Week 1: CPU and GPU Market Share Growing Rapidly
This resource is about CPU and GPU market requirement. According to mention resource, it is useful to understand about future advancement in generation of CPU (referred as central processing unit) using AI. A graphics-processing unit (Referred as GPU) is a particular type of microprocessor GPU is used for different purposes, such as computer gaming, HD video decoding, medical field, and computational science.
I select this resource, because it provides information about CPU to GPU transformation. GPU, designed for gaming. It performs multiple tasks, as it have parallel processors. It designed for quick image rendering. Graphcore is a new chip with an intelligence-processing unit (referred as IPU). It is used for graph computing, it also provide system to low-precision floating-point computing. It is ten time faster than other cores.
In this resource many things are discussed about CPU and CPU. Root of GPU’s innovation is money drives computing. Because it has a big, enough market. It is a market policy that when any product requires in market then someone will develop the product according to market needs. It needs huge economics to make chips, so very few organizations are working on it. According to Moore’s law chip, size will be double in 1-2 years. In case of CPU, in a single chip multiple cores were used for processing. Maximum processes were managed in parallelism concept for better resource management ( Giles, 2018).
This resource is useful because this describe about CPU and GPU working as well as use of them. Four major vendors of GPU’s are NVIDIA, AMD, IBM, and Intel. GPU’s have up to 512 cores on a single chip. It provides very high bandwidth up to 190 GB/s to graphics memory of system. GPU’s provides multi-threading with at least eight threads per core, so pipeline problem will not occurs. CUDA programming is use for GPU computing (Olena, 2018). I think GPU’s are the most exciting development in the field of computer’s in last ten years.Vega is also a much known company in this field; it is so good for integrated graphics. AMD have few resources are impressive, it also rapidly improving in both CPU’s and GPU’s. In august 2018, AMD is announcing that it will move to TSMC from all of its 7nm production on both CPU’s and GPU’s.
Smartron unveils tronX, an artificial intelligence based operating system to assist users
This resource is about artificial intelligence uses in operating systems and all connecting other devices. Combination of artificial intelligence and computer with IoT is latest technology, also known as terming. TronX is an intelligent ecosystem that helps to connect different devices to computer system. It make easy to handling of all devices, whether you are at home. It connects and access to data from cloud and all content, which are related to particular services. Smartron company is working on it from last two years. They also provide tronX Health, tronX Home, and tronX infra.
I select this resource for knowledge about artificial intelligence and different uses of it. Artificial intelligence based applications provide better functionality to operating systems, such as reliability, security, scalability, and integrity including safety from threats and malicious softwares. Artificial intelligence is moving to internet applications in computer system. It is also use in various fields, such as medical intelligent diagnostic systems, robotics, and legal intellectual systems. For better security in operating system all the above requirements means, “authorized actions”. System life cycle have three phases: development, production and functioning.
Week 2: Artificial Intelligence in Operating Systems
In this resource many advance and future technologies was discussed. Artificial intelligence provides deferent features of machine learning and deep processing environments for operating systems. Machine learning makes operating system faster and makes it more powerful in terms of complex calculations. The main work of artificial intelligence is making internal softwares, such as speech synthesizers for operating systems. Integration of different expert system, which are based on artificial intelligence with operating system.
Artificial intelligence helps to integrate all outside systems with operating system for better use. There are many tools for integration, such as OpenAIR protocol, Psyclone AIOS, Elvin, and CORBA. Main requirements of artificial intelligence based operating systems are dependability and security. Different concept are tied with both things like:
- Maintainability
- Integrity
- Reliability
- Confidentiality
The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP
This source is about Microsoft Azure and other four top cloud service vendors according to Forbes. Infrastructure as a service (referred as IaaS) is a new computing frame for managing data over the internet. IaaS provide online services to manage your data and avoid your own physical servers. AI-driven competitive advantages are provided by IaaS.
