0% found this document useful (0 votes)
50 views36 pages

Chapter 8

Chapter 8 discusses emerging technologies, focusing on cloud computing and grid computing. It outlines the differences and similarities between the two, detailing cloud computing's architecture, environment, and goals, while also explaining the characteristics of private, public, and hybrid clouds. The chapter emphasizes the advantages and limitations of each cloud type, highlighting the importance of scalability, security, and cost-effectiveness in modern IT ecosystems.

Uploaded by

anil99senchury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views36 pages

Chapter 8

Chapter 8 discusses emerging technologies, focusing on cloud computing and grid computing. It outlines the differences and similarities between the two, detailing cloud computing's architecture, environment, and goals, while also explaining the characteristics of private, public, and hybrid clouds. The chapter emphasizes the advantages and limitations of each cloud type, highlighting the importance of scalability, security, and cost-effectiveness in modern IT ecosystems.

Uploaded by

anil99senchury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Yuvraj Bachhawat’s CA Final - ISCA 8.

1
Academy Ch. 8 – Emerging Technologies

Chapter 8 – Emerging Technologies


Chapter 8- Emerging Technologies

Cloud Computing Mobile Computing BYOD Social Media & Web 2.0 Green IT
(Part 1) (Part 2) (Part 3) (Part 4) (Part 5)

 Part 1 - Cloud Computing:


Part 1- Cloud computing and Grid computing

1.1) - Short Note 1.2) - Cloud vs Grid 1.3) - Pertinent 1.4) - Goals
Computing Issues

1.5) - Architecture 1.6) - Environment 1.7) - Models 1.8) - Characteristics

1.9) - Advantages 1.10) - Challenges

1.1) Short Note:


 Grid Computing:
 The computing resources in most of the organizations are underutilized but are necessary
for certain operations.
 The idea of Grid computing is to make use of such non-utilized computing power by the needy
organizations, & thereby the Return on Investment (ROI) on computing investments can be
increased.
 Thus, Grid computing is a network of computing or processor machines managed with a
kind of software such as middleware, in order to access and use the resources remotely.
 Middleware allows computers that are connected on networks to communicate with each other.
 The managing activity of grid resources through the middleware is called Grid Services.
 Grid Services provide access control, security, access to data and databases etc.
 Grid Computing is more popular due to the following reasons:
 It has the ability to make use of unused computing power, and thus, it is a cost effective
solution (reducing investments).
 This enables heterogeneous resources of computers to work cooperatively and
collaboratively to solve a scientific problem.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 2
Academy Ch. 8 – Emerging Technologies

 Grid computing requires the use of software that can divide and carve out pieces of a
program as one large system image to several thousand computers.
 One concern about grid is that if one piece of the software on a node fails, other pieces of
the software on other nodes may fail

 Cloud Computing
 Cloud computing means the use of computing resources as a service through networks,
typically the Internet. The Internet is commonly visualized as cloud.
 Cloud computing is a type of computing that relies on sharing computing resources rather
than having local servers or personal devices to handle applications.
 Cloud computing means "a type of Internet-based computing," where different services -
such as servers, storage and applications - are delivered to an organization's computers
and devices through the Internet.
 Example of cloud computing - Google apps where any application can be accessed using a
browser and it can be deployed on thousands of computer using internet.
 Cloud Computing model enables:
 Users to access database resources via the Internet from anywhere without worrying
about any maintenance or management of actual resources.
 Anytime access to a shared pool of applications and resources.
 These applications and resources can be accessed using a simple front-end interface such
as a Web browser, and as a result enabling users to access the resources from any client
device including notebooks, desktops and mobile devices.
 With cloud computing, companies can scale up to massive capacities in an instant without
having to Invest in new infrastructure, Train new personnel, License new software.
 The location of physical resources and devices being accessed are typically not known to
the end user.
 Service consumers use ‘what they need on the Internet’ and ‘pay only for what they use’.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 3
Academy Ch. 8 – Emerging Technologies

1.2) Cloud vs Grid Computing:


 Cloud computing has evolved from grid computing & provides on-demand resource provisioning.
 Grid computing requires the use of software that can divide and carve out pieces of a
program as one large system image to several thousand computers.

 Some pertinent similarities and differences are highlighted as follows:


 Similarities:
1) Cloud computing and grid computing both are scalable:
 Scalability is accomplished through load balancing of application instances running
separately on a variety of operating systems.
 CPU, Storage, network bandwidth is allocated and de-allocated on demand.
2) Both computing types involve multi-tenancy and multi-tasking:
 Multi-tenancy and multitasking means that many customers can perform different tasks,
accessing a single or multiple application instances.
 Sharing resources among a large pool of users assists in reducing infrastructure costs and
peak load capacity.
 Cloud and grid computing provide Service- Level Agreements (SLAs) for guaranteed uptime
availability of, say, 99 percent.
 Differences:
1) Storage:
 Grid is well suited for data-intensive storage & is not economically suited for storing
objects as small as 1 byte.
 In cloud computing one can store an object as low as 1 byte & as large as 5 GB or even
several terabytes.
2) Computation:
 Computational grid focuses on computationally intensive operations.
 Cloud computing offers two types of instances: standard and high-CPU.

1.3) Goals of Cloud Computing


 The core goals of utilizing a cloud-based IT ecosystem are :
 To pool available resources together into a highly efficient infrastructure whose costs
are aligned with what resources are actually used,
 To make services accessible and available from anywhere at any time,
 To quickly scale the resources as organizations business requirements evolve.
 To meet the requirements, some of the pertinent objectives in order to achieve the goals are:
1) To create a highly efficient IT ecosystem, where resources are pooled together and costs
are aligned with what resources are actually used.
2) To access services and data from anywhere at any time.
3) To scale the IT ecosystem quickly, easily & cost-effectively based on the evolving business needs.
4) To reduce costs related to IT energy/power consumption.
5) To enable or improve "Anywhere Access" (AA) for ever increasing users.
6) To enable rapid provision of resources as needed.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 4
Academy Ch. 8 – Emerging Technologies

1.4) Cloud Computing Architecture:


 The Cloud Computing Architecture (CCA) of a cloud solution is the structure of the system,
which comprises of on-premise and cloud resources, services, middleware, and software
components, and the relationships between them.
 A cloud computing architecture consists of a front end and a back end.
 They connect to each other through a network, usually the Internet.
 The front end is the side, the computer user sees and interacts through, and the back end
is the “cloud” section of the system, truly facilitating the services.
 Front End Architecture:
 The front end of the cloud computing system comprises of the client’s devices and some
applications needed for accessing the cloud computing system.
 All the cloud computing systems do not give the same interface to users.
 Some use existing web browsers such as Firefox, Microsoft’s internet explorer while other
types of systems have some unique applications which provide network access to its
clients.
 Back End Architecture:
 Back end refers to some service facilitating peripherals.
 In cloud computing, the back end is cloud itself, which may encompass various computer
machines, data storage systems and servers.
 Groups of these clouds make up a whole cloud computing system.
 Theoretically, a cloud computing system can include any type of web application program
such as video games to applications for data processing, software development and
entertainment.
 Usually, every application would have its individual dedicated server for services.
 In addition a central server is established to be used for administering the whole system. It
is also used for monitoring client’s demand as well as traffic to ensure that everything of
system runs without any problem.

