Friday, December 6, 2019

ICT Service Management for Quantum Computing - MyAssignmenthelp

Question: Discuss about theICT Service Management for Quantum Computing. Answer: What Quantum Computing Can Do for You Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017]. Quantum computing is the application of quantum mechanics in the computer systems and associated operations. The quantum computing has enormous potential and capability to revolutionize the current computing system. The quantum computers can be used to analyze and make deductions from large set of numbers which would otherwise have taken a huge amount of time. It has several applications such as it can be used for future rug cures or examining a huge avalanche of public data. The quantum computing uses the quantum nature of matter, atoms and computing devices. The quantum computer is different from the traditional computer as it can take both the binary digits as input initially. The quantum computer is programed to represent all the possible combination or set of input and they can be tested in the computer simultaneously. In the regular computing devices, all the possible combinations are tested in a serial cycle; therefore, the amount of time required for calculation is much highe r. It can be used to examine the chemical structure of complex molecules. It can also be used for the software verification and validation. Validating the performance of software is important for examining its effectiveness; however, it is time consuming and expensive. Features Canonical. (2017). Features. [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. The Linux distribution refers to the operating system which is made up of Linux kernel and a package management system. Typically, the Linux distribution system comprises of Linux kernel, GNU tools, libraries and desktop environment. In Linux distribution, most of the software used are free of cost and open-source. Ubuntu is the most common Linux distribution software. It is fundamentally based on Debaian; however, it has several unique software repositories. The software in these repositories is synced to the Debian software, so that they could run on any platform. The focus of Ubuntu project is to provide the users with a solid desktop and server experience to the users. In this regard, the technology is customized for the operating system. The Ubuntu Touch edition is also commonly used in network servers. It can run on either the physical or the virtual servers. The security is a major concern for the Ubuntu software developers. In the default operations of the system, the utility programs run on the low privileges and cannot corrupt the operating system of the organization. Moreover, in order to increase the security other tools are used to provide temporary privileges and keep the root account locked so that the users cannot breach the security of the system (Canonical, 2017). Week 3 VMware Workstation - No Experience Necessary Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Virtualization is one of the latest applications of technology which assist in developing virtual machines with the technology. It includes the development of hardware platforms, storage devices and computer network resources as the virtual version of the actual devices. In the virtualization process, the developers create virtual software which can create and operate virtual machines. The virtual machines can be categorized into type-1 and type-2 machines. The type-2 virtualization machine can run on the basic operating system just like the actual physical device. The VMware Workstation is the standard platform which can be used for running multiple operating systems as virtual machines on a single device. The VMware Workstation can be used to enhance productivity, performance, reliability and increase the workplace security. It can be used with different operating systems such as Linux or Windows. The users can replicate the server and the desktop environment on the virtual machine . With this method, several applications can run simultaneously on the physical machine. It also provide safe and isolated environment for running the operating system. It also assists the system administrator in evaluating the hypervisors and other operating systems as well as using other technologies such as cloud computing without any interference with the IT operations of the system. Network Congestion Control: Managing Internet Traffic Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. The transportation layer protocols provide assistance to the host-to-host communication services for the applications. The primary role of the transportation layer protocol is to support the connection-oriented data stream, increase reliability, flow control and multiplexing. The DCCP (Datagram Congestion Control Protocol) is a highly popular protocol for providing assistance to the dataflow in the transportation layer. DCCP protocol is a message-oriented protocol which is used in the implementation of reliable set-up and congestion control in the transportation layer. With DCCP, congestion control mechanism is immediately applicable without using them in the application layer. It is an advanced version of TCP and UDP protocols. It is employed so that the transportation layer can effectively control the congestion in the network. It also offers several other functionalities such as it can be used for identifying the sequence number of packets, maintaining data integrity and identific ation of port numbers so that the communication devices with the same IP address can communicate with each other. It increase the overall efficiency of the commination system such as it reduces the connection teardown, efficient acknowledgement, increases congestion control and increase the security of the system. WannaCry Ransomware: Everything you need to know Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Recently, more than 140 countries are affected by the WannaCry ransom ware locks people out of their computers and data until they pay the ransom. The National Security Agency first discovered vulnerability and the cyber attackers have used to create the most prolific cyber-attacks all across the globe. The ransom ware has affected the computer systems from the USA to Russia and more than 200,000 commuters have been affected all across the globe. The victims include prominent banks, telecommunication companies and hospitals. It is a hacking attack which keeps the computing system hostage until a ransom has been paid. When the ransom ware infects a computer, it encrypts all the data then a program is run on the operating system which demands money from the user to get access to the computer. Furthermore, the price increases overtime until the end of the ransom period and at the end of time, the files get destroyed. The business organizations and the individuals are equally affected by this ransom ware. In order to protect the system from this virus, it is important to keep all the software updated. In addition to it, it is important that the user does not open suspicions mails, emails and links. Delta Finally Admits