.

Tuesday, May 5, 2020

ICT Service Management Quantum Computing System †Free Samples

Questions: 1. What is Debian GNU/Linux? 2.Why Marissa Mayer Failed. Fox Business? 3.Why Target failed in Canada. Answers: Quantum Computing The quantum computing refers to the application of quantum mechanics in the computing system. It is an advanced technology which can solve several contemporary issues in the computing system. The quantum computing can increase the speed of the computers by manifolds and with the help of t several complex mathematical and logical problems can be solved easily. The traditional computing system is based on the binary number system wherein the binary codes one and zero are used to encode and process the information. Contrary to it, the quantum computing uses qubits which is the unit of information in the quantum nature. It is analog in nature and quantum synonymous of classical bit. It is a two-state quantum mechanical system. The qubits are developed around the phenomenon of superposition and entanglement. Therefore, qubits can remain in the state of one, zero or any stat of quantum superposition of the qubits. Therefore, the quantum system has higher capabilities than the classical com puters. The quantum computers take the advantage of the quantum particles which are subatomic in nature and can exist in more than one state at a time. Due to the nature of the quantum particles, the operations can be completed much more quickly and with less amount of energy. The quantum computers are hundred times faster than the traditional computers. Although, the quantum computers are not available commercially, several multinational organizations are making efforts so that they will be available for commercial and scientific purposes. The quantum computing has several benefits such as it can be used complex natural phenomenon and development of medicines with complex chemical formula. The quantum system also has applications in development or breaking difficult codes. It is also beneficial for the development of superconductor materials or pharmaceutical drugs and studying their nature. 1. Debian GNU/Linux? The Linux operating system refers to the system which uses the Linux kernel and package management system. The Linux operating system can be downloaded from one of the Linux distributions such as Ubuntu or Debian. A classic Linux distribution system contains Linux kernel, GNU tools and desktop environment. All the available software in the operating system contains free and open-source software which is allows modifications to the original software. Several times, the Linux software includes propriety software which is not available in the original software system. Basically, a Linux distribution system can be defined as an assortment of application and utility software packaged together with Linux kernel. The Debian system is developed with the emphasis of developing a free operating system. The Debin system are either based on Linux kernel or FreeBSD kernel. The operations system refers to the set of programs which assist then user to run the machine. The Debian operating system is one of the most popular personal computer and network servers and most often used as a base for the operating system. The efficiency of the Debian software can be increased by incorporating it with the Linux distribution system. The Debian operating system is commonly used by the business organizations as it is secure, cost-effective and easy to use. The Debian software package was made up of a large number of software packages which includes executable, scripts, documentation and configuration. The Debian operating system also requires a maintainer who is responsible for keeping track of bugs in the software and recent updates. It has an effective e bug tracking system which ensures that all the problems are solved and resolve quickly. Workstation for Windows Recently, the virtualization technology has developed quickly due to its immense applications in the computing field. With the help of virtualization, an organization can create a several virtual versions of a single device which can run on a single platform. With the help of virtualization, virtual versions can be created of computer hardware platforms, storage devices and computer network resources. The virtual machines can be categorized into two categories, namely, type-1 and type-2 machines. The type-2 virtualization products are the low-level programs which allow multiple operating system to run simultaneously on single computer system. They use software or firmware to allocate the resources in real-time. It controls the internet traffic and memory management. The type-2 virtualization machine run on a host operating system. The type-2 virtiualzation software are most common as the system administrator can buy the software and install it in the server which they already had. Th e Type-2 virtualization machine can be used to mainly run on client system wherein the efficiency is not the primary issue and where support to a large number of input or output device are required. The support can be provided by the host operating system. VMware Workstation is a hosted hypervisor or virtualization machine which is popularly use by the business organizations. VMware Workstation runs on 64-bit operating system and can run on Windows as well as Linux operating system. The hypervisor can be used to set up virtual machines on a physical computing device. Later, the physical machine and the virtual machine can be used concurrently. There are also free of cost version available which can be used for non-commercial purposes. The VMware software product can provide stable and secure desktop virtualization platform for running several virtual machines. DCCP-Datagram Congestion Control Protocol DCCP protocol is a transport layer protocol which can be used to control datagram congestion. It is an effective measure to control internet fall down if it is caused by traffic congestion in the distribution system. The congestion control trait of the protocol is achieved by using the mechanism of reliable acknowledgements and their delivery. The acknowledgements are delivered in the form of packets rather than the bytes and provide dynamic congestion control. DCCP can