1.5) Cloud Computing Environment


 The Cloud computing environment can consist of multiple types of clouds based on their
deployment and usage.
 Such typical Cloud computing environments, catering to special requirements, are briefly
described as follows:

Cloud

Private cloud Public cloud Community cloud Hybrid cloud

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 5
Academy Ch. 8 – Emerging Technologies

I) Private Cloud:
 This cloud computing environment resides within the boundaries of an organization and is
used exclusively for the organization’s benefits.
 These are also called Internal Clouds or Corporate Clouds.
 Private Clouds can either be private to the organization and managed by the single
organization (On-Premise Private Cloud) or can be managed by third party (Outsourced
Private Cloud).
 They are built primarily by IT departments within enterprises, who seek to optimize
utilization of infrastructure resources within the enterprise by provisioning the
infrastructure with applications using the concepts of grid and virtualization.

 Certain characteristics of Private Cloud are as follows:


1) Secure:
 The private cloud is secure as it is deployed and managed by the organization itself, and
hence there is least chance of data being leaked out of the cloud.
2) Central Control:
 As usual, the private cloud is managed by the organization itself, there is no need for the
organization to rely on anybody and is controlled by the organization itself.
3) Weak Service Level Agreements (SLAs):
 SLAs play a very important role in any cloud service deployment model as they are defined
as agreements between the user and the service provider in private cloud.
 In private cloud, either Formal SLAs do not exist or are weak as it is between the organization
and user of the same organization.
 Thus, high availability and good service may or may not be available.

Private Organisation

Cloud
Cloud

User 1 User 2 User 3


User 1 User 2 User 3 Private Organisation

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 6
Academy Ch. 8 – Emerging Technologies

 The advantages of Private Cloud include the following:


1) It improves average server utilization; allow usage of low-cost servers and hardware while
providing higher efficiencies; thus reducing the costs that a greater number of servers
would otherwise entail.
2) It provides a high level of security and privacy to the user.
3) It is small in size and controlled and maintained by the organization.

 Limitation of Private Cloud:


1) IT teams in the organization may have to invest in buying, building and managing the
clouds independently.
2) Budget is a constraint in private clouds and they also have loose SLAs.

 Differences between On-Premise and Outsourced Private Cloud:

Particulars On-Premise Private Cloud Outsourced Private Cloud


 Managed by the organization  Managed by the third party.
\

itself.  Everything is same as usual


Management
private cloud except that here
the cloud is outsourced.
 SLAs are defined between the  These are usually followed
organization and its users. strictly as it is a third party
Service Level Agreements  Service providers are able to organization.
(SLAs) efficiently provide the service
because of small user base and
mostly efficient network.
 Network management and  The cloud is fully deployed
network issue resolving are at the third party site and
easier. organizations connect to the
Network  The networks usually have high third party by means of
bandwidth and low latency. either a dedicated
connection or through
Internet.
 Comparatively, it is more  Cloud is relatively less
resistant to attacks than any secure and the security
Security and Data Privacy other cloud and the security threat is from the third
attacks are possible from an party and the internal
internal user only. employee.
 The performance depends on  The performance of the
the network and resources and cloud depends on the third
Performance can be controlled by the party that is outsourcing the
network management team. cloud.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 7
Academy Ch. 8 – Emerging Technologies

 The data is usually stored in the  The cloud is located off site
same geographical location and when there is a change
where the cloud users are of location the data need to
present. be transmitted through long
Location  In case of several physical distances.
locations, the cloud is
distributed over several places
and is accessed using the
Internet.

II) Public Cloud:


 The public cloud is the cloud infrastructure that is provisioned for open use by the general public.
 It may be owned, managed, and operated by a business, or government organizations, or
some combination of them.
 Typically, public clouds are administrated by third parties or vendors over the Internet, & the
services are offered on pay-per-use basis.
 These are also called Provider Clouds.
 Public cloud consists of users from all over the world wherein a user can simply purchase
resources on an hourly basis and work with the resources which are available in the cloud
provider’s premises.

 Characteristics of Public Cloud are as follows :


1) Highly Scalable:
 The resources in the public cloud are large in number and the service providers make sure
that all requests are granted.
 Hence public clouds are considered to be scalable.
2) Affordable:
 The cloud is offered to the public on a pay-as-you-go basis; hence the user has to pay only
for what he or she is using (using on a per-hour basis).
 And this does not involve any cost related to the deployment.
3) Less Secure:
 Since it is offered by a third party and they have full control over the cloud, the public cloud
is less secure out of all the other deployment models.
4) Highly Available:
 It is highly available because anybody from any part of the world can access the public cloud
with proper permission.
5) Stringent SLAs:
 As the service provider’s business reputation and customer strength are totally dependent
on the cloud services, they follow the SLAs strictly and violations are avoided.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 8
Academy Ch. 8 – Emerging Technologies

 The Advantages of Public Cloud include the following:


1) It is widely used in the development, deployment and management of enterprise applications, at
affordable costs.
2) It allows the organizations to deliver highly scalable and reliable applications rapidly and at more
affordable costs.
3) There is no need for establishing infrastructure for setting up and maintaining the cloud.
4) Strict SLAs are followed.
5) There is no limit for the number of users.

 Limitations
1) One of the limitations is security assurance and thereby building trust among the clients is far
from desired but slowly liable to happen.
2) Further, privacy and organizational autonomy are not possible.

III) Hybrid Cloud:


 This is a combination of both, at least one private (internal) and atleast one public (external)
cloud computing environments - usually, consisting of infrastructure, platforms and applications.
 The usual method of using the hybrid cloud is to have a private cloud initially, and then for
additional resources, the public cloud is used.
 The hybrid cloud can be regarded as a private cloud extended to the public cloud and aims
at utilizing the power of the public cloud by retaining the properties of the private cloud.
 It is typically offered in either of two ways:
 A vendor has a private cloud and forms a partnership with a public cloud provider or
 A public cloud provider forms a partnership with a vendor that provides private cloud
platforms.

Public Cloud
Private Cloud
Cloud (External)
(Internal)

 Characteristics of Hybrid Cloud are as follows:


1) Scalable:
 The hybrid cloud has the property of public cloud with a private cloud environment and as
the public cloud is scalable; the hybrid cloud with the help of its public counterpart is also
scalable.
2) Partially Secure:
 The private cloud is considered as secured and public cloud has high risk of security breach.
 The hybrid cloud thus cannot be fully termed as secure but as partially secure.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 9
Academy Ch. 8 – Emerging Technologies

3) Stringent SLAs:
 Overall the SLAs are more stringent than the private cloud and might be as per the public
cloud service providers.
4) Complex Cloud Management:
 Cloud management is complex as it involves more than one type of deployment models &
also the number of users is high.

 The Advantages of Hybrid Cloud include the following:


1) It is highly scalable and gives the power of both private and public clouds.
2) It provides better security than the public cloud.

 Limitations of Hybird Cloud


1) The limitation of Hybrid Cloud is that the security features are not so good and complex to
manage.

IV) Community Cloud:


 The community cloud is the cloud infrastructure that is provisioned for exclusive use by a
specific community of consumers from organizations that have shared concerns.
 It may be owned, managed, and operated by one or more of the organizations in the
community, a third party or some combination of them, and it may exist on or off
premises.
 In this, a private cloud is shared between several organizations.
 This model is suitable for organizations that cannot afford a private cloud and cannot rely
on the public cloud either.

