CPU vs GPU: Understanding the Difference and Non-Graphical Uses of GPU
Title – The difference between a CPU and GPU
In the era of modern computing, the majority of devices are built with the two major component in the terms of hardware – CPU and GPU. Both these components are made with millions of transistors and are capable of doing thousands of operation each second.
A CPU is also called as the brain of the computer as it provides fundamental building blocks of any computer or device. In the computer, any operations required to process have to go through the CPU as, without the help of CPU, the task neither be processed further not it will be completed. On the other hand, GPU is a special kind of CPU made with the objective of displaying and rendering graphics so as to create a visual experience .
The major difference between CPU and GPU is of the speed and operations, GPU can handle operations with an incredible speed as compared to the CPU. However, CPUs are more flexible and they also can do much larger and complex tasks. In addition, CPU is an important part of the computer as without the CPU, a computer or device never starts or works, unlike the GPU.
Some other uses of GPU are that it can be used in processing millions of images so that to find differences and similarities. This functionality is being used by various industries as a security and border control. It can also be used in the deep machine learning by conversing tons of training data related with neural networks in the fields like video and image analytics, processing of natural language, speech recognition, and much more.
The one non-graphical use of GPU is Cryptocoin Mining, which handles various processes related to virtual currencies and these processes are depend on the computation hashes.
Title – Artificial Intelligence – The future of Operating Systems
This is an online resource clearly states the relation between AI and OSes and how AI is embedded in the Operating System.
The operations are leveraged in every 20 years called as a paradigm shift in OSes where a new form of computing is evolved. Consider the face of Microsoft, the GUI evolved to the Dos and then Windows 95. Here, the interaction method of command line is changed as to new level of interface.
AI is continuously evolving over the past five years and gives the process of computing a new paradigm. It not only increase the productivity in the system but also with the fast predictive analysis technique, the delivery of next generation experience is possible.
AI in Operating Systems: A Paradigm Shift in Computing
The capability of AI can be seen in terms of OSes where all simple line commands are replaced by a new set of modules that decrease the efforts of the user to interact with the OSes. It helps the users in taking timely and effective decisions with the help of various applications and tools.
Various big giants and companies like Amazon, Apple and Microsoft already started to build AI and have also integrated with their respective OS like Apple integrate its AI into IOS, Google into Android and Microsoft into Windows.
Title – Azure vs. AWS Cloud Service Comparison: Which One is Better?
For this discussion, an online resource is chosen which described the exact definition of IaaS and also explain how AWS differs from Azure (Microsoft cloud service) and from these two which one is better in terms of reliability, speed and accessibility.
A cloud reliability is based on the numbers of servers and size of storage. It is necessary that the organization or clients can able to access these servers from any part of the world and not face any serious issue relating to the speed and accessibility.
AWS services are started by Amazon around 12 years ago i.e. 2006 which provides on demand cloud computing platforms to the various organisations and business firms. Soon, this adoption of cloud services become a key driving force for the companies as a part of cutting cost and increases agility.
In 2010, Azure has also started a cloud computing service launched by Microsoft which offers four class of offerings including – networking, performance, data management and computation.
However, it can not be said that which cloud services are better in the current phase as Azure is giving more number of application connected with their cloud services like Azure visual studio, Azure Site Recovery and Azure Scheduler whereas AWS is also trying to compensate the gap by introducing AWS Lambda and other applications.
In addition, according to the today’s scenario, AWS market share is high as compared to the Azure and other cloud service providers i.e. IBM, Adobe and Oracle. However, this gap can be filled in the future any other organization came up with the disruptive technology.
Title – Difference between IPV4 & IPV6
This is an online resource which states the two different internet protocols used in the network addresses and also states the benefits of the IPV6 as compared to the IPV4 in terms of mechanism.
Azure vs AWS Cloud Service Comparison: Which One is Better?
Both IPv4 and IPv6 are the two versions of internet protocol, however; IPv6 is one of the advance version with various new features. IP datagram is defined by the internet protocol which performs routing function by checking path for sending the specific data.
In new advanced version of IPv6, end-to-end connection integrity is possible including encryption and authentication. In addition, due to larger space i.e. 128 bit in IPv6, it enables the user to handle bigger payloads as compared to the IPv4.
Currently, the only advantage of IPv4 is the scalability as every ISP have the IPv4 connectivity unlike the IPv6 however, due to the advancement in technology and needs, soon IPv6 will be evolved at a fast pace which allows the creation of more online contents and connectivity between the devices.