I select this resource for knowledge about cloud computing and its services. IaaS provide many facilities to organization, such as Website hosting, test and development, storage, and backup with big data analysis and high-performance computing.
- What are the main points or key information covered in the resource
Infrastructure as a service is a service based on cloud infrastructure. They are self-service models, which are provides different types of services to vendors. Services of a IaaS are:
- Accessing and storage of data
- Monitoring Data centers
- Managing remote datacenter
- Networking services
This resource is describe about Azure and its services to different organizations.
Azure is IaaS of Microsoft. It has many advantages. It also provide Software as a Service ( referred as a SaaS), as well as Platform as a Service ( referred as PaaS) and provide many types of programming languages, frameworks, and software tools different platforms, such as third party software and Microsoft specific systems. Mr. Neil Hunt is chief product officer of Netflix organization, has revealed that the all infrastructure work will be handing over to Amazon Web Services (AWS). It is too difficult to maintain infrastructure from employees of Netflix, so they just hire AWS for that infrastructure. AWS was in the top ten companies, which provide cloud services or infrastructure for storing lot of data in different forms. Today Netflix is having highest volume of data on cloud. Microsoft Azure is an example of IaaS, which is charge according to per minutes.
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online]
Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-ipv4-to-ipv6-panned-by-engineers[Accessed 11 September 2018].
This source is about changes from IPv4 to IPv6 and its advantages and disadvantages. According to ITU, 1:1 mapping worked and it will solve many recent problems.
I select this resource because its describe about internet protocol version transformation.
IPv4 is an internet protocol, which is use to transfer data between different workstations. IPv6 is next version of IPv4. IPv4 version had a 4.2 billion addresses capacity. Now internet users are highly increased, so classless internet model developed, still facing same problem for address and networks for different organizations. IPv6 is supports 128 bits addresses that means 2128 addresses. Length of the header of IPv6 is 40 bytes. It provides internet protocol security (referred as IPsec) as network security is mandatory. This has better quality of services. It is auto configuration enable protocol version.
Week 3: Description of Commercial IaaS Provider Other Than Google
This resource is describe uses of IPv6 over IPv4. As IPv6 supports multicasting, it does not need to define any broadcast address. IPv4 and IPv6 differences are:
- N. IPv4 IPv6
Address length is 32 bits It have 128 bits for addresses
It have decimal representation It have hexadecimal representation
IPsec is optional It have inbuilt IPsec
DHCP configuration. Auto-configuration and renumbering.
Encryption and Authentication is not Provided Encryption and Authentication is Provided
Fragmentation performed by Sender and forwarding routers Fragmentation performed by Only by the sender
Broadcast messages are available Broadcast messages are not available.
Checksum field is available in IPv4 header Checksum field is not available in IPv6 header
How Similar Are WannaCry And Petya Ransomware?
This resource is about ransomware and malware attacks. This resource explains about both ransomware and malware attacks. WannaCry appeared first time on 12 may 2017. WannaCry is a worm of ransomware type that damages a number of networks rapidly in May of 2017. It encrypts files of windows computers hard disks.
WannaCry is a ransomware, which converts files in to different formats with append .wcry to the end of the file name. First time, it was encrypted 176 different files in a computer system and asked user to pay Bitcoin of worth $3000. In addition, that note indicates that money will be doubled after 3 days and if payment is not done then encrypted files will be deleted after seven days. However, no such type of code found in those files for deletion.
Microsoft already launched patches for this type of attack. It is highly increased on Monday, as employees returned to office after the weekend. WannaCry propagated through “EternalBlue”, an exploit in Windows systems. Microsoft had already released patches for this type of attack, but some organizations had not applied these patches to their systems. This attack was stopped within a week, as Microsoft released patches for that type of attack.
Some security agencies believed from evolution of the threat that the worm originated from agencies working for the North Korea. Petya and NotPetya are malware that affected lots of computer systems in 2016 and 2017. NotPetya encrypt the files of infected system. It was targeting various computer systems in the hospitals, hotels, and government departments also.