Cloud

Private Organisation Private Organisation

User 1 User 2 User 3 User 1 User 2 User 3

Community Cloud

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 10
Academy Ch. 8 – Emerging Technologies

 Characteristics of Community Clouds are as follows:


1) Collaborative and Distributive Maintenance:
 In this, no single company has full control over the whole cloud.
 This is usually distributive and hence better cooperation provides better results.
2) Partially Secure:
 This refers to the property of the community cloud where few organizations share the
cloud, so there is a possibility that the data can be leaked from one organization to
another, though it is safe from the external world.
3) Cost Effective:
 As the complete cloud is being shared by several organizations or community, not only
the responsibility gets shared; the community cloud becomes cost effective too.

 Advantages of Community Clouds are as follows:


1) It allows establishing a low-cost private cloud.
2) It allows collaborative work on the cloud.
3) It allows sharing of responsibilities among the organizations.
4) It has better security than the public cloud.

 Limitation of community cloud:


1) The limitation of the community cloud is that the autonomy of the organization is lost and
some of the security features are not as good as the private cloud.
2) It is not suitable in the cases where there is no collaboration.

1.6) Cloud Computing Service Models:


 Cloud computing is a model that enables the end users to access the shared pool of resources
such as compute, network, storage, database and application as an on - demand service
without the need to buy or own it.

 The services are provided and managed by the service provider, reducing the management effort
from the end user side.
 The essential characteristics of the cloud include on -demand, self service, broad network
access, resource pooling, rapid elasticity, and measured service.
 The National Institute of Standards and Technology (NIST) defines three basic service models:
 Infrastructure as a Service (IaaS),
 Platform as a Service (PaaS),
 Software as a Service (SaaS)

I) Infrastructure as a Service (IaaS):


 IaaS, a hardware-level service, provides computing resources such as processing power,
memory, storage, and networks for cloud users to run their application on -demand.
 This allows users to maximize the utilization of computing capacities without having to
own and manage their own resources.
 IaaS changes the computing from a physical infrastructure to a virtual infrastructure through
virtual computing; storage; and network resources by abstracting the physical resources.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 11
Academy Ch. 8 – Emerging Technologies

 IaaS providers offer computers, more often virtual machines and other resources as service
; the infrastructure/storage required to host the services ourselves i.e. makes us the system
administrator and manage hardware/storage, network and computing resources.
 In order to deploy their applications, cloud clients install operating -system & their
application software on the cloud infrastructure.
 The end users need not maintain the physical servers as it is maintained by the service
providers.
 Examples of IaaS providers include Amazon Web Services (AWS), Google Compute Engine.

 A typical IaaS provider may provide the following services:


1) Compute:
 Computing as a Service includes virtual Central Processing Inputs (CPUs) and virtual main
memory for the Virtual Machines (VMs) that are provisioned to the end users.
2) Storage:
 STaaS provides back-end storage for the VM images.
 Some of the IaaS providers also provide the back end for storing files.
3) Network:
 Network as a Service (NaaS) provides virtual networking components such as virtual router,
switch, and bridge for the VMs.
4) Load Balancers:
 Load balancing as a Service may provide load balancing capability at the infrastructure layer.

 Characteristics of IaaS are as follows:


1) Web access to the resources:
 The IaaS model enables the IT users to access infrastructure resources over the Internet.
 When accessing a huge computing power, the IT user need not get physical access to the
servers.
2) Centralized management:
 The resources distributed across different parts are controlled from any management
console that ensures effective resource management and effective resource utilization.
3) Elasticity and Dynamic Scaling:
 Depending on the load, IaaS services can provide the resources and elastic services where
the usage of resources can be increased or decreased according to the requirements.
4) Shared infrastructure:
 IaaS follows a one-to-many delivery model and allows multiple IT users to share the same
physical infrastructure and thus ensure high resource utilization.
5) Metered Services:
 IaaS allows the IT users to rent the computing resources instead of buying it.
 The services consumed by the IT user will be measured, and the users will be charged by
the IaaS providers based on the amount of usage.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 12
Academy Ch. 8 – Emerging Technologies

 The different instances of IaaS are as follows:


1) Network as a Service (NaaS):
 NaaS, an instance of IaaS, provides users with needed data communication capacity to
accommodate bursts in data traffic during data-intensive activities such as video conferencing
or large file downloads.
 It is an ability given to the end-users to access virtual network services that are provided
by the service provider over the Internet on pay-per-use basis.
 NaaS allows network architects to create virtual networks; virtual network interface cards
(NICs), virtual routers, virtual switches, and other networking components.
 NaaS providers operate using three common service models: Virtual Private Network
(VPN), Bandwidth on Demand (BoD) and Mobile Virtual Network (MVN).
2) Storage as a Service (STaaS):
 STaaS, an instance of IaaS, provides storage infrastructure on a subscription basis to users
who want a low-cost & convenient way to store data, manage off-site backups, mitigate
risks of disaster recovery, and preserve records for the long-term.
 It is an ability given to the end users to store the data on the storage services provided by
the service provider.
 STaaS allows the end users to access the files at any time from any place.
3) Database as a Service (DBaaS):
 This is also related to IaaS and provides users with seamless mechanisms to create, store,
and access databases at a host site on demand.
 It is an ability given to the end users to access the database service without the need to
install and maintain it on the pay-per-use basis.
 The end users can access the database services through any Web User Interfaces provided
by the service provider.
4) Backend as a Service (BaaS):
 It is a type of IaaS, that provides web and mobile app developers a way to connect their
applications to backend cloud storage with added services such as user management, push
notifications, social network services integration using custom software development kits
and application programming interfaces.
5) Desktop as a Service (DTaaS):
 It is an instance of IaaS that provides ability to the end users to use desktop virtualization
without buying and managing their own infrastructure.
 DTaaS is a model in which the service provider manages the back -end responsibilities of
data storage, backup, security and upgrades.
 The end-users are responsible for securing and managing their own desktop images,
applications, and security.
 These services are simple to deploy, are highly secure, and produce better experience on
almost all devices.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 13
Academy Ch. 8 – Emerging Technologies

II) Platform as a Service (PaaS):


 PaaS provides the users the ability to develop and deploy an application on the
development platform provided by the service provider.
 In traditional application development, the application will be developed locally and will
be hosted in the central location.
 PaaS changes the application development from local machine to online.
 For example- Google AppEngine, Windows Azure Compute e tc.

 Typical PaaS providers may provide the following services:


1) Programming Languages:
 PaaS providers provide a wide variety of programming languages like Java, PHP,
Python,Ruby etc. for the developers to develop applications.
2) Application Frameworks:
 PaaS vendors provide application development framework like Joomla, WordPress, Sinatra
etc. for application development.
3) Database:
 Along with PaaS platforms, PaaS providers provide some of the popular databases like
ClearDB, Cloudant, Redis etc. so that application can communicate with the databases.

4) Other Tools:
 PaaS providers provide all the tools that are required to develop, test, and deploy an
application.

