Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

Social Media

Name

Course

Tutor

Date

Social media presence in Newark –New Jersey

Social media is a platform or website where people can create profiles, make them visible, and traverse relationships (Wolf, et al, 2). People use social media platforms to share information, ideas, images, and videos. Newark is a vibrant community with an active social media presence. People in my community participate actively in social media by sharing information, commenting on important community views and mobilizing members on issues touching on community development. Major social media platforms often used in my community include Twitter, Facebook, WhatsApp, and Instagram. 

Many people have twitter accounts where they follow each other and share vital information about events in and out of the community. Popular community members have a larger number of followers, and they influence views and discussions. Facebook is the most popular especially among the youth in my community. Many see Facebook as a platform to freely share their ideas, feelings, photos, and videos. WhatsApp also has a great impact in my community because it enables people to create distinct groups to discuss issues and share information. Instagram also gives people especially youth a chance to share their moments through photos. 

Each social media platform used in my community serves different purposes; they are used to share information, make discussions on important topics, share photos and videos, sensitize members about important issues, and mobilizing community members on community affairs. The information shared in social media in my community is usually updated, fruitful and useful to the members. The information touches on matters crucial to the members include the welfare of the community and social and economic affairs. There is no platform that I would recommend, the social media platforms discussed above are sufficient. 

Works cited

Wolf, Maxim, Julian Sims, and Huadong Yang. "Social media? What social media?." Annual Conference of the UK Academy for Information Systems, Oxford. 2018.

Subject: IT

Pages: 1 Words: 300

Societal And Cultural Impact Of Surgical Robotics

jmi bjbj Fl11cccccwww8 wiS/L RRRRRRRMUWDScSccS@@@ccxQp@R@@L8 NJ

owJXMdQ9S0iSM3X3XD N3Xc NX@SS@iS3X1

)

Societal and Cultural Impact of Surgical Robotics

Author name

Affiliations

Introduction

The quality of surgical practice has been improved with technological innovations. Firstly, there was traditional open surgery that was challenged by laparoscopic surgery in the 1990s.However this was further challenged due to its 2-dimensional operative image and instruments by robotic surgery. Today Da Vinci surgical robot is being used for soft tissue surgery. During recent years, North America and Europe both have shown a sharp rise in the acquisition of surgical robots ADDIN ZOTERO_ITEM CSL_CITATION citationIDvKES4RBA,propertiesformattedCitation(Randell et al., 2015),plainCitation(Randell et al., 2015),noteIndex0,citationItemsid2235,urishttp//zotero.org/users/local/KZl8ZL3A/items/E7S5L7SU,urihttp//zotero.org/users/local/KZl8ZL3A/items/E7S5L7SU,itemDataid2235,typepaper-conference,titleImpact of robotic surgery on decision making perspectives of surgical teams,container-titleAMIA Annual Symposium Proceedings,publisherAmerican Medical Informatics Association,page1057,volume2015,authorfamilyRandell,givenRebecca,familyAlvarado,givenNatasha,familyHoney,givenStephanie,familyGreenhalgh,givenJoanne,familyGardner,givenPeter,familyGill,givenArron,familyJayne,givenDavid,familyKotze,givenAlwyn,familyPearman,givenAlan,familyDowding,givenDawn,issueddate-parts2015,schemahttps//github.com/citation-style-language/schema/raw/master/csl-citation.json (Randell et al., 2015). This paper will discuss the societal and cultural impact of surgical robotics and will give recommendations for their future development, regulation as well as an ethical responsibility in order to make them perform better.

Discussion

A surgical robot can be programmed as it is a computer-controlled device that assists in positioning as well as manipulation of surgical instruments. These assume the role of a nurse or a caregiver andallow the surgeon to perform more multifaceted tasks. These provide the 3-dimensional view to surgeons and increase their depth perception by controlling th4e camera motion ADDIN ZOTERO_ITEM CSL_CITATION citationID6CDVtZ3p,propertiesformattedCitation(Randell et al., 2015),plainCitation(Randell et al., 2015),noteIndex0,citationItemsid2235,urishttp//zotero.org/users/local/KZl8ZL3A/items/E7S5L7SU,urihttp//zotero.org/users/local/KZl8ZL3A/items/E7S5L7SU,itemDataid2235,typepaper-conference,titleImpact of robotic surgery on decision making perspectives of surgical teams,container-titleAMIA Annual Symposium Proceedings,publisherAmerican Medical Informatics Association,page1057,volume2015,authorfamilyRandell,givenRebecca,familyAlvarado,givenNatasha,familyHoney,givenStephanie,familyGreenhalgh,givenJoanne,familyGardner,givenPeter,familyGill,givenArron,familyJayne,givenDavid,familyKotze,givenAlwyn,familyPearman,givenAlan,familyDowding,givenDawn,issueddate-parts2015,schemahttps//github.com/citation-style-language/schema/raw/master/csl-citation.json (Randell et al., 2015). These surgical robots are also known as master-slave manipulators as these cannot work without a human surgeons assistance.

However, despite its numerous benefits, this technology has also resulted in a high number of deaths and patients harms as a result of medical errors due to robots. A surgeon for an intracranial lesion also acquires information related to its boundaries and neighboring structures. Moreover, there is surgical experience as well as hand-eye coordination of surgeon that makes the surgery successful ADDIN ZOTERO_ITEM CSL_CITATION citationIDGEIIfun5,propertiesformattedCitation(Davies, 2015),plainCitation(Davies, 2015),noteIndex0,citationItemsid2236,urishttp//zotero.org/users/local/KZl8ZL3A/items/7RPUJJH2,urihttp//zotero.org/users/local/KZl8ZL3A/items/7RPUJJH2,itemDataid2236,typearticle-journal,titleRobotic surgeryA personal view of the past, present and future,container-titleInternational Journal of Advanced Robotic Systems,page54,volume12,issue5,authorfamilyDavies,givenBrian,issueddate-parts2015,schemahttps//github.com/citation-style-language/schema/raw/master/csl-citation.json (Davies, 2015). All these requirements cannot be fulfilled with currentrobots. Therefore, society is not readily accepting this technology to be used in medicine.Furthermore, it is also expensive technology that not only has a high initial cost but also requires high cost for yearly maintenance. This technology also brings an effect on the employment rates and reduces the number of jobs performed by humans. In addition, there is also the cultural impact of surgical robotics. There are different cultural and legal issues for the use of these robots in medicine. For example, there must be consent and professional confidentiality along with the precision in the treatment. The acceptance of this technology is less in many cultures as they are satisfied with the current laparoscopic procedure and consider it cost effective.

Recommendations

Robotic surgery is a radical development in surgery which is at its initial stages. This requires a number of strategies to be undertaken for its further development and regulations. Firstly, there must be the use of advanced technologies to enhance the precision and dexterity of robots in surgery. There must be the use of technology that should not depend on humans commands. Thus, surgical robots must use the interface technologies so they can complement human abilities to the surgical tasks. One major concern of society is the safety of patients. The technology used in robots must be so effective to ensure the patients safety. Moreover, care should lso be taken towards different ethical issues and their solutions. Policies should also be informed regarding the limit of use of these robots in surgery. Patient consent is the prerequisite for the use of these robots. There must be appropriate risk disclosure to patients.

In addition, robotic surgery has an effect on the structural formation of an organization such as the formation of the surgical robotic team, programs as well as training staff members. Furthermore, it is also expensive technology and requires guidance to organizations about its use and maintenance as well as its potential long term benefits. Similarly, to reduce the number of errors due to humans in robotic surgery, there must be a uniform system of error reporting. This will assist in reducing the errors due to penalties. Organizations should also be motivated for the use of robots instead of laparoscopy. They must understand the advantages and compare them with other available methods.

References

ADDIN ZOTERO_BIBL uncited,omitted,custom CSL_BIBLIOGRAPHY Davies, B. (2015). Robotic surgeryA personal view of the past, present, and future. International Journal of Advanced Robotic Systems, 12(5), 54.

Randell, R., Alvarado, N., Honey, S., Greenhalgh, J., Gardner, P., Gill, A., Dowding, D. (2015). Impact of robotic surgery on decision making perspectives of surgical teams. AMIA Annual Symposium Proceedings, 2015, 1057. American Medical Informatics Association.

SURGICAL ROBOTICS PAGE MERGEFORMAT 2

Running head SURGICAL ROBOTICS 1

78CDPSX_bcdqr wlwaVKhuhXSBphhuhzGBphhuhq5BphhuhTBphhuhBphhuhl5Bphhuh5BphhuhKBphhuhBphhuhlBphhuhiBphhuhPBphhuhBphhuh4BphhuhNBphhuhxBph8DQRSYZ_abcagdlagdl

. agd4agd4gd

/gdcdrrgd-DM gdsd-DM agdmd-DM gd)d-DM gdagdmgdagdl agdP 2 V h - 3 Q R whhTEThuh2SuBmH phsH jhuh 8BUmH phsH huhBmH phsH huhPEBphhuhPEBmH phsH huhn_BphhuhBphhuhsBphhuhABphhuhBphhuhBphhuhtBphhuhTBphhuhXSBphhuhTBpha GHKmowlllaVKVaahuhy0BphhuhN1BphhuhDUBphhuhKBphhuhm5Bphhuh5BphhuhBphh5BphhUBphhuhBphhuh9Bphhuh9BmH phsH huhPEBmH phsH jhuh 8BUmH phsH huh2SuBph()yncXMB7huhVBphhuhJBphhuhBphhuhBphhuh7BphhuhcBphhuhcBfHphq /jhuh 8BUfHphq huhXBfHphq huhjNBfHphq huh.BfHphq huhjNBphhuhwBphhtBph4Hgxy

XvvvkUhuhBphhuhEDfBphhuh-bBphhuhkBphhuhs,BphhuhBphhuh BphhuhJBphhuhLBphhuhXBphjhuh 8BUphhuhBphhuhuBphhuhVBphhuhJBph wlaVaK@huhNBphhuhBphhuh@BphhuhnBphhuh

Bphhuh9BphhuhmBphhuhBphhuhm5Bphhuh5BphhuhiBphhuh)BphhuhFBphhuhYBphhuhEDfBphhuhBphhuhBph4DE

( ) I Q W X _ b shhhhuhqjRBphhuhBphhuhXBphhuhaBphhuhjBBphhuhlBphhuhSBphhuhBphhuhtBphhuh6BphhtBphhuh56BphhuhBphhuhNBphhuhRBph IJUVZhipqrdeshsUshtBphhuhBphhuh)SBphhuhhBphhuhI BphhuhfBKHPJnHphtHhuhfBphhuhXBphhuhBphhuhVBphhuh3usBphhuh-4BphhuhCBphhuhqjRBphhuhdBphHry -.0145sfShFBphhuhwRBphhuhugS5BphhuhiBphhtBphhuhuBphhuhFBphhuhugSBphhuhBphhuh9Bphhuh5BphhuhhGBphhuhMBphhuhBphhuhvBBphhuh Bphr./0123456789I

p@pagdFd-DM gdfd-DM gdfd-DM gdhG5HJK 4569@ACDFWXYZyrlbjh 80JU h 0J hih hlhhqjhqUhuh

/BphhuhNBphhuh6Bphjhuh 8BUphhuh4BphhuhBphhuhwRBphhuhFBphhuhBphhBphIJ5789@BCEFuvgdi

Bgd dgdbgd

/gdFagd4Zqrstuvhuh

/Bphhihx0J hihi hihL hlhL hihhq hm hxjh 80JUmHnHuht0JmHnHujh 80JU h0J8 01hp 80/ b 666666666vvvvvvvvv66666666666666666666666666666666666666.666666666666nN66666666666666666666666666666666666666666666666666666666666666666p62 0@Pp2. 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@PpPJ_HmH nH sH tH VV A

Normald CJKH_HaJmH nHsH tHTT j@ Heading 1@a5OJPJQJJRR j@ Heading 2@5OJPJQJJNN 0@ Heading 3 @5OJPJQJJTT 0@ Heading 4 @56OJPJQJJNN 0@ Heading 5 @6OJPJQJJZZ Fj Heading 6(@BOJPJQJJphnnn Gj Heading 7(@6BOJPJQJJphnnnbb Hj Heading 8(@BCJOJPJQJJaJphh h Ij Heading 9 (@6BCJOJPJQJJaJphDAD

Default Paragraph FontRiR 0 Table Normal4 l4a (k (

0No List TT 8

Section Title@aOJPJQJJ2@2 80Header d22 80 Header CharKH0W@0 8Strong 5B1B 0Placeholder Text Bph@@@f Bf 80No Spacing,No IndentdCJ_HaJmH nHsH tHNQN 8@Heading 1 Char5KHOJPJQJJNaN 8@Heading 2 Char5KHOJPJQJJDrD 8Title amOJPJQJJ@@ S Title CharKHOJPJQJJ.X. 8@Emphasis6NN 0@Heading 3 Char5KHOJPJQJJTT 0@Heading 4 Char 56KHOJPJQJJNN 0@Heading 5 Char6KHOJPJQJJRR 0 Balloon Text dCJOJQJJaJRR 0Balloon Text CharCJKHOJQJJaJ A 8P Bibliography 0xTx j0 Block Text NYYYOYYYPYYYQYYY6BphYYY6B6 80 Body Text x88 80Body Text CharKHP2 80 Body Text 2 xA 80Body Text 2 CharKHBQRB 0 Body Text 3 xCJaJDaD 0Body Text 3 Char CJKHaJLMrL ( 80Body Text First IndentRR 80Body Text First Indent CharKHHCH 80Body Text Indent)xhFF ) 80Body Text Indent CharKHPNP , 80Body Text First Indent 2VV 80Body Text First Indent 2 CharKHLRL . 80Body Text Indent 2-xhJJ - 80Body Text Indent 2 CharKHTST 0 0Body Text Indent 3/xhCJaJRR / 0Body Text Indent 3 Char CJKHaJPP 0Caption1d6BCJaJph88 3 80Closing2d414 2 80 Closing CharKHFBF 5 0 Comment Text 4dCJaJFQF 4 0Comment Text Char CJKHaJ@jAB@ 7 80Comment Subject65RRqR 6 80Comment Subject Char5CJKHaJ(L( 9 80Date8.. 8 80 Date CharKHRYR 0 Document Map dCJOJQJJaJRR 0Document Map CharCJKHOJQJJaJFF 80E-mail Signature dFF 80E-mail Signature CharKHDD 0

Footnote TextdCJaJHH 0Footnote Text Char CJKHaJtt 80Envelope Address@dD/@ OJPJQJJ 0Envelope Return AdCJOJPJQJJaJ2 2 C0Footer Bd212 B0 Footer CharKHp Cp 8p Table Grid7VD0Dd/S 8Grid Table Light7VE0EdRaR 8Heading 6 CharBKHOJPJQJJphnnnXqX 8Heading 7 Char6BKHOJPJQJJphnnnZZ Heading 8 CharBCJKHOJPJQJJaJph Heading 9 Char6BCJKHOJPJQJJaJphDD K 80 HTML Address Jd6DD J 80HTML Address Char 6KHe M 0HTML Preformatted LdCJOJQJJaJ L 0HTML Preformatted CharCJKHOJQJJaJ8 8

80Index 1Nd8 8

80Index 2Od8 8

80Index 3Pd8

8

80Index 4Qd88

80Index 5Rd88

80Index 6Sd88

80Index 7Td88

80Index 8Ud88

80Index 9VdpPP 80

Index HeadingW5OJPJQJJtt Y

Intense Quote/XhhN@@@ P@@@ a6Bph@@@PP XIntense Quote Char6BKHph@@@0/0 80List

Zhm424 80List 2

m434 80List 3

8m444 80List 4

m454 80List 5

m0 8 List Bullet _ FmB6B 80

List Bullet 2

FmB7B 80

List Bullet 3

a FmB8B 80

List Bullet 4

b FmB92B 80

List Bullet 5

c FmFDBF 80

List ContinuedxhmJERJ 80List Continue 2exmJFbJ 80List Continue 3fx8mJGrJ 80List Continue 4gxmJHJ 80List Continue 5hxm1 8 List Number i FmBB 80

List Number 2

j FmBB 80

List Number 3

k FmBB 80

List Number 4

l F mBB 80

List Number 5

m F mDD 8 List Paragraph

nm- p 0 Macro Text(o

@

d(CJKHOJQJJ_HmH nHsH tH/ o 0Macro Text Char(CJKHOJQJJ_HmH nHsH tHI r 80Message HeaderIqdM NOPQ8OJPJQJJ q 80Message Header CharKHOJPJQJJq D2D 80 Normal (Web)s OJQJJB 80

Normal Indent tO v 80 Note Heading uda u 80Note Heading CharKHNZrN x 0 Plain Text wdCJOJQJJaJNN w 0Plain Text CharCJKHOJQJJaJNN z 8Quoteya6Bph@@@@@ y 8 Quote Char6BKHph@@@4K4 80 Salutation 80Salutation CharKH@ 80 Signatured88 80Signature CharKHL,L 80Table of Authorities @@ 80Table of FiguresP.P 80 TOA Heading x5OJPJQJJ22

8pTOC 4d22

8pTOC 5d22

8pTOC 6d22

8pTOC 7d22

8pTOC 8d22

8pTOC 9d 80Endnote ReferenceH@@ 8PFootnote ReferenceH/ A0 APA ReportV0 j4 d

OJQJ@@ 8p Table/Figure

m/ M

Plain Table 1qV044j@ j j

d,5555BB 0Comment ReferenceCJaJBB 0 Endnote TextdCJaJFF 0Endnote Text Char CJKHaJb 0 HTML CodeCJOJQJaJBd B 0

HTML KeyboardCJOJQJaJFg F 0HTML TypewriterCJOJQJaJH1 H PIntense Emphasis6Bph777TA T EIntense Reference5@BphYYYH H jp TOC Heading@ aaJ FVa F j0FollowedHyperlink BphYYY2Or 2 Title 2 a6U 6 40 Hyperlink Bph___NO N pdddKHOJPJQJJtH PKContent_Types.xmlj0Er(Iw,-j4 wP-tbUTUhd)1P W0)T9lyi@(Hu Dz/0 X3aZ,D0j3bi3/G-Rk.s..aPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKatheme/theme/theme1.xmlWn6/ XY2,n S 4Z/pCyj(z(zVwm n7 umNh K2U6 8Fn_

oFyOnCGc

G

Z@ tBk -g-BXFwo v.Gd(KOin,7GSgskiX9 NA /A x,UnNVRv@jZn-)xDXS@JxEAeGbnXjY5kLNuS0 alxpHwWliat

Cj

t8FHjF c0 9OaaRI

jCU_C 8uEqRiJSK

H3w8H)oZZDt. Xw

51mKMxmvX

B2

eT(5hjM2VjAZr1Fn(f

WZq_qDFSO0VpJy,kH VDwS@G

90FJtkCRyyU

VC6cZwtN j,j Vw 4 C

pPU )3-oLoZIlyzkpKk3wxj1 5MMwufHXoZTiO/ UZQc CW)PyPK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 _rels/.relsPK-kytheme/theme/themeManager.xmlPK-atheme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPKxml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/

F kkn 5Z crIQ(

xJ5QQQQ79nL AA@0( B S _GoBacky

_b@BCEF@BCEF24D()WX_9@BCEFXYtnmRlk6jco8bah iL4_ZJhB T V pm tsr ..888.. OJQJo( OJQJo( 888OJQJo( OJQJo(888o(. 888OJQJo( Article . Section .PP()pp()PP)PP))PP.0p0p.hh))88)()()pp() .@ @ . . Article . Section .PP()pp()PP)PP))PP.0p0p.hh.PP.....xx.... ..... X X ......

