Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
Week 1

The text discusses the elements of modern computing architecture however is largely silent on the individuals who played a role in its development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the development of computers and/or components of modern computing architecture.

The limits of Quantum which is written by Scott Aaronson talks about the quantum computers that are an exceptional when it comes to efficiency when performing various tasks. This emerging technology may lead to new fundamental physical principles. This topic of quantum computing has been the emerging and widely talked topic in 21st Century. In quantum computing there is use of the computational process that utilizes the quantum mechanical concepts that is totally new comparison to what is used in the digital computer.

I have selected this resource article since it offers completely new concepts and there has been development in the quantum computing field especially in the Architecture part and the link associated to the other computing technologies. Additionally, this subject would offer insight on the security aspects and the future development in the Quantum computer subject.

The main information that has been covered in this resource is the quantum computer systems that seeks to take advantage of the strange rules of the quantum regulations when it comes to processing of the data in numerous ways in which are not possible to the basic standard computers. Furthermore, this resource emphasizes on how exactly numerous problems could be solves such as factoring the integers.   The resource in addition has covered on data for the analysis on the quantum computers which surpasses the conventional computers.

The article has been very useful particularly to me since I will be able to know the exotic alteration especially in the laws of physics that are useful especially in construction of the quantum computers.

The text discusses the components and activities of operating systems however is largely silent on the individuals who played a role in their development.  Find and summarise a resource that describes ONE such individual.  The individual should have had a significant influence on the writing or development of operating systems.

The individual who has written on this article is James Mackinnon. The article is regarding the Linux operating system. The resources is focused on the Linux distribution for Debian GNU. This distribution involves the following; the flash, Java in addition to a few of the widely used without any cost closed source software. In the article it clearly expound on the open source software as well as the program where the source code is free particularly from the internet.  The concentrate of the article is on Debian since it comes with some very useful packages as comparison to the other distributions of the Linux. It has been found that this distribution is very suitable especially for the econometricians. It is non-commercial and there are very many volunteer across the globe who are involved in maintain it.

Week 2

The purpose as to why I selected this distribution is because of the fact that it is not for commercial purpose and it is one of the most familiar compared to the other kind. Additionally, one is able to understand this distribution much easier since there are many individuals who are solely devoted to make it easier.

The main point which are highlighted in this resource are on the features as well as the merit of the distribution. One of the merit is that it can be much easier to install Debian GNU especially when the hardware has been obviously identified which is well supported. A few of the further merits are the distribution is significantly stable and one is able to multitask. In the article it highlight various advantages as well as the features of the distribution. Moreover, there is also the concepts on the applicability of this distribution particularly to the econometric as well as the software for statistics.

This resource has been useful since it has provide an insight on the different types of features and merits of the Debian GNU distribution. Being a learner am able to understand the different types of distribution particularly in the Linux operating system.

The Internet didn’t just appear – it was an evolution from earlier networks. Find and summarise a resource that describes ONE of the networks that led to the development of the modern Internet.

This resource which I looked at highlights about the virtualization hypervisor software to the various forms. The article has provided insights on differences between the hosted and the bare-metal virtualization hypervisor that has various uses.

The reason as to why I choose this article is that it offers information in regards to the concept of virtualization. It has provided various features along with the advantage on the use of this form two of the virtualization item. This resource assist one in comprehending the variations that happen between the hosted and the bare-metal virtualization hypervisor additionally, from the resource it is possible to understand the best use of each virtualization software, its costs and the features. The resource has also offered the major virtualization vendors as well as the advantages and disadvantages of each to permit one consider diverse features for the hosted virtualization before one takes a decision.

The major key information that are discussed on the resource article is how an individual could choose virtualization on things to consider for example the cost, characteristics as well as the merit of each of them.

Week 3

This resource has been very helpful especially in the provision of an awareness on the kind of two virtualization software program on the market. Furthermore, it has aided me to identify the ideal choice of the virtualization depending on components for example the characteristics, advantages as well as the costs.

