................................................................5
Week -5.......................................................................................................................................................6
What is WannaCry ransomware, how does it infect, and who was responsible?................................6
Week 6........................................................................................................................................................7
The basics of SDN and the OpenFlow Network Architecture...............................................................7
Week 7........................................................................................................................................................8
Reasons to move away from legacy systems.......................................................................................8
Week 8........................................................................................................................................................9
Cambridge Analytica role in US 2016 Election.....................................................................................9
Week 9......................................................................................................................................................10
Overview of LoadComplete tool........................................................................................................10
Week 10....................................................................................................................................................11
Learning from the Qld Health payroll fiasco......................................................................................11
References.................................................................................................................................................12
Document Page
ICT Service Management 2
Week 1
Week 1
Task-1
Title and Reference:
In The Era Of Artificial Intelligence, GPUs Are The New CPUs
Janakiram, M. S. V., 2017. In The Era Of Artificial Intelligence, GPUs Are The New
CPUs. [Online] Available at:
https://www.forbes.com/sites/janakirammsv/2017/08/07/in-the-era-of-artificial-
intelligence-gpus-are-the-new-cpus/#65aeb60a5d16 [Accessed 01 09 2018].
Summary:
I choose this resource, because it describe about GPU as well as CPU importance in
Computer system. Maximum computer users assume that the video cards were
designed for graphical uses in systems like games and all. These were purely optional;
it means they are not only designed for gaming and graphics. GPU’s found a new
place that increase usability of GPU’s in Machine Learning and Artificial Intelligence
as relevant as CPU’s. GPU is getting so much attention now a days, it use machine-
learning techniques that is used in cognitive computing. CPU’s are used for
calculation in sequential order, which means next processes wait for first process to
complete. Now a days multi core processors are used to speed up the calculation by
switch processes in different cores, but cores are so costly.
In terms of calculation, GPU’s have thousands of cores, which is capable to handle
millions of processes in parallel? Deep learning and graphic rendering have these
similarities. Nvidia has a programming model “CUDA” for rendering and build
parallel programs. Next generation of GPU is GPGPU, which is general purpose
GPU. They are used for parallelization, it have the power for deep learning
experiments. Intel also has Altera and Nervana, which can be programmed later for
future use. Google also launched Tensor Processing Unit or TPU, which is a chip that
is designed for complex mathematical operations with parallel programming
(Janakiram, 2017).
Document Page
ICT Service Management 3
Week -2
Week 2
Task - 2
Title and Reference:
Cognitive Hub: the Operating System for the Workplace of the Future
workplacehub.konicaminolta, 2017. Cognitive Hub: the Operating System for the
Workplace of the Future. [Online]
Available at: http://workplacehub.konicaminolta.com/en_us/spotlight/cognitive-hub-
the-operating-system-for-the-workplace-of-the-future[Accessed 01 09 2018].
Summary:
This source is informing about future operating systems, which are based on artificial
intelligence. Those operating systems will be capable of managing complex
calculations to help people and company. Company can derive more benefits from
their resources and data. Now days every person wants all information at our
fingertips. In addition, they want this information immediate, accurate and actionable.
Using artificial intelligence modern operating systems have been able to manage and
schedule different activities with better performance. AI reduces or optimized their
resource and increase efficiency of operating systems. In current time, highly
optimized and efficient operating systems are designed on the bases of artificial
intelligence. Many organizations exploring ways to develop an Artificial intelligence
based operating systems that will support to managing different complex activities.
These operating systems known as cognitive operating system. Machine learning
algorithms are helpful to design these types of operating systems. AI based Operating
systems will be more efficient in handling of decision-making problem solving
processes. Benefits of AI based OS:
Consistent decisions
Capable to solve complex problems
Improved decision making quality
Enhanced problem-solving applications
These operating systems could help human beings in various fields, such as
scientific, academic, military, education, medical, and research.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ICT Service Management 4
Week 3
Week 3
Task-3
Title and Reference:
Azure vs. AWS Cloud Service Comparison: Which One is Better?
Stackify, 2017. Azure vs. AWS Cloud Service Comparison: Which One is Better?.
[Online]Available at: https://stackify.com/azure-vs-aws-comparison/
[Accessed 21 September 2018].
Summary:
This article describes about Microsoft azure and services provided by this to different
organizations. I chose this article because it explains about Infrastructure as a service
and difference between two IaaS. Also, explain how they store data and provide
services to companies.
In the article, discuss about pricing and services of Microsoft Azure. Azure divides
pricing of services according to uses by consumer. There is a price calculator, which
shows cost of your services. Azure also provides Service as a service and platform as
a service with different services.
In addition to services types, IaaS provide languages at service side for development,
such as java, python, and ruby. It is provide software development tools for making
projects online, such as IIS server. In case of databases and storage, SQL database is a
database as a service. For storage of all data of different tables, it provides 200 TB
space.
