Reference no: EM132706181
Discussion
Cloud computing is a relatively new offering delivering services that have been previously hosted on internal infrastructure. This creates an impressive landscape where the services being offered are not new but rather the way they are being presented has changed into such a way the increases there availability and usability. This has to lead to service providers playing catchup to expand their offerings, not with just new and unique technologies but also well-established ones.
Taking the lead cloud provider, Amazon Web Services, as an example, the growth in new services is approaching a near-exponential gradient. In 2018 AWS offered a total of 95 services; this grew to 149 services in 2019 (Robbins, 2019). I'm sure in the future this growth will slow down, but as my research project will take place during this time of exponential expansion of cloud services, the number of services being investigated will prove challenging. I foresee that a limit will be placed on the number of services included in the investigation, focusing on the core services to demonstrate the usefulness of the IT artefact.
The other major foreseeable issue with researching cloud services is the lack of standardisation between providers (Jackson, 2017). While AWS leads the way, the other providers like Azure and GCP are catching up really fast. Being second to the market with similar services does come with its own advantages like improving on what your competitors are already offering. This has lead to divergence in the products offered and does make it harder to compare the services, which would mean a base requirement for cloud computing, cloud storage, or cloud containerisation would differ between vendors. To ensure the research project is able to prove its core question, the services selected for investigation will need to consist of the same core functions.
Both of the above issues are a result of the ever-expanding offering in cloud technology. Moor's law applies to the increasing number of resistors we're able to fit on a given space of silicone, but I think this says much more of the pace of technological advancement (Data Center Knowledge, 2016). As we're able to do more through technology, we use that technology to increase the speed at which we innovate at an ever-increasing rate.
1. Continue to engage with your colleagues in further discussions, considering and commenting on how your colleagues explained the challenges that they identified, potential impact and mitigation strategies.
2. Provide constructive feedback on your colleagues' ideas and offer suggestions or alternative strategies that might assist them in mitigating the challenges they have identified.
3. If possible, provide links to resources that might be helpful during the research project.
Discussion Response 2
Jotting down of items that can possibly go wrong, indicating on how likely this is to happen, adding a level of how severe this can affect a particular project or research study and finally matching this with an action task on how to possibly minimize from happening or action task on how to completely avoid from happening is collectively known as a risk management table (Chapman & Ward, 1996). By creating this table and completing the fields early on, a researcher can potentially avoid big problems later. One item mentioned by Bell (2014) is timing. She stated that in almost all research study timing is a factor that needs to be considered. Timing as a risk item having probability level as high and impact level as high too. Matching this with a mitigation task of creating and possibly following the schedule. Turabian (2007) further adds that another possible mitigation plan is by creating headers and pre-made section titles in the research paper first and leaving them blank. After which any section that could potentially be filled, should be filled and thus effectively following a storyboard mechanism.
In my research study on success factors in telecommuting in Metro Manila, there are a couple of items that have been identified and has been placed in the risk management table. First risk factor item is low participation numbers in the survey. This has been assigned a high level or probability as most survey research methods point out about this as survey's greatest weakness. With regards to impact this has been assigned as a high level as well. Mainly because the next phase which is the IT artefact generation and interview all depends on the proper results from the survey. In order to minimize the worst-case scenario of survey low participation from happening, a combination of tasks will be put in place. Online or web-based surveys will be sent out early to target participants. Printed out copies of survey questionnaire, and pens, will be brought to the field. Tablets with 4G connection that can access the online survey will also be brought to the field. Last possible mitigation method is to assign a longer survey data collection time in the project plan and timing section.
Another risk factor item specific to my research study is web form or UI or flow not working as expected in computer browsers or mobile phone. This risk factor item is based on the telecommute readiness tool that I plan to code and build as part of the IT artefact requirements. This issue may or may not happen depending on a lot of factors especially the PHP and HTML coding part and thus has been assigned a mid-level probability. The IT artefact can still work as expected on other browsers or other mobile phones if such issues are incurred. It's just a matter of additional code debugging time that will need to be factored in thus the assignment of mid-level for the impact. In order to minimize and hopefully avoid completely this issue from happening, initial web-testing and further web-testing to all computer types and all identified browser types will need to be put in place during the IT artefact build schedule.
To close, there is no definitive list and no definitive amount of risks that can be identified in a research study. It is possible that one researcher could end up with a very long list of risk factors for a particular research study while another research could only point out a few. What is important here is the ability to foresee, list and acknowledge possible delay factors or possible show stopper factors and how best to minimize or avoid them.
