Chapter 8
Chapter 8
1
Academy Ch. 8 – Emerging Technologies
Cloud Computing Mobile Computing BYOD Social Media & Web 2.0 Green IT
(Part 1) (Part 2) (Part 3) (Part 4) (Part 5)
1.1) - Short Note 1.2) - Cloud vs Grid 1.3) - Pertinent 1.4) - Goals
Computing Issues
Grid computing requires the use of software that can divide and carve out pieces of a
program as one large system image to several thousand computers.
One concern about grid is that if one piece of the software on a node fails, other pieces of
the software on other nodes may fail
Cloud Computing
Cloud computing means the use of computing resources as a service through networks,
typically the Internet. The Internet is commonly visualized as cloud.
Cloud computing is a type of computing that relies on sharing computing resources rather
than having local servers or personal devices to handle applications.
Cloud computing means "a type of Internet-based computing," where different services -
such as servers, storage and applications - are delivered to an organization's computers
and devices through the Internet.
Example of cloud computing - Google apps where any application can be accessed using a
browser and it can be deployed on thousands of computer using internet.
Cloud Computing model enables:
Users to access database resources via the Internet from anywhere without worrying
about any maintenance or management of actual resources.
Anytime access to a shared pool of applications and resources.
These applications and resources can be accessed using a simple front-end interface such
as a Web browser, and as a result enabling users to access the resources from any client
device including notebooks, desktops and mobile devices.
With cloud computing, companies can scale up to massive capacities in an instant without
having to Invest in new infrastructure, Train new personnel, License new software.
The location of physical resources and devices being accessed are typically not known to
the end user.
Service consumers use ‘what they need on the Internet’ and ‘pay only for what they use’.
Cloud
I) Private Cloud:
This cloud computing environment resides within the boundaries of an organization and is
used exclusively for the organization’s benefits.
These are also called Internal Clouds or Corporate Clouds.
Private Clouds can either be private to the organization and managed by the single
organization (On-Premise Private Cloud) or can be managed by third party (Outsourced
Private Cloud).
They are built primarily by IT departments within enterprises, who seek to optimize
utilization of infrastructure resources within the enterprise by provisioning the
infrastructure with applications using the concepts of grid and virtualization.
Private Organisation
Cloud
Cloud
The data is usually stored in the The cloud is located off site
same geographical location and when there is a change
where the cloud users are of location the data need to
present. be transmitted through long
Location In case of several physical distances.
locations, the cloud is
distributed over several places
and is accessed using the
Internet.
Limitations
1) One of the limitations is security assurance and thereby building trust among the clients is far
from desired but slowly liable to happen.
2) Further, privacy and organizational autonomy are not possible.
Public Cloud
Private Cloud
Cloud (External)
(Internal)
3) Stringent SLAs:
Overall the SLAs are more stringent than the private cloud and might be as per the public
cloud service providers.
4) Complex Cloud Management:
Cloud management is complex as it involves more than one type of deployment models &
also the number of users is high.
Cloud
Community Cloud
The services are provided and managed by the service provider, reducing the management effort
from the end user side.
The essential characteristics of the cloud include on -demand, self service, broad network
access, resource pooling, rapid elasticity, and measured service.
The National Institute of Standards and Technology (NIST) defines three basic service models:
Infrastructure as a Service (IaaS),
Platform as a Service (PaaS),
Software as a Service (SaaS)
IaaS providers offer computers, more often virtual machines and other resources as service
; the infrastructure/storage required to host the services ourselves i.e. makes us the system
administrator and manage hardware/storage, network and computing resources.
In order to deploy their applications, cloud clients install operating -system & their
application software on the cloud infrastructure.
The end users need not maintain the physical servers as it is maintained by the service
providers.
Examples of IaaS providers include Amazon Web Services (AWS), Google Compute Engine.
4) Other Tools:
PaaS providers provide all the tools that are required to develop, test, and deploy an
application.
5) Collaborative Platform:
To enable collaboration among developers, most of the PaaS providers provide tools for
project planning and communication.
3) Centralized Management:
Since SaaS services are hosted and managed from the central location, the SaaS providers
perform the automatic updates to ensure that each customer is accessing the most recent
version of the application without any user-side updates.
4) Multi-device Support:
SaaS services can be accessed from any end user devices such as desktops, laptops, tablets,
smartphones, and thin clients.