The basics of SDN and the OpenFlow Network Architecture
This resource is about Software Defined Networking (referred as SDN) and uses of OpenFLow.
This resource is described about complete architecture of SDN. It is designed to manage data flow and internetworking devices. SDN architecture have three layers are:
- Application layer – it provide communication services for end-user boniness applications
- Control Layer – it consist the logically centralized functionality
- Infrastructure Layer – it provides packet switching and message forwarding
In this resource technical description is well defined. SDN has logically centralized intelligence, which provides decision-making facility to domain. It is also controlled by software. There are many Application-programming interfaces to interact with the network. SDN control layer is also providing abstraction for business applications. In the field of networking OpenFlow-enabled SDN, provide several benefits such as multi-vendor networking. OpenFlow is provides connection between different geographical domains for managing operations and complaints.
Speed and Automation – Centralized control and programmatic API’s manage streamline operations. Efficiency – Minimization and optimization of traffic using OpenFlow increase efficiency of network, it also enables multi-layer path computation.
Week 4: Description of IPv6 Protocol
Operator innovation – It provides access to network operator to differentiate their services and make their own service model using a standard information model. Now a day’s operator needs their transport networks with high bandwidth and shifting traffic patterns. SDN provides all these facilities to maintain network according to their needs.
This resource is explains about Legacy systems and about their managing problems. Sometimes organizations do not have a choice to continue their legacy systems. For business development and industrial strength, it is necessary to replacing core systems. I select this resource because it is provide issues of legacy systems. Legacy systems are too costly to maintaining and upgrading now days. Without upgrading the current system sometimes, reflect on business losses. Legacy systems have supporting unique business. It also provides invaluable knowledge with historical data. Due to cost-effective technology, many IT systems are working on older legacy systems.
It is difficult to hire qualified programmers to maintain legacy systems, because legacy systems working on old technologies. When a change in legacy systems requires a major expenditure and management does not approve many times. It is too difficult to change such massive systems, because they are changing business climate and they have high risk of failure. Changing in legacy system take more time as calculated previously and vice versa costing also increase.
Many systems are useless without IT systems as legacy systems have old technologies to maintain data and process that will be a big task to modern system to embed these old systems with new modern IT technologies. Migration of these legacy systems is best suited for organisations looking to implement an Internet-based business model. Maintenance and migration are too cost effective for legacy systems. IT systems makes better to an organization working process and change business growth of an organization. Information technologies attach previous or current system to mobile phones for easy and fast access from anywhere.
This resource is about Facebook Cambridge Analytica Scandal. Aleksandr Kogan was created an application for digital survey. He is an American researcher work in the well-known company “Cambridge Analytica”. Kogan makes an application for a digital survey from Facebook users for their Digital life. 50 millions of Facebook users are involved in this survey according to different agencies. That app violated Facebook terms and conditions collect data of users and their friends. Kogan took permissions from Facebook. Facebook allows Kogan to collect data of users and their friends if their privacy settings allowed it. According to Facebook, Kogan lied to Facebook by saying he was collecting the information for research purposes.
According to this resource the Cambridge Analytica all data was deleted provided by Kogan. According to Times report Cambridge Analytica pay Kogan more than $800,000 for creating his app and keep a copy for his own research. After this incident Facebook, change many settings. No one can search any person from his or her phone number and email id. Facebook make it easier for users to change their settings according to their needs. Cambridge Analytica had suspended Alexander Nix, who is chief executive officer. According to many secret agency data was used in campaign for psychotic test of different users of Facebook.
