Thursday 21 July 2016

Semester 2, 2016

Welcome to Semester 2


22 August 2016 - Notice Board

* ITA Assessment 2 will at least have minimum 40% of new questions.
 Ch4 - Ch7

Structure of the assessment:
- MCQs,
- Theory, and 
- Application

_____________________________

I am a part-time lecturer; please note ' if you need to reach me for academic reasons, you may email me on goqo.vut@gmail.com or communicate via the respective Module Forums. I will not be able respond to students who sends communications to using any other platforms other the ones given.
We can use the Forums I have created to chat, discuss topics etc... it is an open platform that we can use to deliberate on academic matters or academic related topics of interests.

Hitherto and for some time to come, emailing serves as a better communication channel, as it allows for paper-trail to be maintained - and moreover I access emails when I am not committed to any other activities (e.g. driving, meetings, working, social scenes, etc). I attest that I will give you my 100% dedication in facilitating your modules and 100% undying support in whatever academic hiccups or challenges you may face.


B. Tech Information Technology 2016 Semester 2 Schedule:
Subject
Project 4 (AIPRJ4A)
Advanced IT Management  4  (AIATM4A)
Artificial Intelligence 4 (ASART4A)
Strategic Information Systems 4 (AISIS4A)
Software Engineering and Design (AISED4A)

  

Monday 8 February 2016

Semester 1 2016 Ending

I am a part-time lecturer; please note ' if you need to reach me for academic reasons, you may email me on goqo.vut@gmail.com or communicate via the respective Module Forums. I will not be able respond to students who sends communications to goqo@gmail.com; or social platforms.

We can use the Forums I have created to chat, discuss topics etc... it is an open platform that we can use to deliberate on academic matters or academic related topics of interests.

Hitherto and for some time to come, emailing serves as a better communication channel, as it allows for paper-trail to be maintained - and moreover I access emails when I am not committed to any other activities (e.g. driving, meetings, working, social scenes, etc). I attest that I will give you my 100% dedication in facilitating your modules and 100% undying support in whatever academic hiccups or challenges you may face.


Running Modules:

TIME
MODULE
FACILITATOR
08:00-10:00
10:00-12:00
12:00-14:00
AIRES4A  - Research/ Project
14:00-16:00
ASSEC4A – Computer Security IV



Thursday 13 August 2015

Pressed by social inequalities and saved by Technology; or is it?

Written by Nkululeko Goqo
19 September 2013


A short original case related study (phantom story-line) created for Information Technology Auditing deliberations.


Damn!!! Yelled Sbongiseni Mbambo, as he heard the sirens shrieks from afar after he was tipped that the ‘now’ disbanded scorpions were on his trail, gasping, pacing up and down is his dilapidated condominium. He swung himself across the room, like a pendulum, grabbing his latest MacBook Pro that boasts a Retina display built entirely around flash architecture, dumping it in boiling water to save his skin.

Earlier that day, Zakhele Madida had written a song with Unleash Records, aimed at addressing the issues surrounding social exclusion and social inequalities. He had hoped that folks would heed his call and put a screeching end to their technological crimes, a sound that would echo so loud catching all of them in a slipstream and would be plucked to better living.

Zakhele understood that social inequality is linked to racial inequality, gender inequality, and wealth inequality. It refers to the processes in society that have the effect of limiting or harming a group’s social class, social statuses, that even extend to prohibiting access to basic needs, like education and others.

“We are tired of our brothers becoming embroiled in crimes, becoming the hood-rats that have mastered the sewerage pipes of Westville Prison. Inequalities have created crime monsters, a world that indicates the survival of the fittest, every man for himself”, proclaimed an unnamed poet from Durban, South Africa.


Sbongiseni’s love for old portable Frequency Modulation radios taught him a lot about microchips, semiconductors, broadly electronics. He later puts his itchy hands on computers and telephony systems. He was adorned by Kevin Mitnick, the “America’s most wanted computer outlaw”. Mr. Mbambo was fascinated by Kevin’s exploits as a cyber-desperado and fugitive forming one of the most exhaustive FBI manhunts in history and spawned dozens of books, articles and computer security case studies.