5) Better Scalability:
Most of the SaaS services leverage PaaS and IaaS for its development and deployment and
ensure a better scalability than traditional software.
6) High Availability:
SaaS services ensure 99.99% availability of user data as proper backup & recovery
mechanisms are implemented.
7) API Integration:
SaaS services have the capability of integrating with other software or service through
standard APIs.
6) Virtualization:
This technology allows better use of available hardware resources by running multiple OS
on one server as virtual machines and managing the virtualized software layer separately
from the hardware.
7) Performance:
It is continuously monitored and consistent in providing high level of performance.
8) Maintenance:
The cloud computing applications are easier, because they are not to be installed on each
user's computer and can be accessed from different places.
A) Security Issues:
1) Confidentiality:
Prevention of the unauthorized disclosure of the data is referred as Confidentiality.
Normally, Cloud works on public networks; therefore, there is a requirement to keep the
data confidential from unauthorized entities.
With the use of encryption and physical isolation, data can be kept secret.
2) Integrity:
Integrity refers to the prevention of unauthorized modification of data and it ensures that
data is of high quality, correct, consistent and accessible.
It should be ensured that the data is not changed after being moved to the cloud.
The most direct way to enforce the integrity control is to employ cryptographic hash function.
3) Availability:
Availability refers to the prevention of unauthorized withholding of data.
It ensures the data backup through Business Planning Continuity Planning (BCP) and
Disaster Recovery Planning (DRP).
Availability can be affected by temporary breakdowns, Denial of Service (DoS) attacks,
equipment failure, and natural calamities etc.
4) Privacy:
Privacy is also considered as one of the important issues in Cloud.
The Cloud should be designed in such a way that it decreases the privacy risk.
5) Trust:
Trust is an important issue in Cloud.
Various clients’ oriented studies reveal that Cloud has still failed to build trust between the
client and service provider.
Trust ensures that service arrangements have sufficient means to allow visibility into the
security and privacy controls employed by the Cloud provider and their performance over time.
6) Legal Issues and Compliance:
There are various requirements relating to legal, privacy and data security laws that need
to be studied in Cloud system.
One of the major troubles with laws is that they vary from place to place, and users have
no assurance of where the data is located physically.
7)Data Stealing:
In a Cloud, data stored anywhere is accessible by anyone at any time.
In such cases, an issue arises as data stealing.
Some of the Cloud providers do not use their own server; instead they use server/s from
other service providers.
In that case, there is a probability that the data is less secure and is more prone to the loss.
8) Incident Response:
It ensures to meet the requirements of the organization during an incident.
It ensures that the Cloud provider has a transparent response process in place and
sufficient mechanisms to share information during and after an incident.
B) Implementation/ Adaption Issues:
1) Threshold Policy:
This is a policy which defines cyclical use of any application e.g. credit card validation
application.
Threshold policy helps in creation of additional instances or processing capabilities when
there is sudden increase in demand to fill in that demand and as the demand decreases
instances would be de- allocated and put to other use.
2) Interoperability:
If a company outsources or creates applications with one cloud computing vendor, the
company may find it difficult to change to another computing vendor that has proprietary
APIs (Application Program Interface) and different formats for importing and exporting data.
This creates problems of achieving interoperability of applications between two cloud
computing vendors.
3) Hidden Costs:
Cloud computing service providers do not reveal hidden costs such as higher charges for
data storage & use of applications during peak time.
Companies far from the location of cloud providers could experience latency, particularly
when there is heavy traffic.
4) Unexpected Behaviour:
It is important to test the application in the cloud with a pilot study to check for
unexpected behaviour.
Examples of test include how the application validates transaction say credit card
verification.
If the tests show unexpected results, we need to fix the problem before executing or
obtaining cloud services from the cloud.
Thus before migrating to cloud the companies should test the cloud services for correct
outputs particularly during peak period.
5) Environment Friendly Cloud Computing:
One incentive for cloud computing is that it may be more environment friendly as it reduces
the number of hardware components needed to run applications on the company's
internal data centre and also reduces energy for running and cooling hardware.
2.1) Introduction:
It refers to the technology that allows transmission of data via a computer without having
to be connected to a fixed physical link.
Mobile computing is an extension of mobile voice communication technology with the
ability to send and receive data across these cellular networks.
This is the fundamental principle of mobile computing.