 Characteristics of PaaS are as follows:


1) All in One:
 Most of the PaaS providers offer services like programming languages to develop, test,
deploy, host and maintain applications in the same Integrated Development Environment.
2) Web access to the development platform:
 PaaS provides web access to the development platform that helps the developers to
create, modify, test, and deploy different applications on the same platform.
3) Offline Access:
 To enable offline development, some of the PaaS providers allow the developer to
synchronize their local IDE with the PaaS services.
 The developers can develop an application locally and deploy it online whenever they are
connected to the Internet.
4) Built-in Scalability:
 PaaS services provide built-in scalability to an application that is developed using any
particular PaaS. This ensures that the application is capable of handling varying loads
efficiently.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 14
Academy Ch. 8 – Emerging Technologies

5) Collaborative Platform:
 To enable collaboration among developers, most of the PaaS providers provide tools for
project planning and communication.

6) Diverse Client Tools:


 PaaS providers offer a wide variety of client tools like Web User Interface (UI), Application
Programming Interface (API) etc. to help the developers to choose the tool of their choice.

III) Software as a Service (SaaS):


 SaaS provides ability to the end users to access an application over the Internet that is
hosted and managed by the service provider.
 SaaS changes the way the software is delivered to the customers.
 In the traditional software model, the software is delivered as a license-based product that
needs to be installed in the end user device.
 Since SaaS is delivered as an on-demand service over the Internet, there is no need to install
the software to the end-user’s devices.
 SaaS services can be accessed or disconnected at any time based on the end user’s needs.
 SaaS provides users to access large variety of applications over internets that are hosted on
service provider’s infrastructure.
 For example, one can make his/her own word document in Google docs online- thus
Google is provisioning software as a service.

 The services provided by SaaS are as follows:


1) Business Services:
 SaaS providers provide a variety of business services to startup companies that include
ERP, CRM, billing, sales, and human resources.
2) Social Networks:
 Since the number of users of the social networking sites is increasing exponentially, cloud
computing is the perfect match for handling the variable load.
3) Document Management:
 Most of the SaaS providers provide services to create, manage, and track electronic
documents as most of the enterprises extensively use electronic documents.
4) Mail Services:
 To handle the unpredictable number of users and the load on e - mail services, most of the
email providers offer their services as SaaS services.

 Characteristics of SaaS are as follows:


1) One to Many:
 SaaS services are delivered as one-to-many models where a single instance of the
application can be shared by multiple customers.
2) Web Access:
 SaaS services allow the end users to access the application from any location if the device is
connected to the Internet.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 15
Academy Ch. 8 – Emerging Technologies

3) Centralized Management:
 Since SaaS services are hosted and managed from the central location, the SaaS providers
perform the automatic updates to ensure that each customer is accessing the most recent
version of the application without any user-side updates.
4) Multi-device Support:
 SaaS services can be accessed from any end user devices such as desktops, laptops, tablets,
smartphones, and thin clients.
5) Better Scalability:
 Most of the SaaS services leverage PaaS and IaaS for its development and deployment and
ensure a better scalability than traditional software.
6) High Availability:
 SaaS services ensure 99.99% availability of user data as proper backup & recovery
mechanisms are implemented.
7) API Integration:
 SaaS services have the capability of integrating with other software or service through
standard APIs.

 The different instances of SaaS are as follows:


1) Testing as a Service (TaaS):
 This provides users with software testing capabilities such as generation of test data, generation
of test cases, execution of test cases and test result evaluation on a pay-per-use basis.
2) API as a Service (APIaaS):
 This allows users to explore functionality of Web services such as Google Maps, Payroll
processing, etc.
3) Email as a Service (EaaS):
 This provides users with an integrated system of emailing, office automation, records
management, migration, and integration services with archiving, spam blocking, malware
protection features

IV) Other Cloud Service Models


1) Communication as a Service (CaaS):
 CaaS has evolved in the same lines as SaaS.
 CaaS is an outsourced enterprise communication solution that can be leased from a single
vendor.
 The CaaS vendor is responsible for all hardware and software management and offers
guaranteed Quality of Service (QoS).
 This approach eliminates the large capital investments.
 Examples are: Voice over IP (VolP), Instant Messaging (IM).

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 16
Academy Ch. 8 – Emerging Technologies

2)Data as a Service (DaaS):


 DaaS provides data on demand to a diverse set of users, systems or application.
 The data may include text, images, sounds, and videos.
 Data encryption and operating system authentication are commonly provided for security.
 DaaS users have access to high-quality data in a centralized place & pay by volume or data
type, as needed.
 However, as the data is owned by the providers, users can only perform read operations
on the data.
 DaaS is highly used in geography data services and financial data services.

3) Security as a Service (SECaaS):


 It is an ability given to the end user to access the security service provided by the service
provider on a pay-per-use basis.
 It is a new approach to security in which cloud security is moved into the cloud itself whereby
cloud service users will be protected from within the cloud using a unified approach to threats.
 Four mechanisms of Cloud security that are currently provided are Email filtering, Web
content filtering, Vulnerability management and Identity management.
4) Identity as a Service (IDaaS):
 It is an ability given to the end users; typically an organization or enterprise; to access the
authentication infrastructure that is built, hosted, managed and provided by the third
party service provider.
 Generally, IDaaS includes authentication services, risk and event monitoring, single sign-on
services, and identity and profile management

1.7) Characteristics of Cloud Computing


 Major characteristics of cloud computing are given as follows:
1) High Scalability:
 Cloud environments enable servicing of business requirements for larger audiences, through
high scalability.
2) Agility (Responsiveness):
 The cloud works in the ‘distributed mode’ environment.
 It shares resources among users and tasks, while improving efficiency and agility.
3) High Availability and Reliability:
 Availability of servers is supposed to be high and more reliable as the chances of
infrastructure failure are minimal.
4) Multi-sharing:
 With the cloud working in a distributed and shared mode, multiple users and applications
can work more efficiently with cost reductions by sharing common infrastructure.
5) Services in Pay-Per-Use Mode:
 SLAs between the provider & the user must be defined when offering services in pay per
use mode. This may be based on the complexity of services offered.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 17
Academy Ch. 8 – Emerging Technologies

6) Virtualization:
 This technology allows better use of available hardware resources by running multiple OS
on one server as virtual machines and managing the virtualized software layer separately
from the hardware.
7) Performance:
 It is continuously monitored and consistent in providing high level of performance.
8) Maintenance:
 The cloud computing applications are easier, because they are not to be installed on each
user's computer and can be accessed from different places.

1.8) Advantages of Cloud Computing


1) Cost Efficiency:
 Cloud computing is probably the most cost efficient method to use, maintain and upgrade.
 Traditional desktop software costs companies a lot in terms of finance. Adding up the
licensing fees for multiple users can prove to be very expensive for the establishment
concerned.
 The cloud, on the other hand, is available at much cheaper rates and hence, can
significantly lower the company’s IT expenses.
2) Almost Unlimited Storage:
 Storing information in the cloud gives us almost unlimited storage capacity.
 Hence, one no more need to worry about running out of storage space or increasing the
current storage space availability.
3) Backup and Recovery:
 Since all the data is stored in the cloud, backing it up and restoring the same is relatively
much easier than storing the same on a physical device.
 Furthermore, most cloud service providers are usually competent enough to handle
recovery of information.
4) Easy Access to Information:
 Once registered in the cloud, one can access the information from anywhere, where there
is an Internet connection.
 This convenient feature lets one move beyond time zone and geographic location issues.
5) Quick Deployment:
 Once we opt for this method of functioning, the entire system can be fully functional in a
matter of a few minutes.
6) Automatic Software Integration:
 In the cloud, software integration is usually something that occurs automatically.
 This means that we do not need to take additional efforts to customize and integrate the
applications as per our preferences.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 18
Academy Ch. 8 – Emerging Technologies

