chapter [8] emerging technologies cloud computing mobile computing byod social media web 2.0 green...
TRANSCRIPT
Chapter [8]
Emerging Technologies
Cloud Computing
Mobile Computing
BYODSocial Media
Web 2.0
Green IT
Cloud Computing
Cloud computing is a software and hardware based computing resources delivered as a networked service.
With Cloud Computing, users can access services via the Internet from anywhere without worrying about any maintenance or management of actual resources.
With cloud computing, companies can scale up to massive capacities in an instant without having to invest in new infrastructure.
S. No. Cloud Computing Grid Computing
1. Scalable Scalable
2. Dynamic load balancing Dynamic load balancing
3. Multiuser and Multitasking Multiuser and Multitasking
4.Can store an object as low as 1 byte and as large as several terabytes.
Well suited for data-intensive storage
5.Offers two types of instances: Storage and High-CPU
Focuses on computationally intensive operations
Pertinent Issues
• Threshold Policy ~ To test the program before moving to the
production environment. To detect sudden increases in the demand. To de-allocated unused resources and turned over
to other work needs.
• Interoperability ~Interoperability of applications between two cloud
computing vendors.Reformat data or change the logic in applications.
• Hidden Costs ~Higher network charges.Companies, who are far from cloud providers,
could experience latency.
• Unexpected Behaviour ~An application works well at company's internal
data centre, it is still important to test the application in the cloud for unexpected behaviour.
• Security Issues ~Backup & RecoveryEncryption & Decryption
• Software Development in Cloud ~ Use cloud server pools. Different cloud types: Development cloud, Testing
cloud and Production cloud. Cost per usage.
• Environment Friendly Cloud Computing ~ Reducing the number of hardware components
needed to run applications on the company's internal data centre.
Reduces energy for running and cooling hardware.
Goals of Cloud Computing
• To create a highly efficient IT system1• To access services from anywhere at
any time.2• To scale the IT system easily and cost-
effectively3• To consolidate IT infrastructure into a
more integrated environment.4• To reduce costs of power consumption.5• To improve "Anywhere Access" for ever
increasing users; 6•To enable rapidly provision resources as needed. 7
Cloud Computing Architecture
The Cloud Computing Architecture (CCA) involves communication among multiple cloud components such as ~• On-premise and cloud resources, • Services, • Middleware • Software components
It is about deciding their geo-location and the relationships between them through a loose coupling mechanism.
CCA consists of the followings connected to each other through Internet.– Front End Architecture
It is client’s devices and some applications needed for accessing the cloud computing system.
– Back End ArchitectureThe back end is cloud itself, which may encompass various Servers, Data storage systems and web application program
– MiddlewareIt is a special type of software installed on central server to be used for administering the whole system. There are some set of protocols followed by this server.
Cloud Computing Environment
Public Clouds
Private Clouds
Hybrid Clouds
PUBLIC CLOUDSPublic clouds are administrated by third parties
and the services are offered on pay-per-use basis.
Advantages includes the following: • Affordable costs. • Highly scalable services • Reliable applications
One of the limitations is security assurance.
Private CloudsAlso called internal clouds, they are built primarily
by IT departments within enterprisesAdvantages of private clouds are ~
Improve average server utilization providing higher efficiencies High Security Fully under control due to ownership. Reducing operations costs Reducing Administrative overheads due to automation
Limitations is that IT teams in the organization has to be involved in buying, building and managing the clouds.
Hybrid Clouds
It is possible in two ways ~ An organization has a private cloud and
forms a partnership with a public clouds provider
A public cloud provider forms a partnership with a vendor that provides private cloud platforms.
Cloud Computing Models
IaaS
PaaS
SaaSNaaS
CaaS
[A] IaaS• Provides virtual machines, other resources and
storage required to host the services.• Cloud clients install operating-system and their
application software on the cloud infrastructure.
[B] PaaS• It gives us the platform to create, edit, run and
manage the application programs.• Deliver a computing platform including operating
system, programming language, execution environment, database, and web server.
[C] SaaS• Provides users to access large variety of applications
that are hosted on service provider’s infrastructure.
[D] NaaS• Capability provided to the user is to use
network/transport connecting services.
[E] CaaS• Offers communication solution on lease to the
users. The CaaS vendor is responsible for all hardware and software management and offers guaranteed Quality of Service (QoS).