Ethernet is an example of a Layer Two (L2) data link protocol that is discussed in the text.  Find and summarise a resource that describes the features and uses of ONE other L2 protocol that is not discussed in the text (i.e. NOT Ethernet).

This resource article task highlights on the TPA transport protocol application for what is regarded as the Ad hoc Networks. The author resource highlights on the TPA that was adapted, for the sole attribute on the MANET environment. Such kind of protocol is only found to the complete new congestion control approach that is created in approach to reduce on the variety of ineffective transmission thus there would be certainly power consumption. This article has elaborated on the congestion control method to be able to reduce variety for inefficiency transmission thus there is certainly consumption of power. This article has elaborated on the concept of TPA protocol when it comes to the static scenario that TCP highlights on the sound efficiency. When it comes to the stimulation performance it highlights that even just situation the TPA outperforms on TCP. Moreover, it is evidence that the research has majorly focused on the transport protocol on its customization particularly on the MANET environment that provides dependable especially in well-connected oriented kind of route changes that may arise as a result of the mobility of the nodes.

I have selected this resource because of the fact that it is possible to learn the solutions for the poor performance when it comes to aspect such as the mobile Ad hoc networks while using TCP control. This research offer alternatives to solving issues and enhancement of the performances to the protocol as regards to dependence of TCP. The use of the TPA protocol provides solutions especially on the issue of congestion in the redesign of control mechanism hence implementation retransmissions, which are useful in the conversing of the power.

The main key information would be to examine how the TPA protocol is helpful especially in solving of the problems for the poor efficiency particularly in the mobile Ad Hoc Networks. This resource provides majorly specializes in the TPA performance assessment by means of the provision of connection that could be dependably oriented type of the service compared to the other layer protocol.

Week 4

The resource continues to be very useful as I have learnt how you can improve on the poor performance that are exhibited in the mobile Ad Hoc Networks. Additionally, one is able to learn about the other kind of protocol apart from the major known one UDP or TCP.

The text mentions the role of hackers in attacks on networked infrastructure.  Find and summarise a resource that describes ONE famous or well-known hacker.

This resource is about how the hackers breached into the government asset on Philippines Commission on Elections and stole personal information, which included the fingerprint data as well as the passport data that belonged to over seventy million individuals. This was the worst data leak that happened in 2016, the hackers responsible for this are called Anonymous Philippines and Lulsec. The article highlights further that the entire database of 340 GB of the Comelec was linked online.

I have selected this resource article since it offers insights when it comes to the issue of the cyber security threats particularly to the state department. These hackers compromised the data of the Philippines commission on the elections.

The main key information on the resource was the aspect of the cyber security attack in the Philippines commission on the elections and the responsible individuals for the attack were Anonymous Philippines and Lulsec.

The resource is useful since one is able to learn scenarios on how the breach of system occurs as well as approaches to be able to keep the system secure via the encryption mechanism or perhaps other security measures to keep the asset more secure from the vulnerability that could be exploited by these individuals.

Society is increasingly reliant on networks and network technologies but they are evolving at a rapid pace.  Find and summarise a resource that describes ONE example of a future networking technology or trend that will impact society.

This resource article is about how fire left the Australian superannuation provider UniSuper in accessing their accounts after at Port Melbourne data center. This fire triggered partial system to shut down. There was a number of their systems and the services were impacted. This organization offer superannuation services to more than four hundred thousand workers of the Australia higher education as well as the research sector which has more than 56.8 billion Australian dollars in terms of assets.

This resource article has been selected since it highlights how numerous incidences have happened in the information centers where there volume of data that are lost as a result of the fire. The data which is provided in this resource also highlights on how fire and the catastrophic impacts it could do particularly for the vital government services might bring down the centers of the data.

The main key point that have been highlighted in the resource is that Australian provider UniSuper were left in accessing their accounts after there was the incident of fire from compromising on their ICT infrastructure. This event caused this crucial limited to the outage of the telephony system and the member online portal from being affected.

The resource has been useful since it give one to think about the big question over the safety of the data. Moreover, it provides insight on ways to prevent data from being affected from similar incident such as minimizing the data center from impact of fire with the suppression systems.