1.9) Issues/ Challenges relating to Cloud Computing

1.9) - Issues / Challenges

A) - Security Issues B) – Implementation /


Adaptation Issues

A) Security Issues:
1) Confidentiality:
 Prevention of the unauthorized disclosure of the data is referred as Confidentiality.
 Normally, Cloud works on public networks; therefore, there is a requirement to keep the
data confidential from unauthorized entities.
 With the use of encryption and physical isolation, data can be kept secret.
2) Integrity:
 Integrity refers to the prevention of unauthorized modification of data and it ensures that
data is of high quality, correct, consistent and accessible.
 It should be ensured that the data is not changed after being moved to the cloud.
 The most direct way to enforce the integrity control is to employ cryptographic hash function.
3) Availability:
 Availability refers to the prevention of unauthorized withholding of data.
 It ensures the data backup through Business Planning Continuity Planning (BCP) and
Disaster Recovery Planning (DRP).
 Availability can be affected by temporary breakdowns, Denial of Service (DoS) attacks,
equipment failure, and natural calamities etc.
4) Privacy:
 Privacy is also considered as one of the important issues in Cloud.
 The Cloud should be designed in such a way that it decreases the privacy risk.
5) Trust:
 Trust is an important issue in Cloud.
 Various clients’ oriented studies reveal that Cloud has still failed to build trust between the
client and service provider.
 Trust ensures that service arrangements have sufficient means to allow visibility into the
security and privacy controls employed by the Cloud provider and their performance over time.
6) Legal Issues and Compliance:
 There are various requirements relating to legal, privacy and data security laws that need
to be studied in Cloud system.
 One of the major troubles with laws is that they vary from place to place, and users have
no assurance of where the data is located physically.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 19
Academy Ch. 8 – Emerging Technologies

7)Data Stealing:
 In a Cloud, data stored anywhere is accessible by anyone at any time.
 In such cases, an issue arises as data stealing.
 Some of the Cloud providers do not use their own server; instead they use server/s from
other service providers.
 In that case, there is a probability that the data is less secure and is more prone to the loss.
8) Incident Response:
 It ensures to meet the requirements of the organization during an incident.
 It ensures that the Cloud provider has a transparent response process in place and
sufficient mechanisms to share information during and after an incident.
B) Implementation/ Adaption Issues:
1) Threshold Policy:
 This is a policy which defines cyclical use of any application e.g. credit card validation
application.
 Threshold policy helps in creation of additional instances or processing capabilities when
there is sudden increase in demand to fill in that demand and as the demand decreases
instances would be de- allocated and put to other use.
2) Interoperability:
 If a company outsources or creates applications with one cloud computing vendor, the
company may find it difficult to change to another computing vendor that has proprietary
APIs (Application Program Interface) and different formats for importing and exporting data.
 This creates problems of achieving interoperability of applications between two cloud
computing vendors.
3) Hidden Costs:
 Cloud computing service providers do not reveal hidden costs such as higher charges for
data storage & use of applications during peak time.
 Companies far from the location of cloud providers could experience latency, particularly
when there is heavy traffic.
4) Unexpected Behaviour:
 It is important to test the application in the cloud with a pilot study to check for
unexpected behaviour.
 Examples of test include how the application validates transaction say credit card
verification.
 If the tests show unexpected results, we need to fix the problem before executing or
obtaining cloud services from the cloud.
 Thus before migrating to cloud the companies should test the cloud services for correct
outputs particularly during peak period.
5) Environment Friendly Cloud Computing:
 One incentive for cloud computing is that it may be more environment friendly as it reduces
the number of hardware components needed to run applications on the company's
internal data centre and also reduces energy for running and cooling hardware.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 20
Academy Ch. 8 – Emerging Technologies

6) Software Development in Cloud:


 To develop software using high-end databases, the most likely choice is to use cloud server
pools at the internal data corporate centre and extend resources temporarily for testing
purposes.
 This allows project managers to control costs, manage security and allocate resources to
clouds for a project.
 The project managers can also assign individual hardware resources to different cloud
types: Web development cloud, testing cloud, and production cloud.
 The cost associated with each cloud type may differ from one another.

 Part 2- Mobile Computing

Part 2- Mobile computing

2.1) - Introduction 2.2) - Components 2.3) - Working 2.4) - Mobile computing


services

2.5) - Benefits 2.6) - Limitations 2.7) - Issues

2.1) Introduction:
 It refers to the technology that allows transmission of data via a computer without having
to be connected to a fixed physical link.
 Mobile computing is an extension of mobile voice communication technology with the
ability to send and receive data across these cellular networks.
 This is the fundamental principle of mobile computing.
 Mobile data communication has become a very important as it allows users to transmit
data from remote locations to other remote or fixed locations.

2.2) Components of Mobile Computing:


 The key components of Mobile Computing are as follows:
1) Mobile Communication:
 This refers to the infrastructure put in place to ensure that seamless and reliable
communication goes on.
 This would include communication properties, protocols, data formats and concrete
technologies.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 21
Academy Ch. 8 – Emerging Technologies

2) Mobile Hardware:
 This includes mobile devices or device components that receive or access the service of
mobility.
 They would range from Portable laptops, Smart Phones, Tablet PCs, and Personal Digital
Assistants (PDA) that use an existing and established network to operate on.
 At the back end, there are various servers like Application Servers, Database Servers and
Servers with wireless support, a Communications Server etc.
 The characteristics of mobile computing hardware are defined by the size and form factor,
weight, microprocessor, primary storage, secondary storage, screen size and type, means
of input, means of output, battery life, communications capabilities, expandability and
durability of the device.

3) Mobile Software:
 Mobile Software is the actual programme that runs on the mobile hardware and deals with
the characteristics and requirements of mobile applications.
 It is the operating system of that appliance and is the essential component that makes the
mobile device operates.
 Mobile applications popularly called Apps are being developed by organizations for use by
customers but these apps could represent risks, in terms of flow of data as well as personal
identification risks, introduction of malware and access to personal information of mobile
owner.

2.3) How Mobile Computing Works?


 Here is how Mobile Computing works:
1) The user enters or access data using the application on handheld computing device.
2) Using one of several connecting technologies, the new data are transmitted from handheld
to site’s information system where files are updated and the new data are accessible to
other system user.
3) Now both systems (handheld and site’s computer) have the same information and are in
sync.
 The process is similar to the way a worker’s desktop PC access the organization’s applications,
except that user’s device is not physically connected to the organization’s system.
 The communication between the user device and site’s information systems uses different
methods for transferring and synchronizing data, some involving the use of Radio Frequency
(RF) technology.

2.4) Mobile Computing Services


\

 The ability to share information across a wireless platform is becoming more vital to the
today’s business communication needs.
 Various companies design and develop several wireless applications and solutions for
Blackberry, iPhone, Google Android G1, iPad, Windows Mobile, Symbian, Brew devices, PDA,
Palm & Pocket PC.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 22
Academy Ch. 8 – Emerging Technologies

 Mobile Computing Services allow mobile workforces to access a full range of corporate
services and information from anywhere, at any time and it improves the productivity of a
mobile workforce by connecting them to corporate information systems.
 The goal of mobile computing is to work towards true computing freedom (free from the
tyranny of location), whereby users can connect to the network from anywhere, anytime
and operate as if they were sitting in the "home" office.

