Information Technology Articles Summary: Weeks 1-7, MIT Coursework
VerifiedAdded on 2021/04/21
|13
|3655
|24
Homework Assignment
AI Summary
This assignment presents summaries of technology articles spanning seven weeks, covering a diverse range of topics in the field of information technology. Week 1 focuses on AMD's response to the Spectre exploits, detailing CPU firmware and Windows 10 patches. Week 2 discusses the release of App...

Master of Information Technology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Week 1:Title1: AMD rolls out CPU firmware and windows 10 patches to protect against spectre
Exploits.................................................................................................................................................3
Summary:..........................................................................................................................................3
Reference:..........................................................................................................................................3
Week 2: Title: Source Code for Apple’s Lisa Operating system to be released.....................................3
Summary:..........................................................................................................................................3
Reference:..........................................................................................................................................4
Week 3: How to implement a low power WAN to support the IoT.......................................................4
Summary...........................................................................................................................................4
Reference:..........................................................................................................................................5
Week 4: Title: East View Geospatial launches on-demand Milspec geospatial data.............................5
Summary...........................................................................................................................................5
Reference:..........................................................................................................................................6
Week 5: Title: The truth about Block chain...........................................................................................6
Summary...........................................................................................................................................6
Reference:..........................................................................................................................................7
Week 6: Title: What will happen now that net neutrality is gone? We asked the experts......................7
Summary...........................................................................................................................................7
Reference:..........................................................................................................................................8
Week 7: The technology is killing jobs and only technology can save them.........................................8
Summary:..........................................................................................................................................8
Reference:..........................................................................................................................................9
Week 8: Title: How to apply machine learning to the business problems..............................................9
Summary...........................................................................................................................................9
Reference:..........................................................................................................................................9
Week 9: Title: Why I am learning python in 2018...............................................................................10
Summary.........................................................................................................................................10
Reference:........................................................................................................................................10
Week 10: Title: The bots are changing politics....................................................................................11
Summary:........................................................................................................................................11
Reference:........................................................................................................................................11
Week 1:Title1: AMD rolls out CPU firmware and windows 10 patches to protect against spectre
Exploits.................................................................................................................................................3
Summary:..........................................................................................................................................3
Reference:..........................................................................................................................................3
Week 2: Title: Source Code for Apple’s Lisa Operating system to be released.....................................3
Summary:..........................................................................................................................................3
Reference:..........................................................................................................................................4
Week 3: How to implement a low power WAN to support the IoT.......................................................4
Summary...........................................................................................................................................4
Reference:..........................................................................................................................................5
Week 4: Title: East View Geospatial launches on-demand Milspec geospatial data.............................5
Summary...........................................................................................................................................5
Reference:..........................................................................................................................................6
Week 5: Title: The truth about Block chain...........................................................................................6
Summary...........................................................................................................................................6
Reference:..........................................................................................................................................7
Week 6: Title: What will happen now that net neutrality is gone? We asked the experts......................7
Summary...........................................................................................................................................7
Reference:..........................................................................................................................................8
Week 7: The technology is killing jobs and only technology can save them.........................................8
Summary:..........................................................................................................................................8
Reference:..........................................................................................................................................9
Week 8: Title: How to apply machine learning to the business problems..............................................9
Summary...........................................................................................................................................9
Reference:..........................................................................................................................................9
Week 9: Title: Why I am learning python in 2018...............................................................................10
Summary.........................................................................................................................................10
Reference:........................................................................................................................................10
Week 10: Title: The bots are changing politics....................................................................................11
Summary:........................................................................................................................................11
Reference:........................................................................................................................................11

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 1:Title1: AMD rolls out CPU firmware and windows 10 patches to protect against
spectre Exploits
Summary:
From the new article, we are able to know that intel has discovered CPU microcode for
overcoming the exploitation caused by Spectre. We have selected this online resource
because it gives the clear detail of how the Spectre harmed the processor of the digital
devices. Spectre variant 2 mitigation plan has been developed for the windows 10.
The sensitive information from the computer processor can be hacked by the inclusion of
Spectre because it creates security hole in the designing of the operating system and
Microprocessor. The BIOS of the motherboard get affected due to the inclusion of Spectre
malware. The microchips of the processor is get affected by the security flaws. Spectre
security flaw works for leaking out the secret information of the system to the third party.