Week 5: Description of WannaCry or NotPetya Malware
This resource is about testing and performance tool. I am taking JMeter as a tool for performance testing. It is free of cost. JMeter is open source software designed by Apache software foundation. It is used for performance testing of different application. This is a pure java application to load test of software. It is showing functional behavior and measure performance in different aspects. Apache JMeter may be used to static and dynamic resources performance testing.It has ability to load testing and measure performance of many sources, such as web application, databases, and java objects. It provides dynamic HTML report. It is not a browser; it is software, which works at protocol level. For testing any web application, server, and protocol, runs JMeter in GUI mode. After that go to File menu and start recording. This is first step of test plan building next step is load testing, in which configure the injectors that will run JMeter.
JMeter requires java environments and java development kit.
I select this resource because it is explain about JMeter in brief and in useful way.JMeter version 4.0 is computable with jdk 8 and jdk 9. Some optional requirements of JMeter are java compiler, SAX XML parser, Email Support, SSL Encryption, JDBC driver, JMS client, and libraries for Active MQJMS. To run JMeter, different files to run according to operating systems, such as in case of windows, you should run jmeter.bat or in case of Unix should run JMeter file from bin directory. After some time GUI should appear. That will be easy to monitor and manage resources. JMeter tested complete application and show different graph for performance measurement.
This resource is about failure of payroll system of Queensland Health Department. I select this resource because its explain each and everything about that failure of IT project. I am taking a case of Queensland Health department. They want to implement a new roistering and payroll system. IBM Australia was selected as prime contractor for implementation of that project. The outcome of that project was described as a failure in many aspects, such as performance issues, high delay in project delivery, incorrect distribution of payment, and over budget. IBM charged $21 million for that payroll system project, which is four times more than contract price. Failure can be attributed in different terms, as unclear business requirements, ineffective project governance, and poor management for development process. By this project, failure 75000 employees are affected. This project was around 18 month late from given deadline. There are many other reasons also for failure of this payroll system. In that project identified some problems were;
- Inaccurate payroll payments – some time they pay double to employees
- Defective functionality – incorrectly calculation of leaves
- Upgrade process was failed – data transfer between SAP and workbrain take long time
- Not properly migration of data from legacy system- 20000 forms are not processed
- Data Error – Time code identifier could not processed other files, which are created at same time
It is so necessary to understand about requirement by the organization, so software company analyze according to that and make a suitable application as per requirement.
References
Alcorn, . P., 2018. AMD Rising: CPU And GPU Market Share Growing Rapidly. [Online] Available at: https://www.tomshardware.com/news/amd-cpu-gpu-market-share,36592.html[Accessed 12 September 2018].
Auster, M., 2013. OpenFlow-enabled. [Online] Available at: https://www.opennetworking.org/wp-content/uploads/2013/05/sb-of-enabled-transport-sdn.pdf
[Accessed 03 09 2018].
Evans, B., 2017. The Top 5 Cloud-Computing Vendors: #1 Microsoft, #2 Amazon, #3 IBM, #4 Salesforce, #5 SAP. [Online] Available at: https://www.forbes.com/sites/bobevans1/2017/11/07/the-top-5-cloud-computing-vendors-1-microsoft-2-amazon-3-ibm-4-salesforce-5-sap/#4adccb5f6f2e[Accessed 18 September 2018].
Giles, M., 2018. CPUs and GPUs. [Online] Available at: people.maths.ox.ac.uk/gilesm/cuda/lecs/lec0.pdf[Accessed 04 09 2018].
Korneev, S., 2017. Artificial Intelligence Operating System. [Online] Available at: https://www.researchgate.net/publication/320173364_Artificial_Intelligence_Operating_System [Accessed 04 09 2018].
Lopez, D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
McLean , A., 2016. Netflix to hand infrastructure heavy lifting to AWS. [Online] Available at: https://www.zdnet.com/article/netflix-to-hand-infrastructure-heavy-lifting-to-aws/[Accessed 04 09 2018].
Mubashir , V. P., 2013. IP Address Classes and Ranges Explained with Subnet Mask. [Online] Available at: https://www.smartpctricks.com/2013/03/ip-address-classes-and-ranges-explained-with-subnet-mask.html [Accessed 29 08 2018].
