Quantum Computing and its Potential Applications
1. The text discusses conventional binary computing architecture. However, an emerging field of research focuses on the development of quantum computers. Find and summarise a resource that explains why there is so much interest in this type of computing (for example, the potential applications).
Title and Reference:
Closing In On Quantum Computing
Wired.com.,2017. Cite a Website – Cite This For Me. [online] Available at: https://www.wired.com/insights/2014/10/quantum-computing-close/ [Accessed 13 May 2017].
The concept of the quantum computing is important as it helps in conceptualising about the improvements in the speed with the quantum computer. There are possibilities to check with the performance of the equations along with the artificial intelligence and cryptography standards that tend to transform the landscape. The artificial intelligence and the cryptography are considered to be one of the best to transform the landscape. I have selected this resource as it helps in focusing over the increased stability with the experimental systems that mainly rely on the shielding and the cooling of the operating temperature. The work has chosen contextuality as the necessary resource for the quantum application with the focus on building the quantum devices. The reliability is based on the maintenance and achieving the processing power of the universal computing system. As per my research, the main points that are selected is mainly to minimise the quantum errors with the success over the challenge to check the trends with the nuance and the interpretative skills of humans. Here, the resource has been also able to focus on the D Wave technology which is costing more but the large companies try to look forward to it. The major goals of the functioning of the quantum computer is with the commercialised appealing that is mainly to set the assembling in the labs with the substitution for the transitions. The research is mainly on checking the hurdles in harnessing the powers which is mainly to control the fragile states of the quantum computing. Through this, there are approaches for identifying the magic states through the contextual and the research which clarifies about the trade-offs as well as the other forms that include the special properties of the system.
2. The text briefly makes mention of the Linux operating system, an open-source Unix variant developed in the 1990s. There are many popular Linux distributions (look up “Linux Distribution” if you don’t know what that means). Find and summarise a resource that describes the features and advantages of one of these distributions.
Features and Advantages of Ubuntu Linux Distribution
Title and Reference:
Ubuntu Tutorial
www.tutorialspoint.com. 2017., Ubuntu Tutorial. [online] Available at: https://www.tutorialspoint.com/ubuntu/ [Accessed 13 May 2017].
<Ubuntu is one of the Linux based operating system which mainly focus on the designing for the computers, smartphones and the network servers. This is able to handle the development through the Open Source Software process. I have chosen this resource as it highlights on the features of ubuntu like the desktop version of Ubuntu is able to support the normal software on the Windows like the Firefox, Chrome,etc. Along with this, it is seen that there are host for the free applications for the users to properly view and edit the photos, with applications to manage the videos and then allow them to be used for the user to share. This has been easy to find the content on Ubuntu with the smart searching options. The forms are set with the huge open source community. I have also chosen this article as it focusses on the advantages of Ubuntu which are to build the system with the free operating system and can be used by the regular users as well. The work can be done through the comprehensive software updates with security vulnerability that is set when the machines of Windows and Mac are significantly running the risks related to the apps and their automatic updates. The problems are set to define the software and the methods with the programs, extensions and the other plugins. The system is set with the centralised repository where the forms are to handle the latest version of Firefox. The resource is also useful as it covers the different methods of the scripting, networking and the server installation in Ubuntu. This helps in clearly defining the development with the virtual machines that are set to evaluate the system configuration processes for a particular file and folder.
3. The text discusses the concept of virtualisation. There are several “type 2” or hosted virtualisation products (software) on the market (both commercial and open source). Find and summarise a resource that describes the features and advantages of one of these products.
Title and Reference:
Workstation for Windows
Vmware.com. 2017. Workstation for Windows – VMware Products. [online] Available at: https://www.vmware.com/in/products/workstation.html [Accessed 13 May 2017].
VMWare Workstation Pro and VMware workstations is set for the industry standards with running the multiple operating systems which includes the virtual machines that runs on the single PC. There are different developers, business which includes the productive and secured form. The leadership patterns is set with the satisfied customers with more than 50 awards where there are people to set the stability and secured desktop virtualisation. I have used the resource as this resource is able to provide the best workstation that will help in the innovation of the space and works on the powerful forms of the virtualisation process. There are some of the major points like the development and the testing of the capabilities for the different platforms that are set to evaluate the standards along with the connection to the vSphere. Here, the forms are set for the hypervisor platform which works on the management of the virtual machines and the physical hosts data. The local control of the corporate desktops are generally seen to help the people to access the USB devices and make sure of the proper authorisation process as well. The standards are set for the network designing and testing that will help in data centre management and to process the development with the scope of the workstation management by the VMWare Horizon Flex that offers the flexibility with the agility, productivity and the security for delivering the corporate desktops. I have been able to check on how the VMWare is able to deliver the things that are for the Windows XP on Windows 10 machines.
Features and Advantages of a Hosted Virtualization Product
4. TCP and UDP are examples of two Layer Four (L4) transport protocols that are discussed in the text. Find and summarise a resource that describes the features and uses of one other L4 protocol that is not discussed in the text.