1. Continue to engage with your colleagues in further discussions, considering and commenting on how your colleagues explained the challenges that they identified, potential impact and mitigation strategies.
2. Provide constructive feedback on your colleagues' ideas and offer suggestions or alternative strategies that might assist them in mitigating the challenges they have identified.
3. If possible, provide links to resources that might be helpful during the research project.
Discussion Response 3
There are a few difficulties and difficulty to any fruitful project. A dissertation research venture which is gear toward making new/unique information accompanies numerous difficulties to meet the task points and goals that tends to the examination questions. Subsequent to surveying my exploration proposition, points and targets, procedure, and examination question, I foresee the underneath parts of my exploration may represent a few difficulties and misfortunes:
• Information assortment is a significant part of my exploration that will represent a ton of difficulties in getting the necessary information, the area of the information, the span of information assortment, the authenticity of information, and affectability of information. As I plan to utilize a subjective way to deal with gather information, how I get ready for interviews, creating surveys for interviews, the members for interviews, the nature of information, and how to put together and store the information flawless are difficulties I envision in my exploration. featured, information assortment is basic to explore and relying upon the information assortments technique, investigates could experiences difficulties with getting the data from members in an examination.
• Another difficult angle is Cleaning of information is one of the significant and one of the dubious errands in information investigation. As information comes from various sources so they have distinctive information arranges too. In this way, it's a moving errand to clean information and join them in a similar configuration. Change in Technology: This is another likely test in information as innovation evolving quickly. Associations face the genuine test to proceed onward innovation stack and should put resources into innovation. Consistence: This is additionally perhaps the greatest test for information. Most of the data put away in information is private and delicate, so it implies an association must guarantee that they are fulfilling industry guidelines of a nations rules and guidelines.
Sloppy Data: information is adaptable in nature. Information could be organized, unstructured and semi-organized information coming from on the web and disconnected sources. in this way, it's an issue for an undertaking to manage such unstructured information.
The volume of information: Data is produced quick and When information gets gathered at such a fast movement and in such colossal volumes, the main concern is its stockpiling. To relieve this issue, use cloud innovation is the best arrangement.
Information protection: Data security is probably the greatest danger in huge information. Associations or ventures utilize touchy information of clients around the world. When there's so much classified information lying around, the exact opposite thing an undertaking need is secure information. An answer for alleviate issue could be a reasonable guide and the correct innovation and update in existing security framework.
1. Continue to engage with your colleagues in further discussions, considering and commenting on how your colleagues explained the challenges that they identified, potential impact and mitigation strategies.
2. Provide constructive feedback on your colleagues' ideas and offer suggestions or alternative strategies that might assist them in mitigating the challenges they have identified.
3. If possible, provide links to resources that might be helpful during the research project.
Discussion Response 4
The Dissertation required for completion of the Master's program is expected to bring to the fore skills we have learnt throughout our modules over the years. It draws on mastery of self-discipline, time management and other research skills necessary to complete a 9-months long, inter-disciplinary project.
My research sets to investigate challenges in the use of virtualisation and sandboxing techniques for web-malware prevention in SMEs in developing nations. The research will utilise both quantitative and qualitative methods to answer the three research questions posed by the study. Below are some of the challenges I may face and how I might address them.
1. Continue to engage with your colleagues in further discussions, considering and commenting on how your colleagues explained the challenges that they identified, potential impact and mitigation strategies.
2. Provide constructive feedback on your colleagues' ideas and offer suggestions or alternative strategies that might assist them in mitigating the challenges they have identified.
3. If possible, provide links to resources that might be helpful during the research project.
Discussion Response 5
The method of risk assessment is a process for decisions to be taken. There are five essential steps in risk management which are called the risk management process. It starts by defining hazards, then analyzes hazards, prioritizes hazard, implementing a solution and finally tracks the risk.
For most research studies, good statistical skills are a general prerequisite. This would mean that often it has to be obvious how the results will be collected and the data displayed in a timely way. My research study is based on Network solutions. I have identified a few issues that may arise associated with the collection of data, which I will require for my research. By constructing this table and completing the fields early, a researcher can later escape major problems.
Values of Scale Based on the likelihood and impact on the project (1 - Lowest to 5 - Highest)
1. Continue to engage with your colleagues in further discussions, considering and commenting on how your colleagues explained the challenges that they identified, potential impact and mitigation strategies.
2. Provide constructive feedback on your colleagues' ideas and offer suggestions or alternative strategies that might assist them in mitigating the challenges they have identified.
3. If possible, provide links to resources that might be helpful during the research project.
Attachment:- Week response.rar