Modern CPU Flaws and Mitigating Techniques
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Week 1
The text discusses how modern CPUs function. Recently a critical flaw in microprocessor design has been discovered that allows two extremely serious security exploits: Spectre and Meltdown. Find and summarise ONE resource that describes how either of these exploits work. The resource (and your summary) should focus on what is occurring in the CPU that allows these exploits to occur.
Week 2
Prior to 1985, there were very few Operating Systems (OSes) that used Graphical User Interfaces (GUIs). Find and summarise ONE resource that describes ONE of these GUI operating systems. The OS must have been release prior to 1985 so cannot be Microsoft Windows.
Week 3
Low-Powered Wide-Area Networks (LPWANs) are wireless communication networks that are characterised by linking devices over large distances. Devices (including simple sensors) typically can only communicate at very low bit rates, however, the communication and associated electronics consume very little power. As such, LPWAN devices can be battery powered and operate independently for many months or even years. Find and summarise ONE resource that describes ONE platform or technology that implements a LPWAN.
Week 4
Voice over IP (VoIP) is a group of hardware and software technologies that allow users to communicate via voice and video over the Internet. VoIP uses a number of different software protocols, depending on the application. Find and summarise ONE resource that describes ONE of these VoIP protocols.
Week 5
One of the many uses of cryptography has been the development of the blockchain. Blockchains are commonly used as the basis for maintaining the data integrity of crypto currencies, though have many, many more applications. Find and summarise ONE resource that describes how blockchains work. Note that the resource should focus on the blockchain mechanism, NOT crypto currencies.
Week 6
One controversial practical application of network traffic management is in the contravention of the principle of “net neutrality”. Find and summarise ONE resource that describes what net neutrality is and how its contravention could impact on individual and business users of the Internet.
Week 7
Information Systems have led to greater and greater degrees of automation in the workplace. There is currently extensive speculation on which jobs will cease to be performed by humans in the near future. Find and summarise ONE resource that discusses jobs that are likely to not exist in the future due to ICT based automation. Note that the resource must clearly link the loss of the job(s) to advances in ICT.
Week 8
With the advent of mass data collection and storage has come the use of these datasets for machine learning. Find and summarise ONE resource that describes what machine learning is and how it is being used.
Week 9
Critical to application development are the languages used to implement the specifications. Find and summarise ONE resource that describes ONE programming language that has been developed since 2008. The resource (and your summary) should include information on the principle uses and features of the language.
Week 10
While information systems and technology deliver many benefits to society, they can also result in negative effects and outcomes. One recent controversy, the propagation of fake news and its influence on elections, has been linked to a type of software called a “bot”. Find and summarise ONE resource that describes what bots are and how they can be used for disseminating misinformation and affecting human behaviour.
1. Summary:
This paper focuses on the critical flaw in the microprocessor design in CPU. This paper discusses about the spectre and meltdown attacks in the CPU. These attacks create serious threat for the CPU function. At a high level, Spectre attacks trick processor into speculatively executing instructions sequences that should not have executed during correct program execution. Meltdown attacks exploits out-of-order execution in order to leak the target primary memory. However, meltdown attack does not uses branch prediction for achieving speculative execution. A fundamental security assumption underpinning all of these in which the CPU will faithfully execute software, including its safety checks (Kocher et al. 2018). Speculative execution unfortunately violates this assumption in ways that allow adversaries to violate the secrecy of memory and register contents. This paper has been focusing in the mitigating technique form these risks and threats to the CPU operation functions. The feasibility of exploitation helps on depending on a number of factors including the software and hardware systems of the PC. Various mitigating strategies have been provided in the paper. Fuzzing tools are used for mitigating these threats and issues in the CPU operations. The microprocessor design needs to be revised according to the need of the users.
2. Summary:
This paper describes about the Xerox Star operating system that uses graphical user interface that was released in 1981. The Xerox Star has been a significant for increasing the demand of IT industry in the market. Star was introduced in 1981 with its bitmapped screen, mouse driven interface and clearly distinguished from other computers. The GUI has helped in maintaining a proper look to the computer screen. Users can focus on their work and use various software on their PC. The applications installed in the Xerox operating system is visible to the users that helped in gaining the interest of users for using their PC (Johnson et al. 1989). The Star features were focusing in the low level architectural view of users in the market. The OS has been able to fulfil the demands of the customers at that time in the market. The operation system include the distributed personal computing technique. This paper has described about the distributed personal computing. This operating system depends on the direct manipulation of the data objects in the discrete functions of operating system.
3. Summary:
This paper descries about the application of Low power wide area communication in the IoT connectivity technology. This technology has been helping in minimizing the issues of the mesh network of wires and cables for connecting various computers and devices. In recent days, low power wide area technologies have been available for the kilometre wide communication. However, there is a lack of understanding about the behaviour of such technologies under real conditions. The LPWA technologies have been an emerging technologies that has been included in new physical layer communications capable of leveraging trade-off between range and data-types. City sensing communication require low-cost materials and low-powered sensing nodes. LPWA technologies helps in providing guidelines for the urban IoT developer (Kartakis et al. 2016). The use of the IoT applications have been maintaining the services provided to the customers in the market. The use of this technology has helped in maintaining a clear and concise communication in the computer devices. This paper describes about the implementation of the LPWA in the communication sector for interconnecting into a network. This paper has been based in initial experiments performed during designing a real world sensing solution with several LPWA modules. The real development of the technology has been depicted in the paper.