.......

88........

.........N tsr TZJV pmZGM9 e @ A

8ts@2PEImI w6Qf.z.

/y0VC1W2/z455XT8A BDBjBvB_CChGGzGHJKMjNNPPHQRqjR)SugSU4Ul VVC@ous,9R

6/_n_9a-bcEDfhis-i)kg(knklwlEno3us2Suau7wRFXN5L1zZiSzGKlF-4Wes)NjLVXSlnswRS m 56JO47N1Sk9EhjA1Z09Xiy0q5

9n8nTguhLl9 8xDbMxxUY5SAyDUq9jGfq 7 Rd __Grammarly_42____in__Grammarly_42___1@84H4sIAAAAAAAEAKtWckksSQxILCpxzi/NK1GyMqwFAAEhoTITAAAATH4sIAAAAAAAEAKtWcslP9kxRslIyNDYyMDIzMbKwNDUxsTQ3szRQ0lEKTi0uzszPAykwqwUAraOp4CwAAAA@h@UnknownGAx Times New Roman5Symbol3. Cx Arial(SimSunSO 8SimHeiSO9 Segoe UI95 @ ConsolasACambria MathB1h, v- v660HP P92xx Zack GoldDaudD

Oh0

px

Zack GoldNormalDaud3Microsoft Office Word@Ik@Mo@Fbqo.,D.,, hp

6 TitleD BZOTERO_PREF_1data data-version3 zotero-version5.0.58session idYHeruvmo/style idhttp//www.zotero.org/styles/apa localeen-US hasBibliography1 bibliographyStyleHasBeenSet1/prefspref namefieldType valueField//prefs/data

()-./0123456789@ABCDEFGHIJKLMNOPQRSTUVWXZ_bcdefghkloRoot Entry F@onData 1Table,wXWordDocument FSummaryInformation(YDocumentSummaryInformation8aMsoDataStore0oJ

o2UVPWZE5AIQ20oJ

oItem PropertiesUCompObj y bSources SelectedStyleCHICAGO.XSL StyleNameChicago Version16 xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliography xmlnshttp//schemas.openxmlformats.org/officeDocument/2006/bibliography/bSourcesxml version1.0 encodingUTF-8 standaloneno

dsdatastoreItem dsitemID5614479E-D653-4F64-B57E-2022239DB6B1 xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem FMicrosoft Office Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 2 Words: 600

Software

[Name of the Writer]

[Name of Instructor]

[Subject]

[Date]

Summary

A book “INNOVATORS” written by author Walter Isaacson, Software (chapter#9) focuses on Software. Its development, innovation, and competitive approaches are used. At the time when Paul Allen and Bill Gates were in college Altair was designed. It was designed in 1974, it was microcomputer. It got fame when it was part of a magazine named as popular electronics. After aware of that technology both wanted to contribute in technology of growing world. In this chapter Gates Allen's Microsoft story is portrayed in this part. In June 1975, which Gates moved to Albuquerque, Roberts chose to send the Altair on the street as though it were a festival show display. His objective was to get the message out about the Altair's miracles and make fan clubs in towns crosswise over America. For Gates, the enchantment of PCs was not in their equipment circuits but also in software code. In the fall of 1968, when Gate was entering eighth grade, he and Allen framed the Lakeside Programming. Somewhat it was a nerd's form of a posse. According to Allen at base, the Lakeside Programming was a young men's club, with gangs of one-upmanship and testosterone. So as to completely comprehend the working framework, Gates acknowledged, they would need to gain access to its source code, which software engineers used to determine each activity to be performed. Yet, the source code was firmly held by the top architects and was beyond reach to the Lakeside young men. Gate and Allen charmed up by Intel's new 8008 chip, an amazing redesign of its 4004 "PC on a chip." They were so invigorated by a story on it in Hardware. As Gates was getting ready to start his sophomore year in the mid-year of 1974, he persuaded Allen to move to the Boston zone and accept a position one that had been offered to Gates. Allen dropped out of Washington State, drove his Chrysler east, and encouraged Gates to drop out also. Gates showed the trend-setter's attributes: an extremist person who adores their achievements, works continuously without rationalizing about day and night, and a dissident with slight regard towards power. He fought against club authority taking the BASIC code without paying for it.

Furthermore, Apple's story with Steve Jobs and Wozniak is being told in this part. The pivotal principle of Gate for Microsoft was prominence on giving non-particular grant to IBM and Microsoft for owning the code. Gates mother, Mary Gates, truly expected a fundamental occupation for IBM to work with a non-name Microsoft. Which acknowledged Mary Gate, to work with United Way. The battle among Gates and Steve Jobs on GUI interface was depicted further. Similarly, Torvalds’ Linux story and Stallman's driving the free programming improvement affected the PC business are explained in this chapter.

Explanation

At the framework level, the program experienced extensive disinclination when examining or reporting portion edge-to-edge versus framework start to finish practices. Edge-to-edge conduct is bothered about determining associations and exercises that happen just inside a solitary fragment. Start to finish conduct incorporates determining related associations and exercises that happen over the whole framework, subsequently including various fragments. The "basic" quality properties for dependability, adaptation to non-critical failure, security, and framework quality are most certainly not very much characterized for the start to finish framework. Lacking determination and comprehension of the framework level quality characteristics is one model of framework or undertaking level issues inside the program. Since the general framework level characteristics were neither enough characterized nor surely known, these framework or portion level issues convoluted up being ineffectively tended during formal program framework or fragment configuration audits. This further brought about significant structure reluctance after leaving the conventional audits. (Ann Lapham et.al pp. 4),.

During 1990s many programming models were exhibited that contend for "the General Theory for Software Engineering". Particularly, they call for speculations which should give prescient and authoritarian help to programming building, rather than running expensive structure forms that are evidently founded on experimentation. They notice the issue of programming advancement strategies being developed tasks and associations for instance of critical inquiries, which ought to be handled by such hypotheses. Hypotheses can clarify programming designing from numerous headings. They can clarify a simply specialized perspective, where the embodiment of programming designing is viewed as a progression of much proper changes from an issue to its answer as a working programming article. This methodologies are object –centric: the goal is to comprehend the advancement of the product item through changes. (Smolander et.al pp. 25),.

References

Foreman, John T., and Mary Ann Lapham. "Lessons Learned from a Large, Multi-Segment,

Software-Intensive System." (2009).

Päivärinta, Tero, and Kari Smolander. "Theorizing about software development

practices." Science of Computer Programming 101 (2015): 124-135.

Subject: IT

Pages: 2 Words: 600

Software Design Document

Table of Contents

TOC \o "1-3" \h \z \u 1.Introduction PAGEREF _Toc11219603 \h 1

1.1.Definitions and Acronyms PAGEREF _Toc11219604 \h 1

1.1.1.Definitions PAGEREF _Toc11219605 \h 1

1.1.2.Acronyms PAGEREF _Toc11219606 \h 1

2.SDD Organization PAGEREF _Toc11219607 \h 1

2.1.Business Component Design PAGEREF _Toc11219608 \h 1

2.1.1.Business Purpose PAGEREF _Toc11219609 \h 3

2.1.2.Activities PAGEREF _Toc11219610 \h 3

2.1.3.Resources PAGEREF _Toc11219611 \h 3

2.1.4.Governance PAGEREF _Toc11219612 \h 3

2.1.5.Business Services PAGEREF _Toc11219613 \h 4

2.2.Front End Design PAGEREF _Toc11219614 \h 4

2.3.Process & Workflow Design PAGEREF _Toc11219615 \h 5

2.4.Database Design PAGEREF _Toc11219616 \h 7

2.5.Security and Connectivity in Design PAGEREF _Toc11219617 \h 9

3.Conclusion PAGEREF _Toc11219618 \h 19

4.References PAGEREF _Toc11219619 \h 19

Introduction

The purpose of this documentation is to compile a Software Design process for development of an automated Inventory Management System. When developing multi-layered and complex applications such as IMS, it is important to graphically represent and document its components an module for better understanding, precise testing, and accurate development without any confusions.

For the respective project, we are developing an automated web-based IMS.

Definitions and Acronyms

Definitions

Supply Chain: A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user.

Inventory Management System: software system for tracking inventory levels, orders, sales and deliveries.

Acronyms

IMS: Inventory Management System

SDD Organization

Respective section will briefly represent various aspects and dimensions of the project being developed.

Business Component Design

In order to better design the application, it is important to understand its components individually and distinctly. Following is the component diagram of our proposed IMS.

The above diagram shows that the main and fundamental components of the system are:

Front-end Interface

Manager

Server Database

For each of the above components following are the brief descriptions and details about their functionalities.

Business Purpose

Front-end Interface: The purpose of this front-end interface is to allow user-system interaction and perform essential functions that include user identification, login and verification.

Manager: The purpose of this component is to control and manage the available resources, traffic on system, and various other functionalities.

Server Database: The purpose of server database is to store data regarding the users, inventory items, and processing orders.

Activities

Front-end Interface: The front – end interface performs the activities including login and verification of the clients/users.

Manager: Manager is responsible for organizing clients and functions of the system.

Server Database: The server database manages the data and information.

Resources

Front-end Interface: The front-end is an interactive interface that requires the human-user to interact with the system.

Manager: Human resource department is required for managing the system.

Server Database: Physical storage and management location for keeping and securing the servers are required. Other than this a sophisticated security system an management systems is also required including authenticated and skilled personnel.

Governance

Front-end Interface: The back-end manages the verification and login processes.

Manager: The management and administrative department governs this component.

Server Database: The server database is governed and control by the dedicated staff.

Business Services

Front-end Interface: offers verifications and authentication i.e. security to the clients.

Manager: Offers quality, precision and reliability to the users.

Server Database: Offers secure data storage, retrieval and management.

Front End Design

Following are the mock-up prototypes for the front-end interfaces of the applications.

User Registration

User Account Details

User Login

Process & Workflow Design

Database Design

We can utilize enterprise database in light of the fact that, enterprise database uses authentication by method for an official server, which give the recommended security to a business, individual database is acceptable when you are utilizing it for your own utilization or family unit use, and it is not that safe regarding the matter of maintaining a business. Enterprise database likewise gives multi-user capacity, with this we can without much of a stretch communicate with the home office and let them think about the equipment being shipped.

Also, in this case, A decision support system is based on managing operations and arranging levels of an association so it can decide. It will be a considerable measure of accommodating when we have to settle on decision on classification of the items being transferred and to enhance the efficiency of the system over all. Without squandering much time, we can undoubtedly settle on decisions and we can have a competitive advantage.

The proposed Database system will be developed with following objectives:

Allows real time updating of the data and information

Accessible for all authorized individuals all over the world with efficient data display in required interfaces

No hassle of managing several database that are difficult to sync without replication or errors.

Aims of the Web-Based system will be:

Global accessibility

Security

Centralized virtual data center

Real time responsiveness

Automation

Precision and accuracy.

Rationale

Respective system is the need of time. Companies can no longer wait for data or information to arrive before making their decisions or choices. Therefore, owing to globalization, a web based inventory system will enhance the responsiveness, efficiency, collaboration and accessibility of the company for their consumers.

Security and Connectivity in Design

For organizations that require employees to work from different areas, it is the key significance for the remote staff to have admittance to company information. In like manner, our company needs WAN, as it gives network office over a broad area and then again figuring out how to give network in the assigned area too. This method of telecommunication will permit the business to adequately contact any area and keep a constant communication between the employees. With our company being a consulting business, we need to verify that, the consultants are being recorded for what they are doing and how they are dealing with the errands they are given. Through WAN, we can without much of a stretch see and even assist the employees when they may need assistance in a certain errand given. This permits the business to employ individuals quiet, as it encourages the employees to work notwithstanding when home and don't have a craving for coming to the workplace, or have some other low maintenance work they need to oversee.

It is not compulsory for our business to have the wireless network also yet it does spare the cost of purchasing a computer and assigning it for each employee when the employee has a portable workstation and can without much of a stretch connect to the wireless. For the most part in these companies, wireless network is not gave; in light of the fact that this business is just situated up for the employees who work here and they can be effortlessly connected with a straightforward router that can deal with the network between the computers that will be given to them. In spite of the fact that, on the off chance that we need to make matters quiet, we can introduce all computers with implicit wireless cards and in the event that we need to hire another employee and he needs to work.

e-commerce Security System

System Security

Stepwise Security System

The wireless communication can be further secured through VPN. A VPN is a secure network that gives communication to the remote clients to connect with the authoritative network. VPN is exceptionally helpful in this business and in such manner that the employees can be more remote and work for the association also. It can even give simple connectivity through phones and is useful in this business for communicating with any customer, any place it is conceivable to. With VPN we can guarantee the customers and certification the privacy they need. Then again, in the event that we consider our business to be a little consulting company, which the company really is, we don't need of any VPN, in light of the fact that it is an excessive amount of hustle for a business, first to have a rented telephone line for different clients to dial in on and the call-trafficking equipment will be expected to handle the incoming calls, this will make additional cost for dealing with this, which our company may not have the capacity to afford.

A data center is an ability used to host computer systems and joined mechanical assembly like telecommunications and stockpiling systems. It ordinarily incorporates reinforcement power supplies, abundance data communication associations, environmental controls and wellbeing devices.

IT operations are critical highlight of most modern operations; among which, business coherence is mentionable which permits companies to maintain their business relying upon their information system (Al-Fares, Loukissas & Vahdat, 2008). Along these lines, it is certain to get all accessible information of company's business techniques to run its internal and outside operations appropriately. It is mandatory to give a dependable infrastructure regarding both security and perseverance for IT operations to decrease any possibility of aggravation. A data center in this manner must keep elevated requirements for foreseeing the dependability and usefulness of its facilitated computer environment (Al-Fares, Loukissas & Vahdat, 2008). This can be attained to through legitimate counseling with specialists.

Policy: Associations need to control their employees' entrance to information and this could be possible just when information is plainly ordered or arranged. Limiting access to the Internet and depending on disengaged mainframe computers to store essential information assets are a couple of measures that ought to be joined in an association's Data Center Security policy (Jensen et al. 2009). In the corporate sector, lamentably, a lion's share of the security ruptures go unreported, dreading loss of client certainty.

The practice of not reporting security breaks and Data Center-law violations is a noteworthy impediment to the advancement of law requirement organizations in combating Data Center-wrongdoing. Without further ado, no dependable data is accessible on the nature and degree of security breaks. Absence of plans, poor mindfulness and practically no training in Info security practices are the other similarly basic zones where associations need to contribute, regarding both cash and labor.

Technology: Iterative security arrangements comprising brilliant cards, firewalls, intrusion location devices, encryption calculations and biometric systems are commercially accessible today, but at an expense. While the best of firewalls can be dodged and encryption codes split by hackers, technology itself can't give the response to a dolt verification security system.

Logical Security

This is the fundamental Data Center-security war zone where advanced information is being traded or put away. Each security measure that is performed by a non-human device in the computerized world is an individual from this gathering. There are numerous sub-fields here (Al-Fares, Loukissas & Vahdat, 2008):

Encryption.

Network security.

System security.

Application security.

Security observing and auditing.

Organizational Security: Regardless of the fact that information is fixed behind the impact entryways there may be a risk that some person would open the entryway and let the assailant take it. That is the reason security systems are set up to ensure that in the event that other security measures fizzle individuals would comprehend what to do and by taking after methodology ensure the security of the information (Ryan & Bernard, 2000). All the time in upsetting circumstances with absence of aptitude individuals have a tendency to accomplish more missteps than any time in recent memory. Methods are there to help individuals make the best decision regardless of the possibility that they don't realize what to do these rules would demonstrate to them industry standards to keep the most exceedingly bad.

