IT Service Management
Task The past decade has witnessed tremendous advances in computing, wired and wireless communication, and storage technologies. Discuss the main features and applications of two mass storage technologies namely: direct-attachedstorageand network-attached storage.
What is the difference between SAN, NAS and DAS?
DAS (Direct Attached Storage): It can be described as the computer storage, which has been connected to the server or a computer, which is connected to the server or computer through cable. These storage devices could be externally to the server or the computer and it is always connected to the server. This article presented the problem is related to this device that states that there is limited number of disks those could be supported by the server only. According to Deen (2018), DAS is the most appropriate approach for the data storage for a server or a computer.
NAS (Network Attached Storage): this storage media can be represented as the wireless storage device for the server or the computer that could be made available for more than one user. It allows the users to share the same stored data and thus make it much appropriate for the users. NAS has its own operating system, storage, and management interface that allows it to be easily connected with the computers through even with the existing ethernet connection. There are many beneficial aspects of the application of NAS as it is very easy to access and low lag time that makes it more popular.
Task Real-time operating systems are operating systems that guarantee a certain capability within a specified time constraint. Discuss the main benefits of real-time operating systems for the health sector.
Real time operating system architectures are important for medical designers
Real time operating system has many advantageous impact in the healthcare sector that allows better and effective data collection and data execution in manner to accomplish the objectives and activities within the health care. This operating system is much more reliable and consistent than operating systems being practiced traditionally and thus make it an appropriate option for enhancing the efficiency and effectiveness of the healthcare sector. It allows the user to collect very sensitive and personal information related to the patient along with a very less response time in manner to execute the objective. It has become much more popular after the integration of IoT and RTOS within the healthcare sector and is also being applicable in the crucial sectors of the health care including ICU, risky wards and many more. There are many other advantages such as: cots could be decreased, treatments could be enhanced, disease management system could become much effective and efficient through the collection of data using the Real time operating systems. This could be helpful measure in eliminating the human error as it could affect severely to the medical condition of the patient and thus enhance the way of medical care in the health sector.
Mass Storage Technologies
Task Mobile Cloud computing has gained a wide acceptance for organisations as well as individuals by introducing computation, storage and software based services. Explain the security and privacy issues in relation to the use of the mobile Cloud computing in the finance sector.
Security, Privacy and Challenges in Mobile Cloud Computing (MCC):- A Critical Study and Comparison
Mobile cloud computing has become one of the most innovative and popular technology that is generally being used by almost the whole world. Technology advancement has no doubt change the face of the world, however, there are certain security and privacy issues related to the application of this technology that can hamper the individual in many ways. This article stated that data being stored or exchanged using the network of the mobile cloud computing is vulnerable to data breach or intrusion that could allow an unauthorized user to access the data or information saved or exchanged using the network. Chaubey and Tank (2018) stated that malwares are the most affective malicious code that could lead to the manipulation, deletion or exposing of the data or information by an unauthorized person. Software vulnerabilities is another concern that could lead to privacy and security issues to the individual using mobile cloud computing. Mobile network security was never provided high concern while developing mobile devices or using the network that makes it less reliable for the individuals as it could be a window for the intruders to access the network and thus affect the privacy and security of the individual utilizing Mobile Cloud Computing.
Task TCP/IPis consists of communication protocols used to transfer packets between computer hosts within the network. In TCP/IP, the transport layer is responsible for providing the application layer with session and datagram communication services. Discuss the common standards at the transport layer.
TCP/IP Protocol Fundamentals Explained with a Diagram
User Data Protocol (UDP) and Transmission Control Protocol (TCP) are the common standards for data transport layer those have been being utilized mostly in the current world. Arora (2018) stated that TCP can be categorized in reliable source however, UDP is not much reliable as compared to that of TCP and thus being widely used in the networks for the exchange of data or information. TCP provides error control and extensive data flow control for ensuring that the data or information being travelled using the network is capable of ensuring its safety and thus enhance the security and possibility of data delivery. Packets of data are generally used in the UDP for the exchange of information and integrity could be evaluated after the delivery of the message. TCP is capable of handling the data streaming by the bytes stream and do not differentiate between the transmission and indication of the signal message. The packets created in the UDP transport layer those does not have any definite boundary and thus after collaborating the messages it yields the original message. This helps in ensuring that the message sent is received to the desired individual and actual message has been delivered to the user accepting message.
