ICT Services Management Assignment - Summaries and Analysis
VerifiedAdded on 2022/09/08
|6
|3456
|11
Homework Assignment
AI Summary
This ICT services management assignment requires students to find and summarize online resources on various technology topics. The assignment covers persistent memory, UEFI, 5G, IoT protocols, the ANU data breach, a Verizon routing issue, and the role of business analysts. Each task involves summarizing a specific resource, including its title, link, and reference, along with a summary of the resource's content. The summaries are structured to include what the resource is about, why it was selected, the main points covered, and why it was useful. The assignment emphasizes the use of original wording and the importance of citing and referencing sources in the Harvard format. The resources used must be from IT magazines, blogs, news articles, or conference papers, and no older than 2017 or 2016. The goal is to help students understand these key concepts and issues in the field of ICT services management.

Running head: - ICT SERVICES MANAGEMENT
ICT SERVICES MANAGEMENT
Name of the Student
Name of the University
Author Note
ICT SERVICES MANAGEMENT
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1ICT SERVICES MANAGEMENT
Task 1
The text discusses examples of traditional mass storage such as magnetic disk and solid-
state drives. While these still underpin most mass storage, an emerging next-generation
storage solution is Persistent Memory (PMEM). Find and summarise ONE resource that
describes Persistent Memory. The resource, and your summary, must focus solely on
Persistent Memory.
Title, Link and Reference:
What is Persistent Memory?
https://www.netapp.com/us/info/what-is-persistent-memory.aspx
Memory, W., 2020. What Is Persistent Memory? | Benefits | Examples | Netapp. [online]
Netapp.com. Available at: <https://www.netapp.com/us/info/what-is-persistent-
memory.aspx> [Accessed 3 April 2020].
Summary:
What is Persistent Memory?
The Website that has been chosen describes the proper definition of Persistent Memory.
This Website has been chosen to support the emergence of persistent memory that is
coming into limelight as a new form of storage device bringing in innovation in the digital
world.
In this Website, the author has stated that persistent memory is a non-volatile, low latency
as well as a byte addressable form of Dynamic Random Access Memory (DRAM).
Following this, the resource also states the fact that this form of memory is also helpful in
acting as a primary contributor towards increasing the performance of system as well as to
Task 1
The text discusses examples of traditional mass storage such as magnetic disk and solid-
state drives. While these still underpin most mass storage, an emerging next-generation
storage solution is Persistent Memory (PMEM). Find and summarise ONE resource that
describes Persistent Memory. The resource, and your summary, must focus solely on
Persistent Memory.
Title, Link and Reference:
What is Persistent Memory?
https://www.netapp.com/us/info/what-is-persistent-memory.aspx
Memory, W., 2020. What Is Persistent Memory? | Benefits | Examples | Netapp. [online]
Netapp.com. Available at: <https://www.netapp.com/us/info/what-is-persistent-
memory.aspx> [Accessed 3 April 2020].
Summary:
What is Persistent Memory?
The Website that has been chosen describes the proper definition of Persistent Memory.
This Website has been chosen to support the emergence of persistent memory that is
coming into limelight as a new form of storage device bringing in innovation in the digital
world.
In this Website, the author has stated that persistent memory is a non-volatile, low latency
as well as a byte addressable form of Dynamic Random Access Memory (DRAM).
Following this, the resource also states the fact that this form of memory is also helpful in
acting as a primary contributor towards increasing the performance of system as well as to

