Reference no: EM131204475 , Length: word count:3000
Tasks -
There are ten (10) tasks, one for each week: the tasks are detailed below. There is a table to complete for each task. Please fill in the information required. An example of a completed task is below. Note the first response (resource 1) is good - so aim for something like this. The second response (resource 2) is not acceptable, so if you submit anything like it, you won't pass the assignment! The reasons? Poor resource selection (Wikipedia), no Harvard reference and a block cut and paste from the site (no citation, no original content).
Find two resources that explain aspects of IT Service Management.
1. The text discusses a number of modern mass-storage technologies however there have been huge advances since the early days of computing. Collect and summarise two online resources that explain and describe two mass storage technologies that are not mentioned in the text that were prevalent before 1980. The resources must not be about the same technology.
2. The text briefly makes mention of embedded (operating) systems. Collect and summarise two online resources that describe specific embedded operating systems that are not mentioned in the text. The resources must not be about the same embedded operating system.
3. The "the Internet of things" is an emerging trend towards smart interconnected embedded technologies that allow us to monitor and control our environment. Collect and summarise two onlineresources that describe examples or applications of the Internet of things. The resources must not be about the same application or example.
4. HTTP is an example of a text-based (human readable) application layer protocol. Collect and summarise two online resources that describe other text-based application layer protocols. The resources must not be about the same protocol.
5. An increasing computer security threat is the rise of "ransomware" attacks. Collect and summarise twoonline resources that discuss specific examples of ransomware attacks. The resources must not be about the same incident/attack.
6. SLAs and network design with redundancy are two ways to reduce the risk of a loss of network connectivity. However, reports of major network outages and their impacts on organisations regularly make news headlines. Collect and summarise two onlineresources that provide examples of these outages and their impacts on the business and/or its customers. The resources must not be about the same outage/business.
7. Organisations are increasingly using social networking to engage with their customer base. Collect and summarise two onlineresources that provide examples of organisations using social networking successfully to expand or improve their business. The resources must not be about the same organisation.
8. There are a multitude of paid and open source DBMS solutions available on the market. Collect and summarise two online resources that discuss examples of the more commercially popular DBMS vendors and that describe who use their products. The resources must not be about the same vendor.
9. Outsourcing all or part of an organisation's IT function has had mixed outcomes but for some organisations it has been a wise decision. Collect and summarise two online resources that relate to two specific outsourcing success stories (i.e. two organisations where outsourcing has worked out well). The resources and your summary should explain why the outsourcing was a success. The resources must not be about the same organisation.
10. The text discusses the need to manage scope, time, cost, quality and risk in IS implementations. Of these, cost is arguably the most difficult to manage and the cause of many IS implementation project failures. Collect and summarise two online resources that describe examples of where IS implementation project costs have vastly exceeded the original budget. The resources must not be about the same organisation/project.
Attachment:- Assignment.rar