Conclusion

Respective document has presented a detailed design overview of the IMS that is beging developed with a centralized server database accessed by various geographic locations and from remote branches. The system ensures confidentiality, integrity and security.

References

Kindberg, T., & Barton, J. (2001). A Web-based nomadic computing system.Computer Networks, 35(4), 443-456.

Salvo, J. J., Mackenzie, P. D., Bennett, J. S., Relyea, H. A., & Thomas, A. M. I. (2002). U.S. Patent No. 6,341,271. Washington, DC: U.S. Patent and Trademark Office.

Al-Fares, M., Loukissas, A., & Vahdat, A. (2008). A scalable, commodity data center network architecture. ACM SIGCOMM Computer Communication Review, 38(4), 63-74.

Ryan, G. W., & Bernard, H. R. (2000). Data management and analysis methods.

Jensen, M., Schwenk, J., Gruschka, N., & Iacono, L. L. (2009). On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). IEEE.

Subject: IT

Pages: 14 Words: 4200

Software Development Life Cycle For Data In The Cloud Computing Environment

Software Development Life Cycle for Data in Cloud Computing Environment

Chimene Tchokoko Diboma

School or Institution Name (University at Place or Town, State)

Software Development Life Cycle for Data in Cloud Computing Environment

Operations and Maintenance:

The client has to manage human resource applications in the cloud environment. As the implementation includes software as a service offering, the operations and maintenance support will be provided by the vendor as per the subscription agreement between the vendor and the client. Installed system and applications in a cloud environment require appropriate management services. Client-side applications will work without any further maintenance requirements, but the infrastructure operations will be monitored by the vendor to ensure the quality of service. During the term of the service agreement between the parties, the vendor will provide operations and management support for the project as per the following plan.

A team of professionals will be available to monitor the operations of the applications in managed infrastructure. The vendor will release application updates to address security holes in previously released application versions. However, no major change in architecture will be made to avoid compatibility issues with legacy applications of the client. Data related to human resource management applications contain personally identifiable information and integrity of the data in transit will be monitored by the dedicated teams ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"r7LxDf6u","properties":{"formattedCitation":"(Weber, Nepal, & Zhu, 2016)","plainCitation":"(Weber, Nepal, & Zhu, 2016)","noteIndex":0},"citationItems":[{"id":30,"uris":["http://zotero.org/users/local/BeyJjeak/items/MJYUBHD5"],"uri":["http://zotero.org/users/local/BeyJjeak/items/MJYUBHD5"],"itemData":{"id":30,"type":"article-journal","title":"Developing dependable and secure cloud applications","container-title":"IEEE Internet Computing","page":"74-79","volume":"20","issue":"3","author":[{"family":"Weber","given":"Ingo"},{"family":"Nepal","given":"Surya"},{"family":"Zhu","given":"Liming"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Weber, Nepal, & Zhu, 2016). The vendor will respond to and disclose any discovered anomalies in traffic patterns to the client. The reporting will be transparent and will engage the in-house information technology teams of the client as well. A telephone number will be made available to the client to contact the vendor in case of a support case covered by the service level agreement.

Email support will always be available to the client and client will be able to request support for covered applications. The support will not be provided for legacy applications developed by the client itself. Related documentation and reports of any possible issues or service downtime reports will be provided via email. Incident response teams of the vendor will be available 24/7. However, the recovery support or incident response will be provided as per the severity of the support ticket opened by the client. Severity level 1 will be reserved for the issues that produce emergency conditions. In case of a severity level 1 issue, the client must contact the vendor via phone line as compared to the email requests ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"nRwLEvCC","properties":{"formattedCitation":"(Aljawarneh, Alawneh, & Jaradat, 2017)","plainCitation":"(Aljawarneh, Alawneh, & Jaradat, 2017)","noteIndex":0},"citationItems":[{"id":31,"uris":["http://zotero.org/users/local/BeyJjeak/items/ZKPYAI4Q"],"uri":["http://zotero.org/users/local/BeyJjeak/items/ZKPYAI4Q"],"itemData":{"id":31,"type":"article-journal","title":"Cloud security engineering: Early stages of SDLC","container-title":"Future Generation Computer Systems","page":"385-392","volume":"74","author":[{"family":"Aljawarneh","given":"Shadi A."},{"family":"Alawneh","given":"Ali"},{"family":"Jaradat","given":"Reem"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Aljawarneh, Alawneh, & Jaradat, 2017). After receiving a severity level 1 support request the vendor will provide professional remediation support. In case of severity level, 2 or 3 support event or issues that do not directly affect the operation of the client can be requested by any of the available support channels.

Maintenance of internal infrastructure of the vendor will be scheduled on a monthly basis and the client will be informed well before time. However, any scheduled maintenance will not cause any disruption to the operations of the applications running in the cloud. The clients will be informed to mitigate any discrepancies if there is an outage caused by the maintenance for a fraction of time ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"TqDXj5fY","properties":{"formattedCitation":"(Hehenberger et al., 2016)","plainCitation":"(Hehenberger et al., 2016)","noteIndex":0},"citationItems":[{"id":32,"uris":["http://zotero.org/users/local/BeyJjeak/items/QENM72LL"],"uri":["http://zotero.org/users/local/BeyJjeak/items/QENM72LL"],"itemData":{"id":32,"type":"article-journal","title":"Design, modelling, simulation and integration of cyber physical systems: Methods and applications","container-title":"Computers in Industry","page":"273-289","volume":"82","author":[{"family":"Hehenberger","given":"Peter"},{"family":"Vogel-Heuser","given":"Birgit"},{"family":"Bradley","given":"D."},{"family":"Eynard","given":"Benoît"},{"family":"Tomiyama","given":"Tetsuo"},{"family":"Achiche","given":"Sofiane"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Hehenberger et al., 2016). High availability access to the infrastructure will be maintained by the operations monitoring teams. Maintenance updates to the applications will be provided on a fortnightly basis. Research and development staff will install the updates and the updates will be tested for compatibility issues before the implementation of the patch.

Audit of the security systems is inevitable especially for mission-critical applications such as human resource management systems running in cloud environments. To ensure the confidentiality, availability, and integrity of data being transmitted to the cloud infrastructure, regular audits will be performed. Audits will be performed on a monthly basis and detailed audit reports will be shared with e client as well to ensure transparency of the systems. The vendor will schedule third-party independent audits of internal infrastructure and critical systems that will help in the understanding of the issues. Audits of the infrastructure related to the particular client as in this case will be performed by the in-house security engineers. Security engineers will access all of the logs and monitoring systems to detect anomalies in the traffic patterns. Auditing teams will test all of the parts of the infrastructure including client-side applications for security holes. All of the application programming interfaces will be checked for possible security loopholes ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"bZIADdvY","properties":{"formattedCitation":"(Kashfi, 2017)","plainCitation":"(Kashfi, 2017)","noteIndex":0},"citationItems":[{"id":33,"uris":["http://zotero.org/users/local/BeyJjeak/items/WR9BNRPA"],"uri":["http://zotero.org/users/local/BeyJjeak/items/WR9BNRPA"],"itemData":{"id":33,"type":"article-journal","title":"Software Engineering Challenges in Cloud Environment: Software Development Lifecycle Perspective","author":[{"family":"Kashfi","given":"Hanieh"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kashfi, 2017). Penetration testing tools will be utilized such as packet captures, TCP dumps and man in the middle (MITM) techniques to check for the efficacy of security measures. They will try to compromise or breach the system by using all possible attack vectors. As a result of the efforts, a comprehensive audit report will be generated and provided to the client as well.

If there are any vulnerabilities or possible security breaches such as anomalies in traffic patterns detected, then the vendor will fix discovered issues as soon as reliably possible. Updates will be released to address the security issues indicated in auditing reports. Software updates will include bug fixes and security patches. However, software updates released by the vendor may not include new features to the applications. Any new features developed for the applications may be sold to the clients as add-on services if they require their functionality in their business operations ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jOoYWGOV","properties":{"formattedCitation":"(Ferry et al., 2018)","plainCitation":"(Ferry et al., 2018)","noteIndex":0},"citationItems":[{"id":34,"uris":["http://zotero.org/users/local/BeyJjeak/items/428I36S6"],"uri":["http://zotero.org/users/local/BeyJjeak/items/428I36S6"],"itemData":{"id":34,"type":"paper-conference","title":"ENACT: Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems","container-title":"International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment","publisher":"Springer","page":"112-127","author":[{"family":"Ferry","given":"Nicolas"},{"family":"Solberg","given":"Arnor"},{"family":"Song","given":"Hui"},{"family":"Lavirotte","given":"Stéphane"},{"family":"Tigli","given":"Jean-Yves"},{"family":"Winter","given":"Thierry"},{"family":"Muntés-Mulero","given":"Victor"},{"family":"Metzger","given":"Andreas"},{"family":"Velasco","given":"Erkuden Rios"},{"family":"Aguirre","given":"Amaia Castelruiz"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Ferry et al., 2018). As the security audits are planned to be run at the beginning of each month, any security issues discovered will be patched within one month or before the next scheduled audit. When a fix for possible security issues is released neither the vendor nor the client will delay the installation of the security patch to ensure the smooth running of the applications.

Dedicated teams will monitor the functionality of the system to ensure that day to day functionality of applications remains stable. Operations and maintenance team of the vendor will administer the directories used by the client and user access security as well. The client can request specific restrictions for certain users to ensure the confidentiality of information. Appropriate segregation between critical applications will be provided by the operations and management teams as well. Security engineers may try to integrate more and more features found in the client-side applications into their offerings to increase the efficiency of the subscription models of software as a service cloud offering ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jVmak675","properties":{"formattedCitation":"(Rosa, 2018)","plainCitation":"(Rosa, 2018)","noteIndex":0},"citationItems":[{"id":35,"uris":["http://zotero.org/users/local/BeyJjeak/items/ZECN3CA6"],"uri":["http://zotero.org/users/local/BeyJjeak/items/ZECN3CA6"],"itemData":{"id":35,"type":"thesis","title":"Analysis of requirements and technologies to migrate software development to the PaaS model","author":[{"family":"Rosa","given":"Fabiano"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Rosa, 2018). It will be ensured that data transmission is secured with end to end encryption and the vendor cannot access data of the client. Encryption keys will be stored locally in client-side machines and will never be retrieved by the vendor. Even the emergency recovery keys will be stored in local systems or provided to the client in protected media to ensure that the vendor will never be able to break the encryption mechanism in any way. These measures must be practiced by the operations and maintenance teams of the vendor to maintain the trust of clients in their services.

Disposal Plan:

As the project will enter the finalizing stage, the project deliverables will be handed to the owner as per the disposal plan. At the final stage of implementation, all of the software installations and integrations will be verified and tested for appropriate functioning. Any performance flaws and functionality issues will be rectified. Along with the rectification of issues, their documentation will also be completed for future reference. Documentation of such issues and rectification steps will help the client to look for the solution of possible problems in the future without requiring direct support from the vendor. The design documents and specifications of the projects will be compiled into end user guides. Extra documents or paperwork related to the project will be disposed of appropriately.

Military grade shredding techniques will be utilized both for digital and paper-based information material. It is inevitable to use secure methods of disposal of critical information as a breach of such information can cause irreparable damage to both the vendor and the client as well. Digital information related to the internal infrastructure and applications will be encrypted using AES-256 bits encryption algorithm if it is required by the client. Otherwise, it will be shredded and discarded as the vendor do not require access to such information because all of the necessary details will be provided to the client via documentation of the project ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"47uLs6hj","properties":{"formattedCitation":"(Rittinghouse & Ransome, 2017)","plainCitation":"(Rittinghouse & Ransome, 2017)","noteIndex":0},"citationItems":[{"id":36,"uris":["http://zotero.org/users/local/BeyJjeak/items/KYJDWCII"],"uri":["http://zotero.org/users/local/BeyJjeak/items/KYJDWCII"],"itemData":{"id":36,"type":"book","title":"Cloud computing: implementation, management, and security","publisher":"CRC press","ISBN":"1-4398-0681-0","author":[{"family":"Rittinghouse","given":"John W."},{"family":"Ransome","given":"James F."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Rittinghouse & Ransome, 2017). All the liabilities will be cleared. Accounts related to the project will be closed and all of the transaction receipts will be made part of the documentation related to future audits of the project costs. Employees of the client will be trained to use the newly installed systems. The training will cover the essentials of the project and will be based on the original agreement between the parties. As per the disposal plan, the vendor will never disclose information about the applications and security measures to any third parties. User manuals and troubleshooting guides of the equipment purchased from third parties will be handed over to the client.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385–392.

Ferry, N., Solberg, A., Song, H., Lavirotte, S., Tigli, J.-Y., Winter, T., … Aguirre, A. C. (2018). ENACT Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems. International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment, 112–127. Springer.

Hehenberger, P., Vogel-Heuser, B., Bradley, D., Eynard, B., Tomiyama, T., & Achiche, S. (2016). Design, modeling, simulation and integration of cyber physical systems: Methods and applications. Computers in Industry, 82, 273–289.

Kashfi, H. (2017). Software Engineering Challenges in Cloud Environment: Software Development Lifecycle Perspective.

Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: implementation, management, and security. CRC press.

Rosa, F. (2018). Analysis of requirements and technologies to migrate software development to the PaaS model.

Weber, I., Nepal, S., & Zhu, L. (2016). Developing dependable and secure cloud applications. IEEE Internet Computing, 20(3), 74–79.

Subject: IT

Pages: 7 Words: 2100

Stage 1 - Business Analysis And Systems Recommendation

Stage 1 - Business Analysis and Systems Recommendation

[Name of the Writer]

[Name of the Institution]

Stage 1 - Business Analysis and Systems Recommendation

Introduction

Maryland Technology Consultant is a renowned IT consulting firm to provide IT-based services and solutions to its customers. The target clients of the company are the small to medium enterprises, nonprofit organizations, and government agencies. MTC depends founded in May 2008 with its headquarters in Baltimore, Maryland. Its satellite is located in Herndon, Virginia, Bethesda, and Maryland. The company has 450 employees working in different departments. The total gross revenue of the company was $ 95 million. The company is providing consultancy in the field of business and IT. MTC offers services for business process redesign and process improvement. Moreover, it provides IT strategy, planning, system development, and network support. The company also provide IT outsourcing consulting, selection and performance management. The company provides extraordinary services and recommendations to its clients through its highly skilled consultants. The staff of the company has in-depth knowledge of the contemporary issues of business issues. MTC has set its strategic business plan for business expansion and development. The company has more chances to win two large projects based on its proposal. For these projects, the company will need to hire staff. Staffing is one of the important tasks for the HR department. Finding the best available talent is one of the major issues for any organization. As the company wins these contracts, it will immediately need to hire staff. The company has to improve its hiring system by using some information technology tools to facilitate its HR department. The IT specialists of the company have to improve its DBMS to get a pool of talent and filter a suitable employee. So that the requirements of the organization are fulfilled.

Organizational Strategy

The senior company management and leadership have formulated a strategy which is to be implemented by the middle management and lower management. The senior management of the company analyzed both the internal and external environment to formulate the best strategy. MTC has formulated its strategy to provide unique, worthy, and valuable consulting services and recommendations to its clients. The focus of the company is to provide best quality services and developing new business concepts to its clients and improve its practices. The company officials have to keep in mind that IT is just a simple tool. The company has highly skilled IT consultants who provide innovative solutions for its clients. Organization strategy is the set of actions that the company takes to achieve its long term goals. To combine all the plans set by the organization for its long term benefits and converts it into actions is called organizational strategy. Strategic plans are usually for more than one year to complete. The scope of the strategic plan is also vast and involves all the departments of the company to perform.

Two projects are expected to achieve by MTC for which the company has to hire staff immediately. The HR department will have to retain the best talent for these two major projects. To assist the HR department, the IT staff has to provide IT-based services for proper recruitment procedures. The IT department and the HR department decided to make a pool of talented candidates which could be used in the future. The data of these candidates can be filtered and could easily retrieve in the future. They decided to use an online database management system where they would have all the candidates' record. The interested candidates will be called when they are needed. The shortlisting will be easy by using the filters of required skills, qualification, experience, and other factors. All multinational organizations widely use the online database management system. It saves the time of the HR department, and save the cost of the recruitment process up to a great extent (Greiner, 2015).

Competitive Advantage

The competitive advantage of the company is its highly professional and expert employees which differentiate the company from its competitors. Human capital is the most critical assets of any organization (Namada, 2018). Organizations are made of people and some resources. Resources are not rare and could be easily imitated; however, the organizations the difference among market-leading organizations and trend followers is based on its employees. Moreover, the company has earned a good name in the market for its service quality. The company has established and grown in the last decade successfully. The total annual gross revenue of the company has reached to US$ 95 million because of its committed staff.

Furthermore, the business is providing services to its clients innovatively. So innovation is another competitive advantage of the company. Being different from other consultants is the main objective of the company. Innovation is the key to success and survives for the long term. It ensures the sustainability of the organization and increases market shares.

Strategic Objectives

Strategic objectives are the organizational goals for the long term which help to convert the mission statement and vision of the organization into specific and attainable plans (Papke-Shields, 2017). Strategic objectives are different from the operational objectives. The strategic objectives are the long term achievements of the organization while the operational objectives are the short term achievements of the organization. The strategic objectives of MTC included these four goals. The first strategic objective is to increase business development by getting more contracts in the field of Information Technology, it will increase the revenue of the company and will positively influence its profile. The second strategic goal of the company is to expand the scope of business internationally to provide support to MTC's team in the USA. The company has to expand its operations and capture the international market, as it has been successful in the USA. The international market exposure will also boost the quality and performance of domestic operations. The international operations provide new learning opportunities to the organizations through diverse employees and cultures. The third strategic goal is to raise the capacity of MTC continuously to provide the best quality consultancy and serve its clients in the best possible ways. The capacity and abilities of the employees can be grown through proper training and development program. Training and development is the key task of the HR department. The fourth goal of MTC is to achieve competitive advantage in the field of information technology and increase its reputation in the consulting marketplace.

