Wednesday, July 5, 2023

Five key stages of IT Process


Service Strategy: This stage focuses on the ITIL service lifecycle and describes how to design, develop, and implement IT Service Management.

Service Design: This stage describes how to design services and processes.

Service Transition: This stage explains how to manage the transition of a new or changed service with a focus on ensuring that all service management processes balance.

Service Operation: This stage guides you in ways to ensure that services are delivered and are running smoothly and reliably.

Continual Service Improvement: This stage covers how to re-align IT services as business needs change. CSI consists of seven steps that cover what can and should be measured; gathering, processing and analyzing data; and presenting and using information.

Problem management: ITIL makes a distinction between “incident management” and “problem management.” Incident management is the individual problem that your users deal with, such as an offline printer, for example. Problem management examines root cause of a problem, what can be done, and which resources can be engaged to prevent it from happening again.

itil-lifecycle


IT Process

IT process management is a series of activities that relates to the planning and monitoring stages of either a business process or a computer process. For many businesses, the concept of information technology (IT) process management is linked directly to re-engineering. However, this connection is more related to the actual implementation and support methods used than the actual process itself.

- System Development Life Cycle (SDLC)

Software Development Life Cycle (SDLC) is a process used by the software industry to design, develop and test high quality software. The SDLC aims to produce a high-quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates.

A typical Software Development Life Cycle consists of the following stages −

Stage 1: Planning and Requirement Analysis


Stage 2: Defining Requirements

Stage 3: Designing the Product Architecture

Stage 4: Building or Developing the Product

Stage 5: Testing the Product

Stage 6: Deployment in the Market and Maintenance

- Information Technology Infrastructure Library (ITIL)

ITIL is a library of best practices for managing IT services and improving IT support and service levels. One of the main goals of ITIL is to ensure that IT services align with business objectives, even as business objectives change.

One of the most essential parts of ITIL is the configuration management database (CMDB), which provides the central authority for all components—including services, software, IT components, documents, users, and hardware—that must be managed to deliver an IT service. The CMDB tracks the location of, and changes to, all of these assets and processes, along with their attributes and relationships to each other.

Compute Security 2

API security:

API security best practices include the use of tokens, encryption and signatures, quotas and throttling, and an API gateway.

Malware:

Malware, short for malicious software, is any software that acts against the interest of the user. From ransomware to adware to botnets, malware is responsible for destroying data, violating people's privacy, and causing countless hours of lost productivity. Malware—sometimes delivered via phishing scams—can affect not only the infected computer, laptop or device but potentially any other device the infected device can communicate with. Malware attacks are a severe threat, but effective IT security can reduce your organization’s vulnerabilities and exposure to cyberattacks.

 

cybercrime

Computer security/cybersecurity/Information technology security (IT security)

It is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

IT Security Includes:

Container security:

Containers make it easy to build, package, and promote an application or service across different environments and deployment targets. But there are some challenges to container security. As more businesses adopt container technologies, security teams have new adversary models to combat and new infrastructure components to secure.

 Cloud security:

It’s hard to wrap your head around something that exists somewhere between amorphous resources sent through the internet and a physical server. It’s a dynamic environment where things are always changing—like security threats. While the adoption of cloud-native technologies creates new security challenges, it also creates opportunities to enhance existing security strategies. The goals of an effective cloud-native security strategy should allow teams to achieve greater levels of software delivery while building more secure systems.


 

Types of Computer Network 2


 Personal Area Network (PAN) is the most basic type of computer network. This network is restrained to a single person, that is, communication between the computer devices is centered only to an individual’s workspace. PAN offers a network range of 10 meters from a person to the device providing communication.

Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.

Wireless Local Area Network (WLAN) is a type of computer network that acts as a local area network but makes use of wireless network technology like Wi-Fi. This network doesn’t allow devices to communicate over physical cables like in LAN but allows devices to communicate wirelessly. 

The most common example of WLAN is Wi-Fi.

Virtual Private Network (VPN) is a type of computer network that extends a private network across the internet and lets the user send and receive data as if they were connected to a private network even though they are not. Through a virtual point-to-point connection users can access a private network remotely. VPN protects you from malicious sources by operating as a medium that gives you a protected network connection. 

virtual-private-network


Types of Computer Network 1

Local Area Network (LAN) is the most frequently used network. A LAN is a computer network that connects computers together through a common communication path, contained within a limited area, that is, locally. A LAN encompasses two or more computers connected over a server. The two important technologies involved in this network are Ethernet and Wi-fi. 

Examples of LAN are networking in a home, school, library, laboratory, college, office, etc.

Metropolitan Area Network (MAN) is larger than a LAN but smaller than a WAN. This is the type of computer network that connects computers over a geographical distance through a shared communication path over a city, town or metropolitan area. 

