Easy Office
LCI Learning

CA Final ISCA Amended Notes for Nov. 2016 in Question answer format covering all new concepts and amended topics. #pdf
4715 times
454 KB
Rating:4.6

Download Other files in Students category

File Content -

Chapter 8 Emerging Technology By : Pardeep Rohilla Page 1 Hii dear friends. Due to lot of changes in Emerging Technology Chapter. I have prepared a complete set of questions which are covered 100% concepts from Study Material with amended Questions which are applicable from CA Final November 2016 Exam. Since many friends request for CA Final ISCA notes in question answer format So now I am submitted to you. Please give your response if you like these so that I can further move to other chapters. - Thanking YouPardeep Rohilla Chapter 8 Emerging Technology By : Pardeep Rohilla Page 2 (Emerging Technology) Q.1 What is Cloud Computing ∑Cloud computing simply means the use of computing resources as a service through networks, typically the Internet . ∑Cloud computing is both, a combination of software and hardwarebased computing resources delivered as a networked service. ∑This model of IT enabled services enables anytime accessto a shared pool of applications and resources. ∑With cloud computing, companies can scale up to massive capacities in an instant without having to invest in new infrastructure, train new personnel or license new software . ∑Cloud computing is of particular benefital to small and medium-sized business systems, who wish to completely outsource their data-center infrastructure; or large companies, who wish to get peak load capacity without incurring the higher cost of building larger data centers internally. ∑End users are not need to care about “ How servers and networks are maintained in the cloud.” ∑In both the instances, service consumers use ‘what they need on the Internet’ and pay only for ‘what they use’. E.g : Google apps where any application can be accessed using browser & can be deployed (install)on thousand of computers using internet. Q.2 What is Pertinent issues. M.T : For know about issue of cloud - U S E T H I S ∑Unexpected Behaviors : Chapter 8 Emerging Technology By : Pardeep Rohilla Page 3 ∑Security issue : ∑Environment friendly cloud computing : ∑Threshold Policy : ∑Hidden Cost : ∑Interoperability : ∑Software development in cloud : Chapter 8 Emerging Technology By : Pardeep Rohilla Page 4 Q. 3 Objective/ Goal of Cloud computing ? M.T : ?माराCONSOLIDATED?ै?ड?ु प, ANY WHERE & ANY TIME जबभीNEEDहो AVAILABLEहो जाते है, वो भी िबनाCOSTकी परवाह िकए! ?योकी हमार# दो?त"ECO- FRIENDLY है& ?मेशा?यान दे ती हैSCALE?ै?ड?ु पपर! ∑To consolidateIT infrastructure into a more integrated and manageable environment; ∑To access services and data from anywhereat any time; ∑To enable or improve “Anywhere Access (AA)”for ever increasing users; and ∑To Availability& provision of resources as needed. ∑To scalethe IT ecosystem quickly, easily and cost-effectively based on the evolving business needs; ∑To create a highly efficient IT ecosystem, where resources are pooled together and costs are aligned with what resources are actually used; ∑To reduce costsrelated to IT energy/power consumption; Chapter 8 Emerging Technology By : Pardeep Rohilla Page 5 Q.4 What is Grid Computing ? Explain its reasons for so popular i.e characteristic. Ans. The computing resources in most of the organizations are underutilized but are necessary for certain operations. The idea of Grid computing is to make use of such non- utilized computing power by the needy organizations, and thereby the Return On Investment (ROI) on computing investments can be increased. Thus, Grid computing is a network of computing or processor machines managed with a kind of software such as middleware, in order to access and use the resources remotely. The managing activity of grid resources through the middleware is called Grid Services. Grid Services provide access control, security, access to data including digital libraries and databases, and access to large-scale interactive and long-term storage facilities. Grid Computing is more popular due to the following reasons: ∑It has the ability to make use of unused computing power, and thus, it is a cost effective solution (reducing investments, only recurring costs). ∑This enables different resources of computers to work cooperativelyand collaboratively to solve a scientific problem. Q. 5 Cloud vs Grid Computing. Explain Some Pertinent similarities & differences? Ans : Cloud computing evolved (i.e developed) from Grid computing and provides on demand resource provisioning. Grid computing requires use of software that can divide and carve out pieces of program as one large system. If one piece of software on a node fails, then other pieces of software of software on other node also fail. Some pertinent similarities and differences between cloud and grid computing are highlighted as follows: A) Similarities : ∑Cloud computing and grid computing both are scalable: ∑Scalability is accomplished through load balancing of application instances running separately on a variety of operating systems and connected through Web services. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 6 ∑CPU and network bandwidth is allocated and de-allocated on demand. ∑The system's storage capacity goes up and down depending on the number of users, instances, and the amount of data transferred at a given time. ÿBoth computing types involve multi-tenancy and multitasking: ∑its mean that many customers can perform different tasks, accessing a single or multiple application instances. ∑Sharing resources among a large pool of users assists in reducing infrastructure costs and peak load capacity. ∑Cloud and grid computing provide Service- Level Agreements (SLAs) for guaranteed uptime availability of, say, 99 percent. If the service slides below the level of the guaranteed uptime service, the consumer will get service credit for not receiving data within stipulated time. B) Differences : ÿWhile the storage computing in the grid is well suited for large data storage, it is not economically suited for storing objects as small as 1 byte. ÿIn a data grid, the amounts of distributed data must be large for maximum benefit. While in cloud computing, we can store an object as low as 1 byte and as large as 5 GB or even several terabytes. ÿA computational grid focuses on computationally intensive operations, while cloud computingoffers two types of instances: standard and high-CPU. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 7 Q. 6 What is Cloud computing ARCHITECTURE ? Ans. Front EndBack EndMiddle ware (back end) It is device of clientIn cloud computing , Cloud itself is back end. ÿIt will contains protocols. ÿIt allows computers to connect each other . It needs some application to back end or say cloud computing system. ÿLotof redundant backup so. ÿIt includes 100s of storage devices, servers and various computing machines. ÿIt monitors clients demand. The Cloud Computing Architecture (CCA)of a cloud solution is the structure of the system, which comprises of on-premise and cloud resources, services, middleware, and software components, and the relationships between them. A cloud computing architecture consists of a Front End and a Back End. They connect to each other through a network, usually the Internet. The front end is the side, the computer user sees and interacts through , andthe back end is the “cloud” section of the system, truly facilitating the services. The details are given as follow: Front End Architecture : The front end of the cloud computing system comprises of the client’s devices (or computer network) and some applications needed for accessing the cloud computing system. All the cloud computing systems do not give the same inter face to users. But havee some unique applications which provide network access to its clients. Web services like electronic mail programs use some existing web browsers such as Firefox, internet explorer or Google chrome. Back End Architecture: Back end refers to some service facilitating peripherals. In cloud computing, the back end is cloud itself, which may encompass various computer machines, data storage systems and servers. Groups of these clouds make up a whole cloud computing system. Theoretically, a cloud computing system can include any type of web application program such as video games to applications for data processing, software development Chapter 8 Emerging Technology By : Pardeep Rohilla Page 8 and entertainment. Usually, every application would have its individual dedicated server for services. There are some set of rules, technically referred as protocols, are followed by this server and it uses a special type of software known as middleware. Middleware allows computers that are connected on networks to communicate with each other. If any cloud computing service provider has many customers, then there’s likely to be very high demand for huge storage space. Many companies that are service providers need hundreds of storage devices. The cloud computing system must have a redundant back-up copy of all the data of its client’s. Q.7 What is Cloud computing TYPES or Cloud computing Environment ? Private PublicCommunity Hybrid Developed by IT Dept. within Enterprise. It is more scalable. Having affordable cost. A private cloud is shared between several organization. It is combo of Private & Public. Use exclusive for benefit of org. Admin by third party & used by general public(user) It is provision for exclusive use by specific community from shared org. When Pvt. cloud are forms Partner ship with Public cloud. It also called internal cloud.It also called Provider cloud.Suitable for those org. that can not afford Private cloud and not rely upon Public cloud. When Public cloud are forms Partner ship with Private cloud. E.g : Server of Facebook. E.g : Server of Amazon. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 9 Q.8 What is Private cloud? Also explain its major advantages and limitations in brief. ÿThis cloud computing environment resides within the boundaries of an organization and ÿis used exclusively for the organization’s benefits. These are also called internal clouds. ÿThey are built primarily by IT departments within enterprises, who seek to optimize utilization of infrastructure resources within the enterprise by provisioning the infrastructure with applications using the concepts of grid and virtualization. Advantages of Private Cloud : ÿThey improve average server utilization; allow usage of low-cost servers and hardware while providing higher efficiencies; thus reducing the costs that a greater number of servers would otherwise entail. ÿIt provides a high level of security and privacy to the user. ÿIt is small in size and controlled and maintained by the organization. Limitation of Private Cloud : ÿMoreover, one major limitation is that IT teams in the organization may have to invest in buying, building and managing the clouds independently. Budget is a constraint in private clouds and they also have loose SLAs. Also other major limitation is that IT teams in the organization may have to invest in buying, building and managing the clouds independently. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 10 Q.9 What is the characterstic of Private Cloud ? MT : Privateबात?ताउ तो: C S कौस?Weak Service level Agreementहै Certain characteristics of Private Cloud are as follows: 1.Secure: The private cloud is secure as it is deployed and managed by the organization itself, and hence there is least chance of data being leaked out of the cloud. 2. Central Control :As usual, the private cloud is managed by the organization itself, there is no need for the organization to rely on anybody and its controlled by the organization itself. 3. Weak Service Level Agreements (SLAs): SLAs play a very important role in any cloud service deployment model as they are defined as agreements between the user and the service provider in private cloud. In private cloud, either Formal SLAs do not exist or are weak as it is between the organization and user of the same organization. Thus, high availability and good service may or may not be available. Q.10 What is diffrence between On –Premise & Outsourced Private Cloud ? On Premise Private Cloud On Outsourced Private Cloud Management Managed by the organization itself.Managed by the third party. Everything is same as usual private cloud except that herethe cloud is outsourced. Service Level Agreements (SLAs) SLAs are defined between the organization and its users. Users have broader access rights than general public cloud users and service providers are able to efficiently provide the service because of small user base and mostly efficient network. These are usually followed strictly as it is a third party organization. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 11 Network Network management and network issue resolving are easier. The networks usually have high bandwidth and low latency The cloud is fully deployed at the third party site and organizations connect to the third party by means of either a dedicated connection or through Internet. Security and Data