Xerox Star Operating System Released Prior to 1985
4. Summary:
This paper deals with the development of the telecommunication in the European market. This paper explores about the access substitution of mobile calls and communication. The use of the voice over IP has been helping in providing a clear voice Call over the internet. This technology also support the video conferencing along with voice calls over large distances. There has been recent developments in the EU communication market due to the implementation of the voice over IP. The challenges in the mobile telecommunication have been described in the paper. This paper discusses about the vulnerability issues in the mobile communication methods. This paper focuses on the implementation of the voice over the IP in the European commission system. An empirical strategy has been used in order to complete the research in this paper (Lange, M.R. and Saric 2016). The use of the voice over IP has been heeling in imagining the conversation and communication of the users with the systems in the European commission. The use of this technology in the system might he in enhancing the voice and video calls over the internet. It also helps in increasing the privacy of the chat and video calls among users.
5. Summary:
This report discusses about the benefits and challenges of the blockchain technology in the market. The use of the blockchain technology have been helping in maintaining the transfer of digital mete and transaction all over the world. The use of the block chain technology have been minimizing the challenges in transferring digital accounts and documents between parties. The cryptography technology has been used in the block chain. The digital documents are properly encrypted to end=sure the security of the data and information of company. This paper has discussed about the architecture of the blockchain in order to understand the phenomenon if the blockchain in the market. Different components of the blockchain has been providing in the paper (Zheng et al. 2016). The challenges to the blockchain technology in the market has been discusses in the report. This technology has been creating various security issues in the marmite related to the financial transfer pf documents in the market. There are no third party between the transactions. Therefore, there in track of the transaction dine between parties. The zero involvement of the third party helps in reducing the extra cost of the transferring the money. Various security algorithms have been discuss3d in this report including the RSA algorithm that might help in mitigating the security issues in the block chain technology.
Low Power Wide Area Communication (LPWAN) Technology
6. Summary:
This paper discusses about net neutrality principle on the internet that needs to be treated equally in their delivery process without any discrimination and charges in the content source. The internet traffic management is n topic fir the research as the traffic over the websites has been increased. This have been causing server jamming problem in the organization (Choi,, Jeon. and Kim 2018). This paper have developed a theoretical model that might help in analysing the effect of net neutrality regulation on innovation incentives of major content providers. The ISP investment in the internet traffic management has been maintained by the system. The use of the net neutrality helps in maintaining the network congestion and QoS improvement.
7. Summary:
This paper describes about implementation of the ICT in the workplace that has been resulting in reduction in number of jobs. This paper focuses on the job automatibility of jobs of 21 OECD countries. The use of the ICT robots and automation have helped in minimizing the human power in the organization. However, this has been creating issues in minimizing number of jobs in the workplace. Various types of the jibs have been endangered due to the implementation of the ICT automation at workplace (Arntz, M., Gregory and Zierahn 2016). The job of accountant and receptionist are major endangered jobs in the market due to the automation and digitalization. Automatic calculation of bills can be done with the help of proper arithmetic logic unit in automation. The use of ICT devices and systems at workplace have been maintaining the security if the data and information.
8. Summary:
This paper focuses on the concept o the machine learning and its application sin various phases of matter. Neural networks can be used to identify phases and phase transitions in condensed matter systems via supervised machine learning. This paper focuses on the complexity of the size of classical and quantum state space which grows exponentially. The machine learning community has developed a number of techniques with remarkable abilities to recognize, classify, and characterize complex sets of data (Carrasquilla and Melko 2017). This paper focuses on various models in the machine learning. The toy model has been described in the report that helps in implementation of the machine learning in different concepts of matter.
9. Summary:
This paper describes about the programming language named as Nim programing, that is a multi-programing language. ). It also supports compile time programming features like macros and writing certain number reviews for rewiring macros. Nim comes up with automation garbage collection which is totally based on reference counting and detection of large number of cycles. Compiler of Nim generally emits certain number of C codes and easily defer compiling to some of the external compilers. Various kinds of compilers can easily emit optimized codes and can refer to various kinds of compilers. The various kinds of core developer come up with idea of writing certain number of codes which are productive in nature (Pedersen and Quinlan 2018). This paper describes about various compilers and optimized codes that can be referred to various compilers. It comes up with various programing language including JavaScript and python.
10. Summary:
This paper describes about the online human bots over the internet. This paper focuses on the social media and its powerful tolls for detecting the human bits over the internet. This paper has help in proposing a bot detection framework for detecting the bits in the internet. The human bots can steal all the details from a user by behaving like a human over the internet. The evaluation of model has been provided in the paper (Varol et al. 2017). The network features of the framework has been discussed in the paper. The use of the bit evaluation technique for detecting bots over the internet has been provided in the paper.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Summaries Of IT Industry Essay Topics.. Retrieved from https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/spectre-and-meltdown.html.
"Summaries Of IT Industry Essay Topics.." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/spectre-and-meltdown.html.
My Assignment Help (2020) Summaries Of IT Industry Essay Topics. [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/spectre-and-meltdown.html
[Accessed 21 November 2024].
My Assignment Help. 'Summaries Of IT Industry Essay Topics.' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/spectre-and-meltdown.html> accessed 21 November 2024.
My Assignment Help. Summaries Of IT Industry Essay Topics. [Internet]. My Assignment Help. 2020 [cited 21 November 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20246-ict-services-management/spectre-and-meltdown.html.