1. Do some Internet research on Chevron’s use of seismic imaging technology. Bri
ID: 3726911 • Letter: 1
Question
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs. C6-7 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security. 3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud. 4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets. 5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?
Be sure to reference all sources cited
Explanation / Answer
1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs. C6-7
Answer:
Oil and gas are found in the reservoir rocks. These Oil and gas reservoir rock exploration is verycostly and challenging especially in deep water. The success in Gulf of Mexico drilling is only10% over the last decade. According to US Mineral Management Services statistics, only 7%deep water well discoveries were successful in 2006 and 2007. To over this poor success-rate andreduce cost, Chevron invested more in seismic imaging rather than estimated drilling.Seismic imaging is a tool that bounces sound waves off underground rock structures to reveal possible crude oil and natural gas bearing formations. Seismologists use ultrasensitive devices called geophones to record the sound waves that echo. These recordings help them to identify oil and gas bearing reservoirs beneath. They analyze and interpret this collected data to define the structure and size of the reservoirs. By using this, Chevron achieved a success rate of 69%. This helped Chevron to reduce cost on unsuccessful estimated drillings and increase productivity in oil and gas extractions
3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud.
Answer:
A)Advantages of cloud-computing in enterprise-wide applications:
a) Easy Implementation: It is Easy and ready to over see by the web; it helps the Business to recover a similar application and business handle without backend bolster.
b) Accessibility: Access your information whenever and anyplace in the proficient profitable way.
c) No equipment required: No physical stockpiling is required, everything is facilitated in the cloud
d) Cost per Head: Technology cost are kept up in a financial way.
e) Flexibility for development: Resources can be included or subtract based their needs.
f) Efficient recuperation: It conveys speedier and exact recoveries of use of information.
Disadvantages of cloud computing in enterprise-wide applications:
a) No longer in charge: organizations who have in-house IT staff can't deal withissues all Alone, however stratosphere work area help is accessible all day, everyday.
b) Limited accessible elements: constrained forms and restricted components areaccess
c)Limited servers: there are couple of servers accessible constantly, it might be expensive Considering the kind of cloud administration, be recognizable before join to keep up data centers and cloud framework
d) Bandwidth Issues: the customer ought not to pack an extensive number of serversandCapacity gadgets in the little arrangement of datacenters
4) Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets
Answer:
A typical employer has hundreds and lots of customers. To do their task, every user runs as a minimum 1/2 a dozen or extra software on a computer or other devices. Identification control deals with figuring out individuals in a gadget, along with u. s., network or a company and controlling their get right of entry to sources inside that machine by associating person rights and regulations with the setup identification (identity control (id control), 2013). single sign-on(SSO) takes place whilst a consumer logs into 1 client and it routinely signs directly to different clients regardless of the era, platform or the domain they may be using (what's single sign on?2016). One such instance is Google. while we go online to certainly one of Google’s product, it automatically takes us to, YouTube, Google Analytics, etc.Imposing the SSO either on a standalone basis or integrated with IDM (identity management)will help clear up the password related troubles and decreases IT assist charges, improves organization protection, and simplifies password control (implementing organization single sign-on in an, 2010). There are several variations for SSO to be had, such as web single sign up and password Synchronization. With the web primarily based SSO, the consumer enters credentials, and the internet server then validates the password with a critical credential server. If the entered records matches, the consumer is then granted get right of entry to the web-based software or machine. on the other hand, password synchronization permits sharing of the same password on all applicationsExtranet unmarried signal-On or internet SSO connects to multiple websites which belong to distinct provider vendors or carriers. customers can log in to any federated internet site with a single set of credential and they're not brought on when logging into other websites within the same federation. The exquisite function here is that any of federated web websites may be the first one logged in the day and SSO could be found out to the alternative websites using security token generated by means of the specific authentication provider. Server primarily based Intranetunmarried join up connects to a couple of heterogeneous programs and structures in an enterprise A single master server and satellite SSO servers work collectively to provide get admission to the resources covered by using the system with an unmarried set of credentials. each application has its personal repository of customers and the passwords contained within every repository are kept synchronized to every different.
5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate?
Answer:
CIO / IT govt is a task identify usually given to a person at an organization in the price of IT strategy and the PC gadget required to aid the enterprise’s particular objective and goals (Roles and obligations manual: What does a CIO do? 2015). they're the important thing members to formulating organizational desires as the storage, transmittal, and analysis of digital information grows in significance throughout the company. Their function has rapidly expanded over the years.
As new technology has emerged and business an increasing number of entering the digital era, ITstrategies evolve and companies now demand that senior IT leaders possess capabilities thatmove beyond the conventional technology control. As businesses adopted allotted computing, ITdepartment had more tasks, they were given extra and bigger projects. This led to venturebacklogs, inviting objections that IT management becomes deficiently receptive to business wishes. therefore, the want to align IT with an enterprise with a new skill set in addition to theera know-how have become the topmost precedence. They need to have felony know-how,company economic competencies, facts management abilities, seller and accomplice control,project control and know-how in compliance and safety.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.