Decision Making

The company has decided to hire staff for the upcoming two projects by just in time hiring. The HR department decided to utilize the services of IT in the recruitment process. The company will use the online Database Management System for the recruitment process. For online recruitment, the company will store all the records of the candidates in the MYSQL database which could be retrieved quickly in the future. The candidates will make its account on the company's website with a unique user ID and password. All the personal information of the candidate will be recorded in the provided templet on the site. The candidates will have the option to edit their provided information. The HR department would be able to filter the data of candidates in the talent pool. It will be filtered by qualification, experience, skills, age, and so on. The shortlisting process will take no time, and it will be more reliable and accurate. The shortlisted candidates will be called for interview based on their availabilities.

References

Papke-Shields, K. E., & Boyer-Wright, K. M. (2017). Strategic planning characteristics applied to project management. International Journal of Project Management, 35(2), 169-179.

Namada, J. M. (2018). Organizational learning and competitive advantage. In Handbook of Research on Knowledge Management for Contemporary Business Environments (pp. 86-104). IGI Global.

Greiner, B. (2015). Subject pool recruitment procedures: organizing experiments with ORSEE. Journal of the Economic Science Association, 1(1), 114-125.

Subject: IT

Pages: 4 Words: 1200

Stage 2 - Business Analysis And Systems Recommendation

Stage 2 - Business Analysis and Systems Recommendation

Name of the Student

University Name

Stage 2 - Business Analysis and Systems Recommendation

Process Analysis

Hiring Process

Here we will discuss the overall process of recruitment of staff through an online database management system. The hiring process will be used to improve the process and select the best candidates with lower the cost of recruitment (Boşcai, 2017). Here we will follow the process of the “As-Is” process which includes the input, process, and output. Online recruitment is economically best source to reduce the process cost (Greiner, 2004).

MTC Hiring Process

As-Is Process

(Part 1)

Responsible MTC Position

(Part 1)

To-Be Process – How the System Will Support and Improve the hiring process

(Part 2)

Business Benefits of Improved Process (Align with MTC’s overall business strategy and needs.)

(Part 2)

Recruiter receives an application from job hunter via Postal Service Mail.

Recruiter

The system will receive an application via online submission through MTC Employment Website and store in the applicant database within the hiring system.

A more efficient submission process decreases the time needed to receive and begin processing applications. This will present a positive image to potential employees and help MTC compete for top IT talent.

The applications will be downloaded and scanned

Assistant HR officer

To have the option of filtering the applicants through their skills, experiences, and qualification.

It will reduce the cost of paperwork and time.

Shortlisting the candidates for test

Recruiter

Shortlisting can be done by using these filters to extract the best candidates

It will be more reliable and the least chances of errors.

Conduct test for recruitment

Administrative officer

Online tests can be conducted, and the candidate can take the test from home.

The assessment tests will be customized and assess the cognitive skills of the candidates

Result Announcement of the test

Head of the concerned departments

The online result once the test ended.

The results will be computer-based, so the candidate will be more confident.

Shortlist candidates for interview

Head of the concerned departments

The top scorers will be called for an interview; candidates could see the list of the top performing candidates.

It will be to increase the accuracy and save the time of the HR personnel.

Communicate with top management

Head of HR department

Online communication through the online DBMS

Effective and fast communication is possible through the database management system

Decide the interview panel.

Top management team

The HR personnel, Head of the concerned department, and the CEO will share the information through an online database.

It will help the interview panel to build mutual trust and teamwork.

Schedule the interview

Recruiter

Interviews will be scheduled through online database on the availability of both interviewee and interviewers.

It will save the times and reduce the chances of cancellation of interview of any candidate because of the flexible timing.

Listing the selected candidates

Recruiter

Online DBMS can automatically list the selected candidates.

The automation of recruitment will help MTC to save cost and find the best human capital.

11 Communication with the selected candidates

HR department

The selected candidates will be communicated through email and

The online account of the candidate will be updated will welcome message and plan. Also, a formal email and phone call will be received by the selected candidate.

12. Tom prepares offer letter based on information from the recruiter and puts in the mail to the chosen candidate.

Administrative Assistant

The system enables AA to prepare job offer letter by storing the offer letter template and information on each candidate; allows AA to select information to go into a letter and put it into the template, which can then be reviewed and emailed to the candidate.

More efficient offer process presents a positive image to applicants and decreases the time needed to prepare an offer letter, and enables MTC to hire in advance of the competition.

Expected Improvements

There are some weak areas which are identified by the HR manager and the top management team in the conventional hiring process. It was communicated with CIO to overcome these issues in the online database.

Area

Current Issues

(from the Case Study)

Improvements

(due to use of technology)

Collaboration:

The Hiring Manager states that recruiting is only one area he is responsible for and he isn’t as responsive to HR as he could be. Therefore, he counts on the Recruiters to help manage the process and keep him informed.

The current manual system causes considerable communication breakdowns and takes additional effort and time to stay on top of the hiring process.

An efficient system with all information in one place, easily accessible via a dashboard, and updated in real time could make his recruiting job easier; and he could devote time to effectively working collaboratively and proactively with HR on his staffing needs.

Communications: Explain how a hiring system could improve internal and external communications

The hiring of staff is a complete process which involves many stakeholders. The communication is mostly done through conventional methods, and data is shared in paper format.

The hiring procedure can be completed online. It will help share big data with no time. The data will be retrieved in the future as well.

Workflow: Explain how a hiring system could improve the MTC hiring process by providing a consistent structure for each participant to perform his/her part in the hiring process.

The workflow contained many manual steps and the use of some paperwork, which increase the cost of the recruitment process.

Due to the installation of an online database the unproductive steps will be eliminated. It will reduce the biases in the system (Le Cleach, 2016)

Relationships: Explain how implementing an enterprise hiring system could foster stronger relationships with applicants/potential employees.

In the conventional system, there is always a gap between the new applicants and management. The relationship of the applicant with the organization is weaker due to lack of communication and knowledge sharing.

The online database assists the newly hired employees and the management of the organization to build a strong relationship with each other.

References

Boşcai, B. G. (2017). The evolution of e-recruitment: the introduction of an online recruiter.

Greiner, B. (2004). An online recruitment system for economic experiments.

Le Cleach, L., Doney, E., Katz, K. A., Williams, H. C., & Trinquart, L. (2016). Research techniques made simple: workflow for searching databases to reduce evidence selection bias in systematic reviews. Journal of Investigative Dermatology, 136(12), e125-e129.

Subject: IT

Pages: 4 Words: 1200

Stage 3 - Business Analysis And Systems Recommendation

Stage 3 - Business Analysis and Systems Recommendation

Name of the Student

University Name

Stage 3 - Business Analysis and Systems Recommendation

Requirements

The online database management system will be installed, and MySQL has used an authentic software solution. It will allow the candidates to create their accounts on the webpage of the company where they will enter all their details. They will have their unique id and password. The clients will be allowed to update and edit their information. The recruiter and HR staff will access this information, and after proper scrutiny, they will call the shortlisted candidates for test or interview. Online recruitment system allows all the stakeholders to do better work with more reliable and authentic ways. The chances of errors and mistakes are lower by using online technology solutions (Greiner, 2015)

Stakeholder Interests

Role

Specific problem related to the current hiring process

How a technology solution to support the hiring process could address the problem

CEO

Samuel Johnson

The CEO of MTC is concerned about the recruitment of the right people because it influences the performance of the organization. The current hiring system is not capable of quick induction of new staff.

The online database management system MySQL will improve the hiring process which will help the organization both in the short term and long term.

CFO

Evelyn Liu

According to the CFO, the current hiring system is inefficient and not cost-effective.

The technology solution will Improve the current hiring process and will enable future functionality for the success of the company.

CIO

Raj Patel

The existing architecture and system are not much advanced, and the workforce is distributed.

The new software solution will be more secure, which will replace the old manual hiring process.

Director of Human Resources

Joseph Cummings

The rapid growth of the business and the future plans for business expansion required immediate hiring. The existing system cannot meet these challenges.

The new online MySQL database will provide solutions which are easy to use and will interface the existing systems and will enhance the processes.

Manager of Recruiting

Sofia Perez

The company needs to hire 75 to 150 staff in the next three months which is not possible with the existing system.

The new technology solution will save the time of MTC's recruitment staff to a great extent.

Recruiters

Peter O’Neil (along with Mike Thomas and Jennifer Blackwell)

With the existing system, some applications and resumes can get lost. Which is not retrieved easily when the hiring manager asks for the application of certain applicant.

The online database will solve this issue, and the applications will be easily retrieved.

Administrative Assistant

Tom Arbuckle

The Administrative assistant has the huge issue paperwork of the resumes, applications, and job offers.

The technology solution will reduce the paperwork and will reduce the cost and time of the process.

8.Hiring Manager(Functional supervisor the new employee would be working for.)

The current system is not working efficiently in identifying, interviewing, screening, and selecting of best-qualified applicants.

The electronic dashboard for the announced vacancies, list of candidates, and the position of each candidate against the requirements of the announced vacancy is highly needed MTC because of the future needs of staffing.

Defining Requirements

There are several requirements for the online database management system. Some are the user requirements while others are the system requirements. The system requirements are those which allow the system to run and assist the users. While the stakeholder's requirements are those which they expect from the system, and the system positively influence their performance (Noe et al., 2017).

Requirement ID

Requirement Statement

Stakeholder

(Position and Name from Case Study that identified this requirement)

User Requirements – (What the user needs the system to do)

The system must store all information from the candidate’s application/resume in a central applicant database.

Recruiter –Peter O’Neil

Integrated information

The information stored in the ERP system is consistent and highly accurate. This is used for further decisions.

CEO

Samuel Johnson

Financial information

There is one set of financial statements in the system. There is no errors and every statement match with each other.

CFO

Evelyn Liu

HR Information

The online database is used by employees to enter their details, and the managers across the organization view these details.

Director HR

Joseph Cummings

Enhanced security

The data is stored in one location, with high-security layers, which is used for better decision making.

CIO

Raj Patel

5. (Reporting-Output of organized information retrieved from the system)

The data stored in the online database management system is accessed and must use for future hiring plans.

Administrative officer

Tom Arbuckle

System Performance Requirements – (How the system will perform)

The system must be implemented as a Software as a Service solution.

CIO – Raj Patel

Software and Hardware

The system must need up to date hardware and software tools, which include CPU, ram, graphics, operating system, etc (MySQL :: MySQL Workbench :: 3.1 Hardware Requirements, 2019)

Administrative officer

Tom Arbuckle

Data Up gradation

The system must be updated with the latest data such as the applicants, recruitment procedures, and employees record.

Manager of Recruiting

Sofia Perez

Confidentiality

The system must be protected, and the personal data of employee or candidate must not be shared with others.

Director HR

Joseph Cumming

4. (Security)

The system must be secured, and authentication must be used for security. It must allow users who have the user ID and password.

CIO

Raj Patel

5. (Security)

The system must be encrypted to transfer data with high security. Encryption allows only the authorized person to access.

CIO

Raj Patel

References

Greiner, B. (2015). Subject pool recruitment procedures: organizing experiments with ORSEE. Journal of the Economic Science Association, 1(1), 114-125.

MySQL :: MySQL Workbench :: 3.1 Hardware Requirements. (2019). Download.nust.na. Retrieved 24 March 2019, from http://download.nust.na/pub6/mysql/doc/workbench/en/wb-requirements-hardware.html

Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2017). Human resource management: Gaining a competitive advantage. New York, NY: McGraw-Hill Education.

Subject: IT

Pages: 4 Words: 1200

Stage 3 - Business Analysis And Systems Recommendation

Stage 4 - Business Analysis and Systems Recommendation

Name of the Student

University Name

Stage 4 - Business Analysis and Systems Recommendation

Stage 1

Introduction

Maryland Technology Consultant is a renowned IT consulting firm to provide IT-based services and solutions to its customers. The target clients of the company are the small to medium enterprises, nonprofit organizations, and government agencies. The company has 450 employees working in different departments. The total gross revenue of the company was $ 95 million. The company is providing consultancy in the field of business and IT.

Organizational Strategy

Two projects are expected to achieve by MTC for which the company has to hire staff immediately. The HR department will have to retain the best talent for these two major projects. To assist the HR department, the IT staff has to provide IT-based services for proper recruitment procedures. The IT department and the HR department decided to make a pool of talented candidates which could be used in the future. The data of these candidates can be filtered and could easily retrieve in the future. They decided to use an online database management system where they would have all the candidates' record. It saves the time of the HR department, and save the cost of the recruitment process up to a great extent (Greiner, 2015).

Strategic Objectives

The strategic objectives of MTC included these four goals. The first strategic objective is to increase business development by getting more contracts in the field of Information Technology. It will increase the revenue of the company and will positively influence its profile. The second strategic goal of the company is to expand the scope of business internationally to provide support to MTC's team in the USA. The third strategic goal is to raise the capacity of MTC continuously to provide the best quality consultancy and serve its clients in the best possible ways. The fourth goal of MTC is to achieve competitive advantage in the field of information technology and increase its reputation in the consulting marketplace.

Stage 2: Process Analysis

Hiring Process

Here we will discuss the overall process of recruitment of staff through an online database management system. The hiring process will be used to improve the process and select the best candidates with lower the cost of recruitment (Boşcai, 2017). Here we will follow the process of the “As-Is” process which includes the input, process, and output. Online recruitment is economically best source to reduce the process cost (Greiner, 2004). The system will receive an application via online submission through MTC Employment Website and store in the applicant database within the hiring system. The system will facilitate the HR department officers to filter the data of applicants through their skills, experiences, and qualification. It will reduce the cost of paperwork and time. Interviews will be scheduled through an online database on the availability of both interviewee and interviewers. It will save the times and reduce the chances of cancellation of interview of any candidate because of the flexible timing.

Expected Improvements

There are some weak areas which are identified by the HR manager and the top management team in the conventional hiring process. It was communicated with CIO to overcome these issues in the online database. It will improve the communication and coordination process inside the organization and with the applicants. The communication is mostly done through conventional methods, and data is shared in paper format. The hiring procedure can be completed online. It will help share big data with no time. The data will be retrieved in the future as well. The workflow contained many manual steps and the use of some paperwork, which increase the cost of the recruitment process. Due to the installation of an online database, the unproductive steps will be eliminated. It will reduce the biases in the system (Le Cleach, 2016)

Stage 3: Requirements

Stakeholder Interests

The CEO of MTC is concerned about the recruitment of the right people because it influences the performance of the organization. The current hiring system is not capable of quick induction of new staff. According to the CFO, the current hiring system is inefficient and not cost-effective. The technology solution will improve the current hiring process and will enable future functionality for the success of the company. According to the CIO Raj Patel, the existing architecture and system are not much advanced, and the workforce is distributed. The new software solution will be more secure, which will replace the old manual hiring process. The rapid growth of the business and the plans for business expansion required immediate hiring. The existing system cannot meet these challenges. The company needs to hire 75 to 150 staff in the next three months which is not possible with the existing system. The new technology solution will save the time of MTC's recruitment staff to a great extent.

Defining Requirements

There are several requirements for the online database management system. Some are the user requirements while others are the system requirements. The system requirements are those which allow the system to run and assist the users. While the stakeholder's requirements are those which they expect from the system, and the system positively influence their performance (Noe et al., 2017). The user requirements form the system are: The system must store all information from the candidate’s application/resume in a central applicant database. The information stored in the ERP system is consistent and highly accurate. This is used for further decisions. While the system requirements are the ways how the system perform. The system must need up to date hardware and software tools, which include CPU, ram, graphics, operating system, etc. (MySQL, 2019). The system must be protected, and the personal data of employee or candidate must not be shared with others.

Stage 4: System Recommendation

System Justification

The online database management system for the hiring process will help the recruiters to hire the best talent from the market. Nowadays all the large organizations use technological solutions for all the functions. The role of technology in business is essential; it reduces the cost and improves the quality of products and services. It improves the processes within the organization, which become the competitive advantage of the company. The process improvement or process innovation became the main focus of every organization. It does reduce not only the costs but also increases the quality which is reflected in the products or services provided to the clients. As we discussed the strategy and plan of MTC, that could be achieved by the process improvements. The company needs to hire staff for two upcoming projects which are not possible with the existing manual system. The online recruitment procedure will reduce the chances of hiring incompetent staff. The online recruitment system also helps in the long term. The company will have a pool of candidates which will be used when the company needs the immediate induction of some staff. The company will easily filter the candidates' data and will shortlist the candidates within no time. The online recruitment tools will meet the requirements of the company significantly. It will reduce the paperwork and the manual records and files of every hiring activities.