The text mentions social business and the impact of the use of social networking platforms.  Find and summarise a resource that describes the history of the development of ONE such social media platform.

The resource article is about crowding in the NATO organization. In the article it highlights that crowdsourcing has been new and very powerful way when it comes to utilizing of the social media to be able to solve problems. This article is all about the NATO organization that utilizes the crowdsourcing technologies. It highlights how they are using such technology especially to their politico-military activities. Based on the views of the author, he believes that the use of such technology could be applied to many of the business with the sole purpose of solving various problems. The use of the crowdsourcing technology enable increase on the forces of the connectivity and the member resource.

I have selected on this resource article since it highlights on how to adopt to the crowdsourcing technologies particularly to the connectivity of individuals as well as solving of the problems. The focus is to why organization needs to adopt on crowd sourcing technologies as well as the benefits to the firms.

This resource has proved to be very useful as the information it offers the benefits which are associated to the crowdsourcing technology particularly on the social networking. The usage of this technological know-how permit the business to have the ability to coordinate on the human endeavour, that help in the social interaction in addition to empower on the creativity together with dealing with the problem that are prospective issues in the business .

This resource highlights on how exactly the transformational power tool for example the in the domain of selection of the action in addition to the content creation.

With the advent of mass data collection and storage has come data mining. Find and summarise a resource that describes ONE example where data mining has been used successfully by a business.  You should not use any examples covered in the textbook.

The resource is about the massive data theft for the Wonga organization in which could have hit as many as two hundred and forty five thousand customers that included the account numbers as well as the sort codes.

The information which was stolen was the customer account numbers as well as the sort codes. According to Wonga they believed that the full names, the email addresses as well as the phone numbers along with four digits of their debit card was also stolen.

I have selected this resource due to the fact that this is a big issue especially in the business today. This highlights how the breach of the data took place in the Wong organization. The data of the client was breached and some usually information was stolen.

The key aspect of this resource article has been the compromise of the customer data which has caused negative effects particularly to the brand of the organization. Moreover, in this organization has highlighted that their obligation has been to protect the information of the customer and they are working with the security organization and the law enforcement to be able to determine on the level of the damage that was caused and how they could resolve it to prevent similar situation in future.

This resource has proved to be very useful since I have been able to learn various ways that the company could their data safe and the appropriate approaches that exists to prevent the occurrence of such events.

One of the greatest success stories in application development in recent times has been the popularity of mobile apps.  Find and summarise a resource that describes the story of ONE successful mobile app developer.

The resource is about the strategic failure of Kodak to adapt to the technology lead to the downfall of the company. This was the cause of the Kodak decade long decline to the digital photography which destroyed on their business model. In this resource it highlights how the management of Kodak was unable to see the digital photography as the disruptive technology, and they failed in adapting to the established business model with the use of the digital photography which had potential capability.

I have chosen this resource to provide an insight on the importance of adapting to changes in new innovation especially to the disruptive technology. The organization should adapt to the changes in technology especially in this era where there has been revolution of the technology in every sector.

The main key ideas of the resource is about how the new technology (disruptive) can impact an organization either positively or negatively. Kodak organization failed in taking decisive action to be able to combat on the challenges in the business through adapting to the digital photograph technology.  The organization did little in preparing for the later disruption. They did not prioritize their problem towards turning them to opportunities for the advancement of the technology rather than the founder George Eastman, investing in color film rather than the digital photography.

This resource is useful since it offers some insights on the use of poor strategies particularly in the digital era might impact on the business in negative way. The organization lack of adapting to this new technology lead to its long decline downfall.

While information systems and technology deliver many benefits to society, they can also result in (sometimes inadvertent) negative effects and outcomes.  Find and summarise a resource that describes ONE example of where the use of an information system or technology has led to negative consequences for humans.

The resource is about Myki project which involved the Victorian transport Ticketing Authority which they intended to replace the Melbourne existing ticketing system with the use off the smartcard system that would enable the passengers to touch on and off to all the trams, trains as well as in the buses through the transport grid in Metropolitan. The project was a failure as it suffered various issues from initial beginning since the assembled TTA members they lacked sufficient skills when it came to dealing with the important ICT project as they lacked detailed knowledge of the transport ticketing environment.

