Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Individual Interview Of IT Professional

Individual Interview of IT Professional

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Interview Interview of IT Professional

The representative chosen for the interview is an IT manager that works for a multidisciplinary organization. The disciplines that the company focuses on include magazine publishing, security training, equipment provision, and a Non-Governmental Organization (NGO)

The representative is recently working on the development of a Management Information System (MIS) for the NGO that is working under the umbrella of the main company. The MIS system would be able to track the entire progress of the NGO, its employees, and its projects ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"op5BRNI2","properties":{"formattedCitation":"(DeLone & McLean, 2016)","plainCitation":"(DeLone & McLean, 2016)","noteIndex":0},"citationItems":[{"id":81,"uris":["http://zotero.org/users/local/WKtM8IGm/items/YJHKS33R"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/YJHKS33R"],"itemData":{"id":81,"type":"article-journal","title":"Information Systems Success Measurement","container-title":"Foundations and Trends® in Information Systems","page":"1-116","volume":"2","issue":"1","source":"DOI.org (Crossref)","DOI":"10.1561/2900000005","ISSN":"2331-1231, 2331-124X","journalAbbreviation":"FNT in Information Systems","language":"en","author":[{"family":"DeLone","given":"William H."},{"family":"McLean","given":"Ephraim R."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (DeLone & McLean, 2016). The MIS would make sure that each and everything is monitored and properly recorded to make sure that the donations of the people are used validly. The other applications that have been recently completed includes the development of management software for the finance department to help with record-keeping as well as performing financial functions on the records for the organization.

The company that the subject is working under recently implemented an attendance system that would manage the performance of the employees based on their punctuality. It would make sure that the rules are strictly followed with regards to attendance and penalty would be posed on anyone who offends the system multiple times. The software is integrated with a fingerprint scanner to ensure that there is no ambiguity in record keeping.

Most of the applications that are developed for the organization are developed in-house. There is a team of highly professional and enthusiastic individuals that work on the projects. These projects are undertaken to improve the overall organizational structure and are implemented properly. All the processes that are related to the development lifecycle are conducted in-house.

As the organization requires very sensitive and efficient software so there is careful consideration regarding how the whole project lifecycle is conducted and achieved. It is also to make sure that everything is done according to the policies laid down by the organization.

Requirement gathering depends upon the magnitude of the project. If the project is fairly small, then a week could be spent gathering the requirements. On the other hand, if the project is of a larger magnitude, then two to three weeks are spent in which each of the users of the project and the senior management is interviewed to get an insight on what they require from the software.

Since most of the software is developed in-house that is why the team is well aware of the options they have. As a result there is no need to search for software/hardware opotions that might be available unless the software is to be deployed on a new machine.

Documenting is necessary for anyone who comes in contact with the software as well as the IT team to track all the processes that they have done. Documenting carries on through the entire length of project development so there is no fixed time. If the project is completed in a month, then it is aimed that the documentation is completed at the same time.

The training of employees is done in a two day session and all the users are provided with a copy of the manual for further reference. Manual development takes approximately five to seven days depending on the complexity of the software.

If the changes required are such that it affects the whole setup, then it can take around a week to implement. Otherwise, minor changes can be done within a day or two.

As the organization strives to produce quality software for its employees, so regular monitoring of the software for user satisfaction is carried out. If there is any change that needs to be incorporated, it is done within a time span of two to three days so that there is minimum disruption.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY DeLone, W. H., & McLean, E. R. (2016). Information Systems Success Measurement. Foundations and Trends® in Information Systems, 2(1), 1–116. https://doi.org/10.1561/2900000005

Subject: IT

Pages: 2 Words: 600

Individual Project

Individual Database Project

[Name of the Writer]

[Name of the Institution]

Step 1: I Launched the AWS workspace and then home screen appeared as follows:

Step 2: I opened Microsoft SQL 2014 Management Studio and the following screen I just clicked connect.

Step 3: After successfully connecting the database following screen appeared and I right-clicked on the “Database” Folder to create new database.

Step 4: Following screen appeared:

Step 5: I put a suitable name for my database as “Sample_Database” but received an error because I put a name on the “Owner” field rather than keeping it to “Default”.

Step 6: After getting the above error I watched the video on YouTube and followed the exact steps performed in the video and then I was able to create a new database named “mydatabase”.

Step 7: After the creation of the new database named “mydatabase” following screen appeared and under the breakdown of “Databases” you can view name of the new database.

Step 8: I expanded databases and the on the Tables I right-clicked to add a new table to the database.

Step 9: Following interface appeared and allowed me to add Columns to my table. I added my first column as “Customer_Id” and set it as the primary key of the table.

Step 10: I added more columns and assigned the suitable Data-type along with a suitable length. Secondly, I unchecked “Allow Nulls” order to avoid null entries.

Step 11: After adding more columns I saved the table as “Customer”.

Step 12: Now on this last snapshot you can clearly view that table named “Customer” is successfully added to the database “mydatabase”.

Subject: IT

Pages: 2 Words: 600

Individual Self Reflection

Individual Self Reflection

Student’s Name

Institution

Introduction

The IT Capstone project is a critical project, which provide excellent experience and also offers skills in solving major IT related problems in an organization. It is important to point that major sections of the project have been completed and checked by the project manager. In order to complete the project, we worked as team to develop a working sheet and formula where each team member had a clear line of responsibility, which must be completed with a specific time. The technical team dealing with network setup working independently, with efficient coordination with other project members to ensure that the project is completed on time. Therefore, VM has been setup and completed analysis of the network system or infrastructure and upgrading has been completed, setting up of users’ interface has also been done, and installation of the Xenserver and XenDesktop has been done as well. However, therefore, implementation of a virtualization solution was the best concept, which would improve performance and increase accessibility of data. The implementation of the project requires technical knowledge and expertise. The project implementation gave an opportunity to work together with an enterprise in order to offer the company a solution to the problem through offering a problem solving strategies and techniques which can be used to implement a new system.

Completed work

During the implementation of virtualization solution to our customer, we went through every steps required for a project to be implemented efficiently to meet the goals and objectives set. The initiation was the first step of project, where stakeholders were met, goals and objectives were developed, and stakeholders were mobilized. The research to determine the problem, which an organization faced, was also done for efficiently to derive at the best solution. The completion of the project was achieved through various steps CITATION Oji12 \l 1033 (Ojiako, 2012). The network structure was analyzed for its ability to convey high powered data with limited latency CITATION Dar12 \l 1033 (Dalcher, 2012). The virtualized system was then created at a remote location, transfer of instantiated was done and then VM was started on XenServer host.

The implementation of hardware system required for efficient installation of software was first completed. The network system was upgraded so that it facilitate a speed of 4Mbs so that to improve the connectivity. The upgrading of the network system was completed and testing hence it operational well. A new server has been installed and it is working efficient to support the system CITATION Oji12 \l 1033 (Ojiako, 2012). The current hardware servers have aged over the time, cost of replacements will be very much expensive, and they have limited space. Therefore, the installed server is one of the best latest servers in the market. It provides high speed and space to customers.

The XenDesktop application required addition of some extra features reveled at during the testing method. This indicates that the installation of XenDestop has been completed and it is working efficiently without a lot of difficulties. The XenServer has also been developed based on the description and proposal shared with the team so that it can create better working platforms CITATION Sod08 \l 1033 (Soderlund, 2008). It is also important to point that the implementation of Citrix XenDesktops. The configuration of the server has been completed and the server is operating efficiently. However, the following configurations were done in the server for it to operate and optician level. VM memory and CPU configuration, Virtual storage configuration, VM networking configuration, Virtual GPU configuration were completed in the server and each configured app and system work well. The configurations were done in the server (new server) and it is operating without any itches. For security of the system the firewall was also installed and configured. The installation and configuration of firewall system has also been completed. The firewall was installed as a gateway to filter all information entering the system to ensure that allowed IP addresses are the communication, which can be established between the server and other end users.

The project has been tested to establish how it operates and it has met its goal. The test result indicates that there are some errors from the system. The connection between end users is not effective and it indicates some errors. These errors are triggered anytime a communication is established. However, the errors could be a result of system configuration or poor connection due to fragmented network.

Problems faced

The project could not be completed without experiencing some problems. Implementation of virtualization is done using different software, which must be able to establish communication. However, some of the problems registered are related to errors from connectivity. The connectivity does not work well and it trigger error message from each devices. Therefore, the connection between end devices is not stable has projected and therefore, this is one of the major problem being faced with the implementation of the project. Above all, other problems faced during the project implementation are lack of proper network infrastructure. This cannot allow efficient flow of data and it can be the main cause of error being received at both ends of the devices.

References

BIBLIOGRAPHY Dalcher, D. (2012). The nature of project management. International Journal of Managing

Projects in Business , 2-15.

Ojiako, U. (2012). Facilitating the Development of Project Managers as . Reflecting on your

management of the project , 2-15.

Soderlund, J. (2008). Project Management : Managers And Teams. Relating, reflecting and

routinizing: Developing project , 2-15.

Subject: IT

Pages: 3 Words: 900

Information Networking

Network design and implementation

Smart Digital Networks Company

Student’s Name

Institution

Course Code

Date

Executive Summary

The implementation of the project, require several media or devices to make the entire project successful to achieve its objectives. Smart Digital Network intends to increase the bandwidth consumption and speed and therefore, it will require hardware which can provide the best speed and security required to attain better performance. The purpose of the project is to increase network performance and therefore, the entire network infrastructure is required to be changed. This proposal therefore, provides the type of network structure proposed, the media required for the implementation of the project and the needed devices to secure the network system.

Introduction

Smart Digital Network Company is a new firm with its headquarters building in the city. It has branches in Hornsby, Sutherland and Parramatta. It has also other small offices in Epping and Bansktown. The company’s head office is connected with all its branches using Wide Area Network (WAN). It is a retail firm, selling computers and other hardware to clients across the country and in the global market CITATION Lan14 \p 21 \l 1033 (Langer & Bayerl, 2014, p. 21). Smart Digital Network Company intends to expand its operations over the next five years so that it can accommodate the expansion plan. The expansion of end users will make the number of devices to double and therefore, there is a need for network re-structuring to be done efficiently to allow the service to be efficient after the project is completed. Currently, the firm is using four (4) servers, which is enough for the expansion process. The company will establish 14 subnets, in the head office and the branches. The subnets include the WAN links of all the branches to the office.

Problem statement

Smart digital Network Company experiencing growth and intends to expand its workforces. It is also problem with bandwidths and poor network and therefore, it caused a lot of poor connection hence delayed the operation of the company. The network infrastructure is also not designed well. The network infrastructure is not expandable and scalability is poor and therefore, it makes the entire system not durable. With poor network structure, the internet connection is also low and this needs immediate attention to solve the problem. The branches of the company are not linked to the head office. This derails the data transfer, and therefore, slows down the performance of the company. Poor connection due to lower bandwidths results to high latency, which does not allow the system to operate efficiency. These problems are some of the issues, Smart Digital Network Company is facing, which need to be solved to improve the performance of the company. In order to solve the problem, media, and network structure or layout must be changed.

Media requirement

For complete implementation of the project, several media or devices would be needed. Smart Digital Network intends to increase the bandwidth consumption and speed and therefore, it will require hardware which can provide the best speed and security required to attain better performance. For successful implementation of the project, Smart Digital Network Company will use CISCO router and Switches. The types of Cisco router preferred for the update of the network is RV300 Series. It is one of the best Cisco routers offered by Cisco Company in the market. It is preferred to be used because of its premium performance, durability and security its offers. It is high efficiency to Power Offer Ethernet. Besides it has Dual WAN ports, four or sixteen Switch Ports, firewall, AnyConnect VPN, Web Filtering, Anti-Virus, Intrusion Prevention System (IPS), and Cisco Umbrell CITATION Lee14 \l 1033 (Lee, Chul Choy, & Bae Cho, 2014). This makes the router to be one of the secure routers, which provide high performance in the market.

Table 1: Media requirement

Nos

Devices

Purpose

QTY

Unit Price

Amount

Cisco Router

It is premium performance, durability and security. Above all high efficiency to Power Offer Ethernet. Besides it has Dual WAN ports, four or sixteen Switch Ports, firewall, AnyConnect VPN, Web Filtering, Anti-Virus, Intrusion Prevention System (IPS), and Cisco Umbrell

4

$1,449.99

$5,799.96

Cisco Switch

Cisco 3560 WS-C3560

SPONSORED

Cisco 3560 WS-C3560-48TS LAYER-3 SWITCH BEST FOR CCNA CCNP CCIE ios 15

8

$250

$2000

Firewall

It is a supper performance LAN Cable with 550MHz of bandwidth and 10Gbps speed, and therefore, this makes it a perfect solution for the company.

5

$145

$725

Cat6 LAN cable

Deliver high speed bandwidth. It is a supper performance LAN Cable with 550MHz of bandwidth and 10Gbps speed, and therefore, this makes it a perfect solution for the company.