Implementation Areas

The system will be implemented by an external client; for this purpose, the top management will evaluate many options by their deliverables, cost and the time taken. The company needs a SaaS system for 60 users; the EZ-ATS is charging cost worth $ 100 per month (EZ-ATS, (2018). After analyzing five clients and their packages finally, it is decided to contract with the EZ-ATS. It will provide a complete package with training our staff how to use the system, and it also provides services of maintenance after delivering the software. The available hardware and PCs of the company are compatible and can support this software. The company does not need any hardware to purchase and install. The SaaS solution will be configured by the service provider, and it will be configured with the network and the operating systems of the company. The data will be stored in the database of the company. The vendor and the IT staff of the company will configure and test the software and identify the issues if exist. This is the technology transfer stage for the company. The transition stage needs a strong leadership role to unite the employees and address their concerns (Dhir, 2019). Change management always creates some tensions and negativity among the employees. Transformational leadership can resolve this issue (Muchiri, 2019). Here the role of CEO will be important to address all the employees regarding the change management process. The employees usually have insecurity regarding their jobs after the change. The staff will be trained by the service provider for the initial operations of the SaaS solution. Then the company will hire an internal trainer for a short term contract who will assist the staff in learning the use of this system. The company will provide support to the external users the applicants through the help option on the online website. There will be the helpline phone number, and the email address as well so the users can discuss their concerns. The existing data will be uploaded to the system, and these will be used for testing the functions. The data will be migrated to the system for retrieval and record. The service provider EZ-ATS will provide maintenance for an initial six months for free, and the company will provide paid services.

Summary and Conclusion

MTC is a renowned company in the field of IT tools and solutions. The company provides innovative services to its clients. MTC has set its strategic business plan for business expansion and development. The company has more chances to win two large projects based on its proposal. For these projects, the company will need to hire staff. Finding the best available talent is one of the major issues for any organization. The company will need to make immediate hiring of staff for these projects. So the HR department has concerns about such a huge number of staff induction in less time. It was decided in the meeting to make the recruitment process online. The Chief Information Officer suggested the use of DBMS to get a pool of talent and filter a suitable employee. So that the requirements of the organization are fulfilled. For this purpose, the company's top management decided to digitalize the process of hiring. The project was given to an external client to provide the online hiring tool to the company. This tool will improve the overall performance of the company.

References

Boşcai, B. G. (2017). The evolution of e-recruitment: the introduction of an online recruiter.

Dhir, S. (2019). The changing nature of work, leadership, and organizational culture in future ready organizations. Corporate culture, Management, Leadership, Job redesign, Organizational Behavior, Innovation, Change Management, Human Resources, VUCA.

EZ-ATS. (2018). EZ-ATS Applicant Tracking Software [Course Resources]. In IFSM 300: Information Systems in Organizations: Spring 2019. Retrieved from http://learn.umuc.edu

Greiner, B. (2004). An online recruitment system for economic experiments.

Greiner, B. (2015). Subject pool recruitment procedures: organizing experiments with ORSEE. Journal of the Economic Science Association, 1(1), 114-125.

Le Cleach, L., Doney, E., Katz, K. A., Williams, H. C., & Trinquart, L. (2016). Research techniques made simple: workflow for searching databases to reduce evidence selection bias in systematic reviews. Journal of Investigative Dermatology, 136(12), e125-e129.

Muchiri, M. K., McMurray, A. J., Nkhoma, M., & Pham, H. C. (2019). How Transformational and Empowering Leader Behaviors Enhance Workplace Safety: A Review and Research Agenda. Journal of Developing Areas, 53(1), 257–265. https://doi-org.ezproxy.umuc.edu/10.1353/jda.2019.0015

MySQL :: MySQL Workbench :: 3.1 Hardware Requirements. (2019). Download.nust.na. Retrieved 24 March 2019, from http://download.nust.na/pub6/mysql/doc/workbench/en/wb-requirements-hardware.html

Namada, J. M. (2018). Organizational learning and competitive advantage. In Handbook of Research on Knowledge Management for Contemporary Business Environments (pp. 86-104). IGI Global.

Noe, R. A., Hollenbeck, J. R., Gerhart, B., & Wright, P. M. (2017). Human resource management: Gaining a competitive advantage. New York, NY: McGraw-Hill Education.

Papke-Shields, K. E., & Boyer-Wright, K. M. (2017). Strategic planning characteristics applied to project management. International Journal of Project Management, 35(2), 169-179.

Subject: IT

Pages: 4 Words: 1200

Summarize The Lifecycle Components Of A Business Case

Lifecycle component of a Business Case

Student’s Name

Institution

Date

Introduction

The decision making process involved the use of various tools to access the market trend. In housing sector, decision making process is based on the demand. It is important life for individual, collective and corporate. In order to make appropriate decision accurate data is needed. Therefore, relevant data is important to have efficient data which reflect the business perspective. A study conducted by Crozier & Ranyard (1997), illustrated that information obtained are useful efficient business management. Decision making affect all aspects of life economically, social and technological and therefore, it is important for companies to analyze data before making any decision regarding the market. In the case of “online interest proxies housing demand” data collected from an online portal was used to analyze the market trend and sales based on the clicks of ads and contact information left across the website. It is also pointed out that digital activities leaves behind several traces of human behavior. However, the analysis of the races of digital human activities can provide an overview of a market trend which can be used for effective decision making process. This paper, therefore, illustrates the business problem related to data stated in the article, data collection techniques used, the result and the outcome and the conclusion derived in the article.

Business Problem

Business involves a collection factors and for success and profitable business activities in the market, a company should be able to measure the demand. A study conducted by Pangallo and Loberto (2018) concluded that in online business activities include the sale of houses, it is difficult to measure demand and therefore, it affects business decision process. There is also harder to test the effect of demand therefore, the process of decision making regarded the trend of online house demand become impossible. The buyers are also not listed in the North America stock market. It is therefore, difficult to construct the empirical framework. However, there is also problem with dataset which are used for business analysis in order to make effective decision. Lack of accurate data affect decision making process and therefore, negatively impact the management process of business. The main problem with data is the large fraction of duplication of ads CITATION Pan18 \l 1033 (Pangallo & Loberto, 2018). It is therefore, important to identity duplication of ads to make to easy to estimate price elastic demand of a company. It is therefore, important to point that the main business problem is large volume of fractured data which should be analyzed to be use for efficient decision making. Without accurate data and effective analysis of the data, the decision making would be inefficient and the result of such decision might negatively affect the management process of business or companies.

Data Collection and methodology

The data used for this study was obtained from t (www.immobiliare.it). Immobiliare is one of the largest housing advertisement website in Italy. The data regarded residents and houses ads and other factors related to the housing sectors can easily be downloaded from the website. Therefore, the data of housing adverts. The ads snapshots were gathered for 2015 to 2018 and then analyzed. It is also important to point that the data was collected and analyzed based on the number of clicks of an ads, price and contacts which were left on the website. The upload and downloads of ads across the website was also analyzed. The number of clicks distribution across the lifespan was analyzed in order to obtain accurate information. The data obtained was then analyzed using Statistical process through the use of SPSS application.

Result

The analysis of the data indicates that online interest is a good proxy for demand. The hypothesis that online interest affects the actual demand is supported by the study. It is also obtained that individual decision is important in the general management. The result of the data analyze indicate that the prices of houses are relatively and mostly affected by the demand, stock market performance. It shows that the highest number of clicks in a region shows availability of several activities. It indicates a lot of interest but there is lack of affordability which makes many people not to purchase. From the data it would be easily for a company to determine areas where there is a lot of potential and this could help a company in making decision on where to investment for quick return of investment (ROI). The data is also indicate that the online interest affect the housing demand. The demand of housing affects the prices of house in almost all cities. This therefore, used by companies to strategically invest in the market for increase the market share of a company.

Outcome and conclusion

The result indicates that data from the market is important in understand a market. Several companies have used the data from online sources to analyze and understand the market trend and in this case the data is used to understand the demand of house and the prices changes. This helped the management in making efficient decision on whether to invest outside the country. The data is used to understand outside market and therefore, important for investment decisions. The distribution of interest is also measured based on the clicks, therefore, the number of clicks per each ads were analyzed. The ads which received several clicks show that there are several people who are interest on the product being advertised.

References

BIBLIOGRAPHY Crozier, R., & Ranyard, R. (1997). Cognitive process models and explanations of decision making. http://ebookcentral.proquest.com , 2-15.

Pangallo, M., & Loberto, M. (2018). Home is where the ad is: online interest proxies housing demand. EPJ Data Science , 2-15.

Subject: IT

Pages: 3 Words: 900

Summary

Your Name

Instructor Name

Course Number

Date

Summary

Introduction

The study done to know the impact of reward and penalty on the actions of animals and robotics is termed as Reinforcement learning ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"dtSqHFHm","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). To familiarize the dog with the desired technique, he is rewarded if it tries to learn the technique. This influences the dog to perform with dedication. The artificial systems are known to behave in a similar way when rewarded or punished ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qU7xyzC9","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). Among the given actions, the algorithm designed for reinforcement learning selects the action that has a maximum potential to generate a reward at every step for a required task. The action is then analyzed based upon a reward and a new update is generated that incorporates the information. This association between animal behavior and neuroscience presents reinforcement learning as a phenomenal machine learning model ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qAphkkOL","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). For the development of artificial systems, efficient demonstration based on the high dimensional input is needed which incorporates evidence from the previous practices. The paper usually provides the necessary high dimensional inputs via a proposed network called as deep Q-network. The subject of test was in the Atari game 2600 which incorporates two inputs one of which is the points on the game and other are pixels presented on the screen. As a result of this study, DQN is shown to produce phenomenal results regarding the given task.

Method

The network was conditioned on 49 Atari games and tested on a maximum of Fifty million pixels per each game (one that they claim is around 38 days of gaming experience) ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2DY4p2yV","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). The network as a whole was configured as follows:

Input layer consisting of 84×84×484×84×4 image.

Layer 1 consisting of 32 filters of 8×88×8 with stride 4 followed by a rectifier nonlinearity, defined as max (0, x).

Layer 2 consisting of 64 filters of 4×44×4 with stride 2 followed by the rectifier nonlinearity.

Layer 3 consisting of 64 filters of 3×33×3 with stride 1 followed by the rectifier nonlinearity.

Layer 4 consisting of fully connected with 512 rectifier units.

Output layer consisting of fully connected with linear units, each per action.

Algorithm

The study aims at establishing a network that is required to surpass the number of difficult learning tasks. For this purpose and application of the DQN network is used which contributes towards combining reinforcement learning and deep neural networks ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"E0eGAjhj","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). Specifically, the Ideal action-value function is determined by using a deep convolutional network. The structure of the network is shown in figure 1 below.

Q∗(s,a)=maxπE[rt+γrt+1+γ2rt+2+…|st=s,at=a,π]

It is the total cumulative number of rewards rt deducted by γ  at every step of the time t. The deducted factor is denoted by γ∈ [0, 1]. Q- Learning updates are applied to the stored samples. The following loss functions give the Q-learning update.

Li(θi)=E(s,a,r,s′)∼U(D)[(r+γmaxa′Q(s′,a′;θ−i)−Q(s,a;θi))2]

6993006427300

Fig. 1. Diagram representing the convolutional neural network

Results

Every game was played about Thirty times by specialized networks, equal to at least 5 minutes. The randomized agent chose a specific event every 6 samples which are also the standard. The human opponent utilized the same simulator as the agents and played under controlled circumstances. The player output is the cumulative reward of about 20 game events running for 5 minutes, following 2 hours of training playing consistently ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"LXnEwBnT","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). The individual efficiency is calculated to be 100%, and the performance of the randomized agent is adjusted to 0%.

The method was evaluated against the best performance methodologies and the professional game evaluator. A total of forty-nine Atari games was evaluated that were known to perform a wide range of actions. More than half of the games were shown to accomplish a score of 75 percent while the DQN agent surpassed the past methodologies by a significant margin for 43 games ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"NS0LuizW","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). DQN operates well in a variety of gameplay modes. Games featuring prolonged strategy techniques. However, still present a major problem for DQN (e.g. Revenge from Montezuma) ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"bIl7qeed","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). These findings are shown in the following figure 2.

center188400

Fig. 2. The contrast of a DQN agent with the best approaches for reinforcement learning

The investigators also discussed the interpretation acquired by DQN that utilized a methodology established to simulate high-dimensional content called' t-SNE' to support the most productive agent in the game Space Raiders ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AWoakWNh","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). The t-SNE theorem, as anticipated, appears to project the DQN interpretation to adjacent sites of spatially similar areas. It has been revealed that t-SNE generated identical encoding for DQN representations which were comparable in terms with predicted reward although different in conceptual context ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"eYAfOyXn","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). That's compatible with the concept that perhaps the network will benefit from high-dimensional perceptual input representations that endorse responsive activity.

Conclusion

The constructed implementation has shown the capacity to learn about playing games from Atari, provided limited game previous knowledge as well as fundamental variables ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3axA3c11","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). Using reinforcement learning with the Q-network algorithm was much more efficient than numerous previous efforts, as training had been using encounter preview as well as a distinct designated network. These two adjustments eliminated correlations among concurrent inputs, that enhanced network efficiency ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"S2SvKlw4","properties":{"formattedCitation":"(Mnih et al.)","plainCitation":"(Mnih et al.)","noteIndex":0},"citationItems":[{"id":64,"uris":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"uri":["http://zotero.org/users/local/LGdpQbDd/items/DUFHFGK5"],"itemData":{"id":64,"type":"article-journal","title":"Human-level control through deep reinforcement learning","container-title":"Nature","page":"529-533","volume":"518","issue":"7540","source":"www.nature.com","abstract":"The theory of reinforcement learning provides a normative account1, deeply rooted in psychological2 and neuroscientific3 perspectives on animal behaviour, of how agents may optimize their control of an environment. To use reinforcement learning successfully in situations approaching real-world complexity, however, agents are confronted with a difficult task: they must derive efficient representations of the environment from high-dimensional sensory inputs, and use these to generalize past experience to new situations. Remarkably, humans and other animals seem to solve this problem through a harmonious combination of reinforcement learning and hierarchical sensory processing systems4,5, the former evidenced by a wealth of neural data revealing notable parallels between the phasic signals emitted by dopaminergic neurons and temporal difference reinforcement learning algorithms3. While reinforcement learning agents have achieved some successes in a variety of domains6,7,8, their applicability has previously been limited to domains in which useful features can be handcrafted, or to domains with fully observed, low-dimensional state spaces. Here we use recent advances in training deep neural networks9,10,11 to develop a novel artificial agent, termed a deep Q-network, that can learn successful policies directly from high-dimensional sensory inputs using end-to-end reinforcement learning. We tested this agent on the challenging domain of classic Atari 2600 games12. We demonstrate that the deep Q-network agent, receiving only the pixels and the game score as inputs, was able to surpass the performance of all previous algorithms and achieve a level comparable to that of a professional human games tester across a set of 49 games, using the same algorithm, network architecture and hyperparameters. This work bridges the divide between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging tasks.","DOI":"10.1038/nature14236","ISSN":"1476-4687","language":"en","author":[{"family":"Mnih","given":"Volodymyr"},{"family":"Kavukcuoglu","given":"Koray"},{"family":"Silver","given":"David"},{"family":"Rusu","given":"Andrei A."},{"family":"Veness","given":"Joel"},{"family":"Bellemare","given":"Marc G."},{"family":"Graves","given":"Alex"},{"family":"Riedmiller","given":"Martin"},{"family":"Fidjeland","given":"Andreas K."},{"family":"Ostrovski","given":"Georg"},{"family":"Petersen","given":"Stig"},{"family":"Beattie","given":"Charles"},{"family":"Sadik","given":"Amir"},{"family":"Antonoglou","given":"Ioannis"},{"family":"King","given":"Helen"},{"family":"Kumaran","given":"Dharshan"},{"family":"Wierstra","given":"Daan"},{"family":"Legg","given":"Shane"},{"family":"Hassabis","given":"Demis"}],"issued":{"date-parts":[["2015",2]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Mnih et al.). Additional research must be conducted to develop the experience review algorithm: the selection must be skewed to big-reward incidents rather than selecting randomly from the simulation database. It may add an element of disruption to the network, but it deserves to be examined.

Works Cited

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Mnih, Volodymyr, et al. “Human-Level Control through Deep Reinforcement Learning.” Nature, vol. 518, no. 7540, Feb. 2015, pp. 529–33. www.nature.com, doi:10.1038/nature14236.

Subject: IT

Pages: 4 Words: 1200

Summary Cloud Computing

Cloud Computing

Student's Name

University Affiliation

Cloud computing

Cloud computing is a term used to describe different classes of integrated network components that work over the internet. It includes networked both hardware, internet infrastructure and software (Erl, Puttini & Mahmood, 2013). Also, it uses the internet to communicate hardware, networking and software services to users.

The essential features of cloud computing services are immense scale, resistant computing, and virtualization, advanced security, on-demand self-service such as full network access, quick elasticity and sedate services (Erl et al. 2013). The feature helps in quality improvement to users.

Besides, some conventional cloud services models offered by different companies are like Google app, Amazon web services, Rack-space hosting among other online services (Mosco, 2015). These services use different computing layers like application services, application platforms, server platforms and storage services that enable them to offer flexible and elastic services to their users.

Generally, some of the characteristics of cloud computing are more important because they help users will services they need. For instance, virtualization is used to provide an execution environment to avail authority to users who are using well-defined protocols. Also, it allows many machines to operate on one physical machine components.

Additionally, cloud computing is essential because it enables different organizations the use system infrastructure dependent on being less support. Also, it helps organizations to reduce manual storage cost which can increase the overall value of production because it enables services usage without an understanding of their infrastructure (Lyon, 2014). Furthermore, cloud computing reduces computer cost that could be charged on hardware storage. Cloud computing also, reduces software cost and improves organizational performance. This helped many organizations to minimize their cost of operation. On the other and, cloud computing also has some drawbacks that reduce its efficiency. For instance, constant use of cloud computing limits flexibility and innovation thus minimizes the opportunity for personal improvement. Lastly, it requires a continuous internet connection which can be expensive to small organizations.