also offer negotiable blocking control mechanisms; however, the bandwidth consumption will increase with the additional features. It implements reliable connection setup and congestion notification is provided at each instance. In DCCP protocol, the congestion mechanism is immediately application without the requirement of any protocol in the network layer. The DCCP protocol is based on TCP and UDP protocols; however, it is a better version and has additional functionalities. The DCCP protocol is commonly used to cont rol the congestion in the transportation layer. It also has other applications such as identifying the sequence number of packets, maintaining data integrity and identification of port number so that devices with same IP address can communicate with each other. With DCCP protocol, the overall efficiency of communication system is increased as it results in efficiency acknowledgement between transmitter and receiver increased congestion control and enhanced the overall efficiency of the system. It is useful for application which has time constraint on the delivery of the data. Some of the common examples of such applications are internet telephony and streaming media. In these applications, the old messages or data packets become stale and new data packets are sent instead of accessing lost packages. In the DCCP connection, there are two types of packages which include data traffic and the acknowledgement traffic. Inside the digital heist that terrorized the worldand only made $100k. Recently, a large number of companies and countries were affected by WannaCry ransom software which was a worldwide cyber-attack. It is a ransomware cryptoworm which targets the computers which run on the Windows operating system. It encrypts the data so that the user cannot access the computing system and demand ransom from bitcoin cryptocurrency. The attack infected more than twenty three thousand computers in more than one fiftycountries. The WannaCry ransomware spread over large networks and the internet. It easily infected the computers which were not updated with recent software updates. Moreover, it directly infected all the exposed systems. The attack garnered the attention of the international media as the vulnerability was previously identified by the US National Security Agency; however, instead of informing the organization, build their own offensive work. The existence of the vulnerability was revealed by The Shadow Brokers and later Microsoft become aware of the vulnera bility and produced a security update. In the initial phase, the worm use the EternalBlue to enter the internal system of the computer and take exploit the issue in the Server Message Block (SMB) protocol of the Microsoft Windows. Later, the malware installs DoublePulsar, which is an implant tool which implements the WannaCry ransom package from the backdoor process. The malware works in the similar process as that of other ransomware as it firstly find and encrypts a significant amount of data files in the system and then display a ransom note informing the user that they need to pay a ransom amount in bitcoin currency. It is also a network worm as it contains a transport mechanism which scans vulnerable systems and use different mechanism to gain access and other tools to execute a copy of itself. Delta Problems Included a Fire at Data Center. Data Centre fires are a major issue in large business organizations which needs to deal with the large amount of data and information. The data center fire occurs due to excessive heat generated in the system due to continuous usage. In 2016, a data center fire occurred in the computing networks of US Airline Delta in which a large amount of flights were delayed and the flight schedule was disturbed. The data centers are crucial for the daily operations of the business and the most significant threat to the data centers is that of fire. It can damage the whole data of the data centers and the information once lost cannot be retrieved. In severe incidence, the fire blaze can spread rapidly and cause heavy damage to the infrastructure. The fire blaze can spread quickly and halt the operations of the whole organization. The data center fire in the Delta Airlines also caused heavy damage to the regular operations of the organization. A large number of flights were delayed and the custome rs have to wait for a prolong period of time in spite of booking flights earlier It causes dissatisfaction among the customers which may damage the reputation of the organization and may result in the loss of the customer base. A business organization can reduce the risk associated with the data fire by installing software which is capable to monitor the temperature of the data center rooms. If temperature of the data center exceeds particular limit, the software can alarm the authoritative person by ringing an alarm or sending a message. The Biggest Trends Impacting Retail Innovation. Rocket Space Crowdsourcing is a recent phenomenon which has occurred with the emergence of the internet. The companies are using crowdsourcing to attain contributions from the internet users which can include freelance services and ideas. It is cost optimization model in which the companies can obtain infrequent services from internet users. It also fosters diversity and assists a company to take hold of customers taste and preference. In the crowdsourcing model, the work is divided among the volunteers so that cumulative result can be obtained for the organization. The crowdsourcing model is different from the outsourcing business model as outsourcing is achieved through experienced professionals. In crowdsourcing, the business organizations use a mixture of variety of approaches for the selection of volunteers from the internet. These volunteer can provide services or ideas or suggestions in different category. Crowdsourcing increases the speed, quality and the diversity of operations. Sundial Brands have successfully employed the crowdsourcing approach for increasing the productivity of the organization. It is one of the leading companies in consumer products in Africa. The company uses consumer feedback in manufacturing of the products. It gives special attention to the feedback and the suggestions provided by the users