Week 1: The Emergence of Quantum Computing
Week 1
The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summaries a resource that explains why there is so much interest in this type of computing (for example, the potential applications).
This resource is about introduction about Quantum Computing. The main reason to select this resource is that here basic information about Quantum Computing is given in an easier way. The actual meaning of Quantum + Computing is also described in this resource. This basic information about Quantum Computing will help to understand its further development points. Besides introduction of quantum computing, another important points that are discussed in this resource are what quantum computer would be in reality. This point describes working of Quantum Computing. Another essential point is about what can quantum computers do that cannot be done by ordinary computers? This point clears that why researchers take interest in development of quantum computers. Next important point that is defined in this resource is how far off quantum computers? Through this point, initial development of quantum computing and its further development journey is described.
This resource is useful because discussed comparison in this resource about conventional computing and quantum computing maintains interest to know how quantum computing is better than another types of computing and how it can be used in our daily life to perform different activities. Besides this, from this resource we also got to know that why IT giant companies like Google, are ready to work with quantum computation and they will develop new way for qubits for detecting and protecting against errors. Due to these reasons, we got selected this resource to know about interest of researches in development of quantum computing.
Week 2
The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up “Linux Distribution” if you don’t know what that means). Find and summaries a resource that describes the features and advantages of ONE of these distributions.
The selected resource is about features and advantages of Ubuntu which is one of the most popular Linux distribution. The main reason to select this resource is that, this resource covers discussion about both main features and advantages of Ubuntu over Windows and OS X. Every essential feature of Ubuntu is discussed in this resource with its advantage for Ubuntu’s users. After reading this resource, we got to know about distinguish features and advantages of Ubuntu operating systems. The key points that are covered in this resource are cool feature and advantage of virtual desktop in Ubuntu, community support by Ubuntu, beautiful themes of Ubuntu, and availability of free software library in Ubuntu and feature and advantage of Ubuntu as open and free source. We have studied many articles regarding this Linux Distribution i.e. Ubuntu. But we did not get appropriate content regarding features and advantages of Ubuntu from those resources.
Week 2: Features and Advantages of Popular Linux Distributions
This resource is useful because here whole content is described in simple and easy way. Every essential feature of Ubuntu is described with an image. Therefore, we got to know how a particular feature look like. On another side, the advantage of every feature of Ubuntu is also defined clearly and it shows that Ubuntu has better features than other available operating systems. This resource precisely described important aspects regarding Ubuntu.
Week 3
The text discusses the concept of virtualization. There are several “type 2” or hosted virtualization products (software) on the market (both commercial and open source). Find and summaries a resource that describes the features and advantages of ONE of these products.
This resource is about features and advantages of VMware Workstations. In this resource, all extensive features and advantages of VMware Workstations are described in appropriate ways. There are some essential reasons to select this resource. It is simple and easy to understand article and no complex and technical information is given in this resource. Every aspect about VMWare Workstations is clearly defined. The main points or key information that covered in this resource are unique features of VMware Workstation that include support of VM Workstation for Windows 10 and OpenGL 3.3, management of virtual machines, support for 3-D applications and to receive vCloud Air Force. Besides this, the advantages of VMWare Workstations are also clearly defined in this article such as provide easier way to test compatibility of applications, provide performance improvements upto 3x, improvement in echo and noise cancellation in case of using Skype and VoIP calls and improvement in maximum uptime and availability. This key information was hard to get from another available internet resources.
The main usefulness of this resource is that here only important things about VMWare Workstations are defined. No irrelevant information is discussed here in this resource. It is easier for user to know basic things about VMWare Workstation. The given content is interesting to know more about VMWare Workstations.
Due to these reasons, we have selected this resource to know about advantages and features of VMWare Workstations.
Week 4
TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of ONE other L4 protocol that is not discussed in the text (i.e. NOT UDP or TCP).
This resource describes features of AppleTalk Protocol with brief description of its uses. AppleTalk Protocol is commonly known as ATP protocol which is an example of Layer Four (L4) protocols. The main reason to select this resource is that it was hard to find resources that can describe uses and features of AppleTalk protocol appropriately. In this resource we have found both things but features are mainly highlighted. These provided information is easy to understand and clearly defined. No ambiguities, repetition and irrelevancy is found in information that is provided in this resource. If we talk about key points that are discussed in this resource then these are features, uses and management of AppleTalk Protocol. The features of AppleTalk Protocol includes Remote Access of AppleTalk Protocol, Internet Routing of AppleTalk and Sharing on AppleTalk. The uses of AppleTalk consists of easy way to set up small to midsize networks, possibility of connectivity of third party software and improving management of Mac and another cross platforms.
Week 3: Exploring Virtualization Software
This resource is useful due to its clear form of providing information. Besides this every key feature and use of AppleTalk is defined in this resource that will be helpful for developers and users of AppleTalk. The management of AppleTalk is an important thing for developers of AppleTalk and in this resource one by one management process is described.
Week 5
Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes ONE recent cyber-attack (within the last 3 years) against a government website or asset.
Canada Government Websites Taken Down in Cyber Attack
This resource is about cyber-attack that was encountered by Canadian Government in 2015. According to this resource, a Canadian Government Website was hacked by a hacking group which was a vulnerable attack for Canadian Government Agencies. The reason to select this resource is that in this whole case of cyber-attack is defined precisely which is easy to understand. The reason of this attack and how this attack is conducted are defined clearly in this resource. The main points of this resource are related to who was affected by this cyber-attack, how and by whom this cyber-attack was implemented. Besides this, another essential point according to this resource is that Shared Service Canada agency was responsible for poor infrastructure of information technology and it led to cyber-attack.