References

Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: Concepts, technology, & architecture.

Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 2053951714541861.

Mosco, V. (2015). To the cloud: Big data in a chaotic world. Routledge.

Subject: IT

Pages: 1 Words: 300

SWOT Analysis

DEVELOPMENT OF DOWNTOWN RESTAURANT’S WEBSITE: A SWOT ANALYSIS OF WEB DESIGNS

Student’s name

Institution’s name

DEVELOPMENT OF DOWNTOWN RESTAURANT’S WEBSITE: A SWOT ANALYSIS OF WEB DESIGNS

PREAMBLE

Downtown Restaurant is a start-up food business that is projected to be launched in coming next two months. The restaurant is located in Atlanta, Georgia, and in order to facilitate its customers, it is looking forward to developing its web presence. Downtown Restaurant will offer fine dining to its customers, and therefore three websites of similar restaurant's categories are thoroughly analyzed from SWOT standpoint, so Downtown Restaurant could implement successful aspects of web design while avoiding the negative aspects of developing a website. The selected websites and their SWOT analyses are as follow:

SELECTED WEBSITES AND SWOT ANALYSIS

Alinea Restaurant

https://www.alinearestaurant.com/

Alinea Restaurant is a venue to have a delicious and creative fine dining experience. Chef Grant Achatz's role is eminent in attracting and captivating the attention of all new American food lovers. The entire menu and other service dimensions are highly innovative and creative. Alinea' website is a depiction of artistic aesthetics as its overall presences itself.

Strength: Alinea Restaurant's official website features relevant and unique content. And the substantial theory of creativity and innovation is clearly evident from the interface of the web page as well. That means the content and design of the website perfectly harmonized with the style statement of the restaurant. Moreover, the site allows users to book their tables according to their particular specifications. It also has a section for providing answers to frequently asked questions.

Weaknesses: Regardless of a unique design and online reservation and frequently asked questions' section; the website evidently lack graphics and detailed content. The detailed menus, photos of ambiance, specialties, and other details are starkly absent from the website. The minimal design of the web page makes the user bore in no time. Furthermore, mobile optimization's option is also unavailable. And no contact details are provided, and the social media junctions are nowhere to be found.

Opportunities: The technological advancement and creative appearance of the website could be a plus point for Alinea. But they have to elaborate its efficacy through adding content, further details, and images to make it captivating.

Threats: There is a myriad of food and restaurant businesses, which are competing in a similar industry and have far more better websites. Through flawless services and online options such a restaurant can make and retain loyal customer-base and can leave Alinea behind.

Circa 1886

https://www.circa1886.com/

Circa 1886 is a romanticized and reminiscence fine dining restaurant in Wentworth St, Charleston. The restaurant features a seasonal menu, which is further elevated through the Lowcountry style local menu, and boosted with a selection of exotic wine. The official website of Circa 1886 is as striking as its dining and wine services.

Strength: The website of Circa 1886 is pleasantly laden with visually attractive and practical information and features. From reservation, menus, photos, special events, and restaurants' history and contact, all details are given handily. The colors, high pixel photography, and compatible font add liveliness and vibrancy to its appearance.

Weakness: There is no evident weakness in the website design and interface. However, it is recommended for Circa 1886 to enhance its search by adding more meta tags to its web design.

Opportunity: In the recent era, almost all businesses are opting for improving their social and digital presence through the utilization of mobile apps. Circa 1886 has not developed its mobile application yet. The website of the subject restaurant has almost all the apparent features of a quality and effective website and incorporation of mobile application option can affect the traffic and users-base to an extensive extent.

Threats: Similar to Alinea Restaurant, Circa 1886 to have threats of easy market entrance in the industry of hotel and hospitality. And local and international restaurants are endeavoring tirelessly to boost the productivity of their business operations through social media and other similar junctions. Therefore, Circa 1886 has to be vigilant regarding counter-strategies to attain maximum competitive advantages.

Oriole

http://www.oriolechicago.com/

Oriole is a Chicago based high-end kitchen restaurant service, that proffers new American tastes along with tranquil and minimalist, yet stylish ambient. The official website of Oriole carries a modest and simplistic design.

Strength: Oriole's reticent display is designed with light colors, but regardless of minimum visuals the website fulfills all informative requirements. It has online options for reservations, contacting the restaurant's management or authorized team, and embedded the links of its Facebook, Twitter, and Instagram accounts. Moreover, the site maintains its press section as well, through which it is possible for users to access the articles regarding the updates and reviews of Oriole.

Weaknesses: Lack of colors and sufficient graphics and photographs is evident from the very first click on the web address. When users click on menu or beverage tabs, they expect to see something, to explore the offerings of the restaurant through content and pictures, but these tabs are as bare as the entire website. On the other hand, Oriole does not have a mobile application as well.

Opportunity: Oriole's website is swarmed with Meta tags that are a good omen because, through such implications, it can be easily accessed by numerous visitors. However, Oriole should consider its basic web design cautiously to make it attractive, vibrant, and effective as any successful restaurant website to retain the visitors' traffic.

Threats: The lack of festooned web design of Oriole is a threat to the website itself. By a first look, it does not seem like a restaurant website at all and seems like a generalized blog. Therefore, to attain exacerbated advantages through its Meta tagging strategy and modesty, Oriole needs to reform the basic portrayal of its websites' interface. Because all the fruitful restaurant businesses have sizzling, colorful, and vivid visuals and font etcetera, and Oriole needs to benchmark such standards.

CONCLUSION: DOS AND DON’TS FOR THE PROSPECT WEBSITE FOR THE DOWNTOWN RESTAURANT WEBSITE

By analyzing the web designs of three renowned American fine dining restaurants' websites, it becomes evident that a restaurant website should have certain components to create an effective web presence. According to the above-given SWOT analyses and other underlying implications, Downtown Restaurant has to design and develop a website that adopts all the strong points and evades the peril of fall prey for elucidated weaknesses.

Downtown Restaurant's website should proffer relevant and unique content that should be synchronized its business strategy and style statement. On the other hand, the interface of its website should feature a sufficient quantity of food and ambiance photography so users could get attracted by the tempting depiction. Moreover, incorporating maximum meta tags will assure the restaurant to have a persistent and frequent visitors’ traffic, that will increase its business efficacy, reputation, and rapport simultaneously. On another hand, an easy and convenient home page is imperative for Downtown Restaurant’s website, so users could explore the basic attributes, offers, and packages without getting involved in pestering process of elongated registration and signing in. The Downtown Restaurant is recommended to add all relevant information regarding its contacts, history, management, menu, venues, and other offers to supply the users with a chance to explore all possible events online. Furthermore, the restaurant has to establish its profile on Instagram, Facebook, YouTube, Google+, and twitter etcetera, and all these social media platforms should be synchronized with the official website, so users could access the authentic account of business instead of becoming fooled by imposters.

On the contrary, all the weaknesses of analyzed websites are warning signs for Downtown Restaurant, and therefore all potential err should be avoided. The restaurant is recommended to add the option of mobile optimization and app on its web page so the users could download the app and use the services offered. Moreover, the restaurant has to stay away from poor and insufficient content, as well as from the low-quality images and deficient textual and visual information. It is observed that long and boring subscription procedurals divert the attention of users, and in turn, they prefer to go with a website with minimum hassle and time effective portal instead. Therefore, Downtown Restaurant’s website should be designed according to the time-saving principles. Further, the design of the website should not be extremely modest either exaggeratedly vigorous, and a site map should be included for the sake of ease of searching desired service of the query.

Similarly, Downtown Restaurant can implement different innovative technologies, such as online transactions and sponsored marketing strategies to nurture its opportunistic grounds. New entrants in the hospitality industry are, and will always be a threat to the restaurant, but it has to devise a smart plan sheet to design a flexible web design in order to mark a score through its web presence. In short, a restaurant’s website should be a complete package of convenience, modernity, graphic attraction, comprehensible text, easily accessible information, and coherence is a must.

Reference

Alinea. (2019). https://www.alinearestaurant.com/

Charleston SC Restaurants | Circa 1886. (2019). https://www.circa1886.com/

Oriole. (2019). http://www.oriolechicago.com/

Subject: IT

Pages: 5 Words: 1500

System Categories & System Analysis

System Analysis

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

System Analysis

Part 1

i) type of the system

ii) its purpose

iii) typical user(s) of the system and their means of interacting with it

iv) input data used by the system

v) system’s output

(b) Management information systems—for Feelin’Chicken, a chain of fast-food restaurants

Keep track of the sales of the products as well as of the entire chain. Records could include sales data, purchase data, employee data, etc

The cash counter staff enters the transaction details through the computer which are recorded.

The management staff enters details for the employees and organizations through an interface provided.

Products purchased

Products sold

Employee personal information

Organizational information

Update of the database regarding the data that is stored e.g quantity of the products remaining, etc

(d) Expert systems—for FreeMoney, which provides services for budgeting, debt consolidation, and retirement savings

The expert system can be used to provide the best possible option regarding the services that the client should avail

Typical users can either be the office staff or it could be available for everyone through online service. The required data is inserted using the computer through a form containing the necessary details to be recorded.

The account details.

Personal details

Bank details

Work history

Output is the calculation that the system performs according to the selection that has been made by the client. It could be budget calculation, debt handling, etc.

(g) Customer relationship management system—for FindMe, a line of products that help track inventory and assets with RFID, and Bluetooth technology

The syste would be able to store the data regarding the systems that have been installed at various locations. Through this the customers would be easily tracked.

The data is inserted by the office staff of the company for each system that is installed by them.

Customer details

Order details

Output of the system is in the form of tracking details of a particular client. It could include what system has been installed, any complaints, updates installed ,etc

Part 2

Mission Statement

VolunteerFit is a system that is designed to match potential volunteers with organizations that require their assistance. The VolunteerFit would be a mobile-based app that would keep the profiles of both organizations and potential volunteers. An organization may be able to locate the necessary volunteers as well as the other way around. The app would employ simple design and ease of use for the users. With the use of GPS systems, the organizations and volunteers would be able to locate as well as communicate with one another ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qutBcPcq","properties":{"formattedCitation":"(Renfro et al., 2017)","plainCitation":"(Renfro et al., 2017)","noteIndex":0},"citationItems":[{"id":122,"uris":["http://zotero.org/users/local/WKtM8IGm/items/5MRYB9IA"],"uri":["http://zotero.org/users/local/WKtM8IGm/items/5MRYB9IA"],"itemData":{"id":122,"type":"article-journal","title":"An analysis of global positioning system (GPS) standard positioning system (SPS) performance for 2015","container-title":"Space and Geophysics Laboratory. Applied Research Laboratories. The University of Texas at Austin","author":[{"family":"Renfro","given":"B."},{"family":"Rosenquest","given":"Jessica"},{"family":"Terry","given":"Audric"},{"family":"Boeker","given":"Nicholas"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Renfro et al., 2017).

Functional Requirements

The VolunteerFit system shall have the following functional requirements

The users whether organization or volunteers would be able to make their profile using a registration form.

The organization would include details about their requirements, whether of human capital or items.

The volunteers would include the details about their availability and the items that they would like to donate.

The initial setup can be done using the social media profiles for the user.

A notification shall be sent to both the volunteer and the organization in case of a match between them.

The volunteer and organization can view the potential options in the areas close by.

The organization and volunteers would be able to view the other on a GPS.

Both the users i.e. the volunteers and the organization would be given the opportunity to provide feedback regarding the other through a feedback form.

The volunteers and the organization can communicate with each other through an internal messaging system.

If the volunteer wants to donate money that can be done through the use of online payment gateways and credit/debit cards.

System-Level Use Cases

The user opens the VolunteerFit application.

The app gives the option to log in or make a new account.

The volunteer enters the credentials.

The volunteer’s control panel is displayed.

The volunteer enters the detail of the services/items that they are willing to provide.

The volunteer can check the match that his requirements have with the particular organizations.

In case a match occurs the system notifies the volunteer about that organization.

The location of the organization

The contact details of the organization

The time to set the meeting for the necessary process

The volunteer sends details about the services/items that they are willing to provide to the organization.

The volunteer waits for the response of the organization and further details.

In case volunteers and the organization accept the offers, the delivery is made by the volunteer if items are required otherwise the volunteer proceeds to go to the location if volunteering services are requested.

System-Level Constraints

The system-level constraints for the VolunteerFit application are as follows

The application would work with the devices running on android and ios operating systems.

The app shall work on ios version 11 or higher.

The app shall work on android version 6.0 or higher.

The app shall be integrated with the GPS system to track the distance of the volunteers or the organization.

The app shall have login compatibility with Facebook and Google only.

The GPS used would be based on either Google Maps or Bing maps.

The app would require the use of the internet to keep track of all the necessary details.

The online transfer would be compatible with PayPal or credit/debit cards.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Renfro, B., Rosenquest, J., Terry, A., & Boeker, N. (2017). An analysis of global positioning system (GPS) standard positioning system (SPS) performance for 2015. Space and Geophysics Laboratory. Applied Research Laboratories. The University of Texas at Austin.

Subject: IT

Pages: 3 Words: 900

TECHNICAL REPORTS

[Your Name]

[Instructor Name]

[Course Number]

[Date]

PROSTHETIC ARM

Abstract: This project focuses on the design of a myogenic prosthetic arm to mimic the movement of human arm. A huge increase has occurred in the prostheses for patients with upper limb amputations in recent years. Current prosthetic hands have minimal usability and are costly. Our goal was to design a cost-effective prosthetic hand model. This paper provides the source for a prosthetic limb by examining alternative mechanisms for acquiring and transmitting data.

The prosthetic arm is designed to provide the tactile perceptions experienced by the human body by integrating a network of sensors into the nervous system and operating the arm on the basis of feedback received from these sensors. Coordinate reference systems are used for the transformation of input signals into the desired output. Our proposed model works using electromyogenic (EMG) signals generated by muscle contractions. Our design has increased degree of freedom and the number of grip patterns. In addition to driven thumb roll articulation, which is not seen in commercial products, the novel model includes five independently actuated fingers. Besides that, it exhibits the full range of motion required to grab an object.

INTRODUCTION

Prosthesis is a medical device that structurally and functionally replaces an arm. The hand is a complex part of human body. There are many people who have lost limbs through accidents or by birth and have to face a lot of problems in performing the normal activities of life. Due to advances in engineering and computer science technology, prosthetic limbs are designed as a substitute so that amputees can perform the normal activities easily. The previously designed prosthetic hands are very costly and are not affordable for many individuals. Our main goal is to develop a cost effective prosthetic hand that would be easy to manufacture and maintain. Furthermore, it must be able to carry out daily life activities [1]. There are four types of prosthesis depending on missing part. Our design is used particularly for transradial amputation. A transradial prosthesis replaces an arm below the elbow [2]. The hand must use sensor to read the muscle activities to cause movements. Electromyography (EMG) sensor is used for interpreting muscle movements. Many experimental hands use the EMG signal pattern recognition system to discern the motion or gesture of the hand. This approach is difficult to implement because of the limited hardware memory in the microcontroller,. In this design, the simple algorithm is built using the EMG signal to drive multiple grip patterns. Researchers are trying to improve the previously designed prosthetic arms but despite these technological advances, they are still limited in terms of their amount of sensory feedback received, degrees of freedom and methods of distinguishing various grip patterns of human hands. Most amputees expressed a desire for improved mobility, higher grasping speeds and powers, natural movement and object contact and enhanced cosmetic appearance. Some improvements have been made to increase the degrees of freedom and reduce the weight of the prosthetic arm such as the use of under actuated mechanisms and shape memory alloy actuators. The high degree of flexibility and mobility of the hand and more robust control schemes are needed. The upper limb prostheses still have sufficient room for improvement. [3]

LITERATURE REVIEW

The prosthetic counterparts of the hands have undergone significant evolution and practical advances due to its crucial role in controlling and handling of an object. A large number of institutions have done research on the design and construction of robotic arm. The main focus of the previously designed robotic hand designs was on the mechanical problems that is functioning and designing. Different methods of actuation were used. The Novel Dexterous Hand uses motors to operate the finger joints. These motors are attached through cables much like the tendons in the human hand. With the help of a series of cables, the movement of motors is transmitted to the fingers. Some designs for example Anthroform Arm have actuators that directly transmit the power to the joint. It uses pneumatic 'muscles' to imitate the human arm's muscles that are directly connected to the ' bones' . They have also used wires made up of SMA alloys to provide strength and to transmit motion. When heated, these wires contract and return when cooled to their initial shape. Most prostheses are controlled using non-intuitive methods. No research has been found investigating prosthesis control directly from the neural network of the body. Large number of prosthetic hand models have benn designed. Some of them are are Be-bionic, e-Nable and Michelangelo hand, The Be-bionic hand is a myoelectrically operated prosthetic hand in which all fingers are guided. Gears and leadscrews move the fingers independently with 4 selectable grip settings. The e-Nable hand is available to the public freely. It is entirely operated by the body and functions by the amputee flexing their muscles in the stump. Michelangelo hand also works on the basis of EMG signal with actively driven index finger, middle finger and thumb while the other fingers are passively followed by the ring and pink finger [4]. The arm has 7 styles of grip. Although many manufacturing methods are available for manufacturing prosthetics, 3D printing has become popular in recent years due to the increase in rate at which prosthetic hands design can be prototyped. From the research, we also concluded that our model should be able to allow adaptability based on the amputee's needs depending on what their device should require. Therefore, the prosthetic hand can be modified. This project is trying to lay the foundation for an arm with an intuitive control method that can imitate the human arm [5].