2.5) Benefits of Mobile Computing


 In general, Mobile Computing is a strategic technology that:
 Increases information quality and accessibility,
 Enhances operational efficiency, and
 Improves management effectiveness.
 But, more specifically, it leads to a range of tangible benefits, including the following:
1) It provides mobile workforce with remote access to work order details, such as contact
information, required completion date, asset history relevant warranties/service contracts.
2) It enables mobile sales personnel to update work order status in real-time, facilitating
excellent communication.
3) It facilitates access to corporate services and information at any time, from anywhere.
4) It provides remote access to the corporate Knowledgebase at the job location.
5) It enables us to improve management effectiveness by enhancing information flow and
ability to control a mobile workforce.

2.6) Limitations of Mobile Computing


1) Insufficient Bandwidth:
 Mobile Internet access is generally slower than direct cable connections using technologies
such as General Packet Radio Service (GPRS) and Enhanced Data for GSM (Global System for
Mobile Communication), and more recently 3G networks.
 These networks are usually available within range of commercial cell phone towers.
2) Security Standards:
 When working mobile, one is dependent on public networks, requiring careful use of
Virtual Private Network (VPN).
 Security is a major concern while concerning the mobile computing standards.
 One can easily attack the VPN through a huge number of networks interconnected through
the line.
3) Power consumption:
 When a power outlet or portable generator is not available, mobile computers must rely
entirely on battery power.
 Combined with the compact size of many mobile devices, this often means unusually
expensive batteries must be used to obtain the necessary battery life.
 Mobile computing should also look into Greener IT in such a way that it saves the power or
increases the battery life.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 23
Academy Ch. 8 – Emerging Technologies

4) Transmission interferences:
 Weather, terrain, and the range from the nearest signal point can all interfere with signal
reception.
 Reception in tunnels, some buildings, and rural areas is often poor.
5) Potential health hazards:
 People who use mobile devices while driving are often distracted from driving are thus
assumed to be more likely involved in traffic accidents.
 There are allegations that cell phone signals may cause health problems.
6) Human interface with device:
 Screens and keyboards tend to be small, which may make them hard to use.
 Alternate input methods such as speech or handwriting recognition require training.

2.7) Issues in Mobile Computing


1) Security Issues:
 Wireless networks have relatively more security requirements than wired network.
 A number of approaches have been suggested & also the use of encryption has been proposed.
 Confidentiality: Preventing unauthorized users from gaining access to critical
information of any particular user.
 Integrity: Ensures unauthorized modification, destruction or creation of information
cannot take place.
 Availability: Ensuring authorized users getting the access they require.
 Legitimate: Ensuring that only authorized users have access to services.
 Accountability: Ensuring that the users are held responsible for their security related
activities by arranging the user and his/her activities are linked if and when necessary.
2) Power Consumption:
 Mobile Computers will rely on their batteries as the primary power source.
 Batteries should be ideally as light as possible but at the same time they should be capable
of longer operation times.
 Power consumption should be minimized to increase battery life.
 Chips can be redesigned to operate at lower voltages.
 Individual Components, be powered down when they are idle.
3) Reliability, coverage, capacity, & cost:
 At present; wireless network is less reliable, have less geographic coverage and reduced
bandwidth, are slower, and cost more than the wired-line network services.
4) Integration with legacy mainframe and emerging client/server applications :
 Application development paradigms are changing.
 As a result of the IT industry's original focus on mainframes, a huge inventory of applications
using communications interfaces that are basically incompatible with mobile connectivity
have been accumulated.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 24
Academy Ch. 8 – Emerging Technologies

5) End-to-end design and performance:


 Since mobile computing involves multiple networks (including wired) & multiple application
server platforms; end-to-end technical compatibility, server capacity design, and network
response time estimates are difficult to achieve.
6) Business challenges:
 In addition to these technical challenges, mobile computing also faces business challenges.
 This is due to the lack of trained professionals to bring the mobile technology to the
general people and development of pilot projects for testing its capabilities.

 Part 3- BYOD

Part 3- BYOD

3.1) - Introduction 3.2) - Advantages 3.3) - Threats

3.1) Introduction
 BYOD (Bring Your Own Device) refers to business policy that allows employees to use their
preferred computing devices, like smart phones and laptops for business purposes.
 It means employees are welcomed to use personal devices (laptops, smart phones, tablets
etc.) to connect to the corporate network to access information and application.
 The BYOD policy has rendered the workspaces flexible, empowering employees to be
mobile and giving them the right to work beyond their required hours.
 BYOD has led to an increase in employees’ satisfaction and reduction in IT desktop costs
for organizations.

3.2) Advantages of BYOD:


1) Happy Employees:
 Employees love to use their own devices when at work.
 This also reduces the number of devices an employee has to carry; otherwise he would be
carrying his personal as well as organization provided devices.
2) Lower IT budgets:
 The employees could involve financial savings to the organization since employees would
be using the devices they already possess, thus reducing the outlay of the organization in
providing devices to them.
3) IT reduces support requirement:
 IT department does not have to provide end user support & maintenance for all these
devices resulting in cost savings.
4) Early adoption of new Technologies:
 Employees are generally proactive in adoption of new technologies that result in enhanced
productivity of employees leading to overall growth of business.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 25
Academy Ch. 8 – Emerging Technologies

5) Increased employee efficiency:


 The efficiency of employees is more when the employee works on his/her own device.
 In an organization provided devices, employees have to learn and there is a learning curve
involved in it.

3.3) Emerging BYOD Threats:


1) Application Risks:
 It is normally exemplified in Application Viruses and Malware.
 Reports have revealed that a majority of employees’ phones and smart devices that were
connected to the corporate network weren’t protected by security software (Anti-Virus s/w).
 Organizations are not clear in deciding that ‘who is responsible for device security – the
organization or the user’.
2) Network Risks:
 It is normally exemplified in Lack of Device Visibility.
 When company-owned devices are used by all employees within an organization, the
organization’s IT practice has complete visibility of the devices connected to the
network.
 This helps to analyze traffic and data exchanged over the Internet.
 As BYOD permits employees to carry their own devices (smart phones, laptops for business
use), the IT practice team is unaware about the number of devices being connected to the
network.
 As network visibility is of high importance, this lack of visibility can be hazardous.
3) Device Risks:
 It is normally exemplified in Loss of devices
 A lost or stolen device can result in an enormous financial and reputational
embarrassment to an organization as the device may hold sensitive corporate information.
 Data lost from stolen or lost devices ranks as the top security threats.

4) Implementation Risks:
 It is normally exemplified in Weak BYOD Policy.
 For effective implementation of the BYOD program organisation should mandate
development of a robust implementation policy.
 Because corporate knowledge and data are key assets of an organization, the absence of a
strong BYOD policy would fail to communicate employee expectations, thereby increasing
the chances of device misuse.
 In addition to this, a weak policy fails to educate the user, thereby increasing vulnerability to
the above mentioned threats.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 26
Academy Ch. 8 – Emerging Technologies

 Part 4- Social Media and Web:

Part 4- Social Media & Web

4.1) - Social Media 4.2) - Web 2.0 4.3) - Web 3.0

4.1) Social media:


 A social network is usually created by a group of individuals, who have a set of common
interests and objectives.
 There are usually a set of network formulators followed by a broadcast to achieve the
network membership.
 This happens both in public and private groups depending upon the confidentiality of the
network.
 After the minimum numbers are met, the network starts its basic operations and goes out
to achieve its goal.
 Success of a social network mainly depends on contribution, interest and motivation of its
members along with technology backbone or platform support that makes the life easier to
communicate & exchange information to fulfill a particular communication need.
 Due to the various facets of the human species, we can have multiple types of social networks
in all the fields and areas.
 This can range from a network of researchers, to a network of doctors to a network of
academics.
 Each type of network has its own focus area, member size, geographical spread, societal
impact & objective.