Real Time Operating Systems
Task The Internet of Things (IoT) is a system of interrelated computing devices that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Discuss the cyber security challenges faced by the health sector in this IoT era.
IoT has been no doubt became the integral part for the technologies and thus enhancing the experience or every sector with the help of real data collection and execution. It has been widely spread in the healthcare sector however, it is also vulnerable to security issues such as intrusion, DDoD attacks, malwares, viruses and many other malicious coding those could affect the data or information saved in the database in many ways. Most of the recent activities of intrusion and breaches have remind the world that the data or information being transferred or saved in the internet are vulnerable to breaches and intrusion that could result in the unauthorized access of the individual. Medical sector always collects very personal and sensitive information and expose of this information could affect the user in many ways including financially and physically. IoT is generally comprised of sensors those could be hacked in very easy manner through proper coding that could allow the access of the devices based on the IoT to use it according to their purpose. Proper awareness and training is needed to utilize the devices or technology in secured manner as not utilizing efficiently could allow the intruders to access the data or information saved in the network.
Task Internet of Things (IoT) Cloud is a model designed to facilitate the information society, enabling advanced services by interconnecting physical and virtual things based on, existing and evolving, interoperable information and communication technologies through ennoblement of ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources. Explain the importance of real time data capture capability, data visualisation, data analytics, and API protocols in the application of IoT Cloud.
Health sector is one of the sensitive sector in the current situation as very personal information are being collected for the medical care and thus the databases of the health sector is the most targeted place in the present time. This article was a survey on twenty-five different cloud companies who provides cloud services to the health sector and it was found that most crucial aspect that does not meet the medical requirement is interaction with the HER system. This is the most lacking aspect of the IoT cloud services despite of allowing real time data collection and execution and thus, important data or information are not being collected in the right time. Interoperability is the other factor that lacks in this technology as this technology leads to the locking of the data or information to the single computer that could lead to loss in the patient care system. Other challenging factor in the application of IoT is that the data has been meaningless if the collected real time data has not been in the context with the full patient record. Data breaches or intrusion are some of other challenging factors those are drawing back the effective implementation of the IoT cloud.
Mobile Cloud Computing
Task A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests, backgrounds, and activities. However, there are different security and privacy threats that target every user of social networking sites. Provide five solutions to deal with these security threats.
A Survey on Privacy and Security Issues in Social Networking Services
Social Networking Services are the most popular technology nowadays that is having a tail of security issues with it. Through proper implementation and protective measures, these networks could be highly secured and could result in enhancing the security of the network. Watermarking is a method that could be used as a signature on the digital media files that will allow the owner to retain his or her ownership. Co-ownership, and steganalysis are some of the other security measures that could be applied to the files containing digital media in manner to manage the ownership between more than on e user based on the policies. There are many technical ways to make it happen and thus, distribute the ownership of the same file. Encryption is one of the most secured and advanced technology for the current digital world that allows user to encrypt the file using a unique code and receiver will have to use the unique decryption key to access the file. Digital oblivion is another advanced technology that allows the user to set expiry date or time on the digital media file in manner to remove the data access of the file after a certain time and thus secure the file.
Task Big data has been considered to be a breakthrough technological development over recent year. Big data is based on large volumes of extensively varied data that are generated, captured, and processed at high velocity. Discuss the main challenges as well as the social and economic values for organizations in adopting big data.
Bhadani and Jothimani (2018) stated that big data has more than expected advantages however, current world is not entirely ready for the implementation of big data in each sector. They stated that flexibility, Handoop management, and less knowledge about the technology are the most vital challenges that is being faced for the complete implementation of the Big Data analytics. Data is being stored in the cloud and physical databases and more than expectations, data are being collected in manner to bring out the maximum efficiency of the technology that could lead to the shortage of the space after some time. Technologies based on the big data analytics need learned people and people with knowledge only could utilize this technology in an efficient manner and assigning individuals with less talent and knowledge would not might be able to execute the objectives in an effective and efficient manner. Privacy issues can be categorized in the challenges being faced by the organization while utilizing the big data analytics. Big Data analytics generally collects the data or information related to the choices and interest of the individuals connected to the network and thus could affect the privacy of the individual of this data reaches to an unauthorized person.
