Each resource summary is a maximum of 300 words
Significant advances in very large-scale integration (VLSI) circuit technologies have enabled the implementation of complete computing systems on a single chip. Find and summarise ONE resource (within the last two years) that describes the use of VLSI technology.
Title and Reference:
VLSI: Development and Basic Principles of IC Fabrication. Electronics For You 2019, online, VLSI: Development and Basic Principles of IC Fabrication
The article describes the advancement of VLSI technology, its advantages, design and the basic principles of IC Manufacturing. The main reason I choose this article because this article consists of a brief discussion of VLSI chip design which keep on decrease in its size but increase in its properties along with the describes of its advantages and problems occurs.
In the article, the author describes how Very-large-scale Integration (VLSI) is implemented in the current time. And also, many IC’s had minimal functionality before VLSI. The early digital circuits which contained tens of transistors providing few logic gates and early ICs had as low as two transistors. Since that time the number of transistors in an IC has dramatically increased. There are various advantages of VLSI like size, cost, and consumption of power which decrease rapidly.
Articles also explains performance, functionality, physical dimensions, and manufacturing technology and design techniques are important problem parameters. Finally articles describes about how VLSI are cut into small size and how only good chips are packaged and rechecked after packaging. However, once a netlist is in position, it can be replicated with a front end design omission.
I found this resource useful because this resource not only talks about how VLSI was developed and change according to time but also it explains about it’s different advantages along with its problem, design, assembling and packing of VLSI too.
Real-time operating systems are computer systems that guarantee a certain capability within a specified time constraint. Find and summarise ONE resource that describes the benefits of real-time operating systems for the telecommunication industry
The Role of the Realtime Operating System (RTOS) in Mobile, Qualcomm Developer Network. Mistry, R 2019, online, The Role of the Realtime Operating System (RTOS) in Mobile, Qualcomm Developer Network.
This article describes specifically about what is a real time operating system (RTOS) and why embedded system and mobile developers care about it. I selected this article because it explains the importance of RTOS comparing it with general purpose operating system (GPOS). This article also includes RTOS classification, and it meeting deadlines along with QuRT™ Software’s outline.
In this article, the author describes both RTOS and GPOS where he usually says that RTOS is light weight and smaller in size compared to a GPOS and usually offers only the features needed to run different types of applications on specific hardware. Like a GPOS, a RTOS offers some or all of the basic functionality then you would expect from an operating system. However, an RTOS seeks to provide this functionality in a way that is compatible with the underlying system’s time-constrained requirements and aim. GPOS scheduling is also conducted in a manner that usually achieves a high performance resulting in delayed tasks conducting a high priority operation. An RTOS efficiency, however, it is judged on how quickly or predictably it can react, rather than how much it can do.
Another most interesting part is author explaining Qualcomm Technologies processors which have their own embedded RTOS called QuRT. It can globally schedule the highest priority running programed threads, and directs the identification and reset device failures to interrupt the thread of the lowest-priority hardware. In addition, the main aim of the papers is to provide facilities for time-constrained applications to be carried out in a certain period of time while the delays occur. I found this article useful because it not only highlighted the benefits of real-time operating systems in mobile but also compare and describe both RTOS and GPOS use.
The Cloud of Things combines cloud computing and the Internet of Things (IoT). It unifies the breadth and reaches of IoT with the vast compute and storage capabilities of the cloud. Find and summarise ONE resource that describes the security challenges in adopting this technology.
IoT Security Challenges With Data and the Cloud. Carr, R 2020, online, IoT Security Challenges With Data and the Cloud, Zettaset.
This blog talks about the biggest challenges to IoT security and how you can use encryption to overcome them. I chose this article because it not only discusses new security concerns with more data to collect and analyze or discusses security gaps, but also it highlights how we can work with encryption to resolve them.