I have chosen this resource since it provide insights as to why the complex big ICT project fail. In this case the failure was because of lack of the TTA members lacked skills to deal with the project. There was also the issue of unnecessary complexities of the contract as the TTA as well as the selected vendor negotiated on the outcomes that entailed on the documentation exchanged between the parties via al the process of tendering.

The major key point on this resource is it offers some insight on why major ICT project fails such as this case of Myki system which failed and it cost significant amount of money which was above the previous projected cost.

This resource article highlights how the big and complex ICT project such as Myki failed as a result of lack of expertise of TTA members in dealing with major project. From the resource I have learnt that any slight failure of a single component of a major project could lead to the entire failure or delay in the project completion.

References

Aaronson, S., 2008. The limits of quantum computers. Scientific American, 298(3), pp.62-69. Accessed At: https://www.cs.virginia.edu/~robins/The_Limits_of_Quantum_Computers.pdf

MacKinnon, J.G., 1999. V_sX, t'AI. J. Appl. Econ, 14, pp.443-452. Accessed At: https://qed.econ.queensu.ca/pub/faculty/mackinnon/papers/linux-review.pdf

Gordon, A., Amit, N., Har'El, N., Ben-Yehuda, M., Landau, A., Schuster, A., & Tsafrir, D. (2012). ELI: bare-metal performance for I/O virtualization. ACM SIGPLAN Notices, 47(4), 411-422. Accessed At: https://hypervisorconsulting.com/pubs/eli/eli.pdf

Anastasi, G., Ancillotti, E., Conti, M. and Passarella, A., 2005, June. TPA: a transport protocol for ad hoc networks. In Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on (pp. 51-56). IEEE. Accessed At: https://cnd.iit.cnr.it/andrea/docs/iscc05.pdf

Leisha (2016), ‘Philippines elections hack leaks voter data’. Accessed At: https://www.bbc.com/news/technology-36013713

Sebastian M., 2017. Australian data center fire knocks out unisuper. Accessed At: https://www.datacenterdynamics.com/content-tracks/security-risk/australian-data-center-fire-knocks-out-unisuper/98300.fullarticle

Negoitescu, D., and Blaydes, M., 2014. Crowdsourcing solution is Nato Ready? The Three Swords Magazine. Accessed At: https://www.jwc.nato.int/images/stories/threeswords/crowdsourcing.pdf

James T., (2017). Wonga hack: How to know if you are affected and what to do about it. Accessed At: https://www.telegraph.co.uk/technology/2017/04/10/wonga-hack-know-affected-do/

Mui C., 2012. How Kodak failed. Accessed At: https://www.forbes.com/sites/chunkamui/2012/01/18/how-kodak-failed/

Alex. W., and Matt. J., 2015. Myki ticketing system failure revealed in leaked business case. Accessed At: https://www.heraldsun.com.au/news/victoria/myki-ticketing-system-failures-revealed-in-leaked-business-case/news-story/b114ea522aa55a4fe8f39190690bb557

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Elements Of Modern Computing Architecture, Quantum Computing, And Linux Essay.. Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/crowdsourcing-in-nato-organization-file-A97A8B.html.

"Elements Of Modern Computing Architecture, Quantum Computing, And Linux Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/crowdsourcing-in-nato-organization-file-A97A8B.html.

My Assignment Help (2022) Elements Of Modern Computing Architecture, Quantum Computing, And Linux Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/crowdsourcing-in-nato-organization-file-A97A8B.html
[Accessed 16 July 2024].

My Assignment Help. 'Elements Of Modern Computing Architecture, Quantum Computing, And Linux Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/crowdsourcing-in-nato-organization-file-A97A8B.html> accessed 16 July 2024.

My Assignment Help. Elements Of Modern Computing Architecture, Quantum Computing, And Linux Essay. [Internet]. My Assignment Help. 2022 [cited 16 July 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/crowdsourcing-in-nato-organization-file-A97A8B.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close