The devices which are get affected through the attack of spectre are Laptops, tablets,
desktops, smart phones, and other computing devices (Chacos, 2018). The gadgets based on
internet of things are not get affected from their attack. The Spectre security threat steals the
information stored on the Kernel of the microchip such as details of bank account, login,
security key, passwords, confidential data, credit details, and lots more. These attacks are
magnified on the inclusion of cloud services because it scaled up the computer resources.
The security updates should be fixes on the android smart devices. The new Patching system
is developed by the Intex to secure the operating system and Microprocessor. AMD processor
are not get affected by the spectre malware.
Reference:
Chacos, B. (2018). AMD rolls out CPU firmware and windows 10 patches to protect against
spectre Exploits. PC World, [Online]pp.2-4. Available at
https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-
10-patches-spectre.html [Accessed 23 Mar, 2018]
spectre Exploits
Summary:
From the new article, we are able to know that intel has discovered CPU microcode for
overcoming the exploitation caused by Spectre. We have selected this online resource
because it gives the clear detail of how the Spectre harmed the processor of the digital
devices. Spectre variant 2 mitigation plan has been developed for the windows 10.
The sensitive information from the computer processor can be hacked by the inclusion of
Spectre because it creates security hole in the designing of the operating system and
Microprocessor. The BIOS of the motherboard get affected due to the inclusion of Spectre
malware. The microchips of the processor is get affected by the security flaws. Spectre
security flaw works for leaking out the secret information of the system to the third party.
The devices which are get affected through the attack of spectre are Laptops, tablets,
desktops, smart phones, and other computing devices (Chacos, 2018). The gadgets based on
internet of things are not get affected from their attack. The Spectre security threat steals the
information stored on the Kernel of the microchip such as details of bank account, login,
security key, passwords, confidential data, credit details, and lots more. These attacks are
magnified on the inclusion of cloud services because it scaled up the computer resources.
The security updates should be fixes on the android smart devices. The new Patching system
is developed by the Intex to secure the operating system and Microprocessor. AMD processor
are not get affected by the spectre malware.
Reference:
Chacos, B. (2018). AMD rolls out CPU firmware and windows 10 patches to protect against
spectre Exploits. PC World, [Online]pp.2-4. Available at
https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-
10-patches-spectre.html [Accessed 23 Mar, 2018]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 2: Title: Source Code for Apple’s Lisa Operating system to be released
Summary:
In 1983, Apple Lisa office system 1 was launched by Apple Macintosh. In 1984, there
upgraded version were came which are called as Lisa OS 2 and Lisa OS 7/7 3.1. The Apple
Lisa’s Operating system was the first operating system which makes use of graphical user
interface. The cost price of the first release of Apple Lisa Operating system was $ 9,995. The
operating system was designed for the business representatives (Clover, 2017). This OS was
firstly used by the Motorola Company which is working on 5 MHz project with the
association of 68000 CPU requirement, 5 MB hard disk drive, and RAM of size 1 MB. The
drawback of the proposed operating system is the cost which the user has to pay for
purchasing due to the same reason Apple was able to sell out its 100,000 Lisa Operating
system based computers. Lisa Brennan was the founder of the first GUI based operating
system for Apple. The OS got its name from the founder. It is best suitable OS for text based
workshop. The Lisa Operating system provides 7 applications for the business operational
program which are categorised as Lisa Write, Lisa Draw, Lisa Calculator, Lisa Graph, Lisa
Terminal, Lisa Project, and Lisa List. The Macintosh invented the same model of Lisa
Operating system at lower price. The operational features of the Lisa Operating system make
it suitable for handling business processes efficiently and effectively.