IPv6 retains many core principle of the current internet protocol IPv4 but the major advantage and the reason for the evolution of IPv6 is the number of addresses which came to an exhaustion. In the field of future networking, IPv6 provides better reliability and possibilities.
Title – Most Significant Ransomware Attacks of 2017 – Wannacry
This online resource is chosen for the discussion of the Wannacry. It is a form of vulnerability which has affected the whole world.
Ransomware had a good year in 2017. Many types of significant ransomware attacks from the past year. Wannacry is one of the largest ransomware attack influenced the whole world with its impact and majority the hospitals, universities and big companies.. In this ransomware, the user data of the individual is blocked until he pays a good amount.
The reason for the growth of this Wannacry ransomware is the continuous rise in the digital world which stores big amount of data and information online. This information can be easily accessed by someone who have secure access to that data, however, due to its virtuality characteristics, it is also easily to hack and so accessing the data by the other users.
Approximately, this Wannacry in 2017 leads to around 2, 00,000 victims and 3, 00,000 organizations worldwide. Most of these victims pays lump sum amount to the attacker for getting their important data back. In addition, the attackers demand that lump sum amount in the form of bit coins so that it will be hard for the authorities to track them.
In 2018, organization heavily invested in ransomware defences and data recovery solutions so that make a resolution for this issue.
IPv4 vs IPv6: Benefits of IPv6 over IPv4
Title – SDN Is Business, OpenFlow Is Technology
This resource clearly describes how the protocol i.e. OpenFlow enables Software-Defined Networking (SDN) and what are their significant relations.
OpenFlow (OF) is one of the established set standards of the software defined networking (SDN). It helps the various organization in meeting their dynamic requirements by aligning and connecting with the routers and switchers,
It is also noted that any device whether router or switcher, which want to interconnect with the SDN controller, must help in the OpenFlow protocol, The advantage of OpenFlow in in the term of programmability where one can see the difference in terms of innovation. With the time and the due to the advancement in the technology, new features are continuously introducing with the optimization in the performance.
The OpenFlow commands spread from an OpenFlow Controller to an OpenFlow switch are organized as “flows”. These flows are structured in tables and the OpenFlow controller sustains the OpenFlow protocol communications channels to the OpenFlow switches and thus enables the applications to read the state of the network so that to perform numerous tasks.
In addition, SDN is revolutionizing the networking world by providing a software centric architecture and with the integration of OpenFlow protocol; the configuration with new applications and formation in the hardware, physical and logical aspects is possible.
Title – Legacy systems: a replacement and modernisation headache
For clearly identifying the issues related with the management of legacy systems, an online resource has been taken which clearly states that how legacy system impact the organization in a negative way.
A legacy system organization can be explained in many terms like a computer system, software, language of programming, etc. that is obsolete as not receiving any support or maintenance. However, it is necessary for the organization and they cannot replace or dispose due to various reasons.
In this era of digital world, the new legacy IT system could benefit the business enterprise in many ways like reducing the operational costs and do potential boost in annual revenue.
The major problem or issues created by the Legacy Systems are associated with the several challenges which impact the organization in a negative way. These include outdated and lack of documentation due to older technologies and these technologies are not supported or patched by the vendors.
Due to this obsolesce, the business relationships with the partners and suppliers are moving towards the danger zone. This leads to several vulnerabilities for an entire supply network.
Malware Threats: Understanding the working of WannaCry and NotPetya
In addition, maintaining this legacy system is becomes much more expensive for the organization it terms of cost. Also, it is hard to integrate the older systems and programs of the organization with the modern technologies due to many vulnerabilities.
Title – Cambridge Analytica scandal.
This online resource described the clear issue from where the controversy gets started, who are all people involved and how Facebook respond to this issue.
This scandal came in to light in 2017, when Cambridge Analytica requires millions of Facebook users personal data so that build a software with the aim of targeting potential swing voters. This was stated in the newspaper published by New York Times.
In the various news channel, it was also showed that the cofounder of Cambridge Analytica leak this news with the help of newspaper. It was started back in 2014 at the University of Cambridge, when a Russian researcher build an app named “thisisyourdigitallife” and around 300,000 people distribute their private data through a small amount of payment and also they believe that this data will be helpful for other as used in the academic research.
Due to this incident, Facebook shares value goes down by $60 billion and this force Zuckerberg to make an apology in the front of US congress. However, later on, Facebook states that they are not involved in this controversy but this was late.