A hard knock banged on the door repeatedly as Sbongiseni froze with bated breath. He drifted off into oblivion, only to wake up in a cold cell. What has actually transpired before the activities leading to Sbongiseni’s arrest; was the release of a broadcast citing the following:  

Cyber criminals targeted SA Post Office and stolen more than 42 million user details financial institution Postbank. The theft occurred between 1 and 3 January, and was allegedly committed by a syndicate with knowledge of the post office's information technology (IT) system, confirmed by Department of state security spokesman Brian Dube.

The National Intelligence Agency (NIA) has launched a high-level probe after this data breach. According to NIA spokesman "When a government institution is compromised, the NIA will be involved and will offer its assistance" Postbank currently holds over 4-billion in deposits, and processes millions of rands in social grants throughout the year. The bank told that none of its customers were affected by the hacking, but declined to comment further.

Over the next three days, automated teller machines (ATMs) in Gauteng, Free State and KwaZulu-Natal were used to withdraw cash from the accounts. The incident comes three years after Postbank spent over $15-million to upgrade its fraud-detection service. But that investment seems zero valuation. An unnamed security expert told that "The Postbank network and security systems are shocking and desperate need of an overhaul. This was always going to be a real possibility".


Sbongiseni and his clique better known as the McGezas have been hard at work experimenting with different technologies and techniques including war-dialing. War-dialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, bulletin board systems and fax machines. 

Hackers use the resulting lists for various purposes, hobbyists for exploration, and crackers - malicious hackers who specialize in computer security: for guessing user accounts (by capturing voicemail greetings); or locating modems that might provide an entry-point into computer or other electronic systems. It may also be used by security personnel: for example, to detect unauthorized devices, such as modems or faxes, on a company's telephone network.

It has also emerged that one member of the McGezas clique, Zukiswa Manciya, works for the Posbank and it is alleged that she is privy to very confidential information, system intricacies, operations and the entire organization’s workflow. The following confusing (as the link was not vividly seen) articles that had nothing to do with what Zukiswa is deployed at her post for were seized from her posh upmarket apartment in Sandton. It appeared to be a research that reads as follows:


Exhibit 1.1
Technological convergence is the tendency for different technological systems to evolve toward performing similar tasks. Convergence can refer to previously separate technologies such as voice (and telephony features), data (and productivity applications), and video that now share resources and interact with each other synergistically. Telecommunications convergence, network convergence or simply convergence are broad terms used to describe emerging telecommunications technologies, and network architecture used to migrate multiple communications services into a single network. Specifically this involves the converging of previously distinct media such as telephony and data communications into common interfaces on single devices.

The rise of digital communication in the late 20th century has made it possible for media organizations (or individuals) to deliver text, audio, and video material over the same wired, wireless, or fiber-optic connections. At the same time, it inspired some media organizations to explore multimedia delivery of information. This digital convergence of news media, in particular, was called "Mediamorphosis" by researcher Roger Fidler, in his 1997 book by that name. Today, we are surrounded by a multi-level convergent media world where all modes of communication and information are continually reforming to adapt to the enduring demands of technologies, "changing the way we create, consume, learn and interact with each other".

Convergence in this instance is defined as the interlinking of computing and other information technologies, media content, and communication networks that has arisen as the result of the evolution and popularization of the Internet as well as the activities, products and services that have emerged in the digital media space. Many experts view this as simply being the tip of the iceberg, as all facets of institutional activity and social life such as business, government, art, journalism, health, and education are increasingly being carried out in these digital media spaces across a growing network of information and communication technology devices. Also included in this topic is the basis of computer networks, wherein many different operating systems are able to communicate via different protocols. This could be a prelude to artificial intelligence networks on the Internet eventually leading to a powerful super-intelligence via a technological singularity.


Exhibit 1.2

Privacy and Electronic Shopping – Securing Company Information

The question of privacy is as old as mankind, but with the increasing operation of computers and computer networks it has become an urgent issue. As electronic commerce evolves, information about a person’s shopping behavior becomes more and more valuable and, at the same time, easier to acquire. Large databases facilitate access to information and it is becoming easier to trace activities in electronic media. Formerly, it was feasible to track the activities of one or two people (accessing paper files usually meant phoning and traveling a lot), but it would have been impossible to track thousands of people on a routine basis.
The possibility of automation--of mighty electronic “robots” which comb the Internet for consumer habits or credit card information--really makes privacy an issue. One possibility of protecting ourselves against loss of privacy is not to participate in the Electronic World. This approach corresponds to closing the door behind ourselves. But what if there are big opportunities--special bargains, exiting new products--on the Web which we do not want to miss? What is the information that we believe is too private to be handed over to a merchant?