Reference:
Clover, J. (2017). Source Code for Apple’s Lisa Operating system to be released. Mac
Rumors, [Online]pp.2-4. Available at https://www.macrumors.com/2017/12/27/lisa-source-
code-free-release-2018/ [Accessed 23 Mar, 2018]
Summary:
In 1983, Apple Lisa office system 1 was launched by Apple Macintosh. In 1984, there
upgraded version were came which are called as Lisa OS 2 and Lisa OS 7/7 3.1. The Apple
Lisa’s Operating system was the first operating system which makes use of graphical user
interface. The cost price of the first release of Apple Lisa Operating system was $ 9,995. The
operating system was designed for the business representatives (Clover, 2017). This OS was
firstly used by the Motorola Company which is working on 5 MHz project with the
association of 68000 CPU requirement, 5 MB hard disk drive, and RAM of size 1 MB. The
drawback of the proposed operating system is the cost which the user has to pay for
purchasing due to the same reason Apple was able to sell out its 100,000 Lisa Operating
system based computers. Lisa Brennan was the founder of the first GUI based operating
system for Apple. The OS got its name from the founder. It is best suitable OS for text based
workshop. The Lisa Operating system provides 7 applications for the business operational
program which are categorised as Lisa Write, Lisa Draw, Lisa Calculator, Lisa Graph, Lisa
Terminal, Lisa Project, and Lisa List. The Macintosh invented the same model of Lisa
Operating system at lower price. The operational features of the Lisa Operating system make
it suitable for handling business processes efficiently and effectively.
Reference:
Clover, J. (2017). Source Code for Apple’s Lisa Operating system to be released. Mac
Rumors, [Online]pp.2-4. Available at https://www.macrumors.com/2017/12/27/lisa-source-
code-free-release-2018/ [Accessed 23 Mar, 2018]

Week 3: How to implement a low power WAN to support the IoT
Summary
The internet of thing is the most preferred technology which make use of LPWAN because it
is applied for managing the data in the dense location which is equipped with smart lighting
connection, remote door locks, gas generator, and etc. The LPWAN is the preferred choice
for IoT because it provides license protected and exempt spectrum. The machine to machine
communication can be provided by the LPWAN. The implementation of the LPWAN
requires the development of the use case for the existing IoT framework support. The end to
end system connectivity is required in the setting of LPWAN with the proposed technology.
The fully functional model can be developed by analysing the proof of concept (POC)
associated with the LPWAN technology (Millman ,2017). The most suitable network for the
IoT platform is the low powered wide area network since it well-efficient in managing the
communication between the devices placed on the IoT network with the use of zigbee and
machine to machine protocol. The activities should be rolled out from the full scale network
designed for the integration of sensor and network management devices for managing
communication through LPWAN between devices and network management software. The
major critical issue in implementation of LPWAN with IoT is the high consumption of
power. The complexity of the devices will increased due to the management of the complex
data.
Reference:
Millman, R. (2017). How to implement a low power WAN to support the IoT, Computer
Weekly. [Online]pp.2-4. Available at https://www.leverege.com/blogpost/lpwan-benefits-vs-
iot-connectivity-options [Accessed 23 Mar, 2018]
Summary
The internet of thing is the most preferred technology which make use of LPWAN because it
is applied for managing the data in the dense location which is equipped with smart lighting
connection, remote door locks, gas generator, and etc. The LPWAN is the preferred choice
for IoT because it provides license protected and exempt spectrum. The machine to machine
communication can be provided by the LPWAN. The implementation of the LPWAN
requires the development of the use case for the existing IoT framework support. The end to
end system connectivity is required in the setting of LPWAN with the proposed technology.
The fully functional model can be developed by analysing the proof of concept (POC)
associated with the LPWAN technology (Millman ,2017). The most suitable network for the
IoT platform is the low powered wide area network since it well-efficient in managing the
communication between the devices placed on the IoT network with the use of zigbee and
machine to machine protocol. The activities should be rolled out from the full scale network
designed for the integration of sensor and network management devices for managing
communication through LPWAN between devices and network management software. The
major critical issue in implementation of LPWAN with IoT is the high consumption of
power. The complexity of the devices will increased due to the management of the complex
data.
Reference:
Millman, R. (2017). How to implement a low power WAN to support the IoT, Computer
Weekly. [Online]pp.2-4. Available at https://www.leverege.com/blogpost/lpwan-benefits-vs-
iot-connectivity-options [Accessed 23 Mar, 2018]
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 4: Title: East View Geospatial launches on-demand Milspec geospatial data
Summary
The Geo-spatial products can be effectively managed through the Milspec geospatial data.
