Design Thinking (The Internet, the Web and Electronic Commerce)
1.0 INTRODUCTION
Design Thinking is an iterative process to understanding problems that faced by people and find out solutions to overcome these problems. It is widely used in all field such as education and business to develop thinking skill. Design thinking consists of 5 phases which are Empathy, Define, Ideate, Prototype and Testing.
For this project, we will discuss about the Internet, the web and electronic commerce. Internet is the large global network connecting smaller networks all over the world. It can be used for communication, searching, entertainment, education and shopping. Most of our applications needed internet to work. As we know, the requirement of people toward the speed of Internet keep increasing. This situation encourages the development of Internet from 1G to 5G.
Next, web defined as multimedia interface to the resources available on the Internet and it consists of billion of webpages. We always obtained information from websites through Internet. It also developed from web 1.0 to web 3.0 which is widely used nowadays. However, some of them may consist inaccurate or inappropriate information which will misleading people especially kids. From the definition of Internet and web, we can know that these two are difference things although they always worked together.
Another term that we will discuss in this project is electronic commerce with short form e-commerce. Both web and e-commerce require internet to proceed. E-commerce is a business model that lets people buy and sell things over the internet. It does not need face to face interaction, all buying process will be run virtually. For example, Shopee, Lazada and Amazon. Thus, it is very convenient for people who have transportation problem but it also can cause the problems like scam.
In this project, we will focus our discussion on internet which including problems that faced by most of the users and try to find out solutions to overcome these problems. Before that, we have to study what is Internet, web and electronic commerce first in order to let our project carry on successful.
2.0 DETAILED STEPS
In design thinking process we have gone through five steps which are Empathy, Define, Ideate, Prototype and Testing. For the first step which is Empathy we have to view user and their behaviour (observe). Thus, we decided to make an interview with Mohd Zahari bin Zainal Abidin who is the admin of network in UTM on of November through google meet. We have asked some questions to he during this interview session in order to more understanding what problems faced by users when using internet. We have also recorded the interview in the form of video and audio. Figure 1.0 shows the interview session with Mohd Zahari bin Zainal Abidin.
Figure 2.1 Interview session
After that, we moved to the next step which is Define step. We gathered all the information that we collected during interview and discussed it in our Whatsapp group and through google meet. Through discussion, we have figured out several problems that faced by users when using internet and found that the range of people that using internet are large. Every people have their own problems when using Internet. Thus, we decided to narrow our scope and focus our project on Internet problems that faced by kids. Figure 2.0 illustrates our group discussion through Google Meet.
Figure 2.2 Discussion with group members
After we listed out all the problems that faced by kids, we started our third step, Ideate step. We have one session called brainstorming session, everyone of us started thinking as many solutions as possible to overcome those problems and we tried to find out the best solution through vote. In order to get the ideas to solve the problems, we have discussed the topic, problems and solutions together and shared our opinion. We have also searched information from different resources like book, Internet and newspaper. Figure 3.0 shows the problems and also solutions that listed by our group members.
Figure 2.3 Problems and solutions
Next, in the prototype step, we decided to create a rough prototype of application that will automatic recognize users faces to determine their ages before they can enter certain web. This can ensure kids do not take the opportunity or accidentally enter certain unhealthy web through internet. This application can use in both mobile and laptop and it can use 3D face recognization. So, it requires real face and cannot use picture to log in. Figure 4.0 demonstrates our procedure of making rough prototype.
Figure 2.4 Process of making prototype
Lastly, we have tested our prototype to determine whether it can be function well or not and try to find out new solution to improve our prototype.
3.0 DETAILED DESCRIPTION (PROBLEM, SOLUTION, TEAM WORK)
The concerns we've found in the interview process are that there is a lack of safety for the users when browsing the web. Nowadays all users no matter what aged they can browse a lot of things through the internet. So, we as a group make a decision that we have to take a step to prevent this from happening and keep on worsening in our community.
All the members brainstorm together to figure out the best ways and solutions to solve these problems after all the problems are identified. Then the solutions are filtered and concluded. Since our primary emphasis is on users, we wanted to make it acceptable for the preference and circumstance of the users. The solution we have proposed is to build an app that can recognise the users’ age to restrict users from enter the prohibited site. For users that age 18 and above can access any website like usual while for users that aged under 18, they can only access certain websites to prevent them from any bad activity.