In the article, the author says that IoT adoption continues to rise, and also raises new security concerns. For more data to gather and analyze, there is a greater probability that something will go wrong. Any increasing number of IoT devices also means the setting of more targets for hackers. However, customers are also at risk of internet-connected household appliances. Another security concern with IoT is the hubs for multiple IoT devices which are integration points. If IoT hubs are not protected then vulnerabilities will be automatically exposed to other users.
Items including CCTV security cameras and baby monitors, which often ship without built-in protection. For millions of self-driving cars expected to join the IoT by 2020, patching and updating of security software will become an even bigger concern. This is generally because manufacturer’s priorities cost savings over security. Each device is different, meaning that not every system will have the same IoT data encryption solution to operate. Best IoT data security practices are encryption technologies that adjust based on the type of environment they encrypt should be used. I found this article useful because it not only highlighted the different kind of risk while using cloud in devices but also describe how we can solve the problem using encryption
Ethernet is a layer 2 protocol that defines wiring and signaling standards for the physical layer of TCP/IP. Find and summarise ONE resource (within the last two years) that describes the uses of ONE other layer 2 protocol that is not discussed in the textbook.
What is address resolution protocol (ARP) and how does it work? Rouse, M 2019, online, What is address resolution protocol (ARP) and how does it work? Definition from WhatIs.com, SearchNetworking.
This article explains the details of Address Resolution Protocol (ARP) in the present time. I chose this article because it not only describes about ARP but also explains its works, transfer of packets and its background history.
The author describes ARP as a method for mapping the Internet Protocol (IP) address to a permanent physical machine address within a local area network (LAN) in the article. Essentially the ARP job is to translate 32-bit addresses into 48-bit and vice versa. ARP can also be used for IP over other LAN systems such as fibre-distributed data interfaces, token rings and IP over ATM. When a new device joins a LAN a different IP address is assigned. When an incoming packet enters a gateway on a particular LAN intended for a host computer, it asks the ARP to find an MAC address. A table called the ARP cache holds each IP address record and its corresponding MAC address record. Here, ARP cache size is limited so all entries are periodically cleaned to free up space. As for proxy ARP, it enables the successful transfer of packets from one sub-network to another. Every LAN using ARP must be careful of ARP spoofing since it can have severe effects on companies. Even though, ARP was first proposed and discussed in 1982 it now also one of the preferred LAN technology. I found this article useful because it not only highlighted the detail explanation of ARP but also explains about its work, how it transfer packets, how it deals with IP and MAC address, along with its background history and future
Organisations are now implementing the next-generation firewalls that go far beyond the traditional stateful packet inspection firewalls. Find and summarise ONE resource that describes at least three advantages of the next-generation firewalls over the traditional stateful packet inspection firewalls.
5 Benefits of Next-Generation Firewalls. Network Computing 2017.
This article describes the introduction of next-generation firewalls (NGFWs) in the current situation. I chose this article because it not only discusses NGFWs with advanced technologies that provide greater inspection capabilities and better monitoring of individual applications in a network but also identifies advantages over traditional firewalls.
First of all, this article describes the complexity of modern cyber-attacks and modern hacking methodologies that push organizations to search for next-level firewalls for increased security. It is also mention that the standard firewalls only followed network protocols, and were not smart enough to differentiate web traffic of different kinds. This led to the development of advanced technology next-generation firewalls that offered better control of a network’s individual apps, and deeper inspection.
Secondly, different advantages of NGFWs were describe in this articles. One of the benefits is multi-functional if it provides the interface that helps to perform deeper inspection and enhance the filtering up to the application layer of network traffic with packet information. Another advantage describe about Application awareness were article says user understanding also allows businesses to set policy based on the customer and user. In third advantage article describe about Streamlined infrastructure which reducing infrastructural complexities. Fourth advantage include Threat protection where new threats are detected and NGFWs provide antivirus and malware protection that is constantly updated automatically. Finally, the article describes the advantages of network speed, where the next-gen firewall capacity remains exactly the same regardless of the number of protective services available. I found this article useful as it not only illustrated the next-generation firewalls but also identified their advantages by comparing each advantage to traditional firewalls
Internet of Things (IoT) is designed to enable advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies to a shared pool of configurable computing resources. Find and summarise ONE resource (within the last five years) that explains the importance of quality of service (QoS) metrics in IoT.