When it comes to a business transaction it is usually not possible for the customer to stay anonymous. Some personal information must be revealed. In the case of a physical product that would eventually require to be couriered, for example.

There are so many lose ends that still need to be tied-up and fresh reports are hitting our screens day by day as we wait to see what will happen next. The community is divided between two plots; are the McGezas guilty or are they saved by technology?

Written by Nkululeko Goqo
19 September 2013
REFERENCES:
1.        POSBANK R42 Million news
2.        Kevin Mitnick Articles
3.        Computer Related articles





#AI

Artificial Intelligence 4 (EC)

In its simplest sense, artificial intelligence refers to computer programs or robots that mimic human intelligence, not only by performing the same functions that humans do (like recognizing speech), but by being able to either reason or learn from examples.
When people talk about artificial intelligence, or AI, and homeland security or terrorism in the same breath, they are referring to one of a number of techniques designed to process, organize and analyze data relating to terrorism events or presumed terrorist behaviors.

One of the challenges to AI systems is simply figuring out what information to collect in order to feed it into an analytic system. It is very difficult to know when patterns are meaningful predictors of the future, and when they aren't atterns are often presumed to be predictive, although they may not be. (That is, just because one terrorist attack involved Saudi nationals who went to flight school does not mean another attack will; collecting all of the information possible about Saudi nationals going to flight school in the United States is not necessarily predictive.)

Such techniques include neural networks, genetic algorithms, data mining techniques and rule-bases systems.(Amy Zalman)

#ITA

Information Technology Auditing 4
CLICK -  ITA Material
CLICK - Assessment Letter
CLICK - Groups



An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

An IT audit is different from a financial statement audit. While a financial audit's purpose is to evaluate whether an organization is adhering to standard accounting practices, the purposes of an IT audit are to evaluate the system's internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. In an Information Systems (IS) environment, an audit is an examination of information systems, their inputs, outputs, and processing.


The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties. The IT audit aims to evaluate the following:

Will the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks. (wikipedia)

#SIS

Strategic Information System 4  (EC)
CLICK -  SIS Material
CLICK - Assessment Letter
CLICK - Groups



Strategic information systems are the information systems that companies use to help achieve their goals and become more efficient.

Businesses use these systems to achieve a competitive advantage on their competitors as they seek to provide a good or service in a way that is better than that of their competition. For example, a strategic information system can be used to provide a product at a lower cost than competing organizations. 

This business tool may also be used to help the business appeal to a certain market segment. Businesses can increase their profits by appealing to a portion of the market that is not being adequately served or is particularly profitable. (Ask)


TESLA'S Case Study

THE SECRET TESLA MOTORS’ MASTER PLAN


Background

Electric cars have been manufactured for as long as the internal combustion cars, but the dominant method of propulsion has been the internal combustion engine. Moreover, for the past 100 years the electric car has not been reimaged. Consequently the electric car has been designed, manufactured and retailed in the same way as the internal combustion engine car. However, in 2006 Elon Musk’s ideation (master plan) for the electric car was put forward. Musk, the founder of Tesla Motors, reimagined almost all aspects of how an electric car was designed, manufactured and retailed. The “secret master plan” of Tesla was to enter the high end of the electric car market, where customers would be willing to pay a premium price. The aim was to produce higher unit volumes and reduce the unit price of each successive model. Elon Musk explained the master plan of Tesla briefly as follows:

1. Build a sports car.
2. Use the money earned to build an affordable car.
3. Use that money to build an even more affordable car.
4. While doing the above, also to provide zero emission electric power generation options.

However, in 2006, Tesla was a start-up company that did not possess the bundles of resources and capabilities to create a mass market electric car at the first attempt. The goal was simply impossible to reach, because the company had never built an electric car, had one technology iteration and no economies of scale. Elon Musk realised that its first product was “R going to be expensive no matter what it looked like”, so they decided to build a sports car, because it would probably have the best chance of competing successfully with its gasoline alternatives.