OUR DESIGNED MODEL

The prosthetic limb consists of three main components i.e., biosensors, controller and activator. Biosensors are necessary to detect track neural activity. Controller acts as the key interface between the biosensors and the actuator, so that the data is obtained from the biosensors and this information is fed back to the actuator. Actuator is the end unit that collects controller data and imitates a muscle's movement [6].

Prosthetic limb research is wide-ranging and complex. We have designed a prosthetic hand in such a way that it should be light in weight to allow better movement.

STRUCTURE

The prototype of our model consists of a network of four fingers and a thumb attached to palm of a hand. The hand holds a micro-controller and a battery. A servo motors are used to provide actuation through a series of pulleys. They are basically used to actuate the fingers. These motors have built in encoders that helps motor can to rotate to a specific angle using pulse width modulation. Many options are provided for signal input and control algorithms. The fingers are connected to the DC motor using a copper wire with one end attached to the fingertips and using the program written in ATmega 32 controller. The prototype model is designed in AutoCAD and is 3D printed [7].

WORKING

We have designed a prosthetic arm that works on the basis of Myoelectric signals generated from biosensors. The actuators are attached to the residual part to allow the movement of a prosthetic limb, which will provide input signal produced by the biosensors. The actuators are also attached to a controller device that initiates sensory feedback to the actuators.

In this technology, muscles in your residual limb drive the body. These muscles can be contracted to produce electrical signals to move the arm. The disposable surface electrodes are positioned over the appropriate muscles on the body. The voltages created by contracting muscles are captured by these electrodes. A sEMG amplifier consists of three electrodes, two of which are placed over the muscle and the third electrode act as the ground. The three surface electrodes are placed on different muscles at different positions. The amplitude of signal obtained from electrodes varies from 0 to 10 millivolts and the frequency ranges from 50 to 150 Hz

After acquiring EMG data, it is amplified through amplifier which is connected to a PC for data storage. On a computer screen, auditory and visual animated signals are displayed and used to synchronize with the information. The obtained signal is sampled and bandpass filtered. The prosthetic hand includes a microcontroller capable of handling all hand movements [8].

The filtered signal is then passed to the microcontroller which is not able to move the robotic hand alone with the latest driving capabilities. . It involves a driving circuit to move the motors and moving parts in the robotic hand for the microcontroller's signals by mapping the value of the signal with the range of gesture value already stored in the microcontroller. The final signal obtained is then passed to the servo motors and on the basis of this signal, the servo motors perform the desired gesture.

Finally, the robotic hand imitates a human hand's movements depending on the input signal [7][9][10].

FUTURE WORK

Many areas require more research and development in order to enable the prosthetic to act as part of the neural network of the human body. It is important to investigate the rates of appropriate neuron stimulation without cell damage. It is also necessary to determine the technique of adding the prosthetic to the human nervous system. The acquired data through EMG signals in to produce the desired movement must be defined on the basis of the selected data point. Besides that, you can also incorporate machine learning algorithms to improve its functionality and behavior. Wireless communication can also be established inside it, allowing the user to move in an even more unrestricted manner.

CONCLUSIONS

The prosthesis is a major research area that improves the strength and recovers the amputee's usability. The project has shown effectively the value of hand design as well as design improvements. By placing electrodes on the skin, we have acquired EMG signals of finger gripping movements. After this, raw EMG signals obtained were amplified and rectified using an EMG acquisition circuit. Bio-signals serve as a driving force, thereby transmitting the nerve signals to accomplish the mission. A microprocessor controls this form of prosthesis and DC motors control the finger motion in turn. Then, we designed our own prototype of arm using Solidworks and AutoCAD. Different finger movements are controlled using servo motors. Hence, amputees can install this myoelectric arm which is very affordable in price as compared to other commercially available prosthetics. As an actuator, motors give the hand a light in weight structure. The main requirement of this hand is to provide the natural hand's flexibility so that amputees can also perform daily life activities easily and efficiently.

REFERENCES

[1] M. Ariyanto, Munadi, G. D. Haryadi, R. Ismail, J. A. Pakpahan, K. A. Mustaqim, "A low cost anthropomorphic prosthetic hand using DC micro metal gear motor", 2016 3rd International Conference on Information Technology Computer and Electrical Engineering (ICITACEE), pp. 42-46, 2016.

[2] Prostheses - Prosthetics: Artificial Limb Information. (2019). Retrieved 9 October 2019, from https://www.disabled-world.com/assistivedevices/prostheses/

[3] https://web.wpi.edu/Pubs/E-project/Available/Eproject042612145912/unrestricted/MQP_PaulV_Complete_Final_3.pdf

[4] H. M. C. M. Herath, R. A. R.C. Gopura, Munadi, Thiliana D. Lalitharatne, "Prosthetic Hand with a Linkage Finger Mechanism for Power Grasping Applications. "." IEEE n. pag. Print.

[5] Cloutier, Aimee, and James Yang. "CONTROL OF HAND PROSTHESES- A LITERATURE REVIEW." IEEE n. pag. Print.

[6] An Introduction to the Biomechanics of Prosthetics. (2019). Retrieved 9 October 2019, from https://www.azorobotics.com/article.aspx?ArticleId=11

[7] Harvey, David, and Benjamin Longstaff. "THE DEVELOPMENT OF A PROSTHETIC ARM." IEEE n. pag. Print.

[8] P. Priya, E. Priya, "Design and control of prosthetic hand using myoelectric signal", 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), pp. 383-387, 2017

[9] K. Sharmila, T. V. Sarath, K. I. Ramachandran, "EMG Controlled Low Cost Prosthetic Arm", 2016 IEEE Distributed Computing VLSI Electrical Circuits and Robotics (DISCOVER), pp. 169-172, 2016.

[10] M. Gauthaam and S. S. Kumar, "EMG Controlled Bionic Arm", in proceedings of the National Conference on Innovations in Emerging Technology, pp. 111-114, Erode, India, February 2011.

Subject: IT

Pages: 2 Words: 600

Term Paper

Term Paper

[Name of the Writer]

[Name of the Institution]

TABLE OF CONTENTS

TOC \o "1-3" \h \z \u Introduction PAGEREF _Toc22232042 \h 3

Wireless Communication PAGEREF _Toc22232043 \h 3

Issues regarding Wireless Communication PAGEREF _Toc22232044 \h 5

Eavesdropping to Intercept the Data PAGEREF _Toc22232045 \h 5

Electromagnetic Interface PAGEREF _Toc22232046 \h 6

Bandwidth Congestion PAGEREF _Toc22232047 \h 6

Wireless Network Sniffing PAGEREF _Toc22232048 \h 6

Denial of Service Attacks PAGEREF _Toc22232049 \h 7

Wireless Spoofing Attacks PAGEREF _Toc22232050 \h 7

Traffic Redirection PAGEREF _Toc22232051 \h 8

Rogue Access Point PAGEREF _Toc22232052 \h 8

Cafe Latte Attack PAGEREF _Toc22232053 \h 8

Congestion Problem/Issue PAGEREF _Toc22232054 \h 9

Network Injection Attacks PAGEREF _Toc22232055 \h 9

Man-in-the-Middle Attack Problem PAGEREF _Toc22232056 \h 9

Support for Wide Variety of Wireless Communication PAGEREF _Toc22232057 \h 10

Prevention of Interface and Improvement of Actual Throughout PAGEREF _Toc22232058 \h 10

Simplification of Certification and Setting Process PAGEREF _Toc22232059 \h 10

The Future of Wireless Communication PAGEREF _Toc22232060 \h 11

Wireless Communication in Business and Company PAGEREF _Toc22232061 \h 13

Wireless Communication in Networking PAGEREF _Toc22232062 \h 14

Wireless Communication in Medical Science PAGEREF _Toc22232063 \h 14

Future Advancement in Wireless Communication PAGEREF _Toc22232064 \h 15

Conclusion PAGEREF _Toc22232065 \h 16

References PAGEREF _Toc22232066 \h 18

Term Paper

Introduction

Since each of the communication network and every type of communication is expected to deliver the best possible results in terms of delivering increasing data rates, the existing efficiency of the communication needs to be improved. Improvement of efficiency is necessary and crucially essential because there are several problems and issues to be seen in communication especially in wireless communication. It is a reality that coin has two sides, so based on this reality it can be stated that wireless communication is considered as the most effective and highly efficient type of communication but it does have some critical issues as well. The issues which can be witnessed in wireless communication are mostly associated with the security and systems (complexity of the systems and their application). While the speed and accuracy of wireless communication in comparison to wired communication can be reflected as its credibleness.

Proceeding further, analyzing the current status and future of any topic under discussion is a good step taken by writers all of the time. Hence analyzing the future of wireless communication or giving a view to the future of wireless communication is essential to make a part of the paper. Hence, the second phase of the paper elaborates on the future of wireless communication and lists the reasons that why and how the concept of wireless communication looks upbeat and glow in the future in comparison to the present.

Wireless Communication

Wireless Communication is a type of data communication which is done and performed without direct wire communication. In other words, wireless communication is communication that is performed wirelessly. The term wireless communication is a very broad term that includes lots of processes, procedures, and forms of connecting and communicating between two or more devices that use wireless signals through the technologies of wireless communication devices. Wireless communication is usually seen in daily life on a small level such as communication among individuals through the use of cell phones and the internet etc. but it is a very broad field where a very critical and huge amount of data and information are communicated (Deck, et.al, 2018). Such huge and critical data and information are shared and communicated among companies, businesses, agencies and other large level bodies.

Wireless Communication mainly works by the electromagnetic signals which have broadcasted by an enabled device or devices in the air, atmosphere, or the physical environment. The communication in wireless communication is done and completed at the time when the distance or the intermediate device captures the signals where the device creates wireless communication then and works as a bridge between the sender and receiver device. This type of communication has several forms, delivery methods or techniques, and technology that includes;

Mobile Communication

Satellite Communication

Infrared Communication

Wireless Network Communication

Bluetooth Communication

Hence, each of these communication technologies and techniques has varying underlying architecture. In short, all of these technologies lack a wired and/or physical connection between all of the respective devices to develop and execute the communication.

Issues regarding Wireless Communication

It is a fact that wireless communication is one of the most credible inventions of the current time. It is considered an outstanding contribution to the communication and networking of the present time. But on the other and opposing die, it cannot be ignored as well that gaps and problems exist everywhere. Hence, the same can be found with wireless communication (Deck, et.al, 2018). There are several issues to be witnessed with wireless communication. Some of those issues are considered as most crucial and critical while some of them can be considered minor issues. In short, the issues in wireless communication can be categorized as major and minor issues where major issues are more critical and need a lot of efforts to control and eliminate even in any possible way, but minor issues are the ones that create problems but do not need so huge efforts to eliminate and cover. So, some of the main issues in wireless communication and their possible discussion and analysis are done in this part of the paper.

According to (Ijemaru, et.al, 2018), the main and most critical issues in wireless communication are security issues. Security issues are considered as the main and even the most critical because security in communication is the most important thing to ensure. While on the other side, it is everyone’s concern to have fully secure communication no matter they use wire communication or wireless. So, some of the important security issues in wireless communication and the brief explanation of each is as follows.

Eavesdropping to Intercept the Data

It is an act of illegitimately receiving and intercepting information which is communicated through the sources of wireless communications and networks or channels that can possibly result in the affected data or information being compromised. This happens so because the airwave is not fully secure while an attacker can have access to hijack the signals over the air from a specified location and distance.

Electromagnetic Interface

The terms interface is found very common and usually happening in the broadcasting where a radio receiver might may ick more than one or single channel at one time during the broadcast. Hence, this concern often leads to a signal to fade and then leads to disruption of the normal and smooth transmission.

Bandwidth Congestion

Piggybacking is the ultimate reason due to which the security issue of bandwidth congestion happens. This (Piggybacking) is the unauthorized access of wireless LAN. This includes the process and practices of accessing a wireless internet connection by any other user who uses the wireless internet service of any other subscriber without having the permission of the person (Ijemaru, et.al, 2018). Piggybacking also causes direct attacks on your computer system and services violation as well as other illegal activities by the use of malicious users which could be traced towards you.

Wireless Network Sniffing

Wireless network sniffing is considered as one of the most critical issues in wireless in terms of elimination or control. A wireless sniffer is a tool or piece of software or hardware which is designed to intercept data and information at the when it is transmitting on the wireless network and then decode that data or information into a new or another format which is easily readable and understandable for humans. These wireless sniffers are even specifically designed for the purpose to catch in or capture the data or even information when it is transmitting over a wireless network. One the other side, wireless packet sniffers are the piece that is used to keep wireless networks maintained while their capabilities also make them effective and popular tools available for controlling malicious attackers and attackers. These tools are used by hackers to stool out data and information at the time when data is under transmission over a wireless network. Through the use of these sniffing tools, a lot of important information such as account details, bank details and information, passwords, emails, logins, and credit cards' details, etc. are stolen by the hackers.

For securing such crucial and highly noticeable issues, there are a number of tools available such as SFTP, HTTPS, and SSH, etc. Each of these protocols makes sure that any information transmitted is automatically encrypted.

Denial of Service Attacks

Denial of Service Attacks is one of the major security issues in wireless communication. It is a situation in which a user of wireless is illegitimately deprived of the service of the resources of the network by malicious attackers. In this process, they (attackers) flood the entire network and communication through the unnecessary messages to make the complete network unavailable for the purpose to record each and every code (Ijemaru, et.al, 2018). In this, the codes are recorded with different cracking devices at the time when the network is under-recovery. Hence through breaking the security allows the attacker to get access to the data and/or information he/she or they look for.

Wireless Spoofing Attacks

In this security issue, the spoofing is a type of attack is used. In this type of attack, the attacker(s) uses the collected or gained data and information for impersonating other devices or devices in a particular network. Business networks are mostly attacked with these attacks and used to capture important data and information of the business from their networks. Firewalls and their use are the way which can be used to mitigate such attacks on businesses’ network or other networks. The use of firewalls capable of deep packet inspection or taking measures for the verification of the identity of the sender and receiver of the message are the best possible ways to cater and control this issue of wireless communication or networking (Ijemaru, et.al, 2018).

Traffic Redirection

Traffic redirection is an issue that involves variances in the traffic route of a computer to that of an attacker or hacker through the manipulation of the MAC (Media Access Control) address as well as the IP address of any specific wired station.

Rogue Access Point

In wireless communication, it is a wireless access point which are installed by the hacker or attacker on other network which are secured without having the authorization from the administrator of a local network (most of the times in the public and shared places like airports etc.) where the traffic has been accepted from the unsuspecting wireless clients for the purpose of getting or extract important and sensitive information.

Cafe Latte Attack

Cafe latte attack is a wireless communication problem in which the attack enables the hackers or attackers to break out intruder into the key of WEP. This is done by the process of sending a flood of encrypted ARP requests. The WEP is captured and obtained within minutes once the packet of clients has been got into access (Ijemaru, et.al, 2018). The ARP is used in this process which means that controlling the ARP can be considered as a part of the solution to this major issue or problem.

Congestion Problem/Issue

This issue occurs and can be seen in the case when the free RAC (Random Access Channel) becomes inaccessible to the subscribers while making a call or responding to call at any time. When the AFC cannot get free Traffic Channel, then it leads to the occurrence of TCC. This happens or occurs when the AGC cannot get free TCH to allocate to the concern or request of the mobile terminal by the RAC (Random Access Channel).

Network Injection Attacks

Network injection attack is a type of issue/problem in wireless communication or networking the access points are used by the cracker or attacker to insert the possible fake network re-configuration keys and commands. This process of using access points is used to bring in or bring down the entire network or networking process while it needs the process of rebooting and/or reprogramming of the entire networking process and devices so that the fake codes, keys, and/or commands can be inserted or injected.

Man-in-the-Middle Attack Problem

Man-in-the-middle attack in a wireless communication issue/problem which is a type of eavesdropping attack. In this, the attackers or hackers of the data and information develop a conversation between two parties in a fake manner. In this process, the attackers imitate both of the involved parties and get access to the data and information of search while the involved parties rely on each other at the result (Ijemaru, et.al, 2018). Security faults in the handshake are the way in which the man in middle attacks mostly relies on where the de-authentication attack is executed.

Despite the above-listed issues in wireless communication which are mostly large-scale issues, there are several issues in wireless communication in home networks. Briefly, mainly there are three key issues regarding the home network of wireless communication. Those issues are; 1) support for a wide variety of wireless communication, 2) prevention of interface and improvement of actual throughout, and 3) simplification of certification and setting process. While the possible explanation of each one is below.

Support for Wide Variety of Wireless Communication

Every standard of wireless or wireless communication is optimized for a particular purpose. Each of these standards has been changed for the purpose to improve performance through the implementation of new technologies. However, this has increased the implementation or application area of wireless systems while there are still a number of wireless standards while it is much difficult for users to choose out the most perfect and highly relevant wireless system. So, this issue needs users to develop a wireless home network platform that supports different standards.

Prevention of Interface and Improvement of Actual Throughout

The wireless system and communication devices use bands of unlicensed frequency where several wireless systems may exist. However, the proliferation of wireless communication and system has led to an increased possibility of coexistence which further increases the amount of interference in a similar system or one system or different systems (Ijemaru, et.al, 2018). So at the result, it is not enough to cater to the predicted increase in the communication traffic of wireless communication while improving spectral efficiency would be required and important to keep high systems maintained throughput the wireless systems.

Simplification of Certification and Setting Process

The amount of wireless communication devices increases as people increase the connection and use of wireless communication throughout their activities. While the setting of such increasing systems becomes difficult for the users to differentiate them based on or according to the wireless device or entire wireless system. So, it leads to a critical issue in wireless communication while this needs a mechanism that does not need the user to implement any system as per the wireless process. It does require and necessary because the certification process and complete procedure will need to be applied and followed in the application of the process to simplify the setting and system.