Internet of Things MQTT Quality of Service Levels. Peeples, K 2015.
This article describes how IoT is related to the Message Queue Telemetry Transmission (MQTT) protocol. I chose these articles because they explain what MQTT is, what types of services it offers, how it transfers messages and how important it is in internet.
This article describes MQTT as a protocol for publishing messaging transmission via the Client Server. It is light weight, free, easy and built for fast implementation. Mainly MQTT promotes three quality of service levels. First quality of service level 0 says delivered as soon as possible which indicate no confirmation. In this case message which were send are not stored. Even though it is fast it is also risky too.
Second one is quality of service level 1 which says delivered at least once, where confirmation is needed. Each message shall be delivered at least once in this case. As a consequence, the same message can be sent multiple times and message are stored in both sender and receiver. After the receiver has received an acknowledgment the message will be deleted from the sender. And the last quality of service level 2 says that exactly delivered once, meaning a 4 step handshake is carried out. In this case message is always sent exactly once and message are stored in both sender and receiver. I found this article useful because it not only highlighted the use of Message Queue Telemetry Transmission protocol and its importance but also explains about its quality of services level with appropriate examples.
A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests or activities. SNS is, however, prone to security and privacy threats that target every user of social networking site. Find and summarise ONE resource (within the last five years) that describe a recent attack or security breach in SNS application.
The How, Why and What Next of Facebook’s Latest Data Breach. Hutchinson, A 2018, online, The How, Why and What Next of Facebook’s Latest Data Breach, Social Media
This article describes the Facebook’s data breach in 2018. I chose this articles because this articles describe about the situation where Facebook’s data breach happen and also describe the potentially accessed by the hackers, how many were affected and what were the updates release at that time.
This articles describe Facebook’s data breach that started around 2 am ET where user complains that they are logged out randomly. In India this issue has been widely reported. Soon afterwards, Taiwanese hacker called Chang Chi-yuan revealed that he had found and removed a bug in Facebook’s account code and log-in to Facebook CEO Mark Zuckerberg live. Already this problem had affected nearly 50 million accounts. This hack was undoubtedly even worse than the Cambridge Analytical fiasco. Theoretically, this method could have been used by hackers to access a lot of data on each infected individual, and if they had done so for a few days, there is a possibility that vast amounts of personal information could be accessed and packaged and sold on the dark web.
Facebook company has been working hard to avoid such problems. Even it does not look good for Facebook they again used contact information from people, as a data tool to help marketers, without user permission to do so. Later different update appear in Facebook first one says breach not only affect account but also other application which use Facebook. Second update explains no evidence was found that hacker using other Facebook accessed apps and third update says investigation was going on. The reason I chose this article is because it not only highlighted the security breach in Facebook’s but also it describes about different problem occurs and how does it affect.
Analytic platform is a full-featured technology solution designed to address the needs of large organisations. Find and summarise ONE resource that describes the success story of an analytic platform adoption in a real organisation.
Vodafone Puts Its Faith in Google Cloud for Big Data Analytics. MORRIS, I 2019, online, Vodafone Puts Its Faith in Google Cloud for Big Data Analytics | Light Reading, Light Reading.
This article describes Google Cloud for Big Data Analytics contract with Vodafone. I select this articles because it not only describe about Google Cloud contract with Vodafone but also describe how rapidly Vodafone data are increasing and benefits of AI tools that are used in analytics process.