Characteristics of Cloud Computing
1 •High Scalability
2 •Agility
3 •High Availability and Reliability
4 •Services in Pay-Per-Use Mode
5 •Multi-Sharing
6 •Virtualization
7 •Performance
8 •Maintenance
Advantages
Challenges to Cloud Computing
• Confidentiality• Integrity• Availability• Governance• Trust• Legal Issues and
Compliance• Privacy
• Audit• Data Stealing• Architecture• Identity
Management and Access control• Incident Response• Software Isolation• Application Security
Mobile Computing Transmission of data via a computer without
having to be connected to a fixed physical link. Various companies have develop several wireless
apps for Mobile phones, PDA, Palm and Pocket PCs. It provides remote access to work order details. It enables employees to update work order status. It provides remotes access to corporate services. It provides remote access to the corporate Knowledge
Base. It enables to improve management effectiveness by
enhancing information flow, and ability to control a mobile workforce.
Bring Your Own DeviceBYOD refers to business policy that allows
employees to use their preferred computing devices for business purposes.
It means employees are welcome to use personal devices to connect to the corporate network to access information and application.
The BYOD policy is giving employee the right to work beyond their required hours.
Employees have to buy, maintain and update devices in return for a one-time investment cost to be paid by the organization.
BYOD Threats
Network Risks
• ‘Lack of Device Visibility’• Terminal identification not possible.• Large number of devices being connected to the network.
Device Risks
• ‘Loss of Devices’• Data lost from stolen or lost devices is a security threat.• Easy access to company emails, corporate intranet, company trade secrets from a misplaced device.
Application Risks
• ‘Application Viruses and Malware’• Majority of employees’ devices aren’t protected by security software. Organizations
are not clear in deciding that ‘who is responsible for device security.
Implementation Risks
• ‘Weak BYOD Policy’• BYOD program should not only cover the technical issues but also mandate a robust implementation
policy.• There are increasing the chances of device misuse.
Social Media A Social Network/Media is a group of
individuals, who have a set of common interests and objectives.
Success of a social network mainly depends on contribution, interest and motivation of its members along with technology backbone.
The concept called ‘technology diminishing the humane distance’ help in sustaining social networks.
Types of Social NetworksSocial Contact Networks
• To keep contact with friends and family;• Orkut, Facebook and Twitter;
Study Circles
• Dedicated for students : study material, research papers placement information etc.• Fledge Wing and College Tonight;
Specialist Groups
• For specialists such as Doctors, Scientists, Engineers, Corporates;• LinkedIn;
Networks for Fine Arts
• Dedicated to people linked with music, painting and related arts
Police and Military Networks
• Operate much like social networks on a private domain due to the confidentiality
Sporting Networks
• Dedicated to people of the sporting fraternity
Mixed Networks
• People from all the above groups and serving multiple types of social collaboration
Social Networks for the 'inventors'
• For the people who have invented the concept of social networks • Technical Forums and Mashup centres
Shopping and Utility Service Networks
• To analyze the social behaviour and send related information for the same to respective marts
Web 2.0
Second generation of the World Wide Web.Refers to the transition from static HTML Web
pages to a more dynamic Web.Blogs, Wikis, and Web services are all seen as
components of Web 2.0.The objective is to connect people in
numerous ways and utilize their collective strengths, in a collaborative manner.
Components of Web 2.0
Communities •a group of individuals of common interest to share their thoughts
Blogging •A way to express thoughts in a free form basis
Wikis •a set of co-related pages on a particular subject and allow users to share content.
Folksonomy •System to tag content online to enables others to easily find and view.
File Sharing/ Podcasting
•to send media files and related content online for others to use.
Mashups •congregate services from multiple vendors to create a completely new service.
Benefits of Social Networks
1 •Users need not to worry about underlying technology.
2 •Communication at a very affordable cost and a very easy to use
3 •It support communication that people do in routine and no new knowledge are required.
3 •People are coming much closer to another and geographical boundaries are being reduced.
4 •Increases the social collaboration to a very high degree.
Challenges for Social Networks Data Security and Privacy in such public domains
Privacy of individual users also arises
For bringing offline social network under the purview of online social networks.
Green IT
Green IT refers to the use of computers and IT resources in a more efficient, environment friendly and responsible way.
It include the implementation of energy-efficient CPUs, servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste.
Environmental Protection Agency (EPA) was formed in 1992 to promote energy efficiency in hardware of all kinds.
Steps to support Green IT Power-down the CPU and all peripherals when not in
use. Try to do computer-related tasks during contiguously. Power-up and power-down energy-intensive
peripherals such as laser printers according to need. Use LCD monitors rather than CRT monitors. Use notebook computers rather than desktop. Use the power-management features to turn off hard
drives and displays after several minutes of inactivity. Minimize the use of paper and properly recycle them. Proper dispose of e-waste. Employ alternative energy sources.
Green IT Best Practices Involving employees in developing policies
and green IT initiatives more likely to be embraced by them.
Outsourcing ensures more effective use of limited resources.
Issue guidelines for using the best practices of green IT to campus users
On-going communication and commitment to green IT best practices to produce notable results.
Relevant Facts