5 boxes

$80

$400

Total

Total

8929.99

Table 1: IPv4 Addressing

Subnet name

Subnet Address

Size allocated

Subnet Mask

Host range of addresses

Broadcast Address

Sales Department

192.168.1.0

62

255.255.255.192

192.168.1.1 - 192.168.1.62

192.168.1.63

Chatswood branch

192.168.1.64

62

255.255.255.192

192.168.1.65 - 192.168.1.126

192.168.1.127

City Head office marketing

192.168.1.128

62

255.255.255.192

192.168.1.129 - 192.168.1.190

192.168.1.191

City Head office Account

192.168.1.192

30

255.255.255.224

192.168.1.193 - 192.168.1.222

192.168.1.223

Leichhart branch

192.168.1.224

30

255.255.255.224

192.168.1.225 - 192.168.1.254

192.168.1.255

Rockdale Branch

192.168.2.0

30

255.255.255.224

192.168.2.1 - 192.168.2.30

192.168.2.31

Bankstown headquarter

192.168.2.32

6

255.255.255.248

192.168.2.33 - 192.168.2.38

192.168.2.39

Server network

192.168.2.40

6

255.255.255.248

192.168.2.41 - 192.168.2.46

192.168.2.47

Epping H.O

192.168.2.48

2

255.255.255.252

192.168.2.49 - 192.168.2.50

192.168.2.51

Chatswood WAN

Leichhart WAN

Rockdale WAN

Bankstown WAN

Epping WAN

It is important to point that the WAN IP addresses and for the links will be provided by Internet Service Provider (ISP). It is the reason the table of WAN address are empty on the Table 2: IPv4 addressing above. This will be ensure that there is an improve flow bandwidth and connection. The provision designed will also help the company to reduce the latency and therefore, the download and uploads would be higher due to reduced traffic congestion.

Table 2: IPv6 Addressing

Subnet name

Subnet Address

Subnet Mask

Host range of addresses

Broadcast Address

City Head office Account

192.168.1.0

255.255.255.192

192.168.1.1 - 192.168.1.62

192.168.1.63

City Head office marketing

192.168.1.64

255.255.255.192

192.168.1.65 - 192.168.1.126

192.168.1.127

City Head office sales

192.168.1.128

255.255.255.192

192.168.1.129 - 192.168.1.190

192.168.1.191

Chatswood branch

192.168.1.192

255.255.255.224

192.168.1.193 - 192.168.1.222

192.168.1.223

Leichhart branch

192.168.1.224

255.255.255.224

192.168.1.225 - 192.168.1.254

192.168.1.255

Rockdale Branch

192.168.2.0

255.255.255.224

192.168.2.1 - 192.168.2.30

192.168.2.31

Bankstown headquarter

192.168.2.32

255.255.255.248

192.168.2.33 - 192.168.2.38

192.168.2.39

Epping H.O.

192.168.2.40

255.255.255.248

192.168.2.41 - 192.168.2.46

192.168.2.47

Server network

192.168.2.48

255.255.255.252

192.168.2.49 - 192.168.2.50

192.168.2.51

Chatswood WAN

Leichhart WAN

Rockdale WAN

Bankstown WAN

Epping WAN

The VCLM table of the IPv6 would look like the illustrated above, the WAN link for the company will be provided by the ISP provided and therefore, it empty in the diagram above.

Proposed Smart Digital Network Company Logical Structure

Network Topology

The proposed topology for Smart Digital network Company is tree topology. First, network topology is the structure of the network, and it may represent the physical or logical structure of the network. It illustrates the data transfer fashion within the network. The network topology represents how the data is structured to function and therefore, it is important to ensure that there is proper flow of data within the network structure. According to Vipin (2019), there are bus network topology, point-to-point, star, ring, and tree hybrid and mesh network topology. In the case of Smart Digital network Company, a tree topology will be used for the network setup and connection. A tree topology is a hybrid network setup system where all the networks are connected through a bus. It is known as the combination of a bus and star topology and therefore, it is one of the widely used types of network topology. The reason for the choice of star topology is due to its expandability nature. A study conducted by Aliabad (2012, p. 21), concluded that star topology is easy to implement. The hybrid system gives a better bandwidth in a larger network like what Smart Digital Network Company is setting up. It is also scalable and its durability is high. It has capacity to handle. It provides interconnected method which helps in addressing the problem of IP and therefore, it provides high connection compared to other topology, which is being used for network setup.

The tree topology is implemented using multiple topologies, which include the use of variety of single nodes which is connected to a central node. The multiple stars are used either in series or tertiary nodes attached to several secondary nodes and these secondary notes are attached to the tree primary trunk node as illustrated in the diagram below of logical topology of the designed network structure of the Smart Digital Network Topology. The below topology is the, the tree topology for Smart Digital Network Company. From the look of the diagram it is noticeable that point to point is also used for the connection. In this the hierarchy is created and it is has point to point connection. The tree topology is connected in such as way that each node is linked to both primary and secondary node

Diagram 1: Logical topology of Smart Digital Network Company

However, some of the drawback of the tree topology is that the system or structure can be crippled by any damage of the primary node. Therefore, it is recommended to have a protect tree to safeguard the system and therefore, the primary node is given a special attention to ensure that the any kind of damages are limited.

Recommendation

It is recommended to use highly durable network devices. The proposed network structure should have premium router and switches to improve the performance of the network. Since the main concern of the company is to improve the performance of its network by improving bandwidth, it is recommended to have a subscription of ISP with higher download and uploads. This could help in the provision of high speed connection and reduce high level of latency being experienced. It is also recommended to secure the network infrastructure using firewalls. Therefore, there will be installation of firewall to protect the network infrastructure from being hacked.

Conclusion

The network structure is very dynamic and the establishment of the network structure requires proper understanding of the network layout. For efficient establishment and setup of the network infrastructure it is appropriate to understand the current system. It is establishment that the best topology for the Smart Digital Network Global is Star topology. For installation of the network infrastructure to be successful, it is recommended to use Cisco Router, Switches and firewall. The usage of Cisco router and Switch and other rest of the hardware are meant to improve the bandwidth. The usage of high capacity, high speed and scalable Cisco Switches and router intend to improve the general performance of the network system of the company. With the use of star topology, which is expandable, scalable and durable, the network performance of the company will improve. It will make it easier for branches to communicate effectively and therefore, the general performance of the company will increase. The network tree topology will provide the efficiency, which is needed by the company to provide service and remain secure. Since the main concern of the company is moving from IPv4 to IPv6, the stated platform would be the best and changing the infrastructure is more likely to provide the necessary speed in terms of bandwidth required by the company.

Bibliography

BIBLIOGRAPHY Aliabad, A. R. (2012). Tree Topology.

https://www.researchgate.net/publication/228521721_Tree_Topology , 2-31.

Langer, H., & Bayerl, P. S. (2014). Text type structure and logical document structure.

https://www.researchgate.net/publication/228744651_Text_type_structure_and_logical_document_structure , 2-14.

Lee, K.-H., Chul Choy, Y., & Bae Cho, S. (2014). Logical structure analysis and generation for

structured documents: A syntactic approach. IEEE Transactions on Knowledge and Data Engineering , 2-15.

Vipin, K. (2019). AsyncBTree: Revisiting Binary Tree Topology for Efficient FPGA-Based NoC

Implementation. International Journal of Reconfigurable Computing , 2-15.

Subject: IT

Pages: 7 Words: 2100

Information System Project

Inventory Management System

Introduction

The IMS is a consistent supply data center prepared for partner various stores. This can be used to pursue the supply of a singular store, or to deal with the appointment of supply between a couple of parts of a greater foundation. Regardless, the infrastructure basically records bargains and supply managment information and gives cautioning of low supply at any zone through email at a predefined interim. The goal is to lessen the strain of following instead of arrangement with all store support. Further features may join the ability to make reports of offers, anyway again the translation is left to the administration. Additionally, since thievery does now and again occur, the infrastructure gives answers to insisting the store supply and for changing supply sums.

Overview of Project

IMS is an online programming platform which fulfills the prerequisite of a common Supply Analysis in various supplypiles. It gives the interface to users in a graphical way to deal with the step by step trades similarly as authentic information. Also gives the administration reports like month to month inwards, month to month movements and month to month returns.

This platform keeps up the fused data center so any movements done at a zone reflects immediately. This is an online gadget so beyond what one user can login into infrastructure and use the gadget in the meantime. The purpose of this platform is to diminish the manual effort expected to oversee trades and authentic information used in various supplypiles. Moreover this platform gives an interface to users to see the nuances like the consistently Supply Statements everything considered.

Business Requirement Analysis

It is a Supply Storage office identified which sells extraordinary things to the general population through their retail outlets. Since the organization needs to maintain every one of their items and things at a different storage territory which requires separate division likewise for following the subtleties identified with in and outs all things considered. The in and out's will henceforth be alluded to as inwards also, outwards.

Before storage of merchandise this office needs to manage various storages, itemwise supplys in every storage, inwards and outwards of every storage. It needs to hold the subtleties of all gowdowns like storage id, storage area, limit in quintals, storage manager and begin date. At whatever point a item comes into a specific storage at that point the subtleties like Storage ID, Name of the Supplier, Date of Supply, Item Name, Invoice No, amount, gotten by, receipt no and bill checked by should be stored in the inwards module of the that storage by storage manager.

At whatever point supply turns out from the storage then the subtleties like Storage ID, Item Name, Invoice No, Date of Supply, Date of conveyance, Delivered to, Quantity, Purpose (Deal/Service), Receipt No, Bill Value, Bill Checked by should be stored in the outwards module by the storage manager.

At whatever point a customer restores a supply to the gowdown then the proposal have to check the explanation behind restoring that thing. On the off chance that it is a harm, at that point the subtleties like Item Name, Date of conveyance, date of return, Return Storage ID, Quanity, invoice no, returned by, receipt no, charge esteem and checked by requirements to stored in returns module. On the off chance that the reason is organization dropped then the proposal have to update the supply no in that storage. Checking for specific inwards, outwards or returns passage information takes parcel of time here.

Hence the cycle is rehashed for consistently. As of now all the above exercises are finished manually. The process is a dreary one. To land at the Inwards, outwards or returns for things, data must be accumulated from different sources. As a result of this mistakes are happening in the process, which is prompting postponed conveyances to the customers.

A few times as a result of the blunders wrong items are conveyed which have no requirement and accordingly a ton of financial is being squandered in maintaining the supply. Computerizing such a process won't just take out the mistakes in the process, yet additionally cut down the conveyance times and make the organization progressively focused. So it was chosen that a mechanized system ought to be created to make the entire process less complex and simpler.

Coming up next is the system produced for the above expressed necessities. An underlying achievability think about was performed and an end was touched base at that mechanizing such a system won't just accomplish every one of the things referenced above, however will likewise provide extra Reports which will empower the Management to take a gander at the factual side of the inwards, inwards and returns identified with every storage. This would likewise make an powerful Supply management system, which would diminish the disarray in maintaining the supplys at various storages, hence successfully diminishing the use expenses of the organization. Another preferred standpoint was that the entire Accounts system could be connected to this system in future, which would at last diminish the Overheads of the organization.

System Requirements

The IMS utilizes a web-based interface to show inventory data to the supply manager user. The item will utilization of open-source software essentially because of expense of usage. A JSP (JavaServer Pages) servlet will be facilitated by an Apache Tomcat web server (over any decision of working system, despite the fact that a kind of Unix is prescribe). The primary element of the Supply Manager User web interface part enables the Supply Manager User to see the momentum supply of items, alongside the abilities of seeking and arranging the items. The second element of the Supply Manager User web interface will enable the user to adjust platform settings, for example, the edge for email notices, frequency of inventory examines (day by day at a specific hour, week by week, month to month, and so on.), and security settings. The third component of the Supply Manager User web interface will enable the user to update the inventory amid the supply managment process.

System and Software Architecture

Figure 1: System Flow

Figure 2: System Diagram

Figure 3: Class Diagram

Figure 4: ER Diagram

Lifecycle Plan

Objectives

The aim of IMS is to ensure enduring openness of arrangements for purchasers. Along these lines, IMS is guided toward owners of little to generous stores and supply supervisors who are equipped for keeping up sufficient items accessible in a retail or assembling business. It can scale from a singular PC running both customer and server programming up to various stores and conveyance focuses.

Rationale

Assumptions

The above structure should works for the IMS platform. In any case, the proposal are copying a finances modules interface to work with our item by imitating institutionalized label inputs. An undeniably reasonable structure of finances module interface should be conceivable to suit the combination, as the interface does not meddle with the information assembled. The proposal expect that the finances modules customers can refresh their information to the present purpose of offer in case of loss of relationship with the server. The particular supply managment methodology gotten by each store meddles with the feasibility and accuracy of the platform as it doesn't remind the supply chief to refresh the information each time they had done any supply managment. The proposal moreover trust that that the Secure Socket Layer (SSL) is trustworthy in making a safe relationship between a customer and a server.

Risks

One of the genuine perils verified by this platform is theft breaks synchronization between the supply and the data center. The information could be made by the information put away in this platform. The certainty measurement of trusting information made depends upon the precision of the supply managment strategy. Consequently, the proposal are going up against a threat of irresponsible supply chief who could shortcoming the precision of the information. As of the enduring nature of the encryption, an objectives for this could be by making security layer and electronic statement course of action and setup rules. Also, giving a choice to the user to set the base element of security used by not ignoring the methodology should convince them the unwavering quality of the platform.

Another peril is the test from other Point of Service programming. There are a couple of significant adversaries in this field including an answer from Microsoft; in any case, these will when all is said in done be expensive. IMS will be a straightforwardness game plan basically engaged at more diminutive associations while including the probability of later expansion.

Conclusion

The proficiency of any infrastructure planned to suit an affiliation depends joint effort in the midst of the utilization mastermind and moreover flexibility of the infrastructure to get itself to the affiliation. "Supply Analyzer" has been made to beaten the issues with traditional supply the board in generous scale. Good conditions over ordinary manual infrastructures are on the web platform get to all through all of the supplypiles from a comparable territory, diminishing the manual work, supplypiling the information at a verified united zones and quick time of reports as per our prerequisites.