Executing the master plan

To bring the first compelling electric sports car to market required that a long list of initiatives be deployed. These initiatives included: engineering a custom car and manufacturing process; setting up a factory to assemble the car; designing a new battery system; performing several iterations of safety tests and subsequently making changes to the battery system; developing software algorithms for the transmission; developing a new chassis and a new body, and ensuring that every single part would meet legal safety requirements; performing safety testing; creating infrastructure (service centres) for customers; sourcing spares for every replaceable part; obtaining licenses to transport, manufacture and sell cars and subassemblies; staffing an entire company; and creating the necessary infrastructure to do all of the above. While implementing the above master plan, planning had to be done for the second model.
The second model was priced at half the price point of the Tesla roadster and the third model was even more affordable. Most of the cash generated was reinvested in research and development to drive down costs and to bring the following models to market as fast as possible. Therefore, when a customer buys a Tesla car, it helps to pay for the development of the low-cost family car.

Yet, for all of Tesla’s successes in introducing new models, with the number of cars that Tesla produced it was unlikely to make a dent in the consumption of oil and the number of internal combustion cars that were produced by mainstream car manufacturers. Less than 1% of all cars manufactured were electric. To move closer to achieving Tesla’s overarching strategic goal of sustainable transport called for every aspect of electric car manufacturing and retailing to be re-imagined. Tesla’s strategy was thus not the “business as usual” of mainstream carmakers. Tesla’s strategic initiatives focused on moving beyond the past 100 years of entrenched ways of car manufacturing and retailing. These initiatives included: reimaging what the electric car could be; designing an electric car from the ground up; reimagining the retail experience of buying an electric car; reimagining customer service; creating a network of “electric highways”; venturing into battery manufacturing; and accelerating the manufacturing of electric cars by sharing patents and creating partnerships.


Design process

In 2006, Elon Musk reimagined what the electric car could be. Moreover, Elon Musk envisioned that the future of the car would be electric. This vision and belief in what the electric car could be was very different from main stream car manufacturers’ beliefs. This belief in the future of the electric car also strongly influenced the design process at Tesla. Elon Musk wrote in the Tesla blog:
Not too long from now, most cars will be electric. Why? Two reasons: because electric cars are far more efficient than any other kind of car, and because they are the ultimate multifuel cars. Sound bold, maybe crazy?
Therefore to truly benefit from electric efficiency, Tesla started the design process of an electric car from the ground up. By following the ground-up design approach the restrictions imposed by traditional combustion car design were not experienced. As a result, the Model S design showed superior aerodynamics and remarkable torsion rigidity. Safety tests showed it had the lowest probability of injury of any car ever tested by the US government.
In 2011, Tesla chief designer Franz von Holzhausen made the following comments during an interview on the design philosophy and approach to designing the Model S:

Model S is a revolutionary vehicle not only due to its electric propulsion, but also in that its engineering and design go hand in hand. We have designed Model S from the ground up as an EV. The unique powertrain integration allows for an unprecedented package that is both rigid and incredibly safe. We set out to redefine the electric car, but with room for seven passengers and more functional storage space than any sedan on the market, Model S will set a new bar for the premium sedan as well.


Retail experience

In reimagining the experience of buying an electric car, Tesla started to recruit talented individuals who wanted to be more innovative, create something different and leave the world a better place. John Walker, recruited for his retail track record at Audi, made the following comment:
It is really because of Tesla that the automotive industry has turned so quickly to embrace development of electric vehicles, and I feel confident that Tesla will continue to be at the forefront of innovation. Joining the company now is a once-in-a-lifetime opportunity to help create something different, change the world for the better and have fun in the process.
The recruitment of employees with specific talents ensured that customers’ retail experience at Tesla would be unlike their retail experience at other typical car dealerships. Tesla Motors opened stores in shopping malls where customers could examine a floor model, learn about the design and engineering processes involved, and schedule a test drive. Purchasing happens online, directly from Tesla, which means that there are no intermediaries that add costs. Furthermore, by cutting them out of the value chain, intermediaries lose the leverage they had for decades over car manufacturers and customers.