4.2) Web 2.0:

4.2 - Web2.0

I) - Short Note II) - Components III) - Applications

IV) - Types & Behaviour of V) - Life cycle of VI) - Benefits and


social network social network challenges

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 27
Academy Ch. 8 – Emerging Technologies

I) Short Note:
 Web 2.0 is the term given to describe a second generation of the World Wide Web that is
focused on the ability for people to collaborate and share information online.
 The two major contributors of Web 2.0 are the technological advances enabled by Ajax
(Asynchronous JavaScript and XML) and other applications such as RSS (Really Simple
Syndication) and Eclipse that support the user interaction.
 This refers to the transition from static HTML Web pages to a more dynamic Web that is
more organized and is based on serving Web applications to users.
 Other improved functionality of Web 2.0 includes open communication & sharing of
information.
 One of the most significant differences between Web 2.0 and the traditional World Wide
Web (referred as Web 1.0) is that Web 2.0 facilitates greater collaboration and information
sharing among Internet users, content providers and enterprises.
 Thus it can be said that the migration is from the “read-only web” to “read-write web”
 The main agenda of Web 2.0 is to connect people in numerous new ways and utilize their
collective strengths, in a collaborative manner.
 In this regard, many new concepts have been created such as Blogging, Social Networking,
Communities, Mash-ups, and Tagging.

II) Components of Web 2.0:


1) Communities:
 These are an online space formed by a group of individuals to share their thoughts, ideas
and have a variety of tools to promote Social Networking.
2) RSS-generated Syndication:
 RSS is a format for syndicating web content that allows feed the freshly published web
content to the users through the RSS reader.
3) Blogging:
 A blog is a journal, diary, or a personal website that is maintained on the internet, and it is
updated frequently by the user. Blogging allows a user to make a post to a web log or a blog.
 Blogs give the users of a Social Network the freedom to express their thoughts in a free
form basis and help in generation and discussion of topics.
4) Wikis:
 A Wiki is a set of co-related pages on a particular subject and allow users to share content.
 Wikis are very easy to create and maintain.
5) Usage of Ajax and other new technologies:
 With Ajax, web applications can send data to and retrieve from a server asynchronously
without interfering with the display and behaviour of the existing page.
 Ajax is a way of developing web applications that combines XHTML and CSS (Cascading
Style Sheets) standards- based presentation.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 28
Academy Ch. 8 – Emerging Technologies

6) Folksonomy:
 In folksonomy users can tag their content online and this enables others to easily find and
view content.
 This allows the free classification of information available on the web, which helps the users
to classify and find information, using approaches such as tagging.
 Also known as Social Bookmarking, the bookmarks in a folder are not stored on the user’s
computer rather tagged pages are stored on the web increasing the accessibility from any
computer connected to the Internet.
7) File Sharing:
 This is the facility, which helps users to send their media files and related content online for
other people of the network to see and contribute.
8) Mashups:
 This is the facility, by using which people on the internet can congregate services from
multiple vendors to create a completely new service.
 An example may be combining the location information from a mobile service provider and
the map facility of Google maps in order to find the exact information of a cell phone device
from the internet, just by entering the cell number.

III) Applications of Web 2.0


 Web 2.0 finds applications in different fields, some of which are as follows:
1) Social Media:
 Social Media/Social Network is an important application of web 2.0 as it provides a fundamental
shift in the way people communicate and share information.
 The social web offers a number of online tools and platforms that could be used by the users to
share their data, perspectives, and opinions among other user communities.
2) Marketing:
 Web 2.0 offers excellent opportunities for marketing by engaging customers in various
stages of the product development cycle.
 It allows the marketers to collaborate with consumers on various aspects such as product
development, service enhancement, and promotion.
 Collaboration with the business partners and consumers can be improved by the
companies by utilizing the tools provided by Web 2.0 paradigm.
 Consumer -oriented companies use networks such as Twitter and Facebook as common
elements of multichannel promotion of their products.
3) Education:
 Web 2.0 technologies can help the education scenario by providing students and faculty
with more opportunities to interact and collaborate with their peers.
 By utilizing the tools of Web 2.0, the students get the opportunity to share what they learn
with other peers by collaborating with them.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 29
Academy Ch. 8 – Emerging Technologies

IV) Types and Behaviour of Social Networks


 The main Categories of social networks identified are given below:
1) Social Contact Networks:
 These types of networks are formed to keep contact with friends and family.
 They have all components of Web 2.0 like blogging, tagging, wikis.
 Examples: Orkut, Facebook and Twitter.
2) Study Circles:
 These are social networks dedicated for students, where they can have areas dedicated to
student study topics, placement related queries and advanced research opportunity
gathering.
 These have components like blogging and file sharing.
 Examples: Fledge Wing and College Tonight.
3) Social Networks for Specialist Groups:
 These types of social networks are specifically designed for core field workers like doctors,
scientists, engineers, members of the corporate industries.
 Example: LinkedIn.
4) Networks for Fine Arts:
 These types of social networks are dedicated to people linked with music, painting &
related arts & have lots of useful networking information for all aspiring people of the same
line.
5) Police and Military Networks:
 These types of networks, though not on a public domain, operate much like social networks
on a private domain due to the confidentiality of information.
6) Sporting Networks:
 These types of social networks are dedicated to people of the sporting fraternity and have a
gamut of information related to this field.
 Examples of these include Athlinks.
V) Life Cycle of Social Networks
For any social network, there are a number of steps in its life cycle. For all the steps in the
life cycle, Web 2.0 provides tools and concepts, which are not only cost effective but very
easy to implement.

Need for Social Initial set of Creating space for social


network members identified networking sites

Share group Have discussions Conduct regular meetings


data with all on important topic
members

Achieve final goal or Interact with other


terminate network networks (mash up)

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 30
Academy Ch. 8 – Emerging Technologies

VI) Benefits and Challenges for Social Networks using Web 2.0

 Benefits:
 Web 2.0 provides a platform where users of the network need not to worry about the
implementation or underlying technology.
 Concepts of Web 2.0 like blogging are some things that people do on a day-to-day basis and
no new knowledge skills are required.
 Web 2.0 techniques are very people centric activities and thus, adaptation is very fast.
 People are coming much closer to another and all social and geographical boundaries are
being reduced at lightning speed.
 Challenges:
 One of the major aspects is data security and privacy and in such public domains, there is a
huge chance of data leak and confidentiality loss.
 Privacy of individual users also arises and can create a huge problem if malicious users
somehow manage to perpetuate the social networks.