Mobile data communication has become a very important as it allows users to transmit
data from remote locations to other remote or fixed locations.
2) Mobile Hardware:
This includes mobile devices or device components that receive or access the service of
mobility.
They would range from Portable laptops, Smart Phones, Tablet PCs, and Personal Digital
Assistants (PDA) that use an existing and established network to operate on.
At the back end, there are various servers like Application Servers, Database Servers and
Servers with wireless support, a Communications Server etc.
The characteristics of mobile computing hardware are defined by the size and form factor,
weight, microprocessor, primary storage, secondary storage, screen size and type, means
of input, means of output, battery life, communications capabilities, expandability and
durability of the device.
3) Mobile Software:
Mobile Software is the actual programme that runs on the mobile hardware and deals with
the characteristics and requirements of mobile applications.
It is the operating system of that appliance and is the essential component that makes the
mobile device operates.
Mobile applications popularly called Apps are being developed by organizations for use by
customers but these apps could represent risks, in terms of flow of data as well as personal
identification risks, introduction of malware and access to personal information of mobile
owner.
The ability to share information across a wireless platform is becoming more vital to the
today’s business communication needs.
Various companies design and develop several wireless applications and solutions for
Blackberry, iPhone, Google Android G1, iPad, Windows Mobile, Symbian, Brew devices, PDA,
Palm & Pocket PC.
Mobile Computing Services allow mobile workforces to access a full range of corporate
services and information from anywhere, at any time and it improves the productivity of a
mobile workforce by connecting them to corporate information systems.
The goal of mobile computing is to work towards true computing freedom (free from the
tyranny of location), whereby users can connect to the network from anywhere, anytime
and operate as if they were sitting in the "home" office.
4) Transmission interferences:
Weather, terrain, and the range from the nearest signal point can all interfere with signal
reception.
Reception in tunnels, some buildings, and rural areas is often poor.
5) Potential health hazards:
People who use mobile devices while driving are often distracted from driving are thus
assumed to be more likely involved in traffic accidents.
There are allegations that cell phone signals may cause health problems.
6) Human interface with device:
Screens and keyboards tend to be small, which may make them hard to use.
Alternate input methods such as speech or handwriting recognition require training.
Part 3- BYOD
Part 3- BYOD
3.1) Introduction
BYOD (Bring Your Own Device) refers to business policy that allows employees to use their
preferred computing devices, like smart phones and laptops for business purposes.
It means employees are welcomed to use personal devices (laptops, smart phones, tablets
etc.) to connect to the corporate network to access information and application.
The BYOD policy has rendered the workspaces flexible, empowering employees to be
mobile and giving them the right to work beyond their required hours.
BYOD has led to an increase in employees’ satisfaction and reduction in IT desktop costs
for organizations.
4) Implementation Risks:
It is normally exemplified in Weak BYOD Policy.
For effective implementation of the BYOD program organisation should mandate
development of a robust implementation policy.
Because corporate knowledge and data are key assets of an organization, the absence of a
strong BYOD policy would fail to communicate employee expectations, thereby increasing
the chances of device misuse.
In addition to this, a weak policy fails to educate the user, thereby increasing vulnerability to
the above mentioned threats.
4.2 - Web2.0
I) Short Note:
Web 2.0 is the term given to describe a second generation of the World Wide Web that is
focused on the ability for people to collaborate and share information online.
The two major contributors of Web 2.0 are the technological advances enabled by Ajax
(Asynchronous JavaScript and XML) and other applications such as RSS (Really Simple
Syndication) and Eclipse that support the user interaction.
This refers to the transition from static HTML Web pages to a more dynamic Web that is
more organized and is based on serving Web applications to users.
Other improved functionality of Web 2.0 includes open communication & sharing of
information.
One of the most significant differences between Web 2.0 and the traditional World Wide
Web (referred as Web 1.0) is that Web 2.0 facilitates greater collaboration and information
sharing among Internet users, content providers and enterprises.
Thus it can be said that the migration is from the “read-only web” to “read-write web”
The main agenda of Web 2.0 is to connect people in numerous new ways and utilize their
collective strengths, in a collaborative manner.
In this regard, many new concepts have been created such as Blogging, Social Networking,
Communities, Mash-ups, and Tagging.
6) Folksonomy:
In folksonomy users can tag their content online and this enables others to easily find and
view content.
