Reference no: EM132367358
Tasks
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required.
Note: Each resource summary should be around 200-300 words.
Each summary should briefly explain:
- What the resource is about
- Why you selected it
- What are the main points or key information covered in the resource
- Why the resource was useful.
For more advice about how to complete the assignment, as well as examples and information about selecting good resources.
Week 1
The text discusses about different architectures for parallel processing used for Multiprocessor Machines such as multiple-instruction stream - multiple-data stream (MIMD), single-instruction stream - multiple-data stream (SIMD) etc. Find and summarise ONE resource that compares between MIMD and SIMD architectures. The resource, and your summary, must focus only on MIMD and SIMD architectures.
Week 2
The text discusses about one of the common problems that can arise during resource allocation in operating systems, which is known as deadlock.Find and summarise ONE resource that describes an algorithm of either deadlock avoidance or deadlock prevention. The resource, and your summary, must focus on a single algorithm of either deadlock avoidance or deadlock prevention, NOT both.
Week 3
Internet of things (IoT) is an emerging trend towards smart interconnected embedded technologies that allow us to monitor and control our environment. Find and summarise ONE resource that describe applications of the Internet of things in the field of Smart Farming.The resource, and your summary, must focus on application of IoTONLY in the field of smart farming.
Week 4
The text discusses about IPv4,however, IPv6 is the emerging protocol which is in the process of superseding IPv4.Find and summarise ONE resource that describes about the technologies that are used to run both protocols simultaneously over the same internet infrastructure.
Week 5
Network security has become a major concern of ICT world, and user authentication is one of the popular tools to assure network security. Find and summarise ONE resource that describesanyONE authentication mechanism except password. The resource, and your summary, should focus purely onONLYONE type of authentication mechanism.
Week 6
The text discusses about a massive data breach that happened in Target company, which is referred as ‘Target Breach'. Find and summarise ONE resource that describesanother recent (within last 5 years) well-publicised attack or security breach on a public company or government organisation.The resource, and your summary, should describe about A SINGLE EXAMPLE of security breach.
Week 7
The text briefly discusses aboute-commerce and e-business. Find and summarise ONE resource that discusses the relationship between e-commerce and e-business. The resource, and your summary, should describe similarities and difference between e-commerce and e-business.
Week 8
The text book discusses about the success story of ARI (Automotive Resources International) company after implementing SAP BusinessObjects Explorerand integrating it with HANA. HANA is SAP's in-memory computing platform that is deployable as an on-premise hardware and software appliance or in the cloud. Find and summarise ONE resource that describes the success story of adapting SAP HANA by another local or international company. The resource, and your summary, should focus on the story about ONE single company (which is not ARI company).
Week 9
Rapid application development (RAD) is a process of creating a workable system in a very short period of time. There are few recently developedframeworks available in market to undertake RAD. Find and summarise ONE recent (within last two years)resource that describesand recommends aboutONEframework for RAD.
Week 10
The failure to successfully implement large scale IS has led to the downfall of many previously successful companies. Find and summarise ONE resource that describes few reasons of implementation failure for large scale IS. The resource, and your summary, should analyse at least three reasons of the failure.
Attachment:- parallel processing.rar