2ICT SERVICES MANAGEMENT
enable the fundamental change within the computing architecture that this brings.
In addition to this, the Website states the various places that Persistent Memory is used in
today’s world, such as database, big data, storage, virtualization, cloud computing, Internet
of Things as well as artificial intelligence.
Lastly, this Website has been chosen because of the fact that Persistent Memory has a
supporting hand from multiple hardware, platform ecosystem, software as well as standards
existing across the entire industry.
This resource also ends with the information that system performance is increased from
hours to seconds with the usage of Persistent Memory that is visibly identified by users.
Task 2
Computer BIOS (Basic Input Output System) has been traditionally responsible for the
booting process. However, it has largely been replaced by the Unified Extensible Firmware
Interface (UEFI). Find and summarise ONE resource that describes UEFI. The resource,
and your summary, must focus on UEFI, however, you may mention how it differs from
BIOS.
Title, Link and Reference:
Unified Extensible Firmware Interface (UEFI)
https://whatis.techtarget.com/definition/Unified-Extensible-Firmware-Interface-UEFI
WhatIs.com, 2020. What Is Unified Extensible Firmware Interface (UEFI)? - Definition
From Whatis.Com. [online] WhatIs.com. Available at:
<https://whatis.techtarget.com/definition/Unified-Extensible-Firmware-Interface-UEFI>
[Accessed 3 April 2020].
Summary:
enable the fundamental change within the computing architecture that this brings.
In addition to this, the Website states the various places that Persistent Memory is used in
today’s world, such as database, big data, storage, virtualization, cloud computing, Internet
of Things as well as artificial intelligence.
Lastly, this Website has been chosen because of the fact that Persistent Memory has a
supporting hand from multiple hardware, platform ecosystem, software as well as standards
existing across the entire industry.
This resource also ends with the information that system performance is increased from
hours to seconds with the usage of Persistent Memory that is visibly identified by users.
Task 2
Computer BIOS (Basic Input Output System) has been traditionally responsible for the
booting process. However, it has largely been replaced by the Unified Extensible Firmware
Interface (UEFI). Find and summarise ONE resource that describes UEFI. The resource,
and your summary, must focus on UEFI, however, you may mention how it differs from
BIOS.
Title, Link and Reference:
Unified Extensible Firmware Interface (UEFI)
https://whatis.techtarget.com/definition/Unified-Extensible-Firmware-Interface-UEFI
WhatIs.com, 2020. What Is Unified Extensible Firmware Interface (UEFI)? - Definition
From Whatis.Com. [online] WhatIs.com. Available at:
<https://whatis.techtarget.com/definition/Unified-Extensible-Firmware-Interface-UEFI>
[Accessed 3 April 2020].
Summary:

3ICT SERVICES MANAGEMENT
Unified Extensible Firmware Interface (UEFI)
This Website has been chosen as the resource states that Unified Extensible Firmware
Interface highlights the interface, which exists between the OS and the platform firmware.
This resource has been chosen because of the fact that it puts forward a proper definition
and explanation of the Unified Extensible Firmware interface and the relative usage of the
same within the digital world.
This Website states that the interface has the primary inclusion of data tables that consists of
information related to the platform, runtime service calls as well as the boot service calls.
These provision with a standardised environment responsible for the booting of the OS as
well as the running of the applications that are pre-boot.
The resource also highlights the information regarding the fact that UEFI carries the
primary tendency to change the next generation of IA based computer architectures as well
as can also be referred to as the outgrowth of a different series of generation in regards to
the computing world.
In the year of 2005, the Unified EFI forum had been formed across the entire industry of the
organization and had led towards promoting the adoption as well as the development of the
EFI specification.
Task 3
5G is an emerging Internet delivery technology. Find and summarise ONE resource that
describes 5G. The resource, and your summary, must focus on 5G and the improvements it
brings compared to other wired and wireless technologies.
Title, Link and Reference:
Unified Extensible Firmware Interface (UEFI)
This Website has been chosen as the resource states that Unified Extensible Firmware
Interface highlights the interface, which exists between the OS and the platform firmware.
This resource has been chosen because of the fact that it puts forward a proper definition
and explanation of the Unified Extensible Firmware interface and the relative usage of the
same within the digital world.
This Website states that the interface has the primary inclusion of data tables that consists of
information related to the platform, runtime service calls as well as the boot service calls.
These provision with a standardised environment responsible for the booting of the OS as
well as the running of the applications that are pre-boot.
The resource also highlights the information regarding the fact that UEFI carries the
primary tendency to change the next generation of IA based computer architectures as well
as can also be referred to as the outgrowth of a different series of generation in regards to
the computing world.
In the year of 2005, the Unified EFI forum had been formed across the entire industry of the
organization and had led towards promoting the adoption as well as the development of the
EFI specification.
Task 3
5G is an emerging Internet delivery technology. Find and summarise ONE resource that
describes 5G. The resource, and your summary, must focus on 5G and the improvements it
brings compared to other wired and wireless technologies.
Title, Link and Reference:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4ICT SERVICES MANAGEMENT
Task 4
The Internet of Things (IoT) is set to change the way in which the Internet is used. There
are numerous protocols and standards that underpin IoT. Find and summarise ONE
resource that describes specific network-related protocols/standards that IoT relies on. The
resource, and your summary, must focus purely on IoT protocols.
Title, Link and Reference:
IoT Standards and Protocols Guide — Protocols of the Internet of Things.
https://www.avsystem.com/blog/iot-protocols-and-standards/
Avsystem.com, 2020. Iot Standards And Protocols Guide — Protocols Of The Internet Of
Things. [online] Avsystem.com. Available at: <https://www.avsystem.com/blog/iot-
protocols-and-standards/> [Accessed 3 April 2020].
Summary:
IoT Standards and Protocols Guide — Protocols of the Internet of Things.
The Website that has been chosen as a resource puts forward all the information about a
network protocol that IoT relies upon, named Radio Frequency Identification (RFID). The
Website has been chosen, gives all the information related to this network protocol and the
relative resources that might be necessary for knowing the details of the technology and
how it carries out work.
Firstly, the Website states that RFID refers to a wireless form of non-contact usage of the
radio frequencies that are utilized for transferring of data. Tagging the commodities with the
tags that are RFID based provisions the users with the allowance to track the inventory as
well as the assets for a quick identification of that particular item.
Following this, the Website states RFID technology transforms the auto-ID and the relative
technology to a next level by provisioning with the allowance to be identified without
Task 4
The Internet of Things (IoT) is set to change the way in which the Internet is used. There
are numerous protocols and standards that underpin IoT. Find and summarise ONE
resource that describes specific network-related protocols/standards that IoT relies on. The
resource, and your summary, must focus purely on IoT protocols.
Title, Link and Reference:
IoT Standards and Protocols Guide — Protocols of the Internet of Things.
https://www.avsystem.com/blog/iot-protocols-and-standards/
Avsystem.com, 2020. Iot Standards And Protocols Guide — Protocols Of The Internet Of
Things. [online] Avsystem.com. Available at: <https://www.avsystem.com/blog/iot-
protocols-and-standards/> [Accessed 3 April 2020].
Summary:
IoT Standards and Protocols Guide — Protocols of the Internet of Things.
The Website that has been chosen as a resource puts forward all the information about a
network protocol that IoT relies upon, named Radio Frequency Identification (RFID). The
Website has been chosen, gives all the information related to this network protocol and the
relative resources that might be necessary for knowing the details of the technology and
how it carries out work.
Firstly, the Website states that RFID refers to a wireless form of non-contact usage of the
radio frequencies that are utilized for transferring of data. Tagging the commodities with the
tags that are RFID based provisions the users with the allowance to track the inventory as
well as the assets for a quick identification of that particular item.
Following this, the Website states RFID technology transforms the auto-ID and the relative
technology to a next level by provisioning with the allowance to be identified without