This article describe the contract of Vodafone. Here, the US technology companies have already targeted portions of the telecom industry using artificial intelligence (AI) now they join the systems operators which use to handle activities and support clients. Google announced a similar contract with Vodafone soon after that. When Vodafone’s data demands rise, it is beginning to show cracks in a sign of rapid change. Together, businesses have used the Google Cloud Platform to build a new, personalized system called Neuron that takes advantage of both AI and Google’s cloud capabilities. We clarify that while we become a digital technology corporation, Neuron serves as the foundation for Vodafone’s data ocean and our business minds.
After that they started shifting all the global data of Vodafone into Google’s public cloud. Now Vodafone is aiming for a net reduction in the annual operating costs. According to Crawshaw reckons Vodafone look beyond Google. During a phone call, Telecom Italia’s CEO says Working with all these will promote cultural change and create a number of opportunities. The question remains, in the long term, what it means for the telecom industry. The main purpose for me to choose these articles is because they explain Big Data Analytics and how they can benefit various companies to analyze data along with using AI in data analysis.
Joint Application Development (JAD) is a methodology that involves the client or end user in the design and development of an application, through a succession of collaborative workshop. Find and summarise ONE resource (within the last two years) that describes the use JAD methodology in information system development.
Joint Application Design (JAD) in Information Gathering. W3computing.com (n.d), online, Joint Application Design (JAD) in Information Gathering, viewed 17/01/2020
This article outlines how Joint Application Design (JAD) is used in gathering information. I chose this article because it not only explains how JAD is used to gather information but also describes how JAD is performed, its supporting factors and its merits and demerits.
In the article, it explains that private interviews are time-consuming and error-prone and their results appear to be misinterpreted but alternative approaches to take interview user is known as JAD. Because of JAD time is consumed which directly reduce cost. There are different conditions to support use of JAD like user group always want something new, it is suitable for multiple levels of employees, it can analysts forecast and permits the key in the absence of person.
Joint workshops on application design include a number of participants like analysts, consumers, managers, and so on. It is recommended to hold the two-to-four-day sessions off-site, away from the organization, in comfortable surroundings in order to hold meetings for JAD. The aim is to eliminate the everyday stresses and the expectations of the regular work of the participants. There are different benefits of JAD like time saving over traditional interview, there is rapid development, and the ownership of the information are improved. JAD also has its drawback like it needs the dedication of all participants to a wide period of time, as in follow up reports it is incomplete and the organizational and organizational skills and culture needed may not be sufficient for the JAD environment to be successful. This resource is useful because it not only highlights the use of JAD for information gathering but also explains its advantages and disadvantages along with its supporting conditions.
The availability and implementation of information and communication technologies (ICT) is increasingly vital to all dimensions of a nation’s inclusive, equitable and sustainable economic development and growth strategies. Find and summarise ONE resource that describes sustainable ICT project management practice.
Risk Management in Project Management: 6 Ways to Mitigate Risk. Kashyap, V (n.d), online, Risk Management in Project Management: 6 Ways to Mitigate Risk, GoSkills.com, viewed 17/01/2020.
This article explains the various types of risk management within project management. I chose this article because it talks about different types of risk that may occur in project management and also discusses to dealing with such kinds of problems in the future.
This resource describes project management may have various kinds of risk some of them can be solved where as some of them can be avoid. One of them is risk management where it is important to take care in the company of anything that might stop the project from achieving its ultimate goal. First of all, they should include a list of risks that already exist in the project and train their staff to identify risks before things get worse in order to deal with such risks in project management.
Communication with team members can also help to predicts and points out a potential risk which can be fixed before project starts. Another kind of risk is prioritize risks here we can prioritize the risk according to what kinds of effect it can do like will it impact either project or product and deal with this risk accordingly. Another important part describe in this project is to analyzing the risks. In reality, it can take serious measures to support a project. Even though risk seems small and harmful it may cause serious repercussions. Some risk can be accepted but risk need to be minimize as soon as possible and avoid them. Risk need to be track down always so that same rick does not come in another project. I found this article helpful because it not only illustrates the challenge identified in project management but also explains how we can overcome them and how we can adopt risk management successfully in the future