Due to the investigation, several offices of Cambridge Analytica in London were raided by the Federal Trade Commission. In addition, Cambridge Analytica also made promise to delete all the data of the individuals received from the Kogan’s company.
Title – Performance testing: methodologies and tools
This online book resource explicitly defines the principle use and features of the tool helps in meeting the key metrics.
The load testing in an information system provides many information related to the performance like stability, speed and accuracy. With the help of load testing, management can reduce many unnecessary blockages and ensure the work is going with in the expected load.
The organization also use this tool to identify potential issues in the product before the actual launch of the product in the market. This help to improve that issue if find any and thus leads to achieving in the economy of scale. One of the most popular tool in performance or load testing is DevOps that can easily be aligned with the various chain.
Legacy Systems: Impact on Organisational Agility
This tool also consist of various characteristics like prefilling transaction list for recording, powerful extractors, scripting and checking of users’ path.
In addition, the tests needs to be conducted with the help of this tool is also based on various factors including platform, hardware and software algorithms. These tests reveal the data that are important to be enhanced.
Therefore, in this digital field, effective use of this tool can proved to be the difference between the success and failure.
Title – IBM Sued Over $1 Billion Project That Led To It Being Banned By Queensland, Australia
This online resource includes the case of IBM and the state of Queensland, Australia. This is one of the biggest IT disaster in the history of public administration in Australia.
It was started from a biding of the bidding of a contract when Queensland decided to change their outdated payroll system. For this purpose, the contract was given to the IBM in building up a new system with the new algorithms. This new payroll application system was to build with the help of using SAP software.
At the time of contract, IBM states that the project will cost of about AUS $ 6 million, however later on they change it to $27 million. In addition, IBM take years to build a complete working software with around 1000 people are assigned to it including many other costs. This make force the government to ban IBM for the future projects.
Later on, an investigation was made and that states the issues from both the sides i.e. one was the unethical behaviour of IBM and other was the crummy job of the government employees due to which the project was extended for a long period of time.
This may be the one of the reason that why organization are always looking for various alternatives such as cloud computing. They do now want to focus on custom projects, as they believe that renting this service to other agency, as a monthly pay is the better choice. This resource was selected because it explicitly states the failure in the implementation of the IT system at the state of Queensland.
References
Asis, L. (2018). The difference between a CPU and GPU. Available from https://www.upgrademag.com/web/2018/05/31/the-difference-between-a-cpu-and-gpu/ [Accessed 20/09/2018].
Rosini, R. (2016). AI and the Future of Operating Systems. Available from https://medium.com/@rodolfor/the-future-of-operating-systems-and-weaveos-e4c9bc3f23d7 [Accessed 20/09/2018].
Jake. (2018). Microsoft Azure vs AWS: Cloud Comparison Guide [2018 Update]. Available from https://www.computerworlduk.com/it-vendors/microsoft-azure-vs-amazon-aws-public-cloud-comparison-which-cloud-is-best-for-enterprise-3624848/ [Accessed 20/09/2018].
Akers, J. (2017). DIFFERENCE BETWEEN IPV4 AND IPV6. Available from https://moonv6.org/difference-ipv4-ipv6/ [Accessed 20/09/2018].
Hall, G. (2017). The biggest ransomware attacks of 2017. Available from https://www.2-spyware.com/the-biggest-ransomware-attacks-of-2017/ [Accessed 20/09/2018].
Ferro, G. (2012). SDN Is Business, OpenFlow Is Technology. Available from https://www.networkcomputing.com/networking/sdn-business-openflow-technology/53316220 [Accessed 20/09/2018].
Tennant, F. (2017). Legacy systems: a replacement and modernisation headache. Available from https://www.financierworldwide.com/legacy-systems-the-replacement-and-modernisation-headache/ [Accessed 20/09/2018].
Meredith, S. (2018). Here’s everything you need to know about the Cambridge Analytica scandal. Available from https://www.cnbc.com/2018/03/21/facebook-cambridge-analytica-scandal-everything-you-need-to-know.html [Accessed 20/09/2018].
Rouse, M. (2014). performance testing. Available from https://searchsoftwarequality.techtarget.com/definition/performance-testing [Accessed 20/09/2018].
Bort, J. (2013). IBM Sued Over $1 Billion Project That Led To It Being Banned By Queensland, Australia. Available from https://www.businessinsider.in/IBM-Sued-Over-1-Billion-Project-That-Led-To-It-Being-Banned-By-Queensland-Australia/articleshow/26983732.cms [Accessed 20/09/2018].