Arguments and difference of opinion are inevitable in our debate, but we are lucky that all of our participants are willing to consider the opinions of each other and eventually come to a consensus that everybody is happy with. Then the tasks are assigned to members of the community where someone is in charge of video editing, report writing, prototype producing. To enhance performance, all members assist each other in their duties and a harmonious environment is created.
4.0 DESIGN THINKING ASSESSMENT
The first phase that we have to face is empathize. This phase actually a skill that enables us to understand the same feelings that others feel and share them. Through empathize, we are able to put ourselves in the shoes of other people and interact with how they can feel about their challenges, problems and circumstances. So, in this phase our group decide to find and interview someone who is an expert and skilled in network as well as experience in facing problems in this field. Fortunately, we found UTMDigital staff who specialized in network, Mr. Mohd Zahari bin Zainal Abidin. Then, we conducted an interview with him and jotted down all his opinion and experience that he shared with us. We also asked a few questions regarding our topic. With all of the information that we gathered, we understood what problem and circumstances that faced by users.
The next phase is define. In this step, we start to examine all the data that we have about network and internet. Then, at the same time, we found that there are lots of advantages and disadvantages. We mainly highlighted the disadvantages for users especially aged 18 and below. We believe that these disadvantages are the problem that we faced nowadays.
Now we move to the next phase which is ideate. In this phase we brainstormed ideas and solutions for the problems we analyzed during the previous phase which was define. All members in the group shared their own ideas which leads to the production of the main idea
Lastly, prototype phase. We developed the idea using computer software as our prototype as we are facing pandemic COVID-19 right now so we were only able to do our tasks online via Google Meeting and Webex Meeting. We ensure that in the process of making prototype, the produced item is compatible with the main purpose which is solving the problem that user faced.
5.0 DESIGN THINKING EVIDENCE
a. The sample work by students working to solve the design challenge
Based on our discussion and investigation, we found that many kids were exposed to unhealthy web when they were using internet. Thus, this situation needed to be correct since kids are the people that needed for our country development. Therefore, we decided to develop an application that can recognise users faces and determine their ages.
b. Record for each phase
During the Empathy phase, we have prepared some questions to ask Mohd Zahari bin Zainal Abidin who is the amin of network in UTM. He has 17 years of working experiences in UTM.
Table below shows the questions that we asked during interview and also answers.
|
No |
Questions |
Answers |
|
1 |
What are the problems that you faced when using internet and how you solved it?
|
No problem for me but because UTM area is too big so there were many students cannot used Internet or too slow but I have told they can make complaint to Digital centre and I will check it and try to solve it. |
|
2 |
Is Internet save for kids and how to apply parental control while using it? |
We have software in our laptop or pc so we can manage by our own. The software can prevent the kids or students access dark web or any other dangerous web. Parents can also monitor how long their kids using gadgets by using phone or pc. |
|
3 |
If you were able to make improvement to internet, what are the things that you want to improve and why? |
We need to upgrade ICT and prepare facilities to convert from 4G to 5G and also need to secure our network because some students connect to UTM wifi but they do not install antivirus in their laptop so this will harm our system. |
Table 5.1 Questions and answer for interview
In the Define phase, we have discussed the problems from our interview session. We know some of the Internet problems that faced by users including coverage and safety. These were the common problems that faced by users not only adult but also kids. Figure 5.0 shows our discussion about responses from interview session.
Figure 5.1 Group discussion session
In phase three which is the ideate phase, we have brainstormed and got ideas as many as possible. After that, we have voted to the idea that we thought it is most functional and effective. The result came out was we decided to make an application that can recognize users faces and determined whether their ages qualified to enter certain websites. Figure 6.0 illustrates our idea for solutions to overcome problems.
Figure 5.2 Solutions for the problems faced
In the prototype phase, we made a handphone and application of scan face to test whether users age is below 18 or not before get into certain web by using computer software. Therefore, we can visualize this application and recognize and problems of the application for improvement. Figure 7.0 is our final prototype.