Subject: IT

Pages: 10 Words: 3000

Information Technology

Information Technology

[Name of the Writer]

[Name of the Institution]

Information Technology

Organizations perform risk assessments to ensure that they are able to identify threats which include viruses, malware, and attackers to their information systems. Risk assessment addresses the potential inauspicious impacts to organizational operations and assets which are caused by the threats which the organization is facing. Risk assessment represents the risks level which organizations are facing so that it helps an organization to identify the different levels and create suitable risk mitigation plans according to threats.

Risk mitigation is one of the risk management activity in which only selected risks are being treated. There are many risk mitigation strategies which are used to deal with different types of risks. The strategies which are used for risk mitigation are risk acceptance, risk reduction, risk transfer and risk avoidance (Yoon, 2018). Risk acceptance is that in order to reduce the impact of risk there are no actions which are taken and accept the identified risk, risk reduction is that measures are taken at a certain level of acceptance to reduce the risks, risk transfer is the process of transferring the risks in other entities and risk avoidance is that the company don't take decisions which will cause risk in their operations. Risk reduction strategy always must be applied according to the situation.

Different threats

IP address spoofing

Denial of Service attacks (DoS)

Distributed Denial of Service attacks (DDoS)

Packet analysis/sniffing

Session hijacking attacks

SQL Injection Attack

These threats cause different vulnerabilities in the system. IP address spoofing is the act of making a fake source IP address to hide the identity of the attacker and launching a DoS attack. Attackers will use IP spoofing to get access to the sensitive data of the organization and not allow them to identify the identity of an attacker using spoofing (Various types of network attacks, 2019). Denial of service attacks causes vulnerabilities like disturbance or delay of services by swamping it with large quantities of useless traffic. When Denial of service attacks are launched server will not be able to answerable to the requests from the users. These types of threats are very common as many organizations have to face daily problems of slow network performance, a slow response time of the server, unavailability of the web page and most importantly they can't access to their data (Various types of network attacks, 2019). Distributed Denial of service attacks also causes such type of issues, but they occur differently where multiple infected systems swamp a particular host with traffic concurrently (Various types of network attacks, 2019).

Packet sniffing is the procedure of seizing data packets which are travelling in a network. It is mainly used by the organization to analyze the traffic of the network and finding any suspicious traffic in the network (Various types of network attacks, 2019). Session hijacking attacks are used to attempt unauthorized access to information or services in someone’s system. They allow hackers at one point of the network to take part in a conversation between others network and allow the IP data packets to pass through that point (Various types of network attacks, 2019). Similarly, SQL injection attacks are very common these days. Hackers use the current sensitivity in the database or systems to inject their code for execution that changes the data from the database and also allows hackers to become administrator of a database so that they can create changes in the existing database (Various types of network attacks, 2019).

Threats Identification

Threat attacks on Vulnerabilities

Potential Hacking actors

Types of remediation and mitigation techniques

IP address Spoofing

Attackers who engage in targeted attacks which are driven by profits

Packet filtering is the best technique to defend the IP address spoofing and design network protocols which don't allow unidentified IP address authentication

Denial of Service attack

Opportunistic who are usually amateur hackers and those attackers who want to damage the organization

The only way to detect these attacks is to block unusual traffic on the network

Distributed Denial of Service attack

Opportunistic who are usually amateur hackers and those attackers who want to damage an organization

The DDoS is also detected in the same way as DoS attack. There are different tools which can help in identifying such attacks

Packet analysis/sniffing

IT professionals in the company and Internal user error

The best method of countermeasure against packet sniffing is to use encrypted communication

Session hijacking attacks

Hackers who are having stolen session cookie to gain access usually these are inside the organization

Apply encryption to the traffic which is passed between networks

SQL injection attacks

These types of attacks are usually created by competitors in the market, and the attackers are usually government sponsored in this case

These types of attacks can be prevented by using only parameterized statements, limit the permission on the database and check the pattern of the query.

Federal Information Security Modernization Act (FISMA) has implemented an information security plan to protect the confidentially, integrity and availability of its information resources. The risk management serves as a foundation on which the risks are controlled. The POAM is an action plan which helps the organization to identify and assess information security and privacy weaknesses. It is the requirement of every organization where a weakness of security and privacy has been found.

Risk management strategy is essential for every organization. Every organization is facing massive challenges in their business operations. Cyber-attacks are the biggest threat which organizations are facing, and they need to sort out how they can control this risk. Organizations need to build a strategy in which they define which products and services are required for their business operations and how they will impact the business. One of the most important sources which will guide an organization in implementing their security policies is the NIST Cybersecurity framework (Shen, 2013). This framework defines what core functions are required for an organization to implement in their security program. These functions are Identify, Protect, Detect, Respond and Recover. Similarly, there are other frameworks and standards which can help in guiding organizations in creating a strong security policy.

References

Shen, L. (2013). NIST Cybersecurity Framework: Overview and Potential Impacts, The. SciTech Law., 10, 16.

Yoon, J., Talluri, S., Yildiz, H., & Ho, W. (2018). Models for supplier selection and risk mitigation: a holistic approach. International Journal of Production Research, 56(10), 3636-3661.

Security 1:1 - Part 3 - Various types of network attacks | Symantec Connect. (2019). Symantec.com. Retrieved 31 January 2019, from https://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks

Subject: IT

Pages: 11 Words: 3300

Infrastructure

Network Infrastructure

Student’s Name

Institution

Date

Introduction

Installation of network infrastructure requires analysis of the firm’s needs and the purpose of the network. The network design and installation includes the devices required and configuration of the network to meet the demand. The network of the company will have several computers connected to the server and therefore, the network intends to have external firewall, internal firewall, remote access server IDS and web server. Since the company is Small and medium enterprise in ICT offering online services. It would be essential to include a security setup structure as indicated in the topography below. Therefore, the below shall be the network topography of the company. This topography is chosen based on the fact that it provides a clear network security system and therefore, it provides effective way of establishing secure operations.

Printers

The network shall have a printing pool for all printers in the organization. The printing pool would be located at the back office next to the administrator manager. The printers will be connected through internet and shared so that all employees could send all the printing work at one stations. The CEO and the accountants department will have a separate printing pool because of the nature of their work.

Server

The servers will be located in the server room located at the back office. All the servers will be connected directly to the computers through the switches and routers. It means that all the operations of the company shall be saved in the server. The server to connect to the network through the firewalls and DMZ CITATION Mik15 \l 1033 (Chapple, 2015), which will be installed to ensure that there, is maximum protection of the network infrastructure. The communication between the server and the workstation shall be protected as well and therefore the server will have static Internet Protocol (IP) address. The static IP shall also be implemented in all workstations and the entire network system.

Rationale

This topography will be implemented because of its scalability and reliability of the structure. First, addition workstations can easily be added to the network because of its scalability. This will make it easier for the administration to add more workstations as the company expands. As stated by Ahmad (2018) scalability of network infrastructure is an important aspect to consider when installation network for any organization. It is because most campaniles experience growth and therefore, as companies growth positions is created and therefore, more workstations would be required CITATION Bad18 \l 1033 (Bader, Zhou, & Rababah, 2018). With this kind of topography illustrated above, it would be easier for the management to provide additional workstations to accommodate the growth aspect of the company. Secondly, security is a major factor in businesses today, and every company deserves to have a secure network infrastructure. And therefore, with the illustrated network topography, the implementation of network security would be easier and faster. The network topography includes the installation of firewall, IDS and remote server access and therefore, penetrating the DMZ wall would be difficult for any external intruder and therefore, this topography is chosen because of various security options it provides for installations.

Implementation of network security

Under this network infrastructure, the network security can be implemented in there levels on the network infrastructure. It can be implemented at the backbone, servers, and at the computer CITATION Tod14 \l 1033 (King, 2014). At the backbone level, the network security is installed at router, gateway, and switches to prevent any unauthorized access to the system. When using CISCO router, the network security is configured in two levels to prevent any access to the system. This is to ensure that the entry point to the system is protected and it becomes difficult to gain entry into the system or the network CITATION Rab18 \l 1033 (Rababah, Zhou, & Bader, 2018). The switches also should be configured with strong passwords or key to prevent any entry and therefore, installation of network security is necessary to be done at the entry point to ensure that the system is protected. Besides installation of security at the gateway and switches, it is important to install strong firewall hardware and set software as well. This will limit access to the system to ensure that unauthorized person does not get access to the network. In some cases, the security is also deployed at the gateway to ensure that the system is fully protected. However, it would be important to ensure that there is a clear security policy, to prevent the data from being accessed.

Comprehensive security policy

Security policy is an important measure which is taken to prevent the access to the system. The best way to protect a system is derived a policy which can protect the system from unauthorized access. An organization can derive policies regarding login and accessibility of the system CITATION Pat14 \l 1033 (Michael, 2014). The security policy can be including login password strength, active status and how clients can be able to log to the system and stay active after certain duration. The network administrator must come up with security policy to prevent people from login to the system. The policy would be able to prevent the system from external attack such as hackers and therefore, it is important to ensure that there is a proper security system based on the policy. For instance, the system can be set to require string password such word and letters, and at least eight. This is to make sure that nobody can easily guess the password and use to access a system.

Biometric and password

Mostly entries are protected using biometric and password. It is important to ensure that the password is strong. The personal computer, server, and other electronic devices should be protected using passwords; it is upon the network administrator to design the kind of passwords allowed and the biometric devices which is applicable. The biometrical could be figure print, eye and other allowed system. It is therefore, important to ensure that every employee has a unique passwords and clear policy for login. The passwords are set at the server and configured for every end user could be best way to ensure that the system is protected. It is also required that users should change their passwords often at specific time and any user who failed to change the password would be lockout. It is some of the policies which should be included as part of the network policy to protect the system.

Ethical issues

The employees are expected to utilize concerns and a lot of ethical when dealing with computers, network system of the company. The employees will be required to avoid the use of flash dish and other portable devices to avoid the spread of virus among the computers of the company. It will also be required that employees should never share passwords among themselves and even with any none staff members. All employees will also be expected to report any suspected activities, which can compromise the network system of the company.

Bibliography

BIBLIOGRAPHY Ahmad, N. (2018). Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of. 2-31.

Ahmed, A., Bwisa, H. M., & Karanja, K. (2018). Strategic Decision Making: Process, Models, and Theories. Business Management and Strategy , 2-35.

Bader, M., Zhou, S., & Rababah, B. (2018). Evaluation the Performance of DMZ. https://www.researchgate.net/publication/322165207_Evaluation_the_Performance_of_DMZ , 2-35.

Chapple, M. (2015). Evaluation the Performance of DMZ. https://www.researchgate.net/publication/322165207_Evaluation_the_Performance_of_DMZ , 2-35.

King, T. (2014). CompTIA Security+ Exam: Devices, Media, and Topology Security. 2-3.

Kumar, A., & Malhotra, S. (2015). Network Security Threats and Protection Models. Technical Report – CSE-101507 , 2-34.

kumarasamy, S., & Asokan, D. (2011). DISTRIBUTED DENIAL OF SERVICE (DDOS)ATTACKS DETECTION MECHANISM. International Journal of Computer Science, Engineering and Information Technology , 2-38.

Michael, P. (2014). Effective decision making . http://www.cimaglobal.com/documents/importeddocuments/40_effective_decision_making.pdf , 2-35.

Ossi, V. (2018). 2 EVALUATION OF FIREWALLS AND RESEARCH. Degree Programme in Information Technology , 5-38.

Rababah, B., Zhou, S., & Bader, M. (2018). Evaluation the Performance of DMZ. I.J. Wireless and Microwave Technologies, , 2-35.

Salah, A. (2018). Design and Implementation of a Network Security Model for Cooperative Network. https://www.researchgate.net/publication/50367393_Design_and_Implementation_of_a_Network_Security_Model_for_Cooperative_Network , 2-35.

Sousa, W. H., Galante Porto, M. C., Takenouchi, P., & Marcatonio, P. M. ( 2015 ). Planning the Decision Making Process: A Multiple Case Study. Engineering Management Research; Vol. 4, No. 1 , 2-35.

Subject: IT

Pages: 4 Words: 1200

Installing Direct Access

Installing Direct Access

Your name

Affiliation

Main Post:

In direct access deployment, the network location server is a critical component. NLS itself is a web server with secure sockets layer certificate installed in it. It is used for the direct access of the clients to the corporate network. For a client to get direct access to the corporate network, it is must that he or she should be inside the network. Generally, it is recommended that NLS should be configured on a dedicated server. For the configuration of NLS, any webs server could be used, for example, Apache, IIS, Lighttpd and many others. The web server under use should have a valid SSL certificate. The DNS record used for the configuration of NLS must use an A host record. NLS must have a capability of responding to ICMP echo requests. The major point that should be kept in mind for the configuration of NLS is that existing web application servers working in the company should not be used for running NLS because it would not be reachable externally which will cause problems for clients. They would not be able to directly access the internal application and eventually it will cause failure in the connection (Richard Hicks, 2017).

Follow Post one:

To host NLS (Network Location Server) on server, Internet Information Services (IIS) is must to be installed. For the configuration of IIS a new certificate request is made and to do this the certificate (local) MMC snap-in is used. The major function of this certificate is to provide and create secure services or clients.

Follow Post two:

The SSL certificate installed in web server intended for Network Location Server can be issued by an internal PKI or a public third-party Certificate Authority. A self-signed certificate can also be used if its distribution is only limited to Direct Access clients or servers but this approach is not advisable.

References

“DirectAccess Network Location Server Guidance.” Richard M. Hicks Consulting, Inc. Richard M. Hicks Consulting, Inc., April 18, 2017. https://directaccess.richardhicks.com/2015/02/09/directaccess-network-location-server-guidance/.