Finally, it can be stated that when the above issues of wireless communication are catered and resolved, then the data or information can be kept secured, attackers and attacking or hacking can be prevented and controlled, security could be ensured, and users of wireless communication increase the use of wireless communication and they would be able to adapt wireless communication system more than they currently do. So, the adaptation of wireless communication and its systems, as well as more usage of wireless communication, would lead to a better and more lightened future of wireless communication (Ijemaru, et.al, 2018). So, proceeding further, it can be said that no doubt that there are many issues to see in wireless communication but its future has been predicted as credible. For the purpose to analyze the future of wireless communication, the paper put a light on some aspects of the future of wireless communication in the next (coming) phase.

The Future of Wireless Communication

In the present time, Wireless Communication is gaining all of the attention. It gains the attention of everybody including individuals and communication. Wireless communication even completely changed the way of communication and made communication more than easier for people, organization and other bodies. This did so not by putting huge costs and additional or extra expenditures on the bodies which adapted and started the use of wireless communication while it decreases huge amounts of costs and communication expenses for individuals and organization in several ways. Beyond that, wireless communication also simplified communication as compared to the past while not left it difficult as it was in the past. Wireless communication is used in more few areas and things while (as explained above) it is done through the use of many wireless communication devices. The technology and wireless communication and its progress go in hand to hand with each other. It is also a fact in the current time and it would be important in the future that businesses, organization, and industries or projects needs effective and efficient processes of wireless communication to grow and get succeed. Despite, individuals are also working to get switched from wired communication and use of wired communication devices to wireless communication and the use of wireless communication devices. People do so because of wireless communication and the way it works helps them to reach people whenever they are in such needs. The use of wired communication is much expensive as compared to wireless communication. As discussed earlier, the wireless communication is costly benefited instead of expensive because it cuts the cost of all wired setup which is comparatively very high.

From past years the technology of wireless communication has hugely impacted the telecommunication as well while it is considered as one of the most positive impacts of wireless communication and the technology it uses. According (Mueck, et.al, 2019), wireless communication has become the first and even the primary choice of every organization, business, industry, agency, and even every individual. This has become such a choice because of the incredible benefits it provides such as speed, the accuracy of communication, access to data and information, and security (beyond the issues it has), etc. For companies, businesses and/or organizations wireless communication has become and becoming essential to reach out to each of their customers as well as other associated bodies like suppliers, competing businesses or companies, and the entire industry of their business operation. Similarly, it has several benefits for other agencies like a gathering of data and information reaching out to the target goals like achieving the desired advancement in their operations, for instance, ensuring advancement in medical science and hospital operation. In short, no doubt exists that wireless communication and its technology have changed the means of communication while it does not the meaning of stop while it is found expanded all the time and the same would be the case in the future. Hence wireless communication would be a part of every, but not limited to business, organization, industry, projects, hospital, communication, management, and networking, etc. Wireless communication is considered as magic in the current time while it may take a more enchanted name in the future because of the predicted role it would lay. Hence the future of wireless communication can be explained through analyzing its role in different sectors and areas.

Wireless Communication in Business and Company

It is the fact and reality that every business and Company (except the nonprofit organizations) works to make more revenues and put every possible effort in place to generate hugest possible amounts of profits from the sources they utilize. While wireless communication is the source that helps in doing so and achieving the goal more than we or businesses and companies think about. It is helpful and significantly important because no matter the business or company is of small scale or large, but communication is mandatory. On the other and similar side, every business needs to adapt communication and its technologies with not thinking about the cost it needs. But on the other side, the opportunity of adapting wireless communication which is effective, efficient, superior to wired communication, and beneficial in terms of cost. Beyond that, every business and company know that wireless communication is the source that allows them to reach every important body such as customers. So, because of these concerns, wireless communication is and would be the first priority of businesses and/or companies in the future.

Wireless Communication in Networking

Mobile is one of the greatest contributions of wireless technology which enables an easier wireless communication among people and organizational bodies. Mobile devices are found the most rapidly changing and improving an aspect of wireless communication. This (mobiles) also brings in a number of additional resources that could be used for communicating wirelessly. Hence the innovation, modernization, and revolution of mobile devices clearly state that the future would be covered even entirely by wireless communication. Everybody including individuals, organizations, bodies, and/or agency prefer to have everything such as interconnection, intelligence, information, and data, etc. in their range while wireless communication is the source that makes this possible for them in the present and will be doing so in future. Beyond that, the future of wireless communication in this aspect can be seen very affecting because it makes offerings of a number of new prospects in services like competence.

Wireless Communication in Medical Science

In medical science, the future and success are dependent on wireless communication. As the field of medical science has huge communication issues to face like the communication between hospitals and healthcare professionals cannot be seen strong. Beyond that, there is a number of reporting and other issues which can be witnessed inside hospital and departments. Hence it another fact that most of these issues occur due to poor communication while the communication can be considered poor because the wired communication in a number of the hospitals can be seen which does not ensure efficient communication so. While on the other side, wireless communication is the source and way the serve as a solver of bigger troubles, problems, and complications. Wireless communication can also be found helpful as it is adapted and still adapting by medical bodies for the purpose of remote monitoring of hospital operations, remote monitoring of the patient, ensuring access to patients’ information such as biodata and background information, etc. at the time when needed. So according to (Mueck, et.al, 2019), the medical field is most likely to be covered and improved if the application of wireless communication has been made sure. This means that it is expected that wireless communication would come to see in the future in the field of science.

Future Advancement in Wireless Communication

Despite the above, based on the argument presented by (Deck, et.al, 2018), the future of wireless communication is terahertz. A number of scientists investigated that the future of wireless communication would be shaped as terahertz. This simply means that the wireless communication would be changing even the pattern of communication in the coming future. They further state that wireless communication is the communication that will be changing the interaction of people and organizations etc. in communication. According to the statement proposed by (Deck, et.al, 2018), the transmission of data and information on wireless devices and resources will take a new method of processing in the nearest coming future. His findings further state that most of the receivers which may be an individual or an organizational body only know the information they receive while they do not even have the idea about the type of response they are getting with the data or information they receive. While in the future, with the help of terahertz in wireless communication, the receiver would be able to know and define the type of response they receive with data, information, or message while having a clear idea of system the data or information has been received from. This would include the systems from which people and organizational bodies sometimes receive information (especially through messages) but do not mostly know about the nature of the system. While through changing the relative orientation of the system and source, receivers would be known about the wireless system they receive information through and communicate through them wirelessly (this does not include common wireless communication systems and devices etc. while it involves only critical and high-level wireless communication systems which are mostly used by high-level agencies etc.). Beyond that, in the future, wireless communication would the sources that will open new doors of bringing innovation in the way communication is done through. In short, the future of wireless communication looks more and more glow and spark within the current passing days because there is no field where the use of wireless communication is not in use.

Conclusion

After an in-depth analysis of the topic we have at hand “Wireless Communication: Issues and Future”, it has been concluded that the issues which can be found in wireless communication cannot be taken lightly. This cannot be done so because most of the issues of wireless communication are associated with security such as 1) Electromagnetic interface, 2) Wireless network sniffing, 3) Denial of Service Attacks, 4) Wireless spoofing attacks, and 5) Congestion Problem/Issue, etc. While every person and organization or business always to have ensured the security of their data and information. In other words, the issue in wireless communication is not much simple nor too shocking because the issues do not show that the entire system of wireless communication is in trouble while it has gaps in terms of security. So, covering the explained gaps can lead to a type of communication that would be fully perfect to use.

On the other side, the conclusion states that the future of wireless communication is much glow and compound than our thinking. As wireless communication is ensuring credible innovation while being so beneficial in many ways, the communication looks covered entirely by wireless communication in the coming future. It looks so because of the benefits of wireless communication to even every field and the way it becomes advancing and improved day by day.

References

Deck, T., Skowaisa, J., Sack, H., & Laun, R. (2018). U.S. Patent No. 8,102,278. Washington, DC: U.S. Patent and Trademark Office.

Ijemaru, G. Adeyanju, I. Olusuyi, K. Ofusori, T. & Ngharamike, E. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research. 13.

Mueck, M. Ivanov, V. Choi, S. Kim, J. Ahn, C. Yang, H. Baldini, G. & Piipponen, A. (2019). Future of wireless communication: RadioApps and related security and radio computer framework. Wireless Communications, IEEE. 19. 9-16. 10.1109/MWC.2012.6272418.

Subject: IT

Pages: 14 Words: 4200

The CEO's Challenge

The CEO’s Challenge

[Name of the Writer]

[Name of the Institution]

The CEO’s Challenge

The use of information technology is increasing rapidly and has become an essential part for every organization. We all have seen the rapid growth of shadow IT with the time. The company is worried about their current systems which are not updated and have failed to meet the requirements of the shadow IT projects. It has come to my attention that due to the increasing demand for shadow IT projects, the end users want the immediate access to hardware and software. The company needs to change their information system to provide end users flexibility and scalability. They need to use cloud computing technology to meet the requirement of the end users as the company’s current information systems are not meeting the requirements for Shadow IT projects (Silic & Back, 2014).

Cloud computing is a service which provides user service over the internet to store, manage and process their data over the cloud rather than on local server or storage devices. A company acquires cloud computing services which is a shadow IT service that often gives a lot of benefits to the business. Cloud computed is very imported for the current business world as it reduced the IT costs, increase the scalability, provides flexibility and collaboration efficiency. Cloud computing is part of distributed computing which deal with the current issues of the companies who want to store their massive amount of data and want to expand their business (Buyya et al., 2009).

The information system of the company stores a huge amount of data on a daily basis. There are data of different peoples, and it will be difficult for the company to buy the new storage devices to store that huge amount of data. These devices are also not accessible at any other location. If the company wants to expand their business and people from other locations want to access that data, it will be not possible for them. Cloud computing will provide the company with the flexibility of connecting your business at anytime, anywhere. Moving to cloud computing will reduce the cost of managing the IT systems. It provides the ability to communicate with others all over the world.

The data quality is one of the major concern which company is worried about as the company knows that It is difficult to open all the data and perform operations on it, but cloud computing provides quality data to the business companies because all the operations are performed by the cloud automatically. Cloud computing also provides service by which user can access the data anywhere at any time. It helps a lot in work practices as the company's workers while working at different locations can access the data at any time. The data security is also one of the major concern and cloud provides the protection of data. Cloud also perform automatic upgrades, and there is no chance of losing data from cloud due to power failure or any other issue.

The current systems are very inadequate and inefficient. They still use the old ways of processing, storing and managing data. Users can't access the data everywhere because they can't carry heavy storage devices with them everywhere and it has been a significant concern as in business company requires data at different workplaces. The data also not saved in the old informational systems. The security is a major concern in current informational systems as the database can be accessible by anyone easily. The current systems required a lot of costs as they need manual updates which are sometimes very expensive. There are also scalability and flexibility issues in the existing systems. Business can't be scalable as it requires a huge amount of money to expand business if the company keep on using old techniques.

Cloud computing has solved all the above issues and had a huge success in the business market. Many business organizations have deployed cloud computing to store the huge amount of data which can be accessible from anywhere at any time. Companies are able to protect their data and being able to access their data quickly whenever they needed to avoid loss of productivity. Cloud Computing is providing the option of auto scaling which means a company doesn't need to hire IT executives anymore who can perform system upgrades as it offers automatic upgrades and configure the servers automatically according to the demand of the users. Cloud computing provides fast service so that users can develop, run, check and manage applications and maintenance of hardware. (Garrison et al., 2012).

There are many successful business companies who have deployed cloud computing services in their businesses. Apple, Netflix, Instagram, Facebook, Samsung, etc., all these companies are using cloud computing, and these are the most successful companies currently. The leaders of these companies have explained the innovation which clouds computing brought in this current business world. They explained how cloud computing has expanded their business and provided them with new opportunities. There are many companies which are providing services of the cloud computing, but Amazon, Google, and Microsoft are the top service providers. The company CEO doesn't need to worry about the current informational system anymore and deploy the new informational system which will help the company in the business as well as the users. He needs to take a serious decision which will help the company for long term and help in achieving the desired goals. (Rittinghouse & Ransome, 2016).

References

Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), 599-616.

Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62-68.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Silic, M., & Back, A. (2014). Shadow IT–A view from behind the curtain. Computers & Security, 45, 274-283.

Subject: IT

Pages: 3 Words: 900

The Clarion School For Boys

Three Projects at the Educational Institute

[Name of the Writer]

[Name of the Institution]

Three Projects at the Educational Institute

Introduction

Whenever there is an intent of bringing about changes in any educational institute, there are many factors that are needed to be kept in mind. The first one is the resources that the organization has at its disposal and how they intend to ensure that these changes are going to be taking shape. Not only that, the other thing that is quite important during the course of the whole process is to ensure that the all the relevant stakeholders who are making decision at the given point of time with regards to how these changes are going to be taking place at the particular moment (Johnstone et al, 2016). In this paper, the idea is to see what some of the key projects are that can be implemented in The Clarion School and what is the underlying value that is going to be added by these projects (Antony et al, 2012).

Project 1: Setting up a Digital Library

For the educational institute that is supposed to be functioning in the 21st century, it is quite important for them to make sure that they are clear with regards to how the technology is going to be integrated into their processes. One of the ways through which it can be made sure that the technology is integrated is the E-Learning platform is supposed to be provided to the students (Antony et al, 2012). The basic idea of the such platform is to make sure that the digital library is setup that ensure that all the aid is provided to the students during the course of their learning process. Not only that, effort is also needed to be made to ensure that the better data transfer protocol is needed to be setup (Gorman et al, 2018).

Methodology to Implement this Project

To make sure that this project is being implemented in the right manner, the first thing that has to be done is that the intranet and data transfer protocol is needed to be setup as far as the way management of the data is supposed to be carried out (Johnstone et al, 2016). The other thing that is quite important is that the database has to be setup where not only registration has to be made for the better academic journals so that the digital library, the students must be allowed to research and log in using their own resources and carry out the work. All these things go a long way towards making sure that there is improvement in the situation with regards to how studies are going to be managed (Antony et al, 2012).

Project 2: Setting up a High-Performance Centre

With the passage of time, there has been emphasis by education institutes regarding how important it is for them to make sure that they take care of the wellbeing of the students in a better manner and the sports and recreational activities are needed to be provided to them. In this regard, it is quite imperative that the education institute should go one step beyond and make an attempt to create a performance centre (Antony et al, 2012). Now, it has to be noted that the idea is to ensure that the organized approach is being introduced with respect to how most of the things that are going to be done at the level of the organization are going to be taken care off and one of the ways through which it can be done is to ensure that that the high performance centre is created for the students. The idea behind the creation of this centre is to ensure that the students are provided with the options with regards to how they are going to ensure that they are able to take the best out of them and create a sporting environment for them.

Methodology for the Implementation

One of the things that has to be done with respect to the way whole thing is going to be managed is to ensure that there has to be a thought process with regards to how the performance centre is going to be setup (Antony et al, 2012). The idea behind the whole thing is going to be making sure that how the facility is going to be created where ties are going to be created where people can not only to learn about the particulars of the sport, but to also ensure greater insight into the implementation of this program. It has to be noted that this is something that is going to need considerable investment; thus, effort has to be made to make sure that all the people who are supposed to be on board with regards to how the investment is going to be made. What it means is that the major sporting bodies affiliation is needed. Even though it might expand the scope of the plan (Gorman et al, 2018). Project management is the practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time. The primary challenge of project management is to achieve all of the project goals within the given constraints.

Project 3: Expansion of the Institute Premises

The final thing that is needed to be done during the course of the project is to expand the building premises (Gorman et al, 2018). The idea behind the expansion of the premises is to make sure that the additional projects that are being planned for the University can be taken care off (Antony et al, 2012). What it means is to ensure that the infrastructure, administrational work and the pending repair and maintenance as well as the creation of the layout of the new buildings are some of the things that would constitute this project (Gorman et al, 2018).

Methodology for the Implementation of the Project

Effort would be made this time around to make sure that all the major stakeholders are brought on board with regards to how the finer points of the ruling are going to be working out. This time around, the administration and procurement are going to be given control of how the project runs (Antony et al, 2012). The budgetary and the cost element would be offset by the additional goodwill that the educational institute is going to earn after the expansion of the project (Gorman et al, 2018).

Conclusion

In the hindsight, it can be said that all these three projects are quite different in nature, but the important detail is to ensure that all the stakeholders are on board. All these three projects are not only going to create lot of goodwill, but they would also ensure that the more students are going to be enrolling due to the greater options that the academy is going to be providing. Not only that, effort is going to be made that the all these three projects would be managed in a different time period and timelines and they would not be merging. Not only that, it would be made sure that the restructuring of the revenue structure is done to ensure better perspective in this regard (Antony et al, 2012). Project management is the practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.

References

Antony, J., Krishan, N., Cullen, D., & Kumar, M. (2012). Lean Six Sigma for higher education institutions (HEIs) Challenges, barriers, success factors, tools/techniques. International Journal of Productivity and Performance Management, 61(8), 940-948.

Gorman, G., Hanlon, D., & King, W. (2018). Some research perspectives on entrepreneurship education, enterprise education and education for small business management: a ten-year literature review. International small business journal, 15(3), 56-77.

Johnstone, D. B., Arora, A., & Experton, W. (2016). The financing and management of higher education: A status report on worldwide reforms. Washington, DC: World Bank.

*

Subject: IT

Pages: 4 Words: 1200

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.