It has only a drawback that it is provide a wide variety of services to an organization.
So if you want a specific type of service than it will be difficult.
Amazon Web Services (AWS) is biggest competitor of all IaaS. AWS is a reliable
option for such types of services. However, in last decade many things are changed.
Microsoft Azure provides services into three categories, such as Networking,
compute, and data management and performance.
I found this article useful because it provides details about Microsoft azure services
and compare it with AWS.
Document Page
ICT Service Management 5
Week – 4
Week 4
Task-4
Title and Reference:
What is IPv6?
Whatismyipadress, 2018. What is IPv6?. [Online]
Available at: https://whatismyipaddress.com/ip-v6
[Accessed 18 September 2018].
Summary:
This source is described about IPv6 protocol and also compare IPv4 protocol. IPv6
handled packets more properly. Internet Protocol version 4 (IPv4) is network layer
standard protocol for communication between different networks. It is used for packet
switched network.
Some characteristics of IPv6 that makes it better than IPv4 are larger address space,
stateless auto-configaration, multicast, security at network layer, and qualities of
services capabilities. IPv6 vulnerabilities are making more secure data and system
from viruses and other attacks. Increased address capacity of address remove
subnetting problem in IPv4. It provides additional web addresses to resources. IPv6 is
more efficient in routing compare to IPv4.
It allows for easy aggregation of prefixes assigned to IP networks. It enables big data
packets to be sent in network simultaneously to better usages of bandwidth. It is built
authentication methods into network firewalls.
Some disadvantages of IPv6 are conversion, communication, transition, and
readability. IPv4 addresses are expressing in 32 bits. It is divided in two parts. First, is
network id and second is host id. In 1980’s, network is based on classful networking
but number of users are increased so it replaced with classless inter-Domain routing.
This is a logical addressing system. IPv6 is more innovative than IPv4 version.
Document Page
ICT Service Management 6
Week -5
Week 5
Task-5
Title and Reference:
What is WannaCry ransomware, how does it infect, and who was responsible?
Fruhlinger, J., 2018. What is WannaCry ransomware, how does it infect, and who was
responsible?. [Online] Available at:
https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-
ransomware-how-does-it-infect-and-who-was-responsible.html Accessed 03 09
2018].
Summary:
This resource is about ransomware and malware attacks. WannaCry is a worm of
ransomware type that damages a number of networks rapidly in May of 2017. It
encrypts files of windows computers hard disks. Also not accessible to users of that
particular system. For decrypt, that files it demand a ransom in bitcoin. First time it
spread in Britain’s National Health Service. First, time it discovered by United States
National Security Agency.
I select this resource because its explain about ransomware attacks on computer
systems.
What is WannaCry Ransomware:
It had many components. It is in the form of dropper on the infected systems, it is
self- contained programs that encrypt other files and programs. Three main parts of
this ransomware are:
A program that change format of data in the system
Make encryption keys for all files in the system
A copy of TOR
WannaCry tries to open system files in the computer system and change these files in
other formats like Microsoft office files in the mpeg and mkv formats. Also, make
these files to not accessible for users then demanding $300 in bitcoin to accessing and
decrypting these files. Microsoft security has released patches on march 14, 2017 to
prevent infection from EternalBlue. These update the windows with implementation
of SMB protocol. Some peoples are paying the ransom, for accessing to their files.
Maximum system, which are infected by WannaCry ransomware have windows 7
operating system. Security teams start working to evaluate the origins of WannaCry
ransomware. Symantec security team had believed that the ransomware might have a
working company of North Korean origin. Boeing was hit with a suspected
WannaCry Attack in March 2018. It did little damage in few production systems.
NotPetya virus is encrypts the computer system master file table and showing a
message on screen requesting a Bitcoin ransom to decrypt files and access to the files
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ICT Service Management 7
in the computer system.
Week 6
Week 6
Task - 6
Title and Reference:
The basics of SDN and the OpenFlow Network Architecture
LeClerc , M., 2018. The basics of SDN and the OpenFlow Network Architecture.
[Online] Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-
network-architecture/ [Accessed 21 September 2018].
Summary:
This article describes about Software Defined Networking (referred as SDN) and uses of
OpenFLow. . I chose this article because it explains about overflow and SDN within
different aspects of network. It is designed to manage data flow and internetworking
devices. SDN architecture have three layers are:
Application layer – it provide communication services for end-user boniness
applications
Control Layer – it consist the logically centralized functionality
Infrastructure Layer – it provides packet switching and message forwarding
In this resource technical description is well defined. SDN has logically centralized
intelligence, which provides decision-making facility to domain. It is also controlled by
software. There are many Application-programming interfaces to interact with the
network. In the field of networking OpenFlow-enabled SDN, provide several benefits
such as multi-vendor networking. OpenFlow is provides connection between different
geographical domains for managing operations and complaints. Now a day’s operator
needs their transport networks with high bandwidth and shifting traffic patterns. SDN
provides all these facilities to maintain network according to their needs. SDN
architecture has a central controller, which perform many difficult functions, including
security attacks, routing algorithms, network policy declaration, and naming. A single
controller is deploying in large enterprise network to manage all networking devices.