5ICT SERVICES MANAGEMENT
having the presence of a lie of sight as well as having a dependency upon the multiple types
of RFID.
Lastly, the Website states that RFID technology had been first used to identify airplanes in a
war if that is of the same herd or of the opponent. This technology has been visibly
identified to be improving every year and finding its usage in various fields of the industrial
market.
Task 5
Universities are increasingly the subject of cyber-attacks. The Australian National
University (ANU) was subject to a serious hack in 2018. Find and summarise ONE
resource that describes this attack and how it occurred. The resource, and your summary,
should focus purely on the 2018 ANU incident
Title, Link and Reference:
ANU data breach stretching back 19 years detected.
https://www.abc.net.au/news/2019-06-04/anu-data-hack-bank-records-personal-
information/11176788
ABC News, 2020. Addresses, Emails And Bank Details Targeted In Massive ANU Data
Hack. [online] ABC News. Available at: <https://www.abc.net.au/news/2019-06-04/anu-
data-hack-bank-records-personal-information/11176788> [Accessed 31 March 2020].
Summary:
ANU data breach stretching back 19 years detected.
This Website has been chosen because the resource puts forward all the information
regarding the hack that had taken place in the year of 2018 at the Australian National
University (ANU) hacking the system and stealing huge chunks of data that belonged to the
having the presence of a lie of sight as well as having a dependency upon the multiple types
of RFID.
Lastly, the Website states that RFID technology had been first used to identify airplanes in a
war if that is of the same herd or of the opponent. This technology has been visibly
identified to be improving every year and finding its usage in various fields of the industrial
market.
Task 5
Universities are increasingly the subject of cyber-attacks. The Australian National
University (ANU) was subject to a serious hack in 2018. Find and summarise ONE
resource that describes this attack and how it occurred. The resource, and your summary,
should focus purely on the 2018 ANU incident
Title, Link and Reference:
ANU data breach stretching back 19 years detected.
https://www.abc.net.au/news/2019-06-04/anu-data-hack-bank-records-personal-
information/11176788
ABC News, 2020. Addresses, Emails And Bank Details Targeted In Massive ANU Data
Hack. [online] ABC News. Available at: <https://www.abc.net.au/news/2019-06-04/anu-
data-hack-bank-records-personal-information/11176788> [Accessed 31 March 2020].
Summary:
ANU data breach stretching back 19 years detected.
This Website has been chosen because the resource puts forward all the information
regarding the hack that had taken place in the year of 2018 at the Australian National
University (ANU) hacking the system and stealing huge chunks of data that belonged to the
1 out of 6

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.