The east view geospatial data is used for doing mapping process between the industrial
partners who are geographically apart. The voice communication is supported by the
implementation of voice over internet protocol. The development of multi-national geospatial
cooperation program was designed for managing the flow of data acceptance and rejection
among the coordinating parties which are located geographically apart. 1:50000 scaling
procedure is used for transferring of data between business partners. The global standards for
communication are developed through the integration of MGCP program. The quality and the
reliability of the interconnection between devices depend upon latency period and the
inclusion of Jitter in it. The techniques which are used with the MGCP are management of
the traffic priority, reservation of the bandwidth, label switching with the use of multi-
protocol, and network management through policy driven program. The effectiveness in the
East view information services can be achieved through the implementation of MGCP
protocol in the business administration plan (East View Geospatial, 2018). The data can be
accepted in different languages which are used worldwide such as Chinese, English, Russian,
French, Spanish, and others. The integration with the global partners can be approachable
with the inclusion of MGCP protocol for data transfer globally. The multi-national geospatial
cooperation program was designed for managing operational efficiency to manage smooth
working scenario at the work place by involving the business partner association in the
functional program of the enterprise.
Reference:
East View Geospatial. (2018). East View Geospatial launches on-demand Milspec geospatial
data. Geospatial News, [Online]pp.2-4. Available at
https://www.directionsmag.com/pressrelease/7472 [Accessed 23 Mar, 2018]
Summary
The Geo-spatial products can be effectively managed through the Milspec geospatial data.
The east view geospatial data is used for doing mapping process between the industrial
partners who are geographically apart. The voice communication is supported by the
implementation of voice over internet protocol. The development of multi-national geospatial
cooperation program was designed for managing the flow of data acceptance and rejection
among the coordinating parties which are located geographically apart. 1:50000 scaling
procedure is used for transferring of data between business partners. The global standards for
communication are developed through the integration of MGCP program. The quality and the
reliability of the interconnection between devices depend upon latency period and the
inclusion of Jitter in it. The techniques which are used with the MGCP are management of
the traffic priority, reservation of the bandwidth, label switching with the use of multi-
protocol, and network management through policy driven program. The effectiveness in the
East view information services can be achieved through the implementation of MGCP
protocol in the business administration plan (East View Geospatial, 2018). The data can be
accepted in different languages which are used worldwide such as Chinese, English, Russian,
French, Spanish, and others. The integration with the global partners can be approachable
with the inclusion of MGCP protocol for data transfer globally. The multi-national geospatial
cooperation program was designed for managing operational efficiency to manage smooth
working scenario at the work place by involving the business partner association in the
functional program of the enterprise.
Reference:
East View Geospatial. (2018). East View Geospatial launches on-demand Milspec geospatial
data. Geospatial News, [Online]pp.2-4. Available at
https://www.directionsmag.com/pressrelease/7472 [Accessed 23 Mar, 2018]
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Week 5: Title: The truth about Block chain
Summary
The network of Bitcoin is managed by the establishment of the block chain over the network.
The bitcoin is the virtual currency which made transaction between two parties. The digital
code are embedded in the block chain environment for managing transparency in the sharing
of databases. The deployment of the block chains are used by the companies for the tracking
of the bitcoin supply and demand over the network. The block chain is the new architecture
developed for managing the transaction of the bitcoin over the digital world. The peer to peer
network is placed in the block chain environment for managing the transaction between the
interested parties. Block chain is the open and distributed protocol which reduces the cost of
transaction over the web. All the records of the transaction are saved in the database. The
records of every organization are kept in the synchronized manner through the use of block
chain technology over traditional TCP/IP protocol. The ledger record of the transaction is
equipped with less error and provides accurate information on demand (Lansiti, 2017).
Human intervention is not required for managing the execution of stock transaction. In the
block chain architecture, the replicated copies of records are saved at distinct databases. The
updating of the data at one resource will simultaneously updated in every other copies. No
verification of the transaction is required in the block chain system by the third party because
it provide accurate information about the transaction from the ledger record of the company
saved at the database. The framework of the blockchain is divided into four quadrants. The
quadrant of the block chain is responsible for representing the technological advancement in
the system. The manger is effectively solved the regulatory and legislation compliance with
the government with the deployment of the block chain architecture in managing the
transaction in the form of bitcoin over the digital world.
