Tuesday, May 5, 2020

ICT Services Management - Free Samples - Myassignmenthelp.Com

Questions: Discuss the following question. 1. Alan Turing and the Ace computer.2. A Brief History of Google's Android Operating System.3. The next Evolution of the Internet Is Changing Everything.4. Point-to-Point Communications.5. The Great Cyber heist.6. Technology Trends.7. A brief history of Facebook.8. Data mining at supermarkets.9. How M-Pesa changed banking in Africa. (Monks, 2017).10. Drawbacks of Information systems and technology. Answers: 1. Alan Turing and the Ace computer Ward, M. (5 February 2010). Alan Turing and the Ace computer. Alan Turing and the Ace computer. Automated computing Engine was the earliest electronic stored program planned by Alan Turing. He was competent in engineering of the theoretical computer which could formalize the idea of the algorithm and the computation which can be identified as general purpose machine. He is considered to be the father of the artificial intelligence. Artificial intelligence may look like the realm of the science fiction but one might be surprised to discover that we have been using it. Virtual Personal Assistance is most intelligent digital personal assistants being used in every day operating system thus helping in gathering of useful information and also interacts with the systems one can interact with them using voices to get such directions. They are also important since they collect user information and store it and then make use of that information in recognition of the user speech as programmed by its user. Microsoft launched Contana as AI which continues learning users requirements and give assistance where required. The other artificial intelligence which is widely used is gaming they are adapting to user character which learns user behaviors and also respond to the stimuli and then responds to unpredictable ways. Other technologies invented such as smart cars, Google self-driven cars are good example of the smart cars. The car is able scan the road ahead of it hence interpreting information on what have seen thus helping to learn the process. Such technologies are being used on the road predicting these technologies will soon be implemented. 2. A Brief History of Google's Android Operating System https://www.ipwatchdog.com/2014/11/26/a-brief-history-of-googles-android-operating-system/id=52285/ Brachmann, S. (November 26, 2014). History of Googles Android Operating System. A Brief History of Googles Android Operating System. Android operating systems was not initially designed and programmed to be used mobile phones they were meant to be used in cameras as compared to other operating system on mobile platforms android has been upgraded in number of times while resulting into a web based service which has a huge comparison as compared to other operating systems. The idea of implementing android operating system in the digital cameras which could access computer services thus the team noted that they will be low demand of such kind of cameras thus the team decided to focus on the mobiles phones. Android have gone a huge and tremendous step forward when it availed the open hand set Alliance which is a consortium of technology manufacture to work together in creating an open source mobile devices. Android operating system which used to power computing devices from mobile phone to huge work station are mostly targeted and also keeps in updating on a regular intervals which enables to fix error and other technical challenges thus improving user experiences. Its quite clear that the android will remain unbeaten at the moment since it is a low cost services and it is user friendly which is attractive and compatible to the hardware makers and the operators. 3. The next Evolution of the Internet Is Changing Everything https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf Evans, D. (April 2011). The Internet of Things. How the Next Evolution of the Internet. The article describes the emergence of internet and changes of modern devices. We feel better when the internet makes our lives more interesting while using smart home devices. Majority of these plug-in gadgets comes integrated with Wi-Fi capabilities with other companion applications thus making a streamlined life. Home automation or the Internet of Things most of our devices and other appliances are networked together in order to provide a seam less control over all aspects of homes and business. The idea of home automation has been there in a decade in areas of lighting, security features and other simple appliances. In the recent technology and the growth of internet idea of inter connecting devices and having full control of our homes from anywhere without necessary being there since the automation dictates what a particular device should responds in a certain manner as scheduled. Schedules are made according to our preferences hence providing conveniences, control and resources controls and the best part having smart home. The automation can also make alert of events which are key while there is absences of person such leaking water or eruption of electricity malfunction. The owner only requires to take out a smart phones are makes query desired settings of the house or report to the authority in case of emergency. In the automated home it is more convenience since each and every device and appliances are controlled remotely with or with absence of the user. There is safety since the system provides security while safeguarding homes devices such as IP cameras will make alerts in case of a possible leakage. 