Stallings, W., 2018. Software-Defined Networks and OpenFlow – The Internet Protocol Journal, Volume 16, No. 1. [Online] Available at: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-59/161-sdn.html [Accessed 03 09 2018].
Stokel-Walker, C., 2018. Move over CPUs and GPUs, the Intelligence Processing Unit is the super-smart chip of the future. [Online] Available at: https://www.wired.co.uk/article/graphcore-ai-ipu-chip-nigel-toon [Accessed 12 september 2018].
AFR, 2016. IT disasters now part of modern life. [Online] Available at: https://www.afr.com/technology/it-disasters-now-part-of-modern-life-20160628-gptyw6
[Accessed 18 September 2018].
arrkgroup, 2018. Reasons to move away from legacy systems. [Online] Available at: https://www.arrkgroup.com/thought-leadership/reasons-to-move-away-from-legacy-systems/[Accessed 03 09 2018].
Bloomberg, 2018. Facebook Cambridge Analytica Scandal: 10 Questions Answered. [Online] Available at: https://fortune.com/2018/04/10/facebook-cambridge-analytica-what-happened/[Accessed 05 09 2018].
Certiology, 2018. IPV6 vs IPV4. [Online] Available at: https://www.certiology.com/computing/computer-networking/ipv6-vs-ipv4.html[Accessed 04 09 2018].
Firstpost, 2018. Smartron unveils tronX, an artificial intelligence based operating system to assist users. [Online] Available at: https://www.firstpost.com/tech/news-analysis/smartron-unveils-tronx-an-artificial-intelligence-based-operating-system-to-assist-users-3942083.html [Accessed 12 September 2018].
Forbes, 2017. How Similar Are WannaCry And Petya Ransomware?. [Online] Available at: https://www.forbes.com/sites/quora/2017/07/05/how-similar-are-wannacry-and-petya-ransomware/#25289b8446eb [Accessed 18 Sepetember 2018].
Fruhlinger, J., 2018. What is WannaCry ransomware, how does it infect, and who was responsible?. [Online] Available at: https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html [Accessed 03 09 2018].
JMeter, A., 2018. Apache JMeter™. [Online] Available at: https://jmeter.apache.org/index.html [Accessed 5 september 2018].
LeClerc, . M., 2018. The basics of SDN and the OpenFlow Network Architecture. [Online] Available at: https://noviflow.com/the-basics-of-sdn-and-the-openflow-network-architecture/[Accessed 18 September 2018].
Manongdo, R., 2018. Queensland Health Payroll System – a case study on Business Process Management and application Enterprise Integration. [Online] Available at:https://www.academia.edu/8096282/Queensland_Health_Payroll_System__a_case_study_on_Business_Process_Management_and_application_Enterprise_Integration [Accessed 5 september 2018].
Microsoft, 2018. Microsoft Azure for Research Overview. [Online] Available at: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/microsoft-azure-for-research-overview.pdf[Accessed 12 September 2018].
News, C., 2018. ITU plan to shift internet from IPv4 to IPv6 panned by engineers. [Online] Available at: https://www.computing.co.uk/ctg/news/3033386/itu-plan-to-shift-internet-from-ipv4-to-ipv6-panned-by-engineers [Accessed 11 September 2018].
Olena, 2018. GPU vs CPU Computing: What to choose?. [Online] Available at: https://medium.com/altumea/gpu-vs-cpu-computing-what-to-choose-a9788a2370c4
[Accessed 04 09 2018].
Security Response Team, 2017. What you need to know about the WannaCry Ransomware. [Online] Available at: https://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attack [Accessed 04 09 2018].
Zoufaly, F., 2002. Issues and Challenges Facing Legacy Systems. [Online] Available at: https://www.developer.com/mgmt/article.php/1492531/Issues-and-Challenges-Facing-Legacy-Systems.htm [Accessed 05 09 2018].