there was a 'Small Fire' at Data Center in Atlanta Monday as Airline Headaches Move into Day Four Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. [Online]. Available at: https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. In 2016, data center fire occurred in the computer network of the US Airline Delta. The airline cancelled a large number of flights and delayed many others after the incidence. Out of the myriads of threats posed to the operation of the data center, the most damaging incidence is fire. The fire blaze can spread quickly and halt the operations of the system in a short duration of time. The risk of data center fire can be reduced by the installation of data center temperature monitoring software. In this way, whenever the temperature of the server room reaches more than normal level, the higher authority should be immediately notified. In the case of US airline Delta, the data center fire lead to the disruption on the normal routine of flights and caused delays. The issue occurred when the switchgear used to control the data center temperature malfunctioned. It occurred during the examination of backup supplies of the organization wherein the switchgear malfunctioned and the system was locked out of its reserve generators. The major data center of the company was shut down which controlled the bookings, flight operations and other critical system of the organization. How This $200 Million Beauty Company Turned Product Development on Its Head Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Crowdsourcing is the sourcing model in which the business organizations use the contribution from the internet users to obtain the necessary services or ideas. In this model, the work is divided among the participants so that cumulative results can be achieved for the organization. It is different from outsourcing as the work is performed from the undefined or the general public. Crowdsourcing uses a mixture of bottom-up and top-down approaches for the selection of volunteers and getting work from them. It increases the speed, quality and diversity of the operations. It is also popular for its cost-effectiveness. Sundial Brands have famously employed crowdsourcing for increasing the productivity of the organization. It used the customer feedback to develop the consumer goods. The company manufactures the beauty products especially for women. The organization is heavily directed by the customer feedback. It manufactured a product with rosemary oil in it; however, later, some customers suggested that rosemary oil is not good for the pregnant customers. As a result, the organization changed Rose Mary oil and replaced it with the pepper mint. The use of the customer feedback is essential for the growth of the organization. The company emphasize on the feedback of the customers rather than focusing on its competitors. It has assisted the organization in obtaining customer loyalty. Hackers Finally Post Stolen Ashley Madison Data Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. At present, most of the companies are clod-based solution or internet for storing information and data of the organization. The information stored on the internet mediums is sensitive in nature; therefore, any breach in the security of the organization can negatively impact on the overall operations of the organization. The data security and sensitivity is critical in the organizations which are focused on customer-services as they save the sensitive and private information of the customers. In 2015, the hackers attacked the security system of Ashley Madison which provides dating services to the customers who are in serious relationships or are married. The hackers stole the address, names and locations of its users from the user database and the credit card details. There was serious impact on the customers due to the data theft and online publishing of the data. Several people left their jobs after the publishing of data. It also resulted in termination of employees from their jobs and increased the divorce rate of the people. Other than that, several victims have to face social shaming after the leak. The victims were avoided in social settings which resulted in clinical depression and suicides. Yahoos Demise Is a Death Knell for Digital News Orgs Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. In the present ever-changing business environment, it is important for the organization to adapt to the technological changes. The business organizations should be prompt to adapt to the latest technological advancements; otherwise they will fail and lag behind their competitors. One of the common examples of the companies which failed in to adapt to technology is Yahoo which was once one of the leading business organizations. In 2005, the company had approximately 21% of the market share; however, now it lags behind other major companies such as Google, Facebook and Microsoft. The biggest mistake of the organization was that it focused on creating a great online portal rather than focusing on the importance of the search engine. It outsourced tits search player to Microsoft Bing and neglected its importance. Over the years, the company also failed in several mergers such as Facebook and Google. The main reason was that it was unwilling to shell out money for the mergers. In successf ul operations of the organization, it is important that the organization conducts mergers and acquisition to foster its growth. Moreover, it is also important for the organization to examine the current trends in technology and adapt to it. Lessons Learned: IT's Biggest Project Failures Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Information technology is an innovative field and its growth is marked with constant ups and downs. Whereas, there have been some remarkable and revolution innovation, there are also some significant failure. One of the biggest failures in the Information Technology history is the stretch project by IBM. IBM (International Business Machine) is one of the prominent technology organizations in the world and pioneer in developing computing machines. In 1956, the company declared to manufacture the fastest super computer in the history of mankind. It was intended that the computer will be able to operate at very high speed and will be able to conduct complex calculations in millions of second. After over five year of hard work of the scientists, the company launched the computer in the market. Although the seed of the super computer was ridiculously high, it was still deemed as a failure. The major reason for this is that speed of the computer was only thirty to fifty percent than the in tended speed of the intended speed. Moreover, because of this reason, the organization also had to lower the price from 13.5 million US dollars to 7.5 million US dollars and had to sell the computers at a loss. However, the stretch project of the organization was a stepping stone in the development of supercomputers. Reference List Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Canonical. (2017). Features. . [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.