4. Point-to-Point Communications https://www.linktionary.com/p/point2point.html SHeldom, T. (2012). Point to Point Communication. Point to Point Communication (TCPIP). Point- to- Point connection is the one of the widely used types of the WAN connections, they are used to connect LANs to service providers and also connect LAN segments in an entity network. Its also referred to as serial connection since the serial connection is dedicated to be used by the company. This is normally done when a connection is done in between the internet service provider and while one desires to make multiple connections on the network thus the connection made or established in such connection is a Point to Point Protocol. PPP is also widely used on satellites, fiber-optic lines and the twisted pair transmission of the data. It also allows one to authenticate connections while using pre shared key. It has the following components one it has a method of encapsulating multiple protocol datagrams thus multiple network layer are simultaneously transported on the same link hence enabling compatibility of most supporting network devices. Two it uses the Link Control Protoco l which is used to propel communication over a PPP link. Every link sends packets in order to be configured and also examine data link while the link is propelled the node may be verified by authorization. Last but not the list once the link has been established the Network Control Protocol is used to inaugurate and configured single or multiple layer protocol will be used to initiate connection. 5. The Great Cyber heist https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?mcubz=1 VERINI, J. (NOV. 10, 2010). The Great Cyberheist. New york Magazine. A night in July 2003 at mid night the N.Y.P.D detective in the streets of the Manhattan as they were investigating a series of car theft, surprisingly a suspicious looking entered ATM room and withdrew hundreds of dollars in cash, on the same time he pulled another ATM card and did the same again multiple times while the detective around noted the man was not stealing cars but stealing something. Later the guy confessed that he had programmed multiple blank debit cards comprising of stolen card numbers and he has been withdrawing a much as possible from each account. The guy was wearing womans wig but after being interrogated he politely confessed the truth he is Albert Gonzalez. After a number of interviews by the federal he agreed that he will help the government rather than facing prosecutions. The agents won his trust and decided to pay his bills while waiting for Gonzalez to work though his withdrawal of cybercrimes. Gonzalez worked with the federal for several years and was able together with his crew of hackers illegally gain access to more than one hundred and fifty million payment card accounts from the customers databases and other corporations in the United State of America. During his sentences hearing in the mid-march, Gonzalez received a two con current twenty years jail term which is the longest sentence ever handed down to American for a cyber-crime. 6. Technology Trends https://changes-of-tomorrow.hyperisland.com/technology Patrick, A. (2017). Technology Trends. Technology Trends. Social media has offered new ways of intra enterprise communication which are beneficial of creativity and the innovation of technology globally. Most of the enterprises use online social networks among clients who desegregate business interest and other important activities within the business. Companies are heavily implementing social networks to promote and collaborate to their employees. Other companies are starting to educate their stakeholders on clouding computing and SaaS, while vendors are using these trending technologies to reach most of the companies. These technologies they are added to enterprise on the social networks platforms. Then the technologies in place are being implemented in order for employees to collaborate and share ideas on how to improve the work place. Firm are using social networks in order to exchange information and data to other shareholders in the company such as trading documents done on real time. Majority of the companies have adopted social networking while creating their internal networking sites thus encouraging employees to use these platforms to either connect to other employees enabling them to solve work related issues. Social networks sites such as Facebook, Twitter are used by companies in order to get more clients based on their likes and the preferences since every companies want to gain trust to their customers. 