Agile and Lean Practices
Task There has been a growing interest in the application of agile and lean practices for software development. Discuss the benefits of agile and lean practices and their impacts on project constraints.
Not many studies have been performed yet for the calculation of the impact of lean and agile practices on the project constraints whereas, Nurdiani, Borstler, and Fricker (2018) had executed this study that implies that these practices could result in either positive or negative both impacts on the constraints of the project. It can be stated that such practices do not always have negative impact mostly these practices could be helpful in accomplishing the constraints of the project in an effective manner and in easy way. There are many advantages on the application of these practices that include the team management, better communication, accomplishment of tasks before the deadline and thus it could affect the project in positive manner. Adoption is another beneficial aspect of these practices including the identification of candidates with capability, correct resources pool and many more. Thus, it can be stated that utilizing these practices in an efficient manner could allow the team leader to manage the team and the objectives of the project within the scheduled time and budget set during the project planning. These practices could be a boon for the organization or the heads involved in the project for the accomplishment of the project constraints and meeting the requirements of the project.
Task The availability and implementation of information and communication technologies (ICT) is increasingly vital to all dimensions of a nation’s inclusive, equitable and sustainable economic development and growth strategies. Discuss how ICT is fundamentally changing the nature of economic, environmental, and social relationships globally.
ICT is the most applicable sector for the current world and it is breaking the boundaries of the communication and allowing the whole world to communicate with each other. Globalization was established in the very early stage however, ICT has boosted the word ‘globalization’ through providing means of communication either through social media or mobile phone. Thus, a better communication could yield in the betterment of the society through enhancing the economic and financial value of the products and services. It is beneficial for both the customers and service providers in many ways and providing a bridge to be connected with each other and make the exchange of information, goods, or services. This technology has been spread globally, thus has become the largest crowd of the customers and the business persons and thus attracting everyone. Social medias have became very common and almost every individual connected with the internet is using the social media to interact with different persons.
References
William, J., Jenkins, B. and S. Kartz, R. 2018.The Role of the Information and communication technology. [online] Sites.hks.harvard.edu. Available at: https://sites.hks.harvard.edu/m-rcbg/CSRI/publications/report_22_EO%20ICT%20 Final.pdf [Accessed 29 Jan. 2018].
Nurdiania, I., Börstlera, J. and Frickera, S. 2018. www.bth.se. [online] Bth.se. Available at: https://www.bth.se/com/inu.nsf/attachments/AgileTertiaryStudy_pdf/$file/AgileTertiaryStudy.pdf [Accessed 29 Jan. 2018].
Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Abaker Targio Hashem, I., Siddiqa, A. and Yaqoob, I. 2018. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges – IEEE Journals & Magazine. [online] Ieeexplore.ieee.org. Available at: https://ieeexplore.ieee.org/document/7888916/?part=1 [Accessed 29 Jan. 2018].
Gunatilaka, D. 2018. www.cse.wustl.edu.[online] Cse.wustl.edu. Available at: https://www.cse.wustl.edu/~jain/cse571-11/ftp/social.pdf [Accessed 29 Jan. 2018].
Nccgroup.trust. 2018. Cite a Website -. [online] Available at: www.nccgroup.trust. https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/february/security-of-the-internet-of-things-iot-in-healthcare/ [Accessed 29 Jan. 2018].
Bhadani, A. and Jothimani, D. 2018.arxiv.org. [online] Arxiv.org. Available at: https://arxiv.org/ftp/arxiv/papers/1705/1705.04928.pdf [Accessed 29 Jan. 2018].
Nccgroup.trust. 2018. Cite a Website -. [online] Available at: www.nccgroup.trust. https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/february/security-of-the-internet-of-things-iot-in-healthcare/ [Accessed 29 Jan. 2018].
Moon, J. 2018. Real time operating system architectures are important for medical designers. [online] Newelectronics.co.uk. Available at: https://www.newelectronics.co.uk/electronics-technology/real-time-operating-system-architecture-is-important-for-medical-designers/35970/ [Accessed 29 Jan. 2018].
Deen, G. 2018. NAS vs DAS vs SAN | D-Tech Consulting. [online] D-Tech Consulting. Available at: https://dtechconsulting.com/nas-vs-das-san/ [Accessed 22 Jan. 2018].