and use them in their future product. For instance, the company manufactured a product with rosemary oil; however, the consumers complained that rosemary oil is not ideal for pregnant customers. As a result, the company replaced the rosemary essence with that of peppermint. Zomato Reports Security Breach; Data Of 17 Mn Users Stolen. The data theft and security has become a major concern for the business organizations in the present internet age. All the small and big business organizations are using digital and online mediums to store the consumer data and sensitive information of the organization. It includes various sensitive pieces of information such as trade secrets and bank details of the organization. Therefore, it is important to implement security measures to protect this information. Recently, a few hackers have stolen the consumer data of online food ordering app named Zomato. The company has reported the theft of user records of some seventeen million application users. The stolen data contained the email addresses of the users as well as their passwords. However, the company succeeded to protect the payment information and the credit card details of the users. The hashed passwords of the users were protected by theoretical decryption by brute force algorithms. The companies use the hashed passwords for security reasons as they are random-looking characters which cannot be decrypted easily. The hacker has stolen the data and published the data on the dark web up for sale. In the present case, the hacker was cooperative and wanted to promote security in the IT enterprises. As the ransom, the hacker demanded big bounty program for the ethical hackers. The hacker also shared how he/she entered the security system and accessed the sensitive information. The incidence shed light on the system vulnerability in security systems. 2. Marissa Mayer Failed. Fox Business The technological inventions have transformed the lives of people all across the globe. With the advent of the information age, frequently new inventions and products have been introduced which have transformed the lives of the people and supported different processes. It is important to embrace the technological advancements and innovations frequently otherwise, the business organizations may fail. At the turn of 21st century, Yahoo was considered as one of the leading technological business organization in the world. It has majority of market share and had an immensely popular web portal. However, it focused and relied only on that web portal rather than venturing into diversified business. The biggest mistake of the organization was to rely solely on its web portal rather than diversifying its business. As a result, now Yahoo is behind other technology companies such as Google, Microsoft and Facebook. Initially, the company had the opportunity to buy Google and Facebook; however, it was reluctant to buy the companies at high market price. Later, the company lagged behind other companies and failed to regain its importance. It also lacked in assessing the market demands and customer preference. If the company would have been able to assess the customer demands and requirements, it would have adapted itself with the changing times. 3. Target failed in Canada. Target Corporation is one of the leading retailers of the USA after Walmart. In 2015, the company tried to enter the foreign markets and chose Canada as its first international destination. The target market was chosen as a large number of Canadians used to cross orders for shopping. The people were already aware of the brand which will be beneficial for the organization. The decision for international expansion was also fueled by the decision that that the market of the USA has become stagnant and the competition has arisen as a large number of international retail companies have ventured into the market. However, the decision of the company to enter into the Canadian market was a complete failure. The company bought the retail outlets of leading retailer of the country in several locations. It presumed that the customers will be attracted towards the discount; however, there was lack of market research as there was not large price difference between the local competitors and the Ta rget Corporation. Moreover, there were several supply chain issues in the operations of the organization. It resulted in limited order and products on the shelf. A large number of customers did not switch their retail companies and the customers who did not switch were frustrated due to lack of products. References Collins, K. (2017). Inside the digital heist that terrorized the worldand only made $100k. Quartz. Retrieved on 23 May 2017 from https://qz.com/985093/inside-the-digital-heist-that-terrorized-the-world-and-made-less-than-100k/ Debian. (2017). What is Debian GNU/Linux? Retrieved on 23 May 2017 from https://www.debian.org/releases/stretch//amd64/ch01s03.html.en DWave. (2017). Quantum Computing. Retrieved 22 May 2017 from https://www.dwavesys.com/quantum-computing How Does Internet Work. (2013). Datagram Congestion Control Protocol. Retrieved on 23 May 2017 from https://howdoesinternetwork.com/2013/dccp-datagram-congestion-control-protocol Mayerowitz, S. (2016). Delta Problems Included a Fire at Data Center. US News. Retrieved on 23 May 2017 from https://www.usnews.com/news/business/articles/2016-08-11/delta-computer-outage-included-small-fire-at-data-center Mishra, A. (2017). Zomato Reports Security Breach; Data Of 17 Mn Users Stolen. Inc42. Retrieved on 23 May 2017 from https://inc42.com/buzz/zomato-data-theft-17mn/ Puri, R. (2017). The Biggest Trends Impacting Retail Innovation. Rocket Space. Retrieved on 23 May 2017 from https://www.rocketspace.com/corporate-innovation/the-biggest-trends-impacting-retail-innovation Tobak, S. (2016). RIP Yahoo: Why Marissa Mayer Failed. Fox Business. Retrieved on 23 May 2017 from https://www.foxbusiness.com/features/2016/07/26/rip-yahoo-why-marissa-mayer-failed.html VMware. (2017). Workstation for Windows. Retrieved on 23 May 2017 from https://www.vmware.com/in/products/workstation.html Wahba, P. (2015). Why Target failed in Canada. Fortune. Retrieved on 23 May 2017 from https://fortune.com/2015/01/15/target-canada-fail/

No comments:

Post a Comment