4.3) Web 3.0


 The term Web 3.0, also known as the Semantic Web, describes sites wherein the
computers will be generating data on their own without direct user interaction.
 Web 2.0 technologies allows the use of read/write web, blogs, interactive web applications,
rich media, tagging or folksonomy.
 At the same time, Web 3.0 standard uses semantic web technology, drag and drop mash -
ups, widgets, user behaviour, user engagement, etc.
 Web 3.0 technology uses the “Data Web” Technology, which features the data records that
are publishable and reusable on the web through query- able formats.
 The Web 3.0 standard also incorporates the latest researches in the field of artificial
intelligence.
 An example of typical Web 3.0 application is the one that uses content management systems
along with artificial intelligence. These systems are capable of answering the questions posed
by the users, because the application is able to think on its own and find the most probable
answer, depending o n the context, to the query submitted by the user.
 In this way, Web 3.0 can also be described as a “machine to user” standard in the internet.
The two major components of Web 3.0 are as follows:
a) Semantic Web:
 This provides the web user a common framework that could be used to share and reuse the
data across various applications, enterprises, and community boundaries.
 This allows the data and information to be readily intercepted by machines, so that the
machines are able to take contextual decisions on their own by finding, combining & acting
upon relevant information on the web.
b) Web Services:
 It is a software system that supports computer-to-computer interaction over the Internet.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 31
Academy Ch. 8 – Emerging Technologies

 Part 5 - Green IT
 It is the study & practice of establishing / using computers & IT resources in a more
efficient and environmentally friendly and responsible way.
 Computers consume a lot of natural resources, from the raw materials needed to
manufacture them, the power used to run them, and the problems of disposing them at
the end of their life cycle.
 Green computing is the environmentally responsible use of computers and related
resources and includes practices such as:
 Implementation of energy-efficient Central Processing Units (CPUs), servers & peripherals,
 Reduced resource consumption &
 Proper disposal of electronic waste (e-waste).
 The objective of Green computing is to reduce the use of hazardous materials, maximize
energy efficiency during the product’s lifetime, and promote the recyclability or
biodegradability of defunct products and factory waste.
 Many IT vendors have major initiatives underway to green their products, services and
practices like:
 Building computers with more environmentally friendly materials,
 Designing them to be consume less energy,
 Providing recycling programs to dispose of old systems,
 Developing virtualization and cloud computing alternatives, and
 Providing tips to businesses that want to go green.

5.1) Green Computing Best Practices:


 ‘The work habits of computer users & businesses can be modified to minimize adverse
impact on the global environment’.
 Some of such steps, which can be followed for Green IT are:
 Develop a sustainable Green Computing plan:
1) Involve stakeholders to include checklists, recycling policies, recommendations for disposal
of used equipment, government guidelines and recommendations for purchasing green
computer equipment in organizational policies and plans;
2) Encourage the IT community for using the best practices and encourage them to consider
green computing practices and guidelines.
3) On-going communication about and campus commitment to green IT best practices to
produce notable results
4) Include power usage, reduction of paper consumption, as well as recommendations for
new equipment and recycling old machines in organizational policies and plans; and
5) Use cloud computing so that multiple organizations share the same computing resources,
thus increasing the utilization by making more efficient use of hardware resources.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 32
Academy Ch. 8 – Emerging Technologies

 Recycle:
1) Dispose e-waste according to central, state and local regulations;
2) Discard used or unwanted electronic equipment in a convenient and environmentally
responsible manner as computers emit harmful emissions ;
3) Manufacturers must offer safe end -of-life management and recycling options when
products become unusable; and
4) Recycle computers through manufacturer’s recycling services.

 Make environmentally sound purchase decisions:


1) Purchase of desktop computers, notebooks & monitors based on environmental attributes;
2) Provide a clear, consistent set of performance criteria for the design of products;
3) Recognize manufacturer efforts to reduce the environmental impact of products by
reducing or eliminating environmentally sensitive materials, designing for longevity and
4) Use Server and storage virtualization that can help to improve resource utilization, reduce
energy costs and simplify maintenance.

 Reduce Paper Consumption:


1) Reduce paper consumption by use of e-mail and electronic archiving;
2) Use of “track changes” feature in electronic documents, rather than redline corrections on
paper;
3) Use online marketing rather than paper based marketing; e -mail marketing solutions that
are greener, more affordable, flexible and interactive than direct mail; free and low-cost
online invoicing solutions that help cut down on paper waste; and
4) While printing documents; make sure to use both sides of the paper, use smaller fonts and
margins, and selectively print required pages.

 Conserve Energy:
1) Use Liquid Crystal Display (LCD) monitors rather than Cathode Ray Tube (CRT) monitors.
2) Use notebook computers rather than desktop computers whenever possible.
3) Use the power-management features to turn off displays after several minutes of inactivity.
4) Power-down the CPU and all peripherals during extended periods of inactivity.
5) Try to do computer-related tasks during contiguous, intensive blocks of time, leaving
hardware off at other times.
6) Power-up and power-down energy-intensive peripherals such as laser printers according to
need.
7) Employ alternative energy sources for computing workstations, servers, networks & data
centers.
8) Adapt more of Web conferencing offers instead of travelling to meetings in order to go
green and save energy.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 33
Academy Ch. 8 – Emerging Technologies

5.2) Green IT Security Services and Challenges


 IT solutions providers are offering green security services in many ways.
 The basic aim is to increase the customer's energy savings through green security services
and assess that ‘how sustainable computing technology can immediately help the
environment’.
 Green IT services present many benefits for clients as well as providers, but knowing
‘how to evaluate a client's infrastructure to accommodate green technology is really a
vital issue’.
 Moreover, apart from the common security issues, the green security emphasizes the
role of security tools, methods and practices that reduce a company's environmental
impact.

Important Questions
1) What is cloud computing? Explain some pertinent similarities and differences
between cloud and grid computing.
2) Discuss major goals of cloud computing.
3) Describe front end and back end architecture with reference to cloud computing.
4) What do you understand by public cloud? Also discuss its major advantages and limitations
in brief.
5) What do you understand by private cloud? Also discuss its major advantages and limitations
in brief.
6) Explain characteristics of the following with reference to cloud computing:
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS
7) Explain characteristics of cloud computing.
8) Briefly discuss advantages of cloud computing.
9) Discuss any four challenges to cloud computing.
10) Explain some tangible benefits of mobile computing.
11) The work habits of computer users and businesses can be modified to minimize
adverse impact on the global environment. Discuss some of such steps, which can be
followed for Green IT. Or
Discuss best practices of Green IT
12) Discuss some of the pertinent objectives in order to achieve the goals of cloud computing.
13) Discuss the security and implementation issues in using the cloud computing
technology for running the new web application.

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 34
Academy Ch. 8 – Emerging Technologies

14) List major advantages and disadvantages of hybrid cloud


15) What is community cloud? Discuss its advantages and limitations.
16) Discuss components of mobile computing.
17) Discuss security issues of mobile computing.
18) Platform as a service and Infrastructure as a service are two of the three main
categories of cloud computing. What is the third category? Explain in brief.
19) Explain components of Web 2.0.
20) Discuss limitations of mobile computing
21) Discuss pertinent issues of mobile computing.
22) Write short notes on the following:
a) Hybrid Cloud f) IaaS
b) Mobile computing g) Paas
c) BYOD h) SaaS
d) Web 2.0 i) NaaS
e) Green IT j) CaaS

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 35
Academy Ch. 8 – Emerging Technologies

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123
Yuvraj Bachhawat’s CA Final - ISCA 8. 36
Academy Ch. 8 – Emerging Technologies

© CA YUVRAJ BACHHAWAT (DISA)


(M) 07096111123

You might also like