Figure 5.3 Our prototype
PC Assembly
PART A – TOOLS NEEDED
1.0 Screwdrivers
There are two types of screwdrivers which are flat-head screwdriver and phillips-head screwdriver. Flat-head screwdriver is used tighten or loosen slotted screws while phillips-head screwdriver is used to tighten or loosen cross-headed screws. These screwdrivers are important because it can give extra leverage and prying things apart if we use flat-head screwdrivers and for phillips-head screwdrivers with a big bit, it can help us from stripping the head.
2.0 Needle-nose Pliers
Needle-nose pliers which sometimes known as pointy-nose pliers is used to hold and cut wires. It also can bend small wires and electrical wiring. This is important because this pliers are good to reach into small areas that cannot be reached where regular pliers are unhandy. This tool can grip a lot of wires and pick up small screws with a strong grip. Besides that, this pliers also can be used to cut of the wire’s excess.
3.0 Anti-static Wrist Strap
Anti-static wrist strap is one of the safety gear that can prevent the build-up of static electricity near sensitive electronics or cause safety issues. The wrist strap has a highly conductive threads on it and it can become a ground conductor in order to discharge static electricity safely. This anti-static wrist strap is important to protect items like circuit boards whether during construction, testing or other projects.
4.0 Zip or Twist Ties
Zip or twist ties is necessary to holding items together such as electrical cables or wires. This is important because it can keep the cables organized and can prevent any damage. Besides that, it also is necessary to reduce the accumulation of dust and better airflow. Nevertheless, please do not tight the cables too tight because it can damage the cables.
5.0 Light Source
These light sources such as flashlights and lamps are used to provide directed light and to avoid visual glare. The importance of light sources is we can easily see any small parts such as screws, wires and others because we know that these small parts can easily lost from our sight moreover when we work at the dark places.
6.0 Extra Screws
Screws are used to hold things together tightly and efficiently. This is important because they used to keep side panels in place, attached graphic cards to the back of the case and it also can held together any pieces of internal case. So, these extras can be use when we lost our previous screws.
7.0 Thermal Paste
Thermal paste is a substance with silvery-gray that we can apply to a processor before installing a cooling solution. It can transfer heat from the Integrated Heat Spreader (IHS) of the processor to the base plate of the Central Processing Unit (CPU) cooler that is designed to dissipate the heat. The importance of thermal paste is it can fills in those gap ais and allows the heat to transfer more efficiently.
PART B – Sketch of a motherboard layout
1.0 A Sketch of Motherboard Layout
2.0 Function of importance components on motherboard
2.1 Graphic Card
The graphic card is used to optimize quality of graphics in order to display at a high rate of speed. Some of the examples of graphic card are AMD Ryzen Threadripper Graphics Card Video, PowerColor Devil Graphics Card Video and GeForce GTX 1080 Ti Graphics Card Video.
2.2 CPU / Processor
CPU is Central Processing Unit which is used to control all the operations of computer. It is similar as the brain of computer. For instances, Intel Core i5, Intel Core i7, AMD Ryzen and AMD Athlon.
2.3 Heat Sink
The main function of heat sink is preventing devices from getting over hot by carring heat way from devices through large surface area. Example of models of heat sink are BGA, SFP and XFP heat sink.
2.4 CD ROM
CD ROM or Compact Disc Read Only Memory is importance for stores data from computer such as text, graphic and audio.
2.5 USB Cable
The function of USB cable is connecting external devices such as printer, mice and keyboard to PC. Example of type of USB cable are USB Type-A, USB Type-C and Micro-USB.
2.6 Slots
Slots can provide connection point for specialized cards or circuit boards and also provide expansion capabilities for the computer in order to increase the performances of computer. Some of the example of expansion slots are AGP (Video card), AMR (Modem, Sound card) and PCI (Network card, SCSI, sound card, video card).
2.7 RAM
The function of RAM or random access memory is providing a place to store data on a short-term basis. Two main types of RAM are Static RAM and Dynamic RAM.
2.8 SATA Cable
SATA cable or Serial Advanced Technology Attachment used to connect external secondary storage for high speed connection.