Examples of MAN are networking in towns, cities, a single large city, large area within multiple buildings, etc.

Wide Area Network (WAN) is a type of computer network that connects computers over a large geographical distance through a shared communication path. It is not restrained to a single location but extends over many locations. WAN can also be defined as a group of local area networks that communicate with each other. 

The most common example of WAN is the Internet.



Computer Hardware, Network and Storage

Computer Hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

Storage refers to the process of storing and preserving data or information in a digital format. In the context of computing, storage refers to the hardware and technologies used to hold and retain data, files, and i.e., Hard Disk Drives (HDDs), Solid-State Drives (SSDs), etc.

Computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies.

Storage Area Network (SAN) is a type of computer network that is high speed and connects groups of storage devices to several servers. This network does not depend on LAN or WAN. Instead, a SAN moves the storage resources from the network to its own high-powered network. A SAN provides access to block-level data storage.

Examples of SAN are a network of disks accessed by a network of servers.


Type of Databases Explained 4

  •  Multi-model database

Multi-model databases combine different types of database models into a single, integrated back end. This means they can accommodate various data types.

  • Document/JSON database

Designed for storing, retrieving, and managing document-oriented information, document databases are a modern way to store data in JSON format rather than rows and columns.

  • Self-driving databases

The newest and most groundbreaking type of database, self-driving databases (also known as autonomous databases) are cloud-based and use machine learning to automate database tuning, security, backups, updates, and other routine management tasks traditionally performed by database administrators.

 

multi-model databases

Types of Databases Explained 3

 Some of the latest databases 

  • Open-source databases

An open-source database system is one whose source code is open source; such databases could be SQL or NoSQL databases.

cloud-database

  • Cloud databases

A cloud database is a collection of data, either structured or unstructured, that resides on a private, public, or hybrid cloud computing platform. There are two types of cloud database models: traditional and database as a service (DBaaS). With DBaaS, administrative tasks and maintenance are performed by a service provider.

Types of Databases Explained 2

  •  Data warehouses

A central repository for data, a data warehouse is a type of database specifically designed for fast query and analysis.

Data warehouse


  • NoSQL databases

A NoSQL, or nonrelational database, allows unstructured and semi structured data to be stored and manipulated (in contrast to a relational database, which defines how all data inserted into the database must be composed). NoSQL databases grew popular as web applications became more common and more complex.

  • Graph databases

A graph database stores data in terms of entities and the relationships between entities.

OLTP databases. An OLTP database is a speedy, analytic database designed for large numbers of transactions performed by multiple users.


Types of Databases Explained 1

  •  Relational databases

Relational databases became dominant in the 1980s. Items in a relational database are organized as a set of tables with columns and rows. Relational database technology provides the most efficient and flexible way to access structured information.

relational database


  • Object-oriented databases

Information in an object-oriented database is represented in the form of objects, as in object-oriented programming.

  • Distributed databases

A distributed database consists of two or more files located in different sites. The database may be stored on multiple computers, located in the same physical location, or scattered over different networks.

List of Types of Databases

1. Relational databases

2. Object-oriented databases

3. NoSQL databases

4. Graph databases


5. Data warehouses

 6. Distributed databases

7. Object-oriented databases

Some of the latest databases include

a. Open-Source databases

b. Cloud databases

 c. Multi-Model database

d. Document/JSON database

e. Self-driving databases



Database

A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). Together, the data and the DBMS, along with the applications that are associated with them, are referred to as a database system, often shortened to just database.

Data within the most common types of databases in operation today is typically modeled in rows and columns in a series of tables to make processing and data querying efficient. The data can then be easily accessed, managed, modified, updated, controlled, and organized. Most databases use structured query language (SQL) for writing and querying data.

database


SQL is a programming language used by nearly all relational databases to query, manipulate, and define data, and to provide access control.

There are many different types of databases. The best database for a specific organization depends on how the organization intends to use the data.

Software Development

Software development refers to a set of computer science activities dedicated to the process of creating, designing, deploying and supporting software.

Software itself is the set of instructions or programs that tell a computer what to do. It is independent of hardware and makes computers programmable. 

software Development


There are three basic types:

-System software to provide core functions such as operating systems, disk management, utilities, hardware management and other operational necessities. An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. For desktop and laptop computers, Windows is the most used at 75%, followed by Apple's macOS at 16%, and Linux-based operating systems, including Google's Chrome OS, at 5% (thereof "desktop Linux" at 2.35%). With tablets, Apple's iOS has 55% and Android has 45%.

-Programming software to give programmers tools such as text editors, compilers, linkers, debuggers and other tools to create code.

-Application software (applications or apps) to help users perform tasks. Office productivity suites, data management software, media players and security programs are examples. Applications also refers to web and mobile applications like those used to shop on Amazon.com, socialize with Facebook or post pictures to Instagram.