This resource is useful because it focuses on main reason of cyber-attack rather than any other non-specific information or irrelevant information. It is also defined that this website was popular for handling legal and government level works and huge amount of data about government employees that was stored in it. The arguments of government ministers regarding this cyber-attack are clearly defined. In this internet resource, accurate information is provided about cyber-attack encountered by Canadian Government Website.
Week 6
Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summaries a resource that describes ONE example of an organisation’s ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for “data centre fire” or “network cable earthquake” to find suitable resources.
This resource represents the impact of earthquake on ICT infrastructure of telecommunications company in Taiwan. In this resource every important point about this natural disaster and its impact on company’s business operations and functions are discussed appropriately. There are some essential reasons to select this article. This resource has provided a cleared information about impact of earthquake on ICT infrastructure on Telecommunication Company, why and how it has held and how ICT infrastructure was affected due to this. These important points are discussed precisely in this resource.
Week 4: Lesser-Known Layer Four Protocols
The main discussed point in this resource is that how fiber-optic cables that carried bulk of the world’s internet and communications traffic, were affected with earthquake. This thing is defined in a very good way in this resource with appropriate clarity. With solid arguments and reasons, this resource has defined impact of earthquake on ICT infrastructure of Telecommunication Company of Taiwan.
If we talk about usefulness of this resource then useful point of this resource is that from this we got some essential information that how natural disasters can put influence over Information and Communication Technologies (ICT). Besides this, we also got to know about reasons for this bad influence. On the behalf of this collected information, IT companies can improve their ICT infrastructure to get prevention from these problems as much as possible. Due to these reasons we have selected this resource to understand thorough impact of natural disasters on ICT.
Week 7
The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes ONE example of an organisation using crowdsourcing and the outcomes of the engagement.
This resource is about successful crowdsourcing implementation in McDonald Company. It is very interesting resource and various interesting points are covered here about McDonald. The provided information in this article is non-repetitive and do not raise any arguments against crowdsourcing plan of McDonald’s. The reason to select this resource is its effectiveness, simplicity and reliability to discuss topic in detail. The content of selected resource is easier to understand and we got to know some new things about McDonald’s way of Crowdsourcing. The main points covered in this article are MacDonald’s crowdsourcing campaign ‘My Burger’, how successfully crowdsourcing campaign was driven out, what was done by ‘My Burger’ campaign and how customers were attracted by this and its impact on market. Besides this, challenges of crowdsourcing and how crowdsourcing is helpful for product innovation. This information is very important to understand concept of crowdsourcing in a business organization and this thing enhances the usefulness of this resource. After getting this information, we got to know about many more information about crowdsourcing. The discussed points in this article can be implemented in business organizations to improve their technique to implement crowdsourcing. MacDonald’s is an established company and its strategic campaign can be helpful to implement.
Week 5: Real-World Examples of Cyber Attacks
Week 8
With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes ONE example where data has been stolen from a private company or corporation and explain the impacts on the customers.
In this resource, an example of private company i.e. Ashley’s Madison is discussed whose data has stolen. There are various resources available online that have discussed this case study of Ashley’s Company, but we have selected this resource because here this case of data theft of Ashely’s Madison Company is defined in appropriate way. The information about Ashely’s Company, its way of data storage, how hacking was processed by hackers and another essential points regarding data breaching are discussed in detail. The key points of this resource are how data theft was implemented by hackers, what kind of data was hacked by them, how customers and company were affected by this attack and what amount of data is hacked by hackers. The provided information is accurately defined and no wrong and inappropriate data is used to describe case of data theft. The useful thing of this resource is that from this we got both statistical and theoretical information regarding Ashely’s Madison data theft. This information is required for awareness of another business organizations that are already using IT services and encountering problem in security and privacy of data. This resource is also useful to know about security tools and techniques that were used by Ashley’s Madison Company to get prevention from data theft and to maintain long term security.
Week 9
The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes ONE example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.
This resource is about Kodak failure to adapt ICT technology. This resource contains so much interesting information about this technology adaption failure by Kodak Company. The reason of selected this resource is its way to present critical and important information. Every important point from adaption of ICT by Kodak to its failure is defined in an appropriate way. There are various important points are discussed in this report such as how Kodak missed opportunity to implement a new technology of digital photography, causes of failure, use of disruptive technologies for failure and inability of management to manage new change in company. This information is helpful enough to understand basic reasons of failure of new change implementation that can be faced by another organization. We consider this resource useful because it has described various essential points regarding failure of adaption of new change that we did not get in any other available online resource. The weak points of Kodak Company that led it to failure are highly focused in this resource. In this resource, competitor of Kodak i.e. Sony and its introduction of electronic camera in market is also discussed because after this Kodak showed its interest in new technique of digital camera.
Week 10
Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes ONE example of a large ICT project that failed and explain the impacts of the failure.
This resource is based on failure of a large ICT project. In this resource, not only one example about cases of ICT project failure is given, even more than one are discussed. This thing is important about this resource that we got to know about number of large projects that have failed. This is one of the reason to select this article and another reason is its effectiveness, way of presentation of information and use of easy to use and less technical wording. From listing of large ICT project failures, the selected failure case is of failure of Phoenix. The main points about failure of Phoenix that are discussed in this resource are what was the problem, what were the main challenges faced by company, who was affected and how and results of failure. The useful thing about this resource is its way to provide appropriate information about Phoenix project failure and it is an information resource that aware people how companies can encounter this type of failure. Each and every aspect about company’s project such as cost, date, name of project and its impacts of business activities and functions. This information is not easily available on internet resources but this resource of article has fulfilled our need to know about ICT project failures.