2.9 IDE Cable
IDE cable (Integrated Drive Electronics Cable) can use to connect storage devices in computer. Generally, there are two common types of IDE cable which are 34-pin cable used for floppy drives and the 40-pin cable for hard drives and optical drives.
2.10 Power Supply
Power supply is used to supply electric power to devices and also convert electric current into correct voltage that required by computer. Some of the example of power supply are EVGA SN 1600 T2, Seasonic FOCUS 750 and Corsair AX1600i.
2.11 Hard Disk
Generally, users can set the hard disk jumper to Master or Slave. Hard disk can store digital data by using magnetic storage. Example models of hard disk are Seagate BarraCuda, Toshiba X300 and WD VelociRaptor.
PART C – Step by Step PC Assembly
Step 1 – Install Processor (CPU)
Place the holder of the CPU socket on the motherboard. Lift up the latch lever and open the CPU socket cover. Keeping the CPU on its sides, align any alignment dots or triangle on the corner of the CPU to the triangle indicated on the motherboard to ensure proper orientation. Gently put it straight down into the motherboard socket to carry the CPU. Lower the CPU socket cover over the CPU and lower the latch lever closed again to protect the closed CPU socket holder.
Step 2 – Install CPU Cooler/ Heatsink
If possible, spread thermal paste to the back of the CPU. Seat the heatsink/cooler of the CPU and set it in place. Make sure the heatsink/cooler of the CPU has been clipped tightly. Attach the power cable to the cooler fan to the motherboard connector.
Step 3 – Install Memory (RAM)
Press to open the clips at both ends of the RAM mounting slot. Line up the notch of the RAM stick with the mounting slot. Sit down the RAM and press it tightly into the slot. The tabs should automatically close when you press the RAM down and lock the RAM in place. Install any other RAM sticks that use the same method.
Step 4 – Install Power Supply
Attach the power supply and tighten the screws to the mounting points of the frame. Make sure all of the screws are tightened.
Step 5 – Install Motherboard in the Case
First, find the standoffs and install the standoffs as the standoffs is the place to put the motherboard. Then, place motherboard on the standoffs where the holes and the standoffs should line up. If the motherboard does not come out of the case, gently force the motherboard to fit in the panel. Secure the board with screws.
Precautions;
- Don’t overtight the screws and do not use an electric screwdriver
- Avoid using non-metallic holes
Step 6 – Adding a Graphic Card
Remove the card gently from its bag, making sure that the card does not touch any electric component. Insert it straight into the empty PCI-e slot and apply even pressure to the top until it is placed correctly. Then, use case screws to secure the graphics card to the chassis.
Precautions:
- Make sure no cables or any other components are in the way before completely seating the card.
Step 7 - Install CD ROM
First, Insert the CD-ROM drive inside the drive bay slowly to make sure it will not get stuck. Then, fasten the CD-ROM drive with the locking mechanism and connect the SATA power cable to the CD-ROM drive. Connect the other end of the SATA power cable to the power supply and then Connect the SATA data cable to the CD-ROM drive. Lastly, connect the other end of the SATA data cable to the motherboard.
Step 8 - Install Hard Drive
First, fit the hard disk into the bay. Then, plug in the SATA power cable. Be extremely careful when plugging it in, because any downward pressure can break the clip surrounding the power connector. Then, connect the SATA cable into the rear of the hard disk. Lastly, plug in the SATA cable into the motherboard.
Step 9 - Install SATA Cable
Connect the IDE cable, SATA cable and install the power supply. Connect the SATA power to a storage drive. Make the wire neat by tied it. This will help it in saving the space and hardware cooling.
Step 10 - Install Switch Wire and USB
Connect the switch wire and USB onto the motherboard correctly. Note that every device that has been installed needs power. The power supply connectors are shown. The motherboard has two power connections, and there are two connectors specifically for SATA devices. The other connectors will run fans and other non-SATA devices. Data cables connect drives and front panel devices to the motherboard.
Step 11 – Closing The Case and Connecting The Peripherals
Install the side panels and make sure all the screws are tight enough to hold the side panels. This give a good protection from physical damage to the hardware inside. The computer is now ready for the software installation.
Connect the keyboard, mouse, wireless network dongle and webcams with CPU by plugging into USB port.