These are called SDN domains. SDN domains provide scalability, privacy and
incremental deployment. The SDN controllers implemented in different ways, first it is
require an identical logical switch function and second, it needs a safe and a standard
Document Page
ICT Service Management 8
protocol between network devices and SDN controller.
Week 7
Week 7
Task - 7
Title and Reference:
Reasons to move away from legacy systems
arrkgroup, 2018. Reasons to move away from legacy systems. [Online]
Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-
from-legacy-systems/ [Accessed 03 09 2018].
Summary:
This resource is about disadvantages of Legacy systems. Legacy systems are known
as a system that continues the business from a long time. This could be holding any
organization back. Therefore, there is a difficult question arise in front of
organizations is that: Should they stick with their existing systems? On the other
hand, spend money for new system with latest technology. A good example can be
found in banking sector, where frequently changes are necessary according to
requirements. That was necessary for reduce risk and increase capabilities according
to market. Sometimes organizations do not have a choice to continue their legacy
systems. For business development and industrial strength, it is necessary to replacing
core systems.
Some questions to ask for changing legacy systems:
How cost-effective is our system maintenance?
Can current system integrate technology and system architecture?
Current system still offering anything for organization business?
I select this resource because it is describe about legacy system disadvantages. There
are many other reasons to remove legacy systems from an organization, such as cost
of maintenance, lack of understandings, lack of security issues, and integration of new
systems with older technologies. IT systems makes better to an organization working
process and change business growth of an organization. Information technologies
attach previous or current system to mobile phones for easy and fast access from
Document Page
ICT Service Management 9
anywhere.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ICT Service Management 10
Week 8
Week 8
Task - 8
Title and Reference:
Cambridge Analytica role in US 2016 Election.
Detrow, S., 2018. What Did Cambridge Analytica Do During The 2016 Election?.
[Online] Available at: https://www.npr.org/2018/03/20/595338116/what-did-
cambridge-analytica-do-during-the-2016-election [Accessed 03 09 2018].
Summary:
This resource is about scandal of Facebook and Cambridge Analytica organization. It
is about misuse of 50 million Facebook user’s personal data. Attorneys general of
multiple states are launching investigations of election 2016 in the United States.
They found, that company violated terms of services of Facebook’s for using private
data. Mr. Alexander Nix suspended from company for this issue. He is CEO of
Cambridge Analytica. It is all about the presidential campaign in US; When the
Cambridge Analytica company waded into American politics with the objective of
giving conservatives tools.
I select this resource because it describe about that scandal in details. According to
this resource Facebook's terms and conditions at the time allowed the mobile
application to suck up personal data about many users and take information about
their mutual and all friends from their personal accounts. That data contained within
education level, place, the groups, pages they liked, birthday date, their relationship
status, and office addresses. Kogan did this thing, for academic purposes. He was not
allowed to pass the data along to a negotiator, instead of using it for academic
research work, as had been promised from the company. Kogan and Cambridge
Analytica has suspended from the Facebook environment. According to Cruz and
Trump campaigns, they never used the data, which is copied from Facebook by
Cambridge Analytica.
Document Page
ICT Service Management 11
Week 9
Week 9
Task - 9
Title and Reference:
Overview of LoadComplete tool
smartbear, 2018. Overview. [Online] Available at:
https://smartbear.com/product/loadcomplete/overview/[Accessed 03 09 2018].
Summary:
This resource is about performance and testing tool. LoadComplete is a tool for
testing of websites different features, such as load, stress, and scalability testing. It
works with modern web technologies like AJEX, Silverlight, and J2EE. It shows
results with a few seconds. It has record and playback features. This is provided or
generate load from virtual machines also, so anyone can test from anywhere.
I select this resource because it has all information of LoadComplete. LoadComplete
move toward with many features that help to get started instantaneously. It gains an
end-to-end visibility into application performance. Different powerful functionalities
of LoadComplete include:
Run load tests
Different performance tests between virtual machines
Identify problems using different test on server and browser side
Managing from different geographical places.
System Requirements
Intel Core 2 Duo
Windows XP or higher
Adobe Flash Player
2 GB of RAM
Installation disk space of 4 GB
Many uses of LoadComplete tools in website and other protocol works. A
LoadComplete test allows system to display response times, output rates, and
resource-utilization levels, and to identify web application breaking point. This tool is
show all performance attributes of a web application and show issues in that particular
area by which any fault occurred in future.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]