Monday, December 9, 2019

Security and Support in It-Free-Sample for Students-Myassignment

Question: What does it mean by Automation for Uniformity? Why is it a good solution in principle? Answer: Introduction Automation is nothing but the use of various control system like computer or robots and various information technologies like computers or robots and other technologies related to information (Stephens, and Didden, 2013). It will be used for handling various process and machines in various industry which will replace human being in the coming future. In the coming pages of the report the full idea regarding automation for uniformity has been provided. After that proper solution has been provided regarding it. The reason behind the implementation of fully automatic system has been provided in the coming pages of the report. Various technologies have been discussed which will help in improvisation of reliability, availability and performance related to it. Discussion Automation for Uniformity Automation is nothing but the use and creation of technology and its application so that it provides control and monitoring the production of various goods and services. Automation generally helps in achieving productivity and uniformity of products. It works in a way or process which is similar to worker which can provide service (Inventory, 2012). Longer production hour ensures that various products can be easily produced in minimum time. They robots incorporated in the system can easily produce a product which is consistent and uniform. Human being is more prone to error and products which are not uniform can reduce the overall productivity. In my case I will implement a fully automation for this system help it reduce my burden of individually looking into the systems. In the beginning it can have issues but with the passage of time it will decrease slowly. Technologies used in server computers for improving reliability, availability and performance Improvisation of server reliability begins with careful choice of server hardware and features related to it. The administrator should start selecting server with proper power supplies. There are many other techniques like making use of multiple network interface ports (Zissis and Lekkas, 2012). There are many other approach for server reliability which is making use of server cluster. Availability of a system means that system is on-line and it can be easily accessed. The goal of high availability is to reduce and minimize the time which is needed for recovering form outage (Bauer and Adams, 2012). The goal of achieving high availability solution is to minimize the downtime and also focuses to minimize the time required for downtime and time required for recovering from recovering from issues. Performance of a system can be easily increased by following various steps like Removing malware from the system. Upgrading the system to a better video card. Having a faster drive. Solving various issues related to hardware and driver. Removing junk files from the system. Analyzing the network connectivity on timely basis. Scope of coverage for helpdesk operation A help desk is zone where consumer or customer can easily have answer regarding their queries related to computing, put their respective problems and provide solution regarding it. A helpdesk can be either online or physical thing but should provide and have defined scope of coverage regarding it (Madsen et al., 2013). Scope of coverage must properly define that what is support provided by it and who will be supported by this, time interval for which the support will be provided. What: The beginning of coverage is at what which primarily focuses on problems related to PCs, Network, specific operating system and application and how it can provide support to platform. Who: Second scope of coverage is the who behind it, which will provide support regarding department, buildings and many other. Trusted certificate authority for establishing secure communication Certificate Authorities or CA generally issues various digital certificates. Digital certificate is nothing but small data files which are needed to be verified. It contains some credentials which can help website, people and devices which are generally represent the authentication about various online identity (Space, 2012). CA plays a key role on the method of operation of Internet and the transparency of trusted transaction which can takes place on the internet. CA faces a large number of issues related to digital certificates which are mainly used for protection of information, encrypting large number of transaction and providing secure communication to large number of transaction which will ultimately help in establishing secure and proper communication (Vratonjic et al., 2013). Role it plays in achieving secure communication between IT department and students Trusted certificate authority plays a key role in establishing secure communication between IT department and students. Certificate authorities generally issues certain digital certificates. An SSL certificate is a popular kind of digital certificate which helps in binding details of web server for providing cryptographic keys (Mansour et al., 2014). These keys are generally used in SSL/ TLS protocol for establishing a secure communication between browser and web server which mainly help in hosting SSL certificate. SSL certificate must contain the name of the domain of the website which will be used and this is generally issued by CA which are trusted and does not have any expiry date. Authentication for announcement Browser, OS and mobile devices plays a key role in making authorization CA membership programs where it easily has membership programs which can be easily accepted as a programs. After that CA contain some problems which provides problems regarding SSL certificate (Zissis and Lekkas, 2012). Before issuing a digital certificate CA will conduct analysis which can easily identify the applicant. A domain related SSL certificate can easily have ownership of domain which is being provided within given certificate. Conclusion From the above discussion it can be easily concluded that automation helps in achieving uniformity. Automation is method or technique which is used for innovating technology and its application for achieving control and monitoring of various goods and services related to it. Different technologies which are used for improving reliability, performance and availability has been discussed in the above pages of the report. After that summarization of scope of coverage of help desk operation has been provided. The importance of trusted certificate authority for establishment of secure communication has been provided. The role played by trusted certificate authority for establishment of secure communication between IT department and students has been provided in the above pages of the report. The guarantee of authentication for any announcement has been provided in the report. References Bauer, E. and Adams, R., 2012.Reliability and availability of cloud computing. John Wiley Sons. Inventory, F.N.A., 2012. Department of Natural Resources.Guide to the natural communities of Florida. Madsen, H., Burtschy, B., Albeanu, G. and Popentiu-Vladicescu, F.L., 2013, July. Reliability in the utility computing era: Towards reliable fog computing. InSystems, Signals and Image Processing (IWSSIP), 2013 20th International Conference on(pp. 43-46). IEEE. Mansour, H.A., Sabreen, K., Pibars, M., El-Hady, A. and Eldardiry, E.I., 2014. Effect of water management by drip irrigation automation controller system on faba bean production under water deficit.International journal of geomate,7(2), pp.1047-1053. Space, N.O.V.A., 2012. Mission automation and autonomy: In-flight experience derived from more than 8 years of science operations in orbit about mars. Stephens, A. and Didden, M., 2013. The development of ICT Sector Guidance: rationale, development and outcomes.Hilty et al.(2013), pp.8-11. Vratonjic, N., Freudiger, J., Bindschaedler, V. and Hubaux, J.P., 2013. The inconvenient truth about web certificates. InEconomics of information security and privacy iii(pp. 79-117). Springer, New York, NY. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.