Subject: IT

Pages: 1 Words: 300

Interaction Between VR And AR

RUNNING HEAD: INTERACTION BETWEEN VR AND AR

Interaction Between VR and AR

Yash

[Name of the institution]

The iInteraction between VR and AR

Technical Topic: Virtual or augmented reality hardware components.

Design Topic: User experience in a virtual reality.

Introduction:

Virtual reality (VR) and augmented reality (AR) are the latest buzz words in technology developments. Both technologies are aimed at providing and transforming user experience through the use of virtual and augmented realities. Augmented reality is referred to as an enhanced version of reality created using advanced technology. It provides the user with an experience of viewing details of reality in an augmented perspective. It does not require the user to enter a new world like in the case of virtual reality. Augmented reality use camera of a smartphone to capture a scene from reality and then present the user with added details to that reality and experience is then termed as augmented reality ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a25k32o783v","properties":{"formattedCitation":"(Scholz and Smith, 2016)","plainCitation":"(Scholz and Smith, 2016)"},"citationItems":[{"id":2077,"uris":["http://zotero.org/users/local/gITejLE9/items/XVSZIMVT"],"uri":["http://zotero.org/users/local/gITejLE9/items/XVSZIMVT"],"itemData":{"id":2077,"type":"article-journal","title":"Augmented reality: Designing immersive experiences that maximize consumer engagement","container-title":"Business Horizons","page":"149-161","volume":"59","issue":"2","author":[{"family":"Scholz","given":"Joachim"},{"family":"Smith","given":"Andrew N."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Scholz and Smith, 2016). As compared to augmented reality, virtual reality creates a complete simulated environment and provide the user with an immersive experience. In virtual reality, the user can move around and have a full experience of the environment created using virtual reality. The report provides an insight into VR/Ar hardware components and the user experience design using VR technologies including application designs for virtual reality.

Virtual reality is an established tool in the development of various products. Enhanced capabilities of virtual reality equipment and simulated scenarios such as simulated cave environments that provide an immersive experience to the engineers. Product developers can experience three-dimensional visualizations of computer-aided designs of buildings and various other products. Virtualenvironmnets, when deployed in healthcare facilities, proved helpful in the treatment of anxiety, post-traumatic disorders, and autism due to the immersive capabilities created through simulated virtual environments targeting user experience. Such technologies when combined with stereoscopic projections and head tracking provide the users with correct and immersive experience of spatial perceptions of the simulated environment. Having all the new avenues of research and case study scenarios do not guarantee that virtual reality is an established tool in future work environments. The reason behind the situation can be associated high-cost, and segmentation of experts in different but related domains of virtual reality such as networking, graphics designing, application designing, and projection technologies.

Discussion:

Currently available virtual reality technologies are based on the stimulation of the five physiological senses. Technology that can directly stimulate the human brain to simulate reality is still a fiction. That is the reason behind the primary focus of all virtual and augmented reality equipment on the visual sense. Visual sense is the most important when it comes to the simulation of reality because it can be achieved by creating a visual illusion without stimulating the brain directly. Visual illusions are created through immersive stereoscopic displays used in head-mounted displays ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2mgi7erub9","properties":{"formattedCitation":"(Serino et al., 2016)","plainCitation":"(Serino et al., 2016)"},"citationItems":[{"id":2080,"uris":["http://zotero.org/users/local/gITejLE9/items/R74CDDNW"],"uri":["http://zotero.org/users/local/gITejLE9/items/R74CDDNW"],"itemData":{"id":2080,"type":"article-journal","title":"Pokémon Go and augmented virtual reality games: a cautionary commentary for parents and pediatricians","container-title":"Current opinion in pediatrics","page":"673-677","volume":"28","issue":"5","author":[{"family":"Serino","given":"Maeve"},{"family":"Cordrey","given":"Kyla"},{"family":"McLaughlin","given":"Laura"},{"family":"Milanaik","given":"Ruth L."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Serino et al., 2016). Head mounted displays are the most important hardware components of experiencing virtual or augmented reality. Head-mounted displays are devices mounted on a user's head presenting eyes with various visual techniques to create an illusion perception. Head mounted displays also known as HMD’s usually have two liquid crystal display screens that provide a stereoscopic image of a simulated three-dimensional environment. Head mounted displays are not designed ergonomically and may have resolution problems. Any hardware issues such as reduced resolution and bulky construction material can alter the user experience in virtual reality.

The primary goal of virtual reality equipment is to provide the user with a sense of presence in the simulated environment cutting them out from the real environment. Tracked three-dimensional cathode rays tube monitors are also used in virtual reality. However, they provide a limited field to be viewed from the simulated environment. Same issues are present with autostereoscopic three-dimensional monitors that they provide a limited view of the field and poor resolution. Hardware components that provide a truly immersive experience in virtual reality are known as caves. A cave in virtual reality is essentially cubical projections that provide a room for the user to interact in simulated environments ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1mis5ef6dv","properties":{"formattedCitation":"(Jung et al., 2016)","plainCitation":"(Jung et al., 2016)"},"citationItems":[{"id":2083,"uris":["http://zotero.org/users/local/gITejLE9/items/SKNA7KDU"],"uri":["http://zotero.org/users/local/gITejLE9/items/SKNA7KDU"],"itemData":{"id":2083,"type":"chapter","title":"Effects of virtual reality and augmented reality on visitor experiences in museum","container-title":"Information and communication technologies in tourism 2016","publisher":"Springer","page":"621-635","author":[{"family":"Jung","given":"Timothy"},{"family":"Dieck","given":"M. Claudia","non-dropping-particle":"tom"},{"family":"Lee","given":"Hyunae"},{"family":"Chung","given":"Namho"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Jung et al., 2016). Projections of simulated environments in such caves depend on the technology used for projection of the simulated program. Mainly three types of projections are used in virtual reality caves. The first is the use of active stereo with cathode rays tube monitors combined with shutter glasses. The second is filter technology based on interference filters combined with two video projectors. Interference glasses provide with a bright display and sound effect experience to users. The third projection technique employs polarised glasses and passive stereo sounds with two projectors for visual presentations.

An example of experience provided by these or combination of hardware components is such that if two projectors are deployed with a large projected screen of three meters with the acceptable field of view, then a person standing one and a half meter away will experience a resolution that is only thirty per cent of actual human eye resolution. Immersive projection technologies can provide better results and user experience, but they provide additional challenges for multi-user scenarios in which interaction between two or more viewers is required ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a12789u1ej7","properties":{"formattedCitation":"(Billinghurst et al., 2015)","plainCitation":"(Billinghurst et al., 2015)"},"citationItems":[{"id":2086,"uris":["http://zotero.org/users/local/gITejLE9/items/ZG8HVSWJ"],"uri":["http://zotero.org/users/local/gITejLE9/items/ZG8HVSWJ"],"itemData":{"id":2086,"type":"article-journal","title":"A survey of augmented reality","container-title":"Foundations and Trends® in Human–Computer Interaction","page":"73-272","volume":"8","issue":"2-3","author":[{"family":"Billinghurst","given":"Mark"},{"family":"Clark","given":"Adrian"},{"family":"Lee","given":"Gun"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Billinghurst et al., 2015). There are several hardware components related to virtual reality being sold in the market such as datagloves, joysticks, head-mounted displays and, metaphoric devices. However, the installation of such equipment and operation is still very complex as compared to the ordinary computer equipment and peripheral devices. Novice users have a very difficult time in training their minds for appropriate functioning of these complex hardware devices. Most of the readily available installations except head-mounted displays are used by experts. Head mounted displays are widely being used with gaming environments and consoles.

Among all of the interaction devices available to be used with virtual reality devices, datagloves are the most difficult to operate. Their use may not be as intuitive as perceived by the majority of the people. Engineers and user interaction application developers of virtual reality world are striving to create a more user-friendly environment as compared to what is currently available. The problem to be solved involves making these devices more efficient and increase their usability without compromising the quality of user experience offered by the interface devices. Virtual reality techniques are most commonly deployed in the design review process of digital prototypes ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1kg5sb4kf4","properties":{"formattedCitation":"(Sherman and Craig, 2018)","plainCitation":"(Sherman and Craig, 2018)"},"citationItems":[{"id":2089,"uris":["http://zotero.org/users/local/gITejLE9/items/UU4LCZNH"],"uri":["http://zotero.org/users/local/gITejLE9/items/UU4LCZNH"],"itemData":{"id":2089,"type":"book","title":"Understanding virtual reality: Interface, application, and design","publisher":"Morgan Kaufmann","ISBN":"0-12-801038-X","author":[{"family":"Sherman","given":"William R."},{"family":"Craig","given":"Alan B."}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sherman and Craig, 2018). Aspects such as stability, usability and, ergonomics of such interface devices and end-user equipment of virtual reality are reviewed using computer-aided virtual reality applications. Future trends of virtual and augmented reality hardware will be to make the interface devices and overall virtual reality equipment more portable than ever. People will prefer to experience virtual reality on their personal devices rather than visiting an installation place such as a virtual reality cave in some park. Integration of virtual reality systems into more transferable devices will bring more challenge for engineers designing hardware and programmers designing the applications as well.

Virtual reality provides an immersive experience to users that closes out the physical world. By utilising virtual reality gadgets, users can find themselves in a completely different world. Augmented reality, on the other hand, adds details to a live view of the physical world. An ordinary example of the augmented reality can be considered as the image filters of a social media application known as Snapchat. In addition to virtual reality and augmented reality, there exists mixed reality as well. Mixed reality combines components of both virtual reality and augmented reality. Basic idea and purpose behind all of the virtualisation technologies being developed are to provide a unique and immersive experience to the users. Building a virtual world is all about providing the best possible experience for users and building better interaction ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2pkilvth03","properties":{"formattedCitation":"(Poushneh and Vasquez-Parraga, 2017)","plainCitation":"(Poushneh and Vasquez-Parraga, 2017)"},"citationItems":[{"id":2092,"uris":["http://zotero.org/users/local/gITejLE9/items/4H2FX5NS"],"uri":["http://zotero.org/users/local/gITejLE9/items/4H2FX5NS"],"itemData":{"id":2092,"type":"article-journal","title":"Discernible impact of augmented reality on retail customer's experience, satisfaction and willingness to buy","container-title":"Journal of Retailing and Consumer Services","page":"229-234","volume":"34","author":[{"family":"Poushneh","given":"Atieh"},{"family":"Vasquez-Parraga","given":"Arturo Z."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Poushneh and Vasquez-Parraga, 2017). Extreme requirements of vivid three-dimensional images and better sound quality have opened new paradigms of research and development in information technology. Latest innovations in three-dimensional graphics for virtual or mixed reality worlds have made even the most promising two-dimensional screens as outdated and obsolete. Virtual reality technologies can provide similar results in various training institutions. For example, while on physical training a healthcare student may become overwhelmed. But in case of a virtual reality headset, the student will be able to grasp the same concepts of real-world scenario and in case of any trouble will remove the virtual reality headset.

Another example of virtual reality user experience can be of digital business meetings. Digital meetings will help in transforming businesses into virtual companies as well. In a VR business meeting, the person will feel as if they are physically present in a meeting as compared to the traditional paradigm of looking at a screen for an extended period of time. People are used to the interaction schemes offered by the touchscreen experience. Same interaction experience with even more refinements will be offered by virtual reality as more developers and business joins the fleet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a80jjn10ho","properties":{"formattedCitation":"(Yilmaz, 2016)","plainCitation":"(Yilmaz, 2016)"},"citationItems":[{"id":2095,"uris":["http://zotero.org/users/local/gITejLE9/items/X5RHZHZ5"],"uri":["http://zotero.org/users/local/gITejLE9/items/X5RHZHZ5"],"itemData":{"id":2095,"type":"article-journal","title":"Educational magic toys developed with augmented reality technology for early childhood education","container-title":"Computers in Human Behavior","page":"240-248","volume":"54","author":[{"family":"Yilmaz","given":"Rabia M."}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Yilmaz, 2016). New user interface designs will provide a more immersive experience of virtual worlds. The interaction offered by any virtualised reality depends on three components known as the speed, mapping, and range. Speed refers to the time taken to execute the result of user interaction in the virtual world. If the simulation can handle the result of interaction in realtime, then the experience will be considered as immersive. The problem for researchers in designing personalised virtual reality systems is that they require to understand the real world scenarios before designing virtual reality programs. Analysis of the physical surroundings of the user is an essential step in the creation of quality user experience. The user must not feel at any point in time that his/her personal space is being invaded by the virtual reality experience.

In general virtual reality, applications are composed of two components known as environments and interfaces. Both components play an essential role in creating user experience better. The environment in virtual reality gadgets is the simulated graphical representation of the world also known as virtual world accompanied by he vivid three-dimensional graphics. An interface in virtual reality is the essential element that is used to interact and navigate into the environment. All of the virtual reality applications can be aligned to a two-dimensional axis representing the complexity of environments and interfaces used in a virtual reality application by the designer. As an example, the virtual reality equipment simulated roller-coaster ride will have a rich environment of vivid three-dimensional graphics and stereo sounds but will not have any interface ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a205kqtks1p","properties":{"formattedCitation":"(Bonetti et al., 2018)","plainCitation":"(Bonetti et al., 2018)"},"citationItems":[{"id":2098,"uris":["http://zotero.org/users/local/gITejLE9/items/N86LA9LH"],"uri":["http://zotero.org/users/local/gITejLE9/items/N86LA9LH"],"itemData":{"id":2098,"type":"chapter","title":"Augmented reality and virtual reality in physical and online retailing: A review, synthesis and research agenda","container-title":"Augmented reality and virtual reality","publisher":"Springer","page":"119-132","author":[{"family":"Bonetti","given":"Francesca"},{"family":"Warnaby","given":"Gary"},{"family":"Quinn","given":"Lee"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Bonetti et al., 2018). In this particular case, the interface will be locked for the roller-coaster ride only in which the user has no control requirement. Creating an effective application of virtual reality systems require the use of slow and progressive familiarisation using textual or visual tools is required to be embedded in the software. The user may not be aware of the working of the system, and thus the user experience can be compromised by loading the environment with too many guiding functions or no functions at all.