Then connect speakers and microphone into 2.5mm socket.
Finally connect the CPU with monitor by plugging into display ports.
Compare Cloud Service
CLOUD COMPUTING FUNDAMENTALS
1 Introduction
Cloud computing is the on-demand computing service that delivered through the use of Internet. It including data storage, servers, databases, networking, and software [1]. With cloud computing, people can access data at any time and any place with devices that have Internet access. Nowadays, there are many Cloud Computing Service Providers such as Amazon EC2, Google Cloud Platform, and Microsoft Azure. In order to suite the requirements of users, these providers also updated their services like expand storage and provide service with low cost. We can know that cloud computing is one of the most convenience and useful service especially for people who worked in industrial.
2 Comparative Evaluation
2.1 Service model (IaaS, PaaS, SaaS)
SaaS Software as a Service, also known as cloud application, services, represents the most utilized option for businesses in the cloud market. SaaS utilizes the internet to deliver applications, which are managed by a third-party vendor, to its users. Most SaaS applications run directly through your web browser, which means they do not require any downloads or installations on the client side. For example, Google Workspace, Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting [2].
Platform as a Service (PaaS) provide cloud components to certain software while being used mainly for applications. PaaS delivers a framework for developers that they can build upon and use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain management of the applications. For example, AWS Elastic Beanstalk, Windows Azure, Heroku, Force.com, Google App Engine, Apache Stratos, OpenShift [2].
Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are made of highly scalable and automated compute resources. IaaS is fully self-service for accessing and monitoring computers, networking, storage, and other services. IaaS allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright. For example, DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco Metapod, Microsoft Azure, Google Compute Engine (GCE) [2].
2.2 Virtual Machine (VM) instance types offered (such as micro, small, medium, large etc.)
A virtual machine (VM) is a virtual environment that functions as a virtual computer system with its own CPU, memory, network interface, and storage, created on a physical hardware system. It allows you to share a system with many virtual environments.
Each machine type family includes different machine types. Each family is curated for specific workload types. The following primary machine types are offered on Compute Engine:
- General-purpose machine types offer the best price-performance ratio for a variety of workloads.
- Memory-optimized machine types are ideal for memory-intensive workloads because they offer more memory per core than other machine types, with up to 12 TB of memory.
- Compute-optimized machine types offer the highest performance per core on Compute Engine and are optimized for compute-intensive workloads. Compute-optimized machine types offer Intel Scalable Processors (Cascade Lake) and up to 3.8 GHz sustained all-core turbo.
- Accelerator-optimized machine types are ideal for massively parallelized CUDA compute workloads, such as machine learning (ML) and high-performance computing (HPC).
- Shared-core machine types are available in the E2 and N1 families. These machine types timeshare a physical core. This can be a cost-effective method for running small, non-resource intensive applications.
2.3 Storage
There are three types of cloud data storage: object storage, file storage, and block storage. Each offers their own advantages and have their own use cases:
Object Storage - Applications developed in the cloud often take advantage of object storage's vast scalability and metadata characteristics. Object storage solutions like Amazon Simple Storage Service (S3) are ideal for building modern applications from scratch that require scale and flexibility and can also be used to import existing data stores for analytics, backup, or archive [3].
File Storage - Some applications need to access shared files and require a file system. This type of storage is often supported with a Network Attached Storage (NAS) server. File storage solutions like Amazon Elastic File System (EFS) are ideal for use cases like large content repositories, development environments, media stores, or user home directories [3].
Block Storage - Other enterprise applications like databases or ERP systems often require dedicated, low latency storage for each host. This is analogous to direct-attached storage (DAS) or a Storage Area Network (SAN). Block-based cloud storage solutions like Amazon Elastic Block Store (EBS) are provisioned with each virtual server and offer the ultra-low latency required for high performance workloads [3].