7. A brief history of Facebook https://www.theguardian.com/technology/2007/jul/25/media.newmedia Phillips, S. (2007). A brief history of Facebook. The Gurdian Journal. Facebook founder Mark Zuckerberg while he studying psychology at Havard University, He had developed multiple of social networks websites for collage mates such as Course match which allowed student who are undertaking degrees would they could match and rate peoples attractiveness. Within the next day more than thousands students had signed up and within the course of the month half of the undergraduate had created a profile. The network spread to the next Universities such as Boston University, Ivy League and spread across other universities of the US.In the year 2005 it became Facebook.com and its address was purchased. By the end of September it had already started to spread worldwide reaching UK Universities and by the end of 2006 the network had grown even beyond educational institutions. Facebook remained free and anyone who has a registered email or mobile phone number could join. The sites make profits via advertising revenue and it has incorporated features such as gifts and offers free classified adverts. Today Facebook have more than Thirty billion registered users which makes it the largest social networking site for education and business purpose. With this huge number of registered users companies uses these platforms for brand awareness business on Facebook gains more exposure to clients which drive them to rate a particular product, reviewing thus increase online visits. 8. Data mining at supermarkets https://www.freshplaza.com/article/176587/Data-mining-at-supermarkets Alex, J. (2017). Data mining at supermarkets. Fresh Plaza. Super markets mostly use data mining and other business intelligence in action. Supermarkets use loyalty cards to the customers which are used to gather compressive information about particular customer for use in data mining. The supermarkets developers establish rules in to predict the customer way of purchasing such as fashions and electronics thus by looking the contents of the purchases of the customers in the troy or the baskets they can identify products which he or she uses and they can start to begin targeting promotions for the extra products to the customers. Depending on the purchase of the target customer firm start sending promotion coupons to the client and create awareness of the particular product in the store. In order for a business to stay competitive they therefor requires viable customer retention strategy and since the key success of the developed strategy rest with customer relation, business requires to identify the most profitable ways to build and maintain customer in toes. In order to achieve this implementing a data mining techniques in the business can help understand customer shopping behavior while retaining esteemed customers. In conclusion collection of data together with other social economic data supermarkets are able to make evidence based decisions when devising market operations strategies. 9. How M-Pesa changed banking in Africa.(Monks, 2017) https://edition.cnn.com/2017/02/21/africa/mpesa-10th-anniversary/index.html Monks, K. (2017). How M-Pesa changed banking in Africa . Market Place Africa. In year 2003 Nick Hughes worker at Vodafone as the head of social enterprise made a proposal to deliver a financial service over mobile phone. The idea was to be implemented in a service provider in East Africa known as Safaricom which has 0.4 per cent stake to Vodafone. He got funding from UK department for International Development to venture with one million pounds of which was matched by Vodafone in terms of cash and staff time. He worked with East Africa people and financial experts in figuring the needs of the people in this particular area. In order to manage and work efficiently on the ground he en corporate Susie Lonie who had a know-how on mobile commerce in Europe, she exercised a small scale pilot to improve micro finance loan granting and repayment. Mpesa Application was invented in 2007 with a target of more than 30000 user in the first year the decision was wise since having subscribers using Mpesa could hardly leave Safaricom thus bonding the customers. Ideally Kenyans who received loans could send to their families miles away and to ease this mobile money transfer would be efficient. Mpesa is one of the revolutions that has widely employed and empowered millions of individual around the globe. Mpesa have enhanced customer in daily lives. 10. Drawbacks of Information systems and technology https://blogs.deusto.es/master-informatica/advantages-and-disadvantages-of-information-systems/ Anonymus. (2017). Drawbacks of Information systems and technology. OPINIONS ON THE WORLD OF INFORMATION SYSTEMS. The core factor of information systems is providing information to the right people at the right time. Information system should be in place to track, store, manipulate and so to specific people. Through use of information system can contribute to high opportunities to the firms on their daily transactions giving them un upper hand whereas on the other side can result to a group of individuals jobless since most of work forces are automated such as mechanic works. With the growth of the technology tasks which were performed on hands are carried by the computers systems, thus industry personnel argues that internet has made job security challenge because technology keeps on improving each and every day. On the other information systems has raised security issues concerning online hackers who get into corporate and organization and manipulate information. Implantation of the information systems becomes another challenge to firms because they require good amount of resources such a softwares, supporting technicians, and hardwares. Workers needs to be trained on how to use the new system thus incurring other expenses to the organization. In conclusion by understanding the pros and cons of the information systems it can results effort should be put in place to make the advantages much better than the negative impacts can results in the business world and society.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.