User experience mostly depends on the environment and interface used in the simulator. There is an important concept that is known to ruin user experience in virtual and augmented reality systems. It is defined as the simulator sickness that arises due to the inferior angle of resolution used in simulator environment. Graphical details must be vivid enough to allow wide viewing angles without significantly compromising the image quality. If the user has to tilt their head down for sixty degrees, that may put a burden of almost 60lbs. Prolonged exposure to such conditions may lead to damaged nerves and spinal cord problems. Thus, the user experience will be ruined by a poor quality environment used in simulator either of virtual or augmented reality hardware.

Conclusion:

Virtual and augmented reality solutions can provide various benefits to humanity if utilised with the central principle of improving the user experience. There are many available technologies and hardware components that provide users with virtual reality experience. However, they are not designed with the considerations of user experience. Effective model creation in virtual reality requires extended research in psychological and physiological human behaviours. Without effectively designing the environment and interface components of virtual reality equipment, the user experience cannot be guaranteed. Future endeavours in fields of virtual and augmented reality will consider the user experience in first place before designing hardware components.

References

ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY Billinghurst, M., Clark, A., Lee, G., 2015. A survey of augmented reality. Found. Trends® Human–Computer Interact. 8, 73–272.

Bonetti, F., Warnaby, G., Quinn, L., 2018. Augmented reality and virtual reality in physical and online retailing: A review, synthesis and research agenda, in Augmented Reality and Virtual Reality. Springer, pp. 119–132.

Jung, T., tom Dieck, M.C., Lee, H., Chung, N., 2016. Effects of virtual reality and augmented reality on visitor experiences in museum, in: Information and Communication Technologies in Tourism 2016. Springer, pp. 621–635.

Poushneh, A., Vasquez-Parraga, A.Z., 2017. Discernible impact of augmented reality on retail customer’s experience, satisfaction and willingness to buy. J. Retail. Consum. Serv. 34, 229–234.

Scholz, J., Smith, A.N., 2016. Augmented reality: Designing immersive experiences that maximise consumer engagement. Bus. Horiz. 59, 149–161.

Serino, M., Cordrey, K., McLaughlin, L., Milanaik, R.L., 2016. Pokémon Go and augmented virtual reality games: a cautionary commentary for parents and pediatricians. Curr. Opin. Pediatr. 28, 673–677.

Sherman, W.R., Craig, A.B., 2018. Understanding virtual reality: Interface, application, and design. Morgan Kaufmann.

Yilmaz, R.M., 2016. Educational magic toys developed with augmented reality technology for early childhood education. Comput. Hum. Behav. 54, 240–248.

Subject: IT

Pages: 7 Words: 2100

Internet Assigned Numbers Authority

Internet Assigned Numbers Authority

Lakeidra Eady

[Institutional Affiliation(s)]

Author Note

Internet Assigned Numbers Authority

Since 1998, there had been a process in place about identifying and naming the internet users in the United States. From that time till 2016, the contract of assigning the numbers to internet users was between the United States Department of Commerce Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). After the official expiry of the contract between the NTIA and ICANN, in 2014, the NTIA initiated the final step to privatize the internet assigned number system, by asking ICANN, to call for proposals from the internet stakeholder community. This was the initiation of the transition period, of a decade long agreement between the two departments of the United States government. Prior to terminating this contract, the contract for assigning the domain names was with the Californian based non- Profit Company, which shows the United States government commitment to privatize the internet assigning numbers authority.

With the invention of the individual domain system of networking, the United States government has wanted to decentralize the system of domain naming, and for this reason, after 2016, it wanted that the private sector and not the government sector must take the lead in bringing up the internet domain name system ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"JqVEFpu7","properties":{"formattedCitation":"(Q and A on IANA Stewardship Transition | National Telecommunications and Information Administration n.d.)","plainCitation":"(Q and A on IANA Stewardship Transition | National Telecommunications and Information Administration n.d.)","noteIndex":0},"citationItems":[{"id":226,"uris":["http://zotero.org/users/local/8reWiRZH/items/QTPUQ73A"],"uri":["http://zotero.org/users/local/8reWiRZH/items/QTPUQ73A"],"itemData":{"id":226,"type":"webpage","title":"Q and A on IANA Stewardship Transition | National Telecommunications and Information Administration","URL":"https://www.ntia.doc.gov/other-publication/2016/q-and-iana-stewardship-transition-0","accessed":{"date-parts":[["2020",1,2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Q and A on IANA Stewardship Transition | National Telecommunications and Information Administration n.d.). The ICANN initiated a formal process for transferring the rights to new bodies. In doing so, in 2014, it developed a formal proposal which was intended to bring ease in selecting a new authority that will perform the function of domain naming. In designing this process of transmitting the new contract, the ICANN, held that it intends to support and enhance the multistate holder model. The expansion of multistate holder environment creates ease in ensuring competition and develop the interest of new IT giants to this. The ICANN, also initiated this process, since it believed that the stability, security and resilience might not get compromised at any given time. It also assures the openness of the internet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"ruKIWXrb","properties":{"formattedCitation":"(Stewardship of IANA Functions Transitions to Global Internet Community as Contract with U.S. Government Ends n.d.)","plainCitation":"(Stewardship of IANA Functions Transitions to Global Internet Community as Contract with U.S. Government Ends n.d.)","noteIndex":0},"citationItems":[{"id":227,"uris":["http://zotero.org/users/local/8reWiRZH/items/326AFSH2"],"uri":["http://zotero.org/users/local/8reWiRZH/items/326AFSH2"],"itemData":{"id":227,"type":"webpage","abstract":"Today, 1 October 2016, the contract between the Internet Corporation for Assigned Names and Numbers (ICANN) and the United States Department of Commerce National Telecommunications and Information...","language":"en","title":"Stewardship of IANA Functions Transitions to Global Internet Community as Contract with U.S. Government Ends","URL":"https://www.icann.org/news/announcement-2016-10-01-en","accessed":{"date-parts":[["2020",1,2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Stewardship of IANA Functions Transitions to Global Internet Community as Contract with U.S. Government Ends n.d.).

Internet Assigned Numbers Authority (IANA) is a complex set of interdependent technical and artificial functions which helps in promoting the efficient functions of the internet domain. The IANA functions are not limited to assigning different individual domains to each user, rather it promotes the operability of the internet domain as well. However, many people classify the functions of IANA in three major areas which are as follow

Collaborating with the internet protocol systems and parameters

Processing and manipulating the change requests of internet users

Allocating the internet numbering resources

But the role of NTIA is different from that of IANA, which is more of the clerical nature ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"6HGU5W1b","properties":{"formattedCitation":"(Understanding the IANA Functions 2014)","plainCitation":"(Understanding the IANA Functions 2014)","noteIndex":0},"citationItems":[{"id":225,"uris":["http://zotero.org/users/local/8reWiRZH/items/9T9SQM6Z"],"uri":["http://zotero.org/users/local/8reWiRZH/items/9T9SQM6Z"],"itemData":{"id":225,"type":"post-weblog","abstract":"“NTIA Announces Intent to Transition Key Internet Domain Name Functions” – this caption has marked much of Internet governance discussions so far in 2014 and it is expected to continue to do so in 2015, at least until the 30th of September, when the IANA contract is set to expire.  Since 1999, the IANA functions …","container-title":"Internet Society","language":"en-US","title":"Understanding the IANA Functions","URL":"https://www.internetsociety.org/blog/2014/10/understanding-the-iana-functions/","accessed":{"date-parts":[["2020",1,2]]},"issued":{"date-parts":[["2014",10,10]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Understanding the IANA Functions 2014). NTIA’s role is limited to assessing whether the IANA protocols are based on established policies or not. NTIA looks after the root zones which includes and are not limited to file maintaining, their implementation and establishing future policies.

The root zone which is taken care of by the NTIA is an authoritative registry which enables mentioning the names and addresses of each domain. NTIA does not look for the operational mechanism and the numbering functions. As these, both roles does not conform to the clerical category of the work and therefore, NTIA avoids falling to this category ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"8qQNtnNs","properties":{"formattedCitation":"(Understanding the IANA Functions 2014)","plainCitation":"(Understanding the IANA Functions 2014)","noteIndex":0},"citationItems":[{"id":225,"uris":["http://zotero.org/users/local/8reWiRZH/items/9T9SQM6Z"],"uri":["http://zotero.org/users/local/8reWiRZH/items/9T9SQM6Z"],"itemData":{"id":225,"type":"post-weblog","abstract":"“NTIA Announces Intent to Transition Key Internet Domain Name Functions” – this caption has marked much of Internet governance discussions so far in 2014 and it is expected to continue to do so in 2015, at least until the 30th of September, when the IANA contract is set to expire.  Since 1999, the IANA functions …","container-title":"Internet Society","language":"en-US","title":"Understanding the IANA Functions","URL":"https://www.internetsociety.org/blog/2014/10/understanding-the-iana-functions/","accessed":{"date-parts":[["2020",1,2]]},"issued":{"date-parts":[["2014",10,10]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Understanding the IANA Functions 2014). Some other functions and role of NTIA include the coordination of assignments and technical protocols by the engineering task force of the Internet. It also takes care of the certain responsibilities which are associated with the internet protocol parameters, these parameters also include managing the root zone and time management. The registration of the allotted numbers and the registries of the internet are also carried by the NTIA. Different other services related to.INT and.ARPA is also overlooked by the NTIA.

Changing the stewardship of the domain naming system might not affect the end-user, however, it signals major changes about the internet regulations. The US government dependency on the private sector in the wake of internet security, however, will increase. The stakeholders involved in this situation recognize the importance of such changes, and therefore, among the business stakeholder, there is major support for the stewardship change. For such reason, the Support Letter in 2016 was issued by these stakeholders. As different stakeholders like Amazon, Google, Hewlett, Dell and Facebook etc. are the co-signatories, therefore, in this way, this could affect the end-user. There are different organizations who have held support for this transition since they believe that such a transition can mark renewed changes in the internet industry. These organizations see this from the lenses of consumer behaviour since they believe that end-user guarantees must always be taken care of.

From an end-user perspective, such changes might not bring enormous changes to internet usage and its applicability. As most of the consumers are not aware of the technicalities involve and even don’t care about their identity over different platforms. In the domain of internet services and their security, change of stewardship might bring some changes. As the government is planning to handover the right of stewardship in the ownership of the private sector, therefore, the securities might get enhanced. The private sector might employ different new sources to enhance the security of internet usage. Under all such changes, the private sector will endeavour to introduce a new mechanism to strengthen network probability while increasing the numbers of consumers. Considering such reasons, following the implementation of the stewardship agreement NTIA have requested the ICANN to complete the implementation status.

References:

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY “Q and A on IANA Stewardship Transition | National Telecommunications and Information Administration.” https://www.ntia.doc.gov/other-publication/2016/q-and-iana-stewardship-transition-0 (January 2, 2020).

“Stewardship of IANA Functions Transitions to Global Internet Community as Contract with U.S. Government Ends.” https://www.icann.org/news/announcement-2016-10-01-en (January 2, 2020).

“Understanding the IANA Functions.” 2014. Internet Society. https://www.internetsociety.org/blog/2014/10/understanding-the-iana-functions/ (January 2, 2020).

Subject: IT

Pages: 3 Words: 900

Introduction To Cyberwarefar

Student’s Name

Professor’s Name

Course

Date

Introduction to Cyberwarfare

TO: The United States Government

FROM: your name

DATE: 4 October 2019

SUBJECT: Cyberspace citizen protection

Cybercrime has accelerated in recent years due to advancements in technology, bringing about new and sophisticated methods of unauthorized penetration and access to data of innocent users of the internet. Very sensitive user data can be exposed to these threats without the user's knowledge. I, therefore, would like to call upon the respective arms of the government to put up cyberspace citizen protection policies and regulations to match the modern threats.

With the Rise in Modern E-commerce, E-banking, and the network of IoT, sensitive personal and financial data is shared across the internet either in the process of purchasing goods and services or other relevant online transactions. Users and participants need protection from both the organizations involved and also threats from malicious intruders to the system. Data protection act and financial regulations have to be applied.

However, even putting up mechanisms to prevent the breach against this private data is not a guarantee enough. I propose that in the case that a consumer is exposed to such a threat, the immediate action should be to notify them about the incident. The government and the relevant authorities should then draft a compensation plan by following up and tracing the root of the cause. Once established that the client is innocent, they should be restituted to their earlier state. The government should also see that all payment systems are a complaint of the Payment Card Industry Security Standards Council (PCI SSC) of 2006. PCI SSC describes how organizations handle customers' data CITATION Ker18 \l 1033 (Keren and Jacob).

In conclusion, I envision that blockchain technology is a game-changer when it's adapted in the financial industry. The technology has a chance of beating around 75% financial fraud with the ability to provide the most secure decentralized digital ledger chainable in any economic sector with maintaining the identity of the participants concealed from the external network.

Works Cited

BIBLIOGRAPHY Keren, Livneh, and Reeds, Jacob. USA Cybersecurity 2019. 16 10 2018. https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa. 4 October 2019.