Reference:
Lansiti, M. (2017). The truth about block chain. ITD Express, [Online]pp.2-4. Available at
https://hbr.org/2017/01/the-truth-about-blockchain [Accessed 23 Mar, 2018]
Summary
The network of Bitcoin is managed by the establishment of the block chain over the network.
The bitcoin is the virtual currency which made transaction between two parties. The digital
code are embedded in the block chain environment for managing transparency in the sharing
of databases. The deployment of the block chains are used by the companies for the tracking
of the bitcoin supply and demand over the network. The block chain is the new architecture
developed for managing the transaction of the bitcoin over the digital world. The peer to peer
network is placed in the block chain environment for managing the transaction between the
interested parties. Block chain is the open and distributed protocol which reduces the cost of
transaction over the web. All the records of the transaction are saved in the database. The
records of every organization are kept in the synchronized manner through the use of block
chain technology over traditional TCP/IP protocol. The ledger record of the transaction is
equipped with less error and provides accurate information on demand (Lansiti, 2017).
Human intervention is not required for managing the execution of stock transaction. In the
block chain architecture, the replicated copies of records are saved at distinct databases. The
updating of the data at one resource will simultaneously updated in every other copies. No
verification of the transaction is required in the block chain system by the third party because
it provide accurate information about the transaction from the ledger record of the company
saved at the database. The framework of the blockchain is divided into four quadrants. The
quadrant of the block chain is responsible for representing the technological advancement in
the system. The manger is effectively solved the regulatory and legislation compliance with
the government with the deployment of the block chain architecture in managing the
transaction in the form of bitcoin over the digital world.
Reference:
Lansiti, M. (2017). The truth about block chain. ITD Express, [Online]pp.2-4. Available at
https://hbr.org/2017/01/the-truth-about-blockchain [Accessed 23 Mar, 2018]

Week 6: Title: What will happen now that net neutrality is gone? We asked the experts
Summary
Net neutrality is like the fight which is established between proxy server and different
telecom networks such as Verizon and AT & T. The Google and Facebook are their starting
rivals. The telecom is behaving like the dumb pipes which are used for supplying data from
one end to other. The telecom networks are having the authority to block the data of the
required network. The blocking of the data can take place if net neutrality is not applied to the
text messages sent by the user. The customers will not be able to access the information if it
is blocked by the telecom network. The accessing of the data will be slow down due to the
occurrence of the traffic over the network. Net neutrality protocol has the authority to prevent
the data from blocking. The user can easily access the online services provided by different
website by using the net neutrality protocol. The load on the ISP network can be reduced by
providing free access to various online services for the user. The fees from the new customers
can be extracted by telecom server (Corenn, 2017). The changes in the information can take
place at the telecom network service if network neutrality protocol is not accumulated with
the data uploaded by the user for transmission at the destination end. The load management
system should be applied between the preferred partner for exploring the streaming services
between them. The quality services of emails should be provided to the business partner for
managing the resources between them. The application of the priority system helps in
increasing the reliability of services provided to the participating units. The net neutrality
system is not required for managing the load and setting priority to it over the network.
Reference:
Corenn, M. (2017). What will happen now that net neutrality is gone? We asked the experts .
Quartz, [Online]pp.2-4. Available at https://qz.com/1158328/what-will-happen-now-that-net-
neutrality-is-gone-we-asked-the-experts/ [Accessed 23 Mar, 2018]
Summary
Net neutrality is like the fight which is established between proxy server and different
telecom networks such as Verizon and AT & T. The Google and Facebook are their starting
rivals. The telecom is behaving like the dumb pipes which are used for supplying data from
one end to other. The telecom networks are having the authority to block the data of the
required network. The blocking of the data can take place if net neutrality is not applied to the
text messages sent by the user. The customers will not be able to access the information if it
is blocked by the telecom network. The accessing of the data will be slow down due to the
occurrence of the traffic over the network. Net neutrality protocol has the authority to prevent
the data from blocking. The user can easily access the online services provided by different
website by using the net neutrality protocol. The load on the ISP network can be reduced by
providing free access to various online services for the user. The fees from the new customers
can be extracted by telecom server (Corenn, 2017). The changes in the information can take
place at the telecom network service if network neutrality protocol is not accumulated with
the data uploaded by the user for transmission at the destination end. The load management
system should be applied between the preferred partner for exploring the streaming services
between them. The quality services of emails should be provided to the business partner for
managing the resources between them. The application of the priority system helps in
increasing the reliability of services provided to the participating units. The net neutrality
system is not required for managing the load and setting priority to it over the network.
