Assignment title: Information


Week Task 1 One aspect of week one was data compression. An everyday use of data compression is in the transmission of video. Collect and summarise two resources that explain the specific technologies/standards that underpin video compression. The resources must not be about the same technology/standard. 2 When we think about operating systems, we tend to focus on modern software like Windows, Linux and OS X. But what of the past: what were the forerunners of these systems? Collect and summarise two resources that describe specific operating systems that were prevalent in the 70s, 80s and early 90s. The resources must not be about the same operating system. 3 Week three covered material that mentioned specific network hardware such as modems, switches and routers. Collect and summarise two resources that describe the major commercial manufacturers of network hardware. The resources must not be about the same company. 4 The text chapter for week four mentions Application layer protocols such as HTTP/HTTPS. Collect and summarise two resources that discuss other Application layer protocols. The resources must not be about the same protocol. 5 New and novel forms of malware are released daily. Collect and summarise two resources that discuss specific examples of highly effective malware attacks. The resources must not be about the same malware. Hint: most of the most effective attacks are known by the name given to the worm/virus etc. or the vulnerability. 6 Latency and Jitter are key QoS metrics. Collect and summarise two resources that discuss how negative aspects of these metrics affect communication and/or how they can be minimised. One resource should focus on Latency and the other on Jitter. 7 Internet-based collaboration products (software/environments) are critical to productivity in most modern organisations. Collect and summarise two resources that discuss examples of these products. The resources must not be about the same product. 8 "Big Data" is regarded by some as the challenge of the decade. Collect and summarise two resources that discuss technologies that can be used to store, manage or analyse Big Data sets. The resources must not be about the same product or technology. 9 Outsourcing of "off-shoring" and organisation's IT function, particularly the development and operation of its major Information Systems, is a contentious decision. Collect and summarise two resources that discuss the pros and cons (benefits and risks) of outsourcing. One resource must be about the "positives" and one must be about the "negatives". 10 The text discusses three dimensions of project risk: project size, project structure and experience with technology. Collect and summarise two resources that exemplify the result of not managing these risks successfully (i.e. resources that discuss projects that have failed because of one of these risks). The resources must not be about the same risk.