2.4 OS environment offered
Azure is the product of Microsoft and mainly referred to as Microsoft Azure. It is also a cloud computing service platform. It was created by Microsoft and initially released in the year 2010. It supports the Linux and Microsoft Windows operating systems. It is used for building, deploying and testing and managing the applications. In Azure, the computer power or machine can be selected and this machine mainly refers to VHD that is called as Virtual Hard Disk. It can be configured by them or the user and maybe the third party. Strength of Azure such as total support for Microsoft legacy apps, easy one-click migrations in many cases, conversion of on-prem licenses to the cloud, good support for mixed Linux and Windows environments, better hybrid cloud offering and better support for disaster recovery. [4]
Google Cloud Platform is a public cloud infrastructure, as well as Google Workspace which is the enterprise versions of Android and Chrome OS. Google Cloud is a cloud computing platform and released in the year 2008. It was written in Java, C++, Python including Ruby. Google cloud is categorized into different platforms like google app engine, google compute engine, google cloud datastore, google cloud storage, Google big query and google cloud SQL. Strength of google cloud platform such as top kubernetes support, better devops support, heavy involvement in AI, simpler licensing, faster private network for low latency and better load balancing globally. [4]
2.5 Security
There are three primary areas to be considered regarding security: device, connection and cloud security. For authentication and authorization, Microsoft Azure provides Active Directory Premium to manage access and identity of users. Other than that, the Azure Hub Identity Registry provides secure storage of device identities and each security key to ensure that all connections have to be initiated by the device to the Hub but not vice versa. Microsoft Azure also provides Transport Layer Security (TLS) with X.509 certificate. It can help to encrypting the communication between web applications and servers and encrypt other communications such as email, messaging, and voice over IP (VoIP). [5]
For Google Cloud Platform, it provides Cloud Identity and Access Management (IAM) and Cloud Identity-Aware Proxy to allows to control, authenticate and authorize the Cloud IoT Core API access. It also refer to the ability to manage user identities and their access to IT resources from the cloud. Google infrastructure provides a variety of storage services and a central key management service. The storage services can use keys from central key management service to encrypt data before it is written to physical storage. It also implements addition layer of protection to prevent malicious disk firmware. Figure 1 shows several data security challenges and the major data security challenges in the cloud. [6]
2.6 Performance and scability
Based on the experiment done by Malawski, he used Benmarks to compare the performance of both cloud computing service provider. He found that Microsoft Azure has much wider distribution, and the average execution times are relatively slower. This can be attributed to different hardware, but also to the underlying operating system (Windows) and virtualization. [7]
Google cloud functions execution time have multimodal distributions with higher dispersion. For example, for the 256 MB function, the execution time is most often around 27 s, but there is another peak around 20 s, coinciding with the faster 512 MB function. Similarly, the distribution for the slowest 128 MB function has multiple peaks, overlapping with faster functions and reaching even the performance of the fastest 2048 MB function. This suggests that GCF does not enforce strictly the performance limits, and opportunistically invokes smaller functions using the faster resources. Figure 2 shows the results of the integer benchmarks using Mersenne Twister random generator. [7]
The next aspect measured in order to determine the performance of cloud service providers is network latency. Endpoints exposed by cloud providers are secured with HTTPS protocol. The average results were consistent with typical Benchmarking Heterogeneous Cloud Functions 9 network latency for Google Cloud Functions – 150 ms. However, for Azure the latency measured that way was 439 ms which is significantly larger than the network ping time. Figure 3 shows the result of the network latency for Microsoft Azure and Google Cloud Platform. [7]
2.7 Pricing model
Pricing model is the most important thing for providers as they can control it to encourage the use of their services. Pricing also is a very important thing for the company and in terms of economy because it will involve clients and provider profits. Every provider has their own pricing models for the cloud services offered for clients. Providers have their own target which is to make huge profits but the client’s target is to have the best service at a low price. Thus, an optimal pricing methodology is required to satisfy both parties.
There are two pricing models for Microsoft Azure, namely pay-per-use and subscription. For Google Cloud Platform, the pricing models available on their service are subscription and hybrid pricing. Pay-per-use pricing, clients only have to pay for what they use in the function of time or quantity taken. This is a bit unfair to the clients because they may have to pay more for the services they use. Next, subscription pricing needs its clients to pay repeatedly or monthly to access the services provided. This kind of pricing model sometimes can charge the clients more or less depending on the provider. Lastly, hybrid pricing is the combination of pay-per-use and subscription. The price to be paid by the clients is not fixed as it depends on the job queue wait times. This model is said to be fair to clients. [8]
2.8 Auto-Scaling/Elasticity
Auto-scaling is a hugely important feature for software providers, identifying an auto-scaling policy that can assure no breach of performance is an extremely difficult task, and will invite failure unless significant precautions are taken. Auto-scaling enables resources to be purchased and published on demand. In addition, in order to properly configure a rule-based auto-scaling policy, there must be an in-depth amount of knowledge and a high level of expertise, which is not necessarily true in practise.