Reference:
Corenn, M. (2017). What will happen now that net neutrality is gone? We asked the experts .
Quartz, [Online]pp.2-4. Available at https://qz.com/1158328/what-will-happen-now-that-net-
neutrality-is-gone-we-asked-the-experts/ [Accessed 23 Mar, 2018]
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Week 7: The technology is killing jobs and only technology can save them
Summary:
The innovation in the field of automation and the robotic system can create the problem of
job losses. The jobs of human are replaced by the working efficiency of the robots. This issue
should be taken under consideration because it can cause ill effects on the growing youth as
they are getting less opportunity to explore their talent and skills. The manufacturing jobs
created by the organization are totally lost due to the use of automation and robotic system in
the deployment of the manufacturing process. The working employees are not able to match
up with the accuracy provided by the ICT technologies. The feeling of depression and
demotivation brings inefficiency in their day to day working scenario. The innovation in
getting quality product will provide new opportunity to the trained people to give their best
for the betterment of the company (Heater, 2017). In the manufacturing industries, the work
of the employees are handed to the ICT technology. The monitoring and controlling jobs are
replaced by humans to the computer controlled program. These all scenario creates the
problem of Job losses from the working employees. The increasing innovation in the field of
ICT is the major hazard for limiting the jobs for the human resources. The human resource
should not be replaced by the automatic system because it can affect the mental health of
them. The loss of job is drastic scenario for the employees. Limited ICT technologies should
be used in the current working structure of the enterprise.
Reference:
Heater, B. (2017). The technology is killing jobs and only technology can save them. Tech
Crunch, [Online]pp.2-4. Available at https://techcrunch.com/2017/03/26/technology-is-
killing-jobs-and-only-technology-can-save-them/ [Accessed 23 Mar, 2018]
Week 8: Title: How to apply machine learning to the business problems
Summary
With the technological advancement, the most crucial question is the applicability of machine
learning to resolve the queries and complexity related to business problems. The article is
drawn to explore the initiative taken by the machine learning to apply the right approach for
the solution of business problems. There are various business problems which can be
resolved with the application of machine learning. It is difficult to write the program code for
the face detection system because there is a difference in the skin, colour, hair, angle of view,
Summary:
The innovation in the field of automation and the robotic system can create the problem of
job losses. The jobs of human are replaced by the working efficiency of the robots. This issue
should be taken under consideration because it can cause ill effects on the growing youth as
they are getting less opportunity to explore their talent and skills. The manufacturing jobs
created by the organization are totally lost due to the use of automation and robotic system in
the deployment of the manufacturing process. The working employees are not able to match
up with the accuracy provided by the ICT technologies. The feeling of depression and
demotivation brings inefficiency in their day to day working scenario. The innovation in
getting quality product will provide new opportunity to the trained people to give their best
for the betterment of the company (Heater, 2017). In the manufacturing industries, the work
of the employees are handed to the ICT technology. The monitoring and controlling jobs are
replaced by humans to the computer controlled program. These all scenario creates the
problem of Job losses from the working employees. The increasing innovation in the field of
ICT is the major hazard for limiting the jobs for the human resources. The human resource
should not be replaced by the automatic system because it can affect the mental health of
them. The loss of job is drastic scenario for the employees. Limited ICT technologies should
be used in the current working structure of the enterprise.