Subject: IT

Pages: 1 Words: 300

Inventing The Internet By Janet Abbate

Inventing the Internet by Janet AbbateAtanas Atanasov

[Institutional Affiliation(s)]

Author Note

Inventing the Internet by Janet Abbate

The Internet is a multi-faceted system comprising of diverse features and components featuring a collection of world-wide networks communicating through Internet Protocol (IP). The system has advanced and popularized to the extent that it has become an essential element of the socio-economic fabric of modern society. Although still evolving as a system, investigating the development of the internet is highly relevant to the study of complex systems. It is a complicated system that exhibits itself in simple ways as opposed to being a system that is simple but exhibits itself in complex ways. In this regard, Janet Abbate in her book Inventing the Internet outlines key technologies, players, organizations and systems that have collaborated together to develop the internet such as computer scientists, academics, military and government agencies, standards organizations and telecommunications companies. In addition, she demonstrates how various cultural and social factors influenced these various systems and players when designing the internet, which contributed to the trend of user-driven, decentralized development that made the Internet a diverse and flexible environment. The paper will further explore the complex organizational cultures, styles, and technical designs involved in the invention of the Internet, in light of Abbate’s research, to illustrate how these various structures came together to create such a complex system.

Summary of the Book

In her book, Abbate (2000) shares many stories and events that led to the creation of the Internet as we know it today. The internet began from being a simple network in the 1960s comprising of a few sites in the US to a worldwide network allowing millions of computers to connect. Janet starts her book by showing us the significance of the Cold War and the impact that it had on the invention of the early technologies that led to the later creation of the internet. Some of those very important technologies were the packet switching and the ARPANET. Janet covers in detail how each of those technologies came to life and of course all of the challenges and strategies that had to be overcome in order to complete those projects. The author highlights the important aspects of the collaboration and the conflicts between the key players in each project. The ARPA organization was formed with the idea to drive vision and to manage the mega projects that had to take place for a technological advancement which will allow various researchers and computers to connect and collaborate instantaneously. In the late 1960s, Lawrence Roberts was recruited to join the ARPA organization and to oversee one of the most important projects for humanity – the ARPANET. His idea was to connect all of the existing ARPA sites with one another to exchange information. Building upon the ideas of another scientist – Davies and his work on the Mark I system, Roberts was able to build upon his existing idea and combining Davies’s idea for packet switching which made the idea of a continental network possible.

The idea of packet switching was a critical advancement during the era as it allowed the flow of data by reducing it to smaller chunks, in order to quickly transmit them over various network lines, and to later reassemble them at the recipient’s end. The newer technique was efficient and faster compared to other methods such as circuit switching that was being utilized in telephony, and had the additional advantage of making it more difficult to intercept this data while it was being transmitted, thus serving another benefit during the Cold War days. Earlier, science conferences were the only events that made collaboration among scientists possible. A shared desire to collaborate and exchange ideas in real-time for mutual benefit drove the development of the ARPANET.

In subsequent chapters, however, Abbate (2000) also clarifies that the development of such networking technologies was not inevitable as many claim. Although, Cold War military spending and the then ideological conflict served as a factor, yet, researchers developing the internet struggled to sustain funding and saw little approval until the introduction of the email. The demand for email substantially helped them sustain funding for further research, which proves that the internet was not solely a creation of an industrial, military, and academia complex but rather its potential use in commercial and academic activities which drove its development. At times these objectives were cultural, social, or personal, and would conflict with the funding institution’s efforts. During development, the teams and their project managers had to look outside the conventional resource and time-sharing model of interactive computing and shift to a full networked environment, which enables computing research centers in far flung areas to effectively network together. The scientists working on these systems were able to design programs to enable resource sharing, and with the introduction of the email, had demonstrated the capabilities of the network beyond what had been originally planned by ARPANET. The idea of network itself changed to allow not just incompatible computers to connect but entire networks to connect with other networks CITATION Mal00 \l 1033 (Malone, 2000).

Furthermore, the development of these networking technologies was not solely an American creation but rather prominent scientists working at CERN and Minitel projects were involved that played a critical role in developing standards that would be used in these networking technologies. The development of the internet had driven various standards, technologies, people, and views together which transcended geographical boundaries under a complex synergy before being ready for commercialization in the 1990s. The trend of a decentralized, user-driven, and informal development that marked the evolution of the internet followed the same pattern of development. The internet drew various technologies and people together as it continually shifted. Eventually it gained mass commercialization and appeal and became the World Wide Web as we know it today.

Primary themes of the book

The primary ideas that Janet Abbate expresses in her book the Invention of the internet are the historical events and cultural environment of the society that influenced the creation of the internet as we know it today. In the first part of the book, Janet paints a vivid picture of the 1960s and the US technology situation during the Cold War. The USSR had the technological advantage. they already had a program to support and develop technology that will give military advantage over the US. If the US government wanted to stay relevant, they had to act quickly and with full. That led to the creation of the ARPA organization. The ARPA organization had a different and more modern approach on technological projects. ARPA had its mission to keep the US ahead of military rivals by managing research projects that promise significant advances in defense related fields. ARPA was a small agency that specialized on managing projects and outsourcing the research and the development to contractors. The ideas that were initially developed as military defense projects led to the creation of multiple civilian technologies that helped to propel the US as a leader in technology and science. One of the most important projects was the ARPANET. The author gives us a detailed overview of the progress of the ARPANET. In the very beginning the ARPANET started as an idea to connect researchers throughout the US sites and to help them to collaborate and exchange ideas. Roberts knew that such a network will help the science society to collaborate and to advance faster. However, the cultural and political interests at the time influenced the development of the ARPANET. In 1972 Roberts left the ARPANET project to join BBN and its project called Telenet. Telenet was a commercial spin off of the ARPANET. And another scientist named Khan took over ARPANET. Khan was faced with the challenge to popularize the internet. The challenge was to create a protocol which will allow computers from different networks to connect to each other. TCP turned out to be the open protocol that everyone working on a networking project had come across at some point of their research. There were multiple tests and projects that were focused on breaching that gap. There was a successful three-way test between SATNET, ARPANET, and PRNET that represented the beginning of the Internet. The design made it possible for the three networks to operate independently but still to communicate.

As lower cost computers began to be introduced, it increased individual’s capability to access the ARPAET without the need to go through the host server, something which raised concerns about network security especially among the military. These concerns were a result of the open-architecture networking that had allowed networks to expand beyond a limited circle of connected computers. The initial protocol, called the NCP (Network Control Protocol) could only manage host to host communications among computers that lied within the same network. Thus, a new protocol was needed which had to be dynamic, reliable, and open. Eventually in 1978, Vint Cerf and Robert Kahn were able to develop such a protocol and termed it Internetwork Protocol/Transfer Control Protocol or TCP/IP. The new protocol opened up possibilities of collaboration between all similar global networks with that of ARPANET. Thus, the foundations of a network that could expand and connect on a global scale were laid where anyone could join in CITATION Nav16 \l 1033 (Navarria, 2016). The internetwork protocol (IP) could be used for transmitting packets of data to packet switches while the transmission control protocol (TCP) helped manage communication among various hosts.

Eventually, the development split in two and a separate MILNET system was created for projects related to military operations while ARPANET became used by academic researchers for various projects. Moreover, with the success of TCP/IP, ARPA started to encourage its commercialization to support the development of a user or civilian-driven Internet. However, commercialization required the development and selection of International standards which had to involve all industry and government stakeholders. Thus, two international standard bodies, along with the telecommunications industry, computer manufacturers, and other standards-setting entities collaborated to develop the Open Systems Interconnection standard (OSI) which supported the development of public and universal standards. As personal computers began to popularize, the network began to expand dramatically, against which the ARPANET’s system could not keep up. Host connections had to be transferred to a newly developed NSFNET that many universities had started to rely upon. This process further shifted the network away from its military origins which became even further distant when NSFNET decided to allow commercial internet service providers to develop and strengthen the Internet’s infrastructure.

At the same time, the rapid development of the networks spiked interest in the rest of the military organization and more specifically in the Defense Communication Agency, which at the moment was still depending on extremely slow network called WWMCCS. It some cases, it was faster to copy the information on tape and transport it with an airplane instead of using WWMCCS. On July 1st, 1975, the defense Communications Agency officially assumed control over the ARPANET, which resulted into all military organizations made increase use of the network. And the first personal computer was introduced in the US, it was made by a small company called Micro Instrumentation Telemetry Systems. The Altair 8800 was an instant hit with amateur computer enthusiasts and thousands of them were sold in the first few months. The increased interest from civilian parties started to form the fear of hackers breaking into the military system of the ARPANET.

How the book relates to complex systems

The book “Inventing the Internet” by Janet Abbate is full of examples of managing complex systems as we cover in our class. From the very beginning, the author covers the political aspect and situation that led to the major projects like the ARPANET. If it wasn’t for the political competition between the US and the USSR during the Cold War, we probably wouldn’t witness so many great projects that helped to shape the humanity. US was afraid that they were losing the technological competition with the USSR and they were not going to remain the dominant power in the world. They had to take drastic actions to stay relevant and to allocate enormous budget to support research and development. The ARPA organization is a great example of a government agency that is focused on managing complex projects and at the same time innovating by bringing a new approach and viewpoint. ARPA didn’t get involved with the actual execution rather they outsourced the development and the research to academic and industrial contractors. Their full focus was on managing the project, driving vision, making sure US is ahead in the technology competition. This new approach gave them the ability to be focused on the vision and the next thing that had to be developed instead of getting caught up in the weeds. Once, the ARPANET project became of significance to the entire country we see the political and economic aspect of the situation to take priority and to lead the project in different directions. Janet covers the split focus of the military involvement and the popularization of the Internet with the civilian and commercial society. The benefits of such a network were important not only to the military organizations. It was becoming important benefit for the entire society and that led to the popularization of the internet.

The Internet is essentially a highly complicated system but which exhibits simple behavior owing to a range of inherently characteristic architectural features involving a wide range of scientific fields and disciplines. This includes the key features of network traffic which operate in open-loop and closed-loop control that governs the flow of data, under control theory. It also relies upon graph theory to create the connectivity structure of the various information networks, while relying on information exchange theories to enable the development of protocols, conventions and rules. Similarly, it relies on game theory to create competitive and resource-bound environments, while also relying on various theories of organizational behavior that affect the development of its infrastructure and the relationships among various competing ISPsCITATION Kih05 \t \l 1033 (Park & Willinger, 2005). One of the unique features of a complex system like the internet is that it became a melting point of various ingredients, each of which came from different fields and disciplines and converge together at some point. Secondly, the Internet is a multi-body man-made system which led to various synergistic opportunities, modeling challenges, and novel phenomena, which were grounded in science; hence, the internet’s two features can be said to form a corner stone of modern complex systems CITATION Par05 \l 1033 (Park, 2005).

The initial motivation for the development was resource sharing where the time-sharing systems connected to the ARPANET could be accessed by individuals on packet radio networks. This had allowed remote login and file transfer, however, it was email that had the most significant impact out of all networking innovations. It not only help people communicate in real time but also led to the development of the internet itself. Another key concept was that it was not just built for use by a single application but a general system that many applications could access and be purposely-built to utilize. The TCP/IP protocols enabled this general purpose use which made global collaboration possible CITATION Lei97 \l 1033 (Leiner, et al., 1997). Another principle at play was network management, where many commercial and research entities interplayed together. Initially, this was restricted to implementing and defining protocols which allowed interoperation but later as the network expanded, simple ad-hoc protocols were found to be inadequate. Automated algorithms were developed which helped configure arrays and tables. Moreover, the need to remotely manage different components of the network led to the development of various protocols and standards such as the HEMS, the SNMP, and the CMIPCITATION Par05 \t \l 1033 (Park, 2005).

The web didn’t get invented from the ARPA research community. New organization called CERN had scientists work on a new idea that the internet could be more than just text. They wanted to incorporate multimedia messages, video, voice, and text. Personal computers were becoming more visual oriented and CERN saw an opportunity to create a new system that allows scientist to collaborate in a different way. Berners-Lee envisioned a system that can be built on top of the same protocols used so far. However, his system was going to be very different than the military idea of network. The idea was to create “a pool of human knowledge” accessible by anyone. In December 1990 the first version of the Web software began operating and it was an immediate hit the users in CERN. The Web transformed the internet from a research tool to a popular medium by simple relaying to the masses. Now, each individual had the ability to be a producer of content and a consumer of information.

To conclude, the internet today is not just a collection of various technologies and theories, but a collection of communities. Its success can be attributed to utilizing this network of communities in a way that helped achieve both the communities’ needs and for them to collaborate together to push its infrastructure further forward. The spirit of community could initially be seen with the development and work of the ARPANET wherein a close-knit community worked together to develop packet switching technology. Other research programs, initiatives and contractors collaborated together to create mechanisms that helped further coordinate these development efforts which added the capability for remote access, file, sharing, and email, which eventually paved the way for the World Wide Web. The way the ARPANET Network Working Group evolved into a global working group, is an example of how various organizational and management styles in various little sub-projects integrated and collaborated together to create complex projects and systems, which eventually led to the creation of the internet as we know it.

References

BIBLIOGRAPHY Abbate, J. (2000). Inventing the Internet. In W. E. Bijker, W. B. Carlson, & T. Pinch (Eds.), Inside Technology (pp. 1-181). Cambridge, MA: MIT Press.

Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., . . . Wolff, S. (1997). Brief History of the Internet. Retrieved May 4, 2019, from Internet Society: https://www.internetsociety.org/internet/history-internet/brief-history-internet/

Malone, C. K. (2000). Inventing the Internet by Janet Abbate. Journal of the American Society for Information Science, 51(8), 787-788. doi:10.1002/(SICI)1097-4571(2000)51:8<787::AID-ASI100>3.0.CO;2-F

Navarria, G. (2016, November 3). How the Internet was born: from the ARPANET to the Internet. Retrieved May 4, 2019, from the Conversation: https://theconversation.com/how-the-internet-was-born-from-the-arpanet-to-the-internet-68072

Park, K. (2005). The Internet as a Complex System. Retrieved May 4, 2019, from Purdue Education: https://www.cs.purdue.edu/nsl/complex.pdf

Park, K., & Willinger, W. (2005). The Internet as a large-scale complex system. New York, NY: Oxford University Press.

Subject: IT

Pages: 9 Words: 2700

Inventory Assets On Network And Identify Vulnerabilities

Inventory Assets on Network and Identify Vulnerabilities

Student’s Name

Institution

Date

Inventory Assets on Network and Identify Vulnerabilities

Network vulnerability is critical aspect for the security of network infrastructure and an organization data security CITATION Vää18 \l 1033 (Ossi, 2018). Vulnerability is caused by several factors include ignorance or recklessness of employees. However, the determination of vulnerability is based on the level of risk, since the precaution is taken based on the risk. The scan of the vulnerability indicates that cento 6/7 Firefox is one of the most venerable in the organization and therefore, the risk factor is high CITATION Nad18 \l 1033 (Ahmad, 2018). The scan score indicates that that the CVSS Scare of 9.3 and CVSS had a temporal score of 6.9 and the CVSS vector sectors. It is therefore, evident that the vulnerability is on the access at the end points of the network. The system vulnerability by loose application of system and lack of proper protection and security policies hence the system can be attacked by hackers, and virus attack CITATION Tod14 \l 1033 (King, 2014). These threats are usually get entry into the system based on the vulnerability, which are created by uses. The implementation of network security would be the best ideal method to product the system.

The network security can be implemented in there levels on the network infrastructure. It can be implemented at the backbone, servers, and at the computer. At the backbone level, the network security is installed at router, gateway, and switches to prevent any unauthorized access to the system CITATION Kum15 \l 1033 (Kumar & Malhotra, 2015). This is to ensure that the entry point to the system is protected and it becomes difficult to gain entry into the system or the network. Besides installation of security at the gateway and switches, it is important to install strong firewall hardware and set software as well. This will limit access to the system to ensure that unauthorized person does not get access to the network. However, it would be important to ensure that there is a clear security policy, to prevent the data from being accessed

References

BIBLIOGRAPHY Ahmad, N. (2018). Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of. 2-31.

King, T. (2014). CompTIA Security+ Exam: Devices, Media, and Topology Security. 2-3.

Kumar, A., & Malhotra, S. (2015). Network Security Threats and Protection Models. Technical Report – CSE-101507 , 2-34.

Ossi, V. (2018). 2 EVALUATION OF FIREWALLS AND RESEARCH. Degree Programme in Information Technology , 5-38.

Salah, A. (2018). Design and Implementation of a Network Security Model for Cooperative Network. https://www.researchgate.net/publication/50367393_Design_and_Implementation_of_a_Network_Security_Model_for_Cooperative_Network , 2-35.

Subject: IT

Pages: 1 Words: 300

Investigation And Implementation Of Network Security Countermeasures

Investigation and implementation of network security

Student’s Name

Institution

Date

Introduction

Security of internet and system are some of the key in issue business. The revolution of network, threats and computer system have risen over the last few years. Studies have indicated that the issues of security are essential to enterprise and therefore, without data and hardware security, the information could be exposed. According to Salah (2018, p. 32), computer and system threats have increased due to advanced technology. Most systems are being targeted by either hackers or authorized entry to access and therefore, it is important to ensure that the system is protected from any unauthorized access. Therefore, this paper analyzes the security threats and the types of threats which businesses and companies are usually exposed to and methods, which can be used to solve the problem.

The first defense of any system or computer to any kind of security threat is firewall. Most internet users are concern about the internet connection and therefore, strict network connection usually weakness the network. According Ossi (2018), access to internet creates a lot of vulnerability into the system and therefore, it is important to ensure that the system is protected before connecting it to the network. Again, when the effectiveness of the network security is being done, it is important to assess the firewall platform and its impact to the network connection. A business network can only be regarded as secure when it is already been secured against any threats. Without implementing proper security then the network is still not secure.

As stated by Ahmad (2018 some of the threats to network are virus, hackers, unauthorized access by either employees or external attacks. These threats are usually get entry into the system based on the vulnerability, which are created by uses. According Kumar & Malhotra (2015)., system users create vulnerability which occurs as a result of recklessness the end user. It is also happened as a result of lack of enough information regarding the threats and therefore, users unknowingly open loopholes into the system, which are actually utilized by hackers to gain easy access to the system.

Without adequate protection or network security, the businesses, government and individual information are at risk. Network security is the process or techniques where digital information is protected from unauthorized access. The main goal of internet security is to protect the confidentiality, privacy and integrity of the information. Business leaders or government implement strict and power network security to protect government information from being accessed. With this in mind it is appropriate to protect information from threats and vulnerability for the business to be able to achieve its full potential. Studies also discovered that vulnerability can arise from poorly configured hardware, router, poor network design, end user carelessness and inherent technological weakness. It is therefore, important to disable any unnecessary services from router and also limit the access to the router by ensuring that the system has a strong password.

Network Security and protection

The purpose of security is to protect assets. With the growing technology and the involvement of different sectors such as e commerce, personal computer, and internet, the concern about security is high. Most data are kept within personal computers must be protected and the best way to offer protection to these data is by ensuring that the system is well setup and clear policies are also designed to protect the management of the network. Network security is therefore the most important component in the provision of security to the system. It ensures that information which is stored cannot be accessed by any one. It simply makes it difficult for any access to the system CITATION Tod14 \p 32 \l 1033 (King, 2014, p. 32). It is securing any information, which can pass through the netw0rk. The network security is referred to the hardware, software, operational producers, accountability, measures and control to the system. Network security for it to be successful, it must prevent the access or any entry into the system. For network security to be successful it has to prevent the information from getting loss. In network security there must be accountability, privacy and confidentiality.

In real world network security involve prevention detention and response. If the prevention techniques were perfect there would be no need to require detection and prevention. There are so many techniques, which are used to protect the system. Besides firewall, there are encryptions, passwords which are used to provide proper security to the system. Security of the network can be achieved only through proper installation of firewalls, which is at the entry and exit point of any system. The firewall prevents entry and exists of information without authorization. Therefore, firewall is a component which must be installed at the any network to prevent any entry to the system.

Implementation of network security

The network security can be implemented in there levels on the network infrastructure. It can be implemented at the backbone, servers, and at the computer. At the backbone level, the network security is installed at router, gateway, and switches to prevent any unauthorized access to the system. When using CISCO router, the network security is configured in two levels to prevent any access to the system. This is to ensure that the entry point to the system is protected and it becomes difficult to gain entry into the system or the network. The switches also should be configured with strong passwords or key to prevent any entry and therefore, installation of network security is necessary to be done at the entry point to ensure that the system is protected. Besides installation of security at the gateway and switches, it is important to install strong firewall hardware and set software as well. This will limit access to the system to ensure that unauthorized person does not get access to the network. In some cases, the security is also deployed at the gateway to ensure that the system is fully protected. However, it would be important to ensure that there is a clear security policy, to prevent the data from being accessed.

Security Policy

Security policy is an important measure which is taken to prevent the access to the system. The best way to protect a system is derived a policy which can protect the system from unauthorized access. An organization can derive policies regarding login and accessibility of the system. The security policy can be including login password strength, active status and how clients can be able to log to the system and stay active after certain duration. The network administrator must come up with security policy to prevent people from login to the system. The policy would be able to prevent the system from external attack such as hackers and therefore, it is important to ensure that there is a proper security system based on the policy. For instance, the system can be set to require string password such word and letters, and at least eight. This is to make sure that nobody can easily guess the password and use to access a system.

Biometric and password

Mostly entries are protected using biometric and password. It is important to ensure that the password is strong. The personal computer, server, and other electronic devices should be protected using passwords; it is upon the network administrator to design the kind of passwords allowed and the biometric devices which is applicable. The biometrical could be figure print, eye and other allowed system. It is therefore, important to ensure that every employee has a unique passwords and clear policy for login. The passwords are set at the server and configured for every end user could be best way to ensure that the system is protected. It is also required that users should change their passwords often at specific time and any user who failed to change the password would be lockout. It is some of the policies which should be included as part of the network policy to protect the system.

Security decision making

There are some mistakes, which business leaders usually make which affect a company badly. It is required of an individual to take his or her time before deciding on what to do or any action to take. Studies have indicated that decisions which are made in rush always lead to poor choices and therefore, it is important to take time before deciding on what to do (Michael, 2014). Jeff Miller, the director in charge of training and development for human resources and business performance solution highlighted that leaders usually make quick decision without consideration other key factors. This affect the company’s performance since such decision was made without thinking of the alternative. It is also important to note that avoid making decision can also hurt the reputation of business. And therefore, it is required for a business leader, manager to make quick and appropriate decision without delaying because such delaying may hurt the company.

Recommendation

Network security is an important factor for enterprises. It is therefore, important to ensure that the system is protected using policies, hardware and software to safeguard the integrity of the data. Security implementation should be done at the entry point and within the system to ensure that any network is protected from any unauthorized access. It is therefore recommended for enterprises to deploy some of the latest security system which require the use of bio for access to a building or a system. The firewall should e deployed as well at the entry and exists to make sure that the system is protected. In real world network security involve prevention detention and response. If the prevention techniques were perfect there would be no need to require detection and prevention. There are so many techniques, which are used to protect the system. Besides firewall, there are encryptions, passwords which are used to provide proper security to the system. Security of the network can be achieved only through proper installation of firewalls, which is at the entry and exit point of any system. The firewall prevents entry and exists of information without authorization. Therefore, firewall is a component which must be installed at the any network to prevent any entry to the system.

Conclusion

Network and network security are essential for businesses and other enterprises. Without network security the information is exposure and this can hurt a company. Most companies have sensitive information, which should be protected. Therefore, it is important to ensure that such information is protected using various standards and policies. The network protection can be informed of hardware, software or policy application to ensure that the data and any other information about the company are protected from access.

Bibliography

BIBLIOGRAPHY Ahmad, N. (2018). Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of. 2-31.

King, T. (2014). CompTIA Security+ Exam: Devices, Media, and Topology Security. 2-3.

Kumar, A., & Malhotra, S. (2015). Network Security Threats and Protection Models. Technical Report – CSE-101507 , 2-34.

Ossi, V. (2018). 2 EVALUATION OF FIREWALLS AND RESEARCH. Degree Programme in Information Technology , 5-38.

Salah, A. (2018). Design and Implementation of a Network Security Model for Cooperative Network. https://www.researchgate.net/publication/50367393_Design_and_Implementation_of_a_Network_Security_Model_for_Cooperative_Network , 2-35.

Subject: IT

Pages: 6 Words: 1800

IoT

IoT has turned into an amazingly broad systems administration worldview that has reformed the correspondence mediums, interactions, commitment, showcasing, commercialisation, and so forth. To control and make the most out of IoT, one of the methodologies is o build up a decision-production framework that upgrades the client encounters and exposures dependent on their interests and necessities. For this reason, the specialists have advanced and created different methodologies dependent on computerized reasoning and AI. With the utilization of man-made consciousness, the information base is created, and improved exponential dependent on the client experience and presentation designs. Founded on the acknowledgment and coding of this information base, AI is upgraded that create effective decision for IoT standards. Thinking about this methodology, the individual paper will quickly recognize and ponder five distinct methodologies regularly utilized for improving AI through man-made brainpower and advance successful decision making.

Since IoT will be among the best wellsprings of new data, data science will make an extraordinary promise to making IoT applications progressively intelligent. Data science is the mix of different fields of sciences that use data mining, AI and diverse procedures to find structures and new encounters from data. These methods fuse a far reaching extent of calculations pertinent in different regions. The path toward applying data examination procedures to specific areas incorporates portraying data makes, for instance, volume, arrangement, speed; data models, for instance, neural systems, characterisation, grouping techniques and applying beneficial calculations that coordinate with the data characteristics.

Upgraded mechanical advancements and genuine enhancements to Internet shows and enlisting systems have made the correspondence between different contraptions easier than at some other time. This has offered to rise to the as of late created thought of the Internet of Things (IoT).

References

Bell, James John. (2003). Exploring the ‘Singularity’. Kurzweil Accelerating Intelligence. http://www.kurzweilai.net/exploring-the-singularity

Conitzer, V., Sinnott-Armstrong, W., Borg, J. S., Deng, Y., & Kramer, M. (2017). Moral Decision Making Frameworks for Artificial Intelligence. In AAAI (pp. 4831-4835).

Ghahramani, Z. (2015). Probabilistic machine learning and artificial intelligence. Nature, 521(7553), 452.

Irissappane, A. A., & Zhang, J. (2017). Filtering unfair ratings from dishonest advisors in multi-criteria e-markets: a biclustering-based approach. Autonomous Agents and Multi-Agent Systems, 31(1), 36-65.

Kapoor, N., & Ohri, J. (2017). Sliding Mode Control (SMC) of Robot Manipulator via Intelligent Controllers. Journal of The Institution of Engineers (India): Series B, 98(1), 83-98.

Kochenderfer, M. J. (2015). Decision making under uncertainty: theory and application. MIT press.