Microsoft Azure has recently increased their auto-scaling rules offered to clients by allowing a wide range of metrics. [9] Microsoft Azure has its own name for services that run auto-scaling operation which is Azure Autoscale. At the same time, Google Cloud Platform also has the same thing which is Managed Instance Groups. This service provides automatic healing and built-in load balancing for clients who use their cloud.
2.9 Monitoring tools/Service provided
Cloud monitoring is a process of checking, analysing and controlling the operating workload in a cloud-based IT facility. [10] A few cloud services have the self-belief and provide clients with tools to monitor the availability of services. Monitoring services could be managed by providers or by a third party.
Microsoft Azure has provided many first party Azure monitoring tools with a specific purpose such as Microsoft Azure Monitor to collect and analyze performance metrics, Azure Advisor to scan resource configurations, Azure Automation to automate cloud management tasks and many more. There also other organizations that made cloud monitoring tools that work with Azure such as AppDynamics, Datadog, LogicMonitor and Serverless360. Google Cloud Platform monitoring, it use Stackdriver but we can also use third party monitoring tools.
3 Opinions
In our opinion, Microsoft Azure gives a lot of benefits to all the users especially users who are in the field of business. First of all, security. Microsoft Azure takes a big step to ensure the security of their user and this can easily identify any suspicious activity within the technology. Secondly, privacy. This technology will not easily share the users data or information to others unless it is authorized by the owner. Other than that, availability and the scalability are high. Microsoft Azure provides higher availability and scalability compared to other cloud service providers and last but not least is the cost. Cost of this technology is more worth it other than cloud service providers it is because the cost of maintenance, infrastructure and others can be reduced. Although there are many advantages but there are still some disadvantages that the users need to know. One of the disadvantages is the need of experts. Azure need expertise to make sure that everything works efficiently. This is because this is one of the mistakes that always happen to other administrators. [11]
For Google Cloud Platform, this platform is one of the fastest, simplest and also cheapest. However, there are some advantages and disadvantages. As we all know, the storage for Google Cloud Platform is so fast with unlimited bandwidth and also highly consistent listings. Other than that, the security and access are easy. So, this shows the control and the flexibility that are available to all users which means that the user can decide either to use or not the platform and they can easily delete their data from Google Cloud. The disadvantages of this platform are the lack of managed services and also limited and outdated versions.
4 Conclusion
As a conclusion, cloud computing is one of the technologies that has been created and give a big impact not only to our county but also to the whole world. It also one of the fastest growing part of IT. This really helps people all around the world with massive benefits to users of all sizes. Cloud computing also is a service provider that are simpler to acquire and can scale either up or down. Among all of the clouds, public clouds work the best for some but not for all however for private clouds, this cloud provide many benefits for all internal applications. Moreover, for your information, public clouds and private clouds can be used in combination. Private clouds known as an internal or enterprise cloud meanwhile public cloud is a standard cloud computing model that are use to make resources and the only way to differentiate between public cloud and private cloud is that users are not responsible for any management of a public cloud. [12]
Design Thinking Video
Chapter Presentation
File(s) to download
-
Download DESIGN THINKING REPORT (GROUP 3).docx.1
DESIGN THINKING REPORT (GROUP 3).docx.1 Details
- Monday, 25 January 2021 [2.7MB] -
Download RptPCAsmbly_03.doc.docx.1
RptPCAsmbly_03.doc.docx.1 Details
- Monday, 25 January 2021 [4.7MB] -
Download REPORT GROUP 3 - Comparing Cloud Service.docx
REPORT GROUP 3 - Comparing Cloud Service.docx Details
- Monday, 25 January 2021 [279.8KB]