Reference:
Heater, B. (2017). The technology is killing jobs and only technology can save them. Tech
Crunch, [Online]pp.2-4. Available at https://techcrunch.com/2017/03/26/technology-is-
killing-jobs-and-only-technology-can-save-them/ [Accessed 23 Mar, 2018]
Week 8: Title: How to apply machine learning to the business problems
Summary
With the technological advancement, the most crucial question is the applicability of machine
learning to resolve the queries and complexity related to business problems. The article is
drawn to explore the initiative taken by the machine learning to apply the right approach for
the solution of business problems. There are various business problems which can be
resolved with the application of machine learning. It is difficult to write the program code for
the face detection system because there is a difference in the skin, colour, hair, angle of view,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

and etc. for every person. The algorithm can be developed for it which follows the concept of
machine learning. In the speech recognition system the concept of machine learning works on
the principle of identifying patterns for the conversion of speech into written text messages.
Real time bidding system depends on the matching of patterns for identifying the behaviour
of the user. The relationship between the advertisement and the user can be effectively done
through the concept of machine learning. The concept of machine learning plays a crucial
role in the development of the fraud detection system for the credit card purchase (Faggella,
2018). The filtering of the email spams can be effectively done with the concrete rules of
machine learning algorithm. The accumulation of the common signals is used for matching
the pattern of the new entrant which detects the occurrence of the fraud. The machine
learning helps in managing the accuracy and the confidentiality of the data. The machine
learning concept is the common solution to handle all the business problems effectively and
efficiently.
Reference:
Faggella, D. (2018). How to apply machine learning on business problems. Tech Emergence,
[Online]pp.2-4. Available at https://www.techemergence.com/how-to-apply-machine-
learning-to-business-problems/ [Accessed 23 Mar, 2018]
Week 9: Title: Why I am learning python in 2018
Summary
The popularity of the python programming language is growing at a very fast rate because it
fulfils the demand of various language single handed. 34% of the python user are increased in
the last decade. The stack overflow can be efficiently handled by the python because the
machine learning capability of this language is the main driver of popularity. The versatility
is the major factor of python popularity among the user. The data analysis can be effectively
done with the use of python. It is easy to learn that how to develop codes for achieving the
functionality of the program. Python is useful for the people who are from the non-technical
field. The growing rate of the hackers emphasis to develop the functional modules of the
organization with the use of python language (Strong, 2018). The database queries can be
machine learning. In the speech recognition system the concept of machine learning works on
the principle of identifying patterns for the conversion of speech into written text messages.
Real time bidding system depends on the matching of patterns for identifying the behaviour
of the user. The relationship between the advertisement and the user can be effectively done
through the concept of machine learning. The concept of machine learning plays a crucial
role in the development of the fraud detection system for the credit card purchase (Faggella,
2018). The filtering of the email spams can be effectively done with the concrete rules of
machine learning algorithm. The accumulation of the common signals is used for matching
the pattern of the new entrant which detects the occurrence of the fraud. The machine
learning helps in managing the accuracy and the confidentiality of the data. The machine
learning concept is the common solution to handle all the business problems effectively and
efficiently.
Reference:
Faggella, D. (2018). How to apply machine learning on business problems. Tech Emergence,
[Online]pp.2-4. Available at https://www.techemergence.com/how-to-apply-machine-
learning-to-business-problems/ [Accessed 23 Mar, 2018]
Week 9: Title: Why I am learning python in 2018
Summary
The popularity of the python programming language is growing at a very fast rate because it
fulfils the demand of various language single handed. 34% of the python user are increased in
the last decade. The stack overflow can be efficiently handled by the python because the
machine learning capability of this language is the main driver of popularity. The versatility
is the major factor of python popularity among the user. The data analysis can be effectively
done with the use of python. It is easy to learn that how to develop codes for achieving the
functionality of the program. Python is useful for the people who are from the non-technical
field. The growing rate of the hackers emphasis to develop the functional modules of the
organization with the use of python language (Strong, 2018). The database queries can be

easily handled with the use of this language. The beginners can efficiently learn to develop
the code of functional module with the use of python language and become the expert
programmer. The learning of the python language opens new opportunities for the beginners
to start their career field with it. The memory management can be effectively done in this
language. It is beautifully designed to resolve the issues of complexity which exist with the
programming languages to learn. The outputs are easily readable. It is capable of avoiding the
optimization in the non-critical part of the functional module. The syntax of the python
language are very simple to handle by the beginner to develop a working module of code
according to the requirement of the designer. The expression can be easily read by the user.