-A possible fourth type is embedded software. Embedded systems software is used to control machines and devices not typically considered computers — telecommunications networks, cars, industrial robots and more. These devices, and their software, can be connected as part of the Internet of Things (IoT).

Fields of Information Technology

 1. Software Development

2. Database 

3. Hardware 

4. Computer Network 

5.  IT Process

6. Computer security/

7. Artificial Intelligence

8. Cloud Computing

Thursday, February 2, 2023

Introduction to Information Technology

General Knowledge of Information Technology

Information means data processed for some purpose whereas Technology refers to methods, process, techniques, systems, skills and devices which are used for accomplishment of some objectives or goals such as scientific investigation.



Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of electronic data and information. It is the use of technology for information processing and solve business or organizational problems on a broad scale through the use of financial software.














-

 





 

8. Artificial Intelligence

Artificial Intelligence is a way of making a computer, a computer-controlled robot, or a software think intelligently, in the similar manner the intelligent humans think.

AI is accomplished by studying how human brain thinks, and how humans learn, decide, and work while trying to solve a problem, and then using the outcomes of this study as a basis of developing intelligent software and systems.

Goals of AI

* To Create Expert Systems − The systems which exhibit intelligent behavior, learn, demonstrate, explain, and advice its users.

* To Implement Human Intelligence in Machines − Creating systems that understand, think, learn, and behave like humans.

 

9. Cloud Computing

Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each location being a data center. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, typically using a "pay-as-you-go" model which can help in reducing capital expenses but may also lead to unexpected operating expenses for unaware users.

Types of Clouds

# Public clouds

Public clouds are cloud environments typically created from IT infrastructure not owned by the end user. Some of the largest public cloud providers include Alibaba Cloud, Amazon Web Services (AWS), Google Cloud, IBM Cloud, and Microsoft Azure.

# Private clouds

Private clouds are loosely defined as cloud environments solely dedicated to a single end user or group, where the environment usually runs behind that user or group's firewall. All clouds become private clouds when the underlying IT infrastructure is dedicated to a single customer with completely isolated access.

# Hybrid clouds

A hybrid cloud is a seemingly single IT environment created from multiple environments connected through local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), and/or APIs.

The characteristics of hybrid clouds are complex and the requirements can differ, depending on whom you ask. For example, a hybrid cloud may need to include:

- At least 1 private cloud and at least 1 public cloud

- 2 or more private clouds

- 2 or more public clouds

- A bare-metal or virtual environment connected to at least 1 public cloud or private cloud

# Multiclouds

Multiclouds are a cloud approach made up of more than 1 cloud service, from more than 1 cloud vendor—public or private. All hybrid clouds are multiclouds, but not all multiclouds are hybrid clouds. Multiclouds become hybrid clouds when multiple clouds are connected by some form of integration 

* Cloud services

Cloud services are infrastructure, platforms, or software that are hosted by third-party providers and made available to users through the internet. There are 3 main types of as-a-Service solutions: IaaS(Infrastructure as a Service), PaaS(Platform as a service), and SaaS(Software as a service). 

 

10. Data mining 

It is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

Steps In The Data Mining Process

1) Data Cleaning

2) Data Integration

3) Data Reduction

4) Data Transformation

5) Data Mining

6) Pattern Evaluation

7) Knowledge Representation

Problems 

  • Data Overload
  • Lack of fully skilled manpower
  • System and Network Security Issues i.e. Network Traffic, Dark Web, Viruses, etc.

Career/Jobs Related to this field

  1. Software Developer 
  2. Web Developer
  3. Network Administrator
  4. Database Administrator
  5. IT Officer/Manager
  6. Program Designer
  7. System Analyst
  8. Project Manager
  9. Information System Auditor
  10. AI Specialist
  11. Technical Writer
  12. Database Operator
  13. Cryptographer
  14. Data Scientist
  15. Cloud Administrator

Topics Related to Information Technology

# Types of Computers 

-Analog Computers

-Digital Computers

#Generation of Computer

1st Gen- Vacuum Tubes 

2nd Gen - Transistor 

3rd Gen - Integrated Circuit(IC) 

4th - Microprocessors/Very Large Scale Integrated (VLSI) circuits 

5th - Artificial Intelligence(AI)

#Classification of computers

-Super Computers

- Mainframe Computers

- Mini/Personal Computers(PC)

- Laptops and Palmtops or Handheld Devices

#Characteristics of Computer

- Accuracy - Speed - Diligence - Storage 

#Application/Uses/Areas of Computers

-Education 

- Health and Medicine

- Science 

- Business

- Recreation and Entertainment

- Banking 

- Art, Science and Engineering

 

Content Written By:
Nilesh Ghimire


Five key stages of IT Process

Service Strategy:  This stage focuses on the ITIL service lifecycle and describes how to design, develop, and implement IT Service Managemen...