Lin, Patrick; Abney, Keith & Bekey, George. (2010). Robot ethics: Mapping the issues for a mechanised world. http://digitalcommons.calpoly.edu/cgi/viewcontent.cgi?article=1020&context=phil_fac

Markoff, John. (2013). The Rapid Advance of Artificial Intelligence. http://www.nytimes.com/2013/10/15/technology/the-rapid-advance-of-artificial-intelligence.html?_r=0

Rodriguez, Carlos; Daniel, Florian; Casati, Fabio; Cappiello, Cinzia (2010). "Toward Uncertain Business Intelligence: The Case of Key Indicators". IEEE Internet Computing 14 (4): 32. doi:10.1109/MIC.2010.59.

Subject: IT

Pages: 1 Words: 300

IOT Internet Of Things

IOT Internet of things

Student’s Name

Institution

Course Code

Date

TECHNOLOGY OVERVIEW OF IOT

IOT SYSTEM

IOT INTERNET OF THINGS SOLUTION

Intelligent spectacle

IOT INTELLIGENT REVOLUTIONIZED CONNECTIVITY

It resulted to the introduction of intelligent sensor, wearable electronics, intelligent inspect able.

Wearable Electronics

IOT Sensor

IOT Sensor

It improves productivity

Help us to stay connected with each other.

Control power system in the house remotely.

Wearable electronics

It measures the temperature and provides update on the changes.

It connects to emails, phone or mobile phones and used to lock doors.

It used for detection of danger and measure temperature of the surrounding.

Intelligent Spectacles

Convey update information gathered to the data for effective analysis and application in the real business.

Internet of the Things (IoT) provides effective away of connectivity and intelligent data collection for business analysis

Bibliography

Meghanathan, N., Sharma, S., & Skelton, G. W. (2010). On Energy Efficient Dissemination in Wireless sensor Networks using Mobile Sinks. Journal of Theoretical and Applied Information Technology, 19(2), 79- 91.

BIBLIOGRAPHY Rouse, M. (2019). Internet of the Things. https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT , 2-15.

Sharma, S. (2016). Expanded cloud plumes hiding Big Data ecosystem. Future Generation Computer Systems, 59, 63-92.

Sharma, S. (2016). Concept of Association Rule of Data Mining Assists Mitigating the Increasing Obesity. International Journal of Information Retrieval Research (IJIRR), IGI Global, 2016.

Sharma, S., Gadia, S., Kumar, N., Narayanan, V., & Zhao, X. (2010). Climate Analysis in IOWA Using XML and Spatio-Temporal Dataset-NC94. Int. J. Database Manage. Syst, 2(3), 82-93.

Subject: IT

Pages: 1 Words: 300

IoT Research Methology

IoT Research Methodology

Student’s Name

Institution

Date

Research methodology

The research methodology is a key component in conducting a research. It derives the techniques which were used by the researchers to complete the study CITATION Sam14 \l 1033 (Srivastava, 2014). This study will be completed using quantitative and qualitative research methods. The qualitative research method is conducted using structured interview to engage or determine the perception of the interviewees. The structured interview would be able to help the research identify the appropriate site for the implementation of IoT. The purpose of the study is to establish perception of people regarding IoT and its impact to the society. Therefore, qualitative research method would be able to help in establishing the perception of people regarding the IoT.

In order to complete the research efficiently, the qualitative data will be analyzed using experimental, discourse and descriptive research design CITATION Enz13 \l 1033 (Mingozzi, 2013). Discourse design plays the concept of literature review and case studies. And therefore, it will be applied to analyze the impact of IoT from various literature review and case studies. However, through the use of qualitative research method, interviews will be conducted and then analyzed to answer the research questions and variables. This would be done from source obtained from reliable databases like Google Scholar and EBSCO to ensure that all the literature used are authentic and most trusted and reliable materials.

For this reason, the specialists have advanced and created different methodologies dependent on computerized reasoning and AI. It will help the researchers to test various variables to determine the effect of the IoT CITATION Wal14 \l 1033 (Donato, 2014). The application of qualitative research method will be helpful in establishing the perception of people towards the IoT, which is key objective of the study. With the utilization of man-made consciousness, the information base is created, and improved exponential dependent on the client experience and presentation designs.

References

BIBLIOGRAPHY Donato, W. d. (2014). research methodology for . https://www.researchgate.net/figure/The-research-methodology-adopted-in-this-work_fig2_287883657 , 2-14.

Mingozzi, E. (2013). Methodologies for the IoT. Knowledge Acceleration and ICT , 2-12.

Srivastava, S. (2014). IoT Needs Qualitative User Research. Journal of Reserach and study science , 2-15.

Subject: IT

Pages: 1 Words: 300

IoT Research Paper

IoT Research Paper

Ngoc Nguyen

21st may 2019

Abstract

A refrigerator that registers automatically when the milk runs out and autonomously orders new ones. A toaster is refusing to toast another slice of bread before we went jogging. This information he receives from our socks, which incidentally also recognized the onset of the ever-recurring nail fungus and already long ago ordered a tincture against it at the pharmacy. Something like this could look like just a small part of our future life. This life has always been accompanied by technological developments. Starting with the invention of the stone tool millions of years ago, the first use of steam engines for the industrial production of goods or the use of computers, which at the beginning of their development still filled entire rooms, but now have enormous computing power in the smallest space. Through every past progress, people's lives have changed significantly. Since then, new technological projects have been introduced at ever shorter intervals, so that we are once again faced with such a decisive development, the "Internet of Things" (IoT in the following).

Research methodology

Due to the level of interest and the relevance of this topic, my interest in the development of the Internet of Things has been aroused. Therefore, it was easy for me to decide in the context of my housework for this topic. The hypothesis of my work focuses on the impact of the internet of things on day to day life. I will only cover the key points of these aspects and focus on history, current state, and future trends on this topic. At the beginning of my work, I will go into the history and development of the Internet until today. This also includes the beginnings of the Internet of Things, which I will briefly explain in more detail. Under the following paragraph, I will introduce next to a definition also the goals of the Internet of Things. Then I will discuss the technical and safety-critical prerequisites for the further progress of the IoT. The conclusion of this chapter is a presentation of various examples of the Internet of Things from our private lives, the last chapter contains a conclusion that emphasizes important statements in my work and gives an assessment of the future.

Internet of Things

The development of the Internet

In the meantime, most people can no longer imagine life without the "World Wide Web". For a long time now, the Internet has no longer only supported us in our private lives. Even the daily work is much easier with its help. And yet the Internet, as we know it today, is just twenty-three years old. The beginnings of the Internet can be found in the 1960s. Joseph Carl Robnett Licklider developed one of the first time-sharing systems at that time (Leiner et al., 1997). With these systems, it is possible to have multiple users working on one computer at the same time, without a user feels he has to share the computing power with the others. Licklider developed a so-called multi-user system. This system allowed him for the first time to change the definition of the computer as a calculating machine to the computer as a communication device. In particular, the US Department of Defense was interested in this development, so that in 1962 Licklider changed from the American arms supplier "Bolt Beranek and Newman" (BBN) to the military department "Advanced Research Projects Agency" (ARPA).

In 1966, for the first time, four US universities researching the Department of Defense were connected to a decentralized network, the ARPAnet (Foote, 2019). This system, developed by Licklider and his department, combined other universities and research institutions in the next few years and the term "Internet" emerged, consisting of the prefix "inter" for "between, middle" and "net," the short form for “Network." In 1971, the US Department of Defense commissioned defense contractor BBN to develop a new feature. As a result, Ray Tomlinson, the company's employee, wrote an electronic message to his colleague for the first time and constructed the probably most important application of the Internet, the e-mail. Not quite twenty years later, in 1989, the Internet's most important function was invented by Tim Berners-Lee, the "World Wide Web." His goal was for researchers around the world to be able to share their findings, at first only in text form. Unlike many colloquially used, this is not the same as the Internet. It is a retrievable system of hypertext documents, so-called websites, which are linked to each other by hyperlinks. In 1991, Mark Weiser published an essay titled "The Computer for the 21st Century," and for the first time published the term "Ubiquitous Computing," the first vision of the "Internet of Things." "The third wave of computing is that of ubiquitous computing, who’s crossover point with personal. In 1993 Marc Andreessen introduced the first graphical browser.

Due to the rapid computerization, more and more households were connected to the Internet more and more, and soon it was as good as every human being possible to use the Internet. Nevertheless, the Internet initially established itself primarily in the economy. Starting in 1994, companies began to set up their websites and for the first time to handle business processes via the World Wide Web. Start-up companies sprang up and went public with unrealistically high earnings expectations. Then in March 2000, when the bubble burst, prices dropped, and the market collapsed, it became clear that the digital revolution could not lift the rules of the economy. During this "new beginning," developers became aware that now is the best time for new technologies and projects, and they entered a new age of the Internet called Web 2.0. Another name for this form of the Internet is also the "interactive internet." The user changed in this context from the consumer to the producer. He was now able to independently upload content in the form of photos, videos, or profiles and share them with other users. Social networks like Facebook are becoming popular and allowing people around the world to get in touch. In the course of Web 2.0, but also, new applications are designed (Morrow, 2019). Application software such as mail programs or image processing can now be used increasingly over the Internet and are thus detached from their computer and their workplace. The Internet no longer consists of new technologies and programs but has also become the basis for a social movement of self-expression. The Internet has thus become more democratic and is shaped by its users "with all the positive and negative consequences of this development."

Definition and goals

Today we know that Weiser's view of living with ubiquitous computing was by no means just wishful thinking. What was ridiculed at the time is already a reality today? For us, the technological developments of UC, now the "Internet of Things," are no longer twenty years away, but are already in widespread use (Peiris, 2019). But what is this "Internet of Things," which in recent years has repeatedly dominated the innovation and digitization fairs from Cebit to IFA?

The term "Internet of Things," IoT (Internet of Things), describes the dissolution of the connection between the Internet and computer. The computer will disappear in the future more and more and be replaced by "smart devices" (Martis, 2019). Such a thing or "thing" can ultimately do everything. In addition to smartphones and tablets, this can also be everyday items such as toasters or umbrellas, which are equipped with processors, sensors, and network technology. With this equipment, it is possible for them to autonomously measure, navigate, calculate, control, regulate or communicate with each other. An example of today's time would be the "wearables" (Lueth, 2019). This term includes fitness trackers, which can be worn comfortably on the arm and measure while running the heart rate and running speed. Such values ​​are interesting not only for the trainee but also for the trainer or the health insurance company. Particularly active members have the opportunity to reduce their contribution to a few health insurances by passing on the tracker data. Another example, which is now widespread, are printers that independently reorder cartridges when a certain level is exceeded. But these are only the beginnings of the IoT so far. It is planned that in the future all objects of everyday life are networked and communicate with each other. But what exactly is this supposed to do for us?

The overarching goal is to provide data from the real world to the network. This means that smart items make their state ("milk is empty," "printer toner is full") available to the network for further processing. In this way, a need for maintenance or replacement could be detected early, or even a person's situation could be improved by having the network control things in a household. Applications would be in the construction industry, for example. Sensors could spark information about the statics of a bridge to the relevant authorities or register cracks before they are even visible. However, smart appliances and sensors could also help older people stay longer in their own homes. These sensors detect if a person is behaving normally and can alert nurses, relatives, or authorities if problems occur. In sum, the Internet of Things aims to make our everyday life easier, to support us in it, and to provide assistance in critical situations.

As progressive and convenient as our future life may sound in theory, the implementation of the Internet of Things is as complex as it is in practice. Because unfortunately there is not one technique that ensures a smooth use. In addition to the various requirements for networks or "smart devices," it is also necessary to deal with topics relating to the storage and security of the collected data. The main task of the IoT is the creation and storage of data. For this data to be created, the smart things need to be equipped with sensors. A sensor is a component that recognizes physical properties such as temperature, brightness, or movement and converts them into an electrical voltage. Today, they are known to anyone who owns a smartphone. When tilting, the user interface can be switched from vertical to horizontal and vice versa.

Conclusion

In principle, the central issue in the development of the Internet of Things must be the extent to which the new technological application possibilities are profitable for individuals and society. The evolution of the Internet of Things and the increasing ease-of-use of these devices are associated with an increased risk of further threats and previously unknown situations appearing on the scene. So far consisting the best safety measure in it, always about everything worth knowing in connection with your internet-enabled Devices to stay informed, it is expected that billions of Internet-enabled IoT devices will make life easier for us. The Internet of Things provides real-time information that enables us to monitor our homes, apartments, and businesses remotely. With nothing more than an internet connection, devices will work independently. The resulting time and resource savings enable better results.

References

Foote, K. (2019). A Brief History of the Internet of Things - DATAVERSITY. Retrieved from https://www.dataversity.net/brief-history-internet-things/

Morrow, K. (2019). Web 2.0, Web 3.0, and the Internet of Things | UX Booth. Retrieved from https://www.uxbooth.com/articles/web-2-0-web-3-0-and-the-internet-of-things/

Martis, W. (2019). The Internet of Things - the promise & the challenges. Retrieved from http://rattletech.com/internet-of-things/

Lueth, K. (2019). Why it is called Internet of Things: Definition, history, disambiguation. Retrieved from https://iot-analytics.com/internet-of-things-definition/

Leiner, B., Cerf, V., Clark, D., Kahn, R., Kleinrock, L., & Lynch, D. et al. (1997). Brief History of the Internet | Internet Society. Retrieved from https://www.internetsociety.org/internet/history-internet/brief-history-internet/

Peiris, P. (2019). How IoT Strengthens Ubiquitous Computing - DZone IoT. Retrieved from https://dzone.com/articles/how-iot-strengthens-ubiquitous-computing

The History of IoT (Internet of Things) and How It’s Changed Today | Avancer Software Solutions. (2019). Retrieved from http://avancer.in/history-iot-internet-things-changed-today/

Subject: IT

Pages: 6 Words: 1800

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.