Enhancing the customer experience

In reimaging the customer experience, Tesla first set the goal to deliver the highest possible level of ownership satisfaction in every way. Tesla measured customer satisfaction using a survey that customers were asked to complete after each service. Almost 90% of customers’ rated Tesla’s service at 9 or better on a 10-point scale, where 10 is best and 1 is worst. Tesla also made several improvements to the Model S through software updates and added small but important features, such as power folding mirrors and parking sensors. These efforts were validated by an owner satisfaction survey, which gave Model S a score of 99 out of 100, the highest satisfaction score achieved for any car in the world. The next highest score was 95.


Electric highways
In April 2014, Tesla announced it had opened 100 charging stations (86 Supercharger stations in North America, 14 in Europe and 1 in China) as part of its initiative to create “electric highways” that would make long distance driving possible. The “electric highways” initiative made it convenient to travel long distances in an electric car and addressed the practicality of growing the number electric cars on roads. Charging stations were also an important component in creating a carbon-free lifestyle for customers, enabling customers to combine other renewable energy options with all electric cars. The network of charging stations was part of a partnership with SolarCity and Rabobank aimed at creating a corridor of fast charging stations between San Francisco and Los Angeles.


Battery manufacturing

In 2014, Tesla announced it would build the world’s largest and most advanced battery factory in Nevada. This initiative would allow Tesla to achieve a major reduction in the cost of battery packs and to accelerate the pace of battery innovation. Working in partnership with suppliers, Tesla planned to integrate precursor material, cell, module and pack production into one facility. With this facility, Tesla would possess another capability, namely to create a compelling and affordable electric car in a shorter timeframe. This capability would make it possible for Tesla to address the solar power industry’s need for a massive volume of stationary battery packs.


Patents and open structures

In 2014, Elon Musk decided to join the open source movement by making the patents of Tesla available to anyone who wanted to use them in good faith. Initially Tesla felt that competitors would copy Tesla technology and therefore they felt compelled to create patents. Elon Musk admitted that this assumption was wrong. Tesla rather found that competitors were not copying Tesla’s technology, nor were they using their resources and capabilities to overtake Tesla. The true state affairs was that less than 1% of cars sold by major car companies were electric cars and trying to protect patents in reality slowed down the advent of sustainable transport. Tesla’s new logic assumed that patents were of more value if shared across a large number of stakeholders interested in manufacturing electric cars. Elon Musk wrote the following on Tesla’s open patent initiative to accelerate the advent of sustainable transport:

At Tesla, however, we felt compelled to create patents out of concern that the big car companies would copy our technology and then use their massive manufacturing, sales and marketing power to overwhelm Tesla. We couldn’t have been more wrong. The unfortunate reality is the opposite: electric car programs (or programs for any vehicle that doesn’t burn hydrocarbons) at the major manufacturers are small to non-existent, constituting an average of far less than 1% of their total vehicle sales.

At best, the large automakers are producing electric cars with limited range in limited volume. Some produce no zero emission cars at all.
Given that annual new vehicle production is approaching 100 million per year and the global fleet is approximately 2 billion cars, it is impossible for Tesla to build electric cars fast enough to address the carbon crisis. By the same token, it means the market is enormous. Our true competition is not the small trickle of non-Tesla electric cars being produced, but rather the enormous flood of gasoline cars pouring out of the world’s factories every day.
We believe that Tesla, other companies making electric cars, and the world would all benefit from a common, rapidly-evolving technology platform.
Technology leadership is not defined by patents, which history has repeatedly shown to be small protection indeed against a determined competitor, but rather by the ability of a company to attract and motivate the world’s most talented engineers. We believe that applying the open source philosophy to our patents will strengthen rather than diminish Tesla’s position in this regard.


Conclusion

The strategic initiatives undertaken by Tesla look beyond the present and 100 years of entrenched ways of car manufacturing and retailing. Tesla’s strategic goal to accelerate the advent of sustainable transport by bringing electric cars into the market as soon as possible is big, bold and risky. Yet, Tesla’s ability to execute strategy reveals that strategic change is not about trying to predict change. It is rather about creating change.

Sources:
Adapted from http://www.teslamotors.com/blog-and-press-releases, accessed September 2014.
Adapted from http://www.wired.com/2014/03/tesla-banned-ensure-process-buying-car-keeps-sucking/, accessed September 2014.