This allows the free classification of information available on the web, which helps the users
to classify and find information, using approaches such as tagging.
Also known as Social Bookmarking, the bookmarks in a folder are not stored on the user’s
computer rather tagged pages are stored on the web increasing the accessibility from any
computer connected to the Internet.
7) File Sharing:
This is the facility, which helps users to send their media files and related content online for
other people of the network to see and contribute.
8) Mashups:
This is the facility, by using which people on the internet can congregate services from
multiple vendors to create a completely new service.
An example may be combining the location information from a mobile service provider and
the map facility of Google maps in order to find the exact information of a cell phone device
from the internet, just by entering the cell number.
VI) Benefits and Challenges for Social Networks using Web 2.0
Benefits:
Web 2.0 provides a platform where users of the network need not to worry about the
implementation or underlying technology.
Concepts of Web 2.0 like blogging are some things that people do on a day-to-day basis and
no new knowledge skills are required.
Web 2.0 techniques are very people centric activities and thus, adaptation is very fast.
People are coming much closer to another and all social and geographical boundaries are
being reduced at lightning speed.
Challenges:
One of the major aspects is data security and privacy and in such public domains, there is a
huge chance of data leak and confidentiality loss.
Privacy of individual users also arises and can create a huge problem if malicious users
somehow manage to perpetuate the social networks.
Part 5 - Green IT
It is the study & practice of establishing / using computers & IT resources in a more
efficient and environmentally friendly and responsible way.
Computers consume a lot of natural resources, from the raw materials needed to
manufacture them, the power used to run them, and the problems of disposing them at
the end of their life cycle.
Green computing is the environmentally responsible use of computers and related
resources and includes practices such as:
Implementation of energy-efficient Central Processing Units (CPUs), servers & peripherals,
Reduced resource consumption &
Proper disposal of electronic waste (e-waste).
The objective of Green computing is to reduce the use of hazardous materials, maximize
energy efficiency during the product’s lifetime, and promote the recyclability or
biodegradability of defunct products and factory waste.
Many IT vendors have major initiatives underway to green their products, services and
practices like:
Building computers with more environmentally friendly materials,
Designing them to be consume less energy,
Providing recycling programs to dispose of old systems,
Developing virtualization and cloud computing alternatives, and
Providing tips to businesses that want to go green.
Recycle:
1) Dispose e-waste according to central, state and local regulations;
2) Discard used or unwanted electronic equipment in a convenient and environmentally
responsible manner as computers emit harmful emissions ;
3) Manufacturers must offer safe end -of-life management and recycling options when
products become unusable; and
4) Recycle computers through manufacturer’s recycling services.
Conserve Energy:
1) Use Liquid Crystal Display (LCD) monitors rather than Cathode Ray Tube (CRT) monitors.
2) Use notebook computers rather than desktop computers whenever possible.
3) Use the power-management features to turn off displays after several minutes of inactivity.
4) Power-down the CPU and all peripherals during extended periods of inactivity.
5) Try to do computer-related tasks during contiguous, intensive blocks of time, leaving
hardware off at other times.
6) Power-up and power-down energy-intensive peripherals such as laser printers according to
need.
7) Employ alternative energy sources for computing workstations, servers, networks & data
centers.
8) Adapt more of Web conferencing offers instead of travelling to meetings in order to go
green and save energy.
Important Questions
1) What is cloud computing? Explain some pertinent similarities and differences
between cloud and grid computing.
2) Discuss major goals of cloud computing.
3) Describe front end and back end architecture with reference to cloud computing.
4) What do you understand by public cloud? Also discuss its major advantages and limitations
in brief.
5) What do you understand by private cloud? Also discuss its major advantages and limitations
in brief.
6) Explain characteristics of the following with reference to cloud computing:
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS
7) Explain characteristics of cloud computing.
8) Briefly discuss advantages of cloud computing.
9) Discuss any four challenges to cloud computing.
10) Explain some tangible benefits of mobile computing.
11) The work habits of computer users and businesses can be modified to minimize
adverse impact on the global environment. Discuss some of such steps, which can be
followed for Green IT. Or
Discuss best practices of Green IT
12) Discuss some of the pertinent objectives in order to achieve the goals of cloud computing.
13) Discuss the security and implementation issues in using the cloud computing
technology for running the new web application.