Title and Reference:
Reliable Data Transfer
Anon, 2017. [online] Available at: https://www.d.umn.edu/~gshute/net/reliable-data-transfer.xhtml [Accessed 16 May 2017].
The chosen protocol is the reliable data transfer which is best for the services and to work on the part where there is no guarantee that there are standards to reach the data to the destination. Hence for this, it is important to check on the connection oriented factors which have been provided by the TCP along with working over the data transfer. The sets are related to use the basic tools like the stop and wait protocol which is for the sending of the packets where the sender stops and then waits for the feedback. I have chosen this resource as it clearly helps in explaining about how the protocol is able to cover the poor performance in the long-distance connection. For this, the sender is able to transmit the information through the per round per trip time where the connections are mainly to establish the connection with the data set with the sequencing number and feedback. The data link and the network layers are set to handle the transformation of the data with the lower layer protocols which are set to analyse the discarding of the packets. Here, the setup is also related to the system to deal with the missing packets with the discard of all the other unwanted packets.
5. Cyber-attacks on governments or government assets are receiving increasing publicity and media attention. Find and summarise a resource that describes one recent cyber-attack (within the last 3 years) against a government website or asset.
Title and Reference:
Government computer networks breached in cyber-attacks as experts warn of espionage threat
ABC News. 2017. Chinese hackers behind Defence, Austrade security breaches. [online] Available at: https://www.abc.net.au/news/2016-08-29/chinese-hackers-behind-defence-austrade-security-breaches/7790166 [Accessed 15 May 2017].
I have chosen this article as it is able to clearly reflect on how the sensitivity Australian Government and the networks are easily attacked by the high confidential plans. Here, there are groups which are suffering from the infiltrations by the hackers who are based in China. The intelligence sources are generally suspected by the attackers where the four corners are also including the Australian Satellite company whose assets are set with the check and infiltrations in the past times by the hackers who are in China. There are intelligent sources where the suspect are the attackers. I have chosen this incident as it highlights about the breaches that could come to the most secured network as well. I have noticed that everyone is pointing the issues to the other country where the issues were waged mainly against the Australian government and the companies. The focus is on the espionage where the process involves the obtaining of the information that has not been available publically, through the use of the human sources or the technical issues like hacking into the system of the computer. The open information setup with the available information is the activity that is mainly set with the diplomatic staff with the military attaches and the trade allegations.
Features and Uses of a Layer Four Protocol
6. Flood, fires and earthquakes are events beyond our control, yet impact heavily on ICT infrastructure. Find and summarise a resource that describes one example of an organisation’s ICT infrastructure being impacted by such an event and the resulting effects on the business and/or its operations. For example, you might want to search for “data centre fire” or “network cable earthquake” to find sui resources.
Title and Reference:
Asian Quake Disrupts the Data Traffic
Arnold, C. 2017. Asian Quake Disrupts Data Traffic. [online] Nytimes.com. Available at: https://www.nytimes.com/2006/12/28/business/worldbusiness/28quake.html [Accessed 16 May 2017].
The resource is about how the data traffic has affected the disruption of the telecommunications across Asia. This link has been selected by me to highlight on the quake disrupted services in Singapore, Hong Kong etc., where there are ripple effects that could be felt in the different parts of the world. For this, there are different subscribers who could not get through the regional telecommunication operations as they have been raced for the reroute of the traffic. The major points have been that the financial companies and the business in the region are mainly hit hard with the online banking and communication. The earthquake by Taiwan authorities could easily register the magnitude of 6.7 striking of the island southern top. The best and the largest telecommunication company, Chunghwa Telecom, was affected through this, where the earthquake has completely affected the lines that were coming from the Chinese mainland for the places which include the areas of Taiwan. The resource has also been important for the Asian networks to work on the equipment of the company network with properly tracking the companies with the sub diaries and the manufacturing in Asia. The analysis is set through the breakdown that tend to occur at the holiday period with the activity lights and the market. The interruption mainly at the time of the ordinary week had a major impact of catastrophe. Here, the resources are also to define the Internet traffic which was not entirely set for the testimony to the progress in addition to the capacity of the new routes.
7. The text briefly mentions crowdsourcing which is a form of social business that organisations employ to engage with the public to achieve a goal. Find and summarise a resource that describes one example of an organisation using crowdsourcing and the outcomes of the engagement.
Title and Reference:
Lego Ideas: a leading crowdsourcing platform in the Toy Industry
Recent Cyber-attack on Government Website or Asset
Digit.hbs.org. 2017,. Lego Ideas: a leading crowdsourcing platform in the Toy Industry – Digital Innovation and Transformation. [online] Available at: https://digit.hbs.org/submission/lego-ideas-a-leading-crowdsourcing-platform-in-the-toy-industry/ [Accessed 16 May 2017].