Duck typing is used by the python to eliminate compilation time of the program.
Reference:
Strong, A. (2018). Why I am learning python in 2018. Code academy, [Online]pp.2-4.
Available at http://news.codecademy.com/why-learn-python/ [Accessed 23 Mar, 2018]
Week 10: Title: The bots are changing politics
Summary:
Various news comes into existence that bots have threatened the activists during the time of
election. Bots are the software which are developed to imitate like the behaviour of the
humans. The bots can provide chatting facility at the customer care centre. The political bots
are developed to post several messages on the social media pages of the politics like
Facebook, twitter, Instagram to spread fake messages and spread rumours for popularity or
harming the image and reputation of the other politicians. The difference in the post of bots
and human can be recognised by measuring the followers of it. The messages posted through
bots can acquire hundreds or more followers and viewers in a day which is not in the case of
messages posted by the humans. The bots are designed with the particular mission and
objective. The bots can dominate the public opinion for making effective communication and
circulation of the rumours. The bots are programmed for exploring the real identity
equivalent to the real users. The communication can be arranged with millions of follower
the code of functional module with the use of python language and become the expert
programmer. The learning of the python language opens new opportunities for the beginners
to start their career field with it. The memory management can be effectively done in this
language. It is beautifully designed to resolve the issues of complexity which exist with the
programming languages to learn. The outputs are easily readable. It is capable of avoiding the
optimization in the non-critical part of the functional module. The syntax of the python
language are very simple to handle by the beginner to develop a working module of code
according to the requirement of the designer. The expression can be easily read by the user.
Duck typing is used by the python to eliminate compilation time of the program.
Reference:
Strong, A. (2018). Why I am learning python in 2018. Code academy, [Online]pp.2-4.
Available at http://news.codecademy.com/why-learn-python/ [Accessed 23 Mar, 2018]
Week 10: Title: The bots are changing politics
Summary:
Various news comes into existence that bots have threatened the activists during the time of
election. Bots are the software which are developed to imitate like the behaviour of the
humans. The bots can provide chatting facility at the customer care centre. The political bots
are developed to post several messages on the social media pages of the politics like
Facebook, twitter, Instagram to spread fake messages and spread rumours for popularity or
harming the image and reputation of the other politicians. The difference in the post of bots
and human can be recognised by measuring the followers of it. The messages posted through
bots can acquire hundreds or more followers and viewers in a day which is not in the case of
messages posted by the humans. The bots are designed with the particular mission and
objective. The bots can dominate the public opinion for making effective communication and
circulation of the rumours. The bots are programmed for exploring the real identity
equivalent to the real users. The communication can be arranged with millions of follower
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

with the use of bots at a time (DiResta, 2017). The political bots are developed for creating
the illusion of human for doing voting to the correspondent participant. The fake accounts of
the users are known as Personas or sock-puppets. The complex strategy can be driven during
the election time with the use of bot software. Sometimes the fake contents are unwillingly
posted through the use of bot account. The bots are capable of producing misinformation,
fake news, and rumours to post negative comments on the social media platform. They are
developed with the intention to initiate the conversation with the sock puppets, for amplifying
the fake news on the social media, and fake conversation.
Reference:
DiResta, R. (2017). The bots that are changing politics. Botty Politic, [Online]pp.2-4.
Available at https://motherboard.vice.com/en_us/article/mb37k4/twitter-facebook-google-
bots-misinformation-changing-politics [Accessed 23 Mar, 2018]
the illusion of human for doing voting to the correspondent participant. The fake accounts of
the users are known as Personas or sock-puppets. The complex strategy can be driven during
the election time with the use of bot software. Sometimes the fake contents are unwillingly
posted through the use of bot account. The bots are capable of producing misinformation,
fake news, and rumours to post negative comments on the social media platform. They are
developed with the intention to initiate the conversation with the sock puppets, for amplifying
the fake news on the social media, and fake conversation.
Reference:
DiResta, R. (2017). The bots that are changing politics. Botty Politic, [Online]pp.2-4.
Available at https://motherboard.vice.com/en_us/article/mb37k4/twitter-facebook-google-
bots-misinformation-changing-politics [Accessed 23 Mar, 2018]
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.