Lego has been the best company for the crowdsourcing in the toy industry. It is able to cover the platforms where the idea is set for the new logo set along with creating a model, taking photos and then writing the convincing description of the project. I have selected the project for the LEGO where the support mainly comes from the user generated sets that have been approved and sold. This company has been able to attract the better programs and focus on the different offering of the fame and the financial gain to the originator for a better idea. The main points of the resource are checked with the platform ground rule to minimise the conflicts that has been set in the platform with the handling of moderator of the group. The LEGO ideas are set for the crowdsourcing that works on the technology industry with company to create and capture the value. The designing is based on incentive programming with the users who can easily vote for the project in the ideas. Here, the resources are set primarily with the risks to control and check the room for the improvement. The fact is mainly that the company is also engaged in the outsourcing and is able to cover the platform which is effective to take hold of the well balanced network standards, with increased user engagement level.
8. With the advent of mass data collection and storage has come a surge of instances of data theft. Find and summarise a resource that describes one example where data has been stolen from a private company or corporation and explain the impacts on the customers.
Title and Reference:
Chick-fil-A investigates hack into credit card payment data
Yuhas, A. 2017. Chick-fil-A investigates hack into credit card payment data. [online] the Guardian. Available at: https://www.theguardian.com/technology/2015/jan/02/chick-fil-data-breach-hack-investigation [Accessed 16 May 2017].
Here, the resource has been about how Chick-fil-A has gone under the possible breach of the data at the different restaurants. Here, the focus is on the working over the cybersecurity with the law enforcement mainly to check on how the data in the system has been hacked. I have selected this resource mainly to highlight about how the company had to undergo the different traces to check on the point-of-purchase with the suspicious activities. This includes the breach to the other medium sized chains like the Dairy Queen. The major focus of this attack has been that the hackers tend to install the malware in the POS software technology for stealing all the data that has been encoded in the back of the cards. This breach of data has affected many people as there was no money left in the accounts of some people and some people were also warned to get their cards de-activated as well. With the digital standards and the wealth of the credit card data, the personal information has been set to determine about how the customers were not able to take hold of the relevant changes. The identity protection is important where the wealth of the credit card data and the information of the users could lead to create the counterfeit cards for selling the information to the other people as well. As per the investigation, one need to confirm for the breach where the customers are not able to take hold of all the relevant changes with the arrangement of the identity protection services.
Impact of Natural Disasters on ICT Infrastructure
9. The failure to adapt business processes and embrace technology, particularly ICT, has led to the downfall of many previously successful companies. Find and summarise a resource that describes one example of an organisation that failed to adapt to changes in technology and explain what the organisation failed to do/respond to.
Title and Reference:
How Technology Killed Kodak
Forbes.com. 2017. Forbes Welcome. [online] Available at: https://www.forbes.com/sites/erikkain/2012/01/19/how-technology-killed-kodak/#35694caa66df [Accessed 16 May 2017].
The company chosen is Kodak to highlight over how the changing technology lead to the failure of the company. It has been seen that the company had to undergo the filing for the protection from the creditors of U.S. bankruptcy code. I have chosen this resource as it highlights on the killing of the film manufacturing. The use of the digital cameras over the film, the use of the SD cards and the other important things for the restructuring lead to the failure of the company. There are major points relate to the SOPA in the news, where the interest is mainly about how the business models are threatened to adapt and make use of the force of law and protection for saving and for failure. The entertainment industry tends to attempt the use of the government regulations where the economy has also been able to change the technology. The driving force of the change has led to the issues in the company with the resource highlighting about the changing forms of the technology. With the evolution of the NYSE regulation, the note is about the uncertainty in timing and the outcome effect of the bankruptcy process. Hence one need to check on the effects of the process over the company common stockholders. >
10. Large, complex ICT projects are more likely to fail than succeed. Find and summarise a resource that describes one example of a large ICT project that failed and explain the impacts of the failure.
Title and Reference:
Abandoned £10bn NHS IT system
Computer Business Review. 2017. 5 of the worst IT system failures – Computer Business Review. [online] Available at: https://www.cbronline.com/news/verticals/cio-agenda/5-of-the-worst-it-system-failures-4159576/ [Accessed 16 May 2017].
The resource has been about how the IT system failures led to the great issue for the system and the companies. It has been seen that the abandoning is by the government in September 2013, which relates to the cost of the taxpayers. I have chosen this resource as it is able to highlight about the different centralised e-record system, where the fiasco has been dubbed with the biggest failure in IT. The scheme of the NHS patient record was undergone with the Labour government where the cost was supposed to be $.4bn but there tend to be some issues related to the data management which completely led to the failure of the system. Along with this, there have been issues in the system related to the costs that continued to be spiral when the new systems were managed badly mainly down the human error. The poor communication and the lack of clarity in the roles and responsibilities has been a major cause which led to the issues with the management of the project. One cannot easily define the accounts to underlie the facts with poor planning and improper scope or objectives. The standards are set to check on the failure to the factors for a particular time and money. The plan is about how to rule and set assigning to the right people for the particular role. The right technology has not been set for the little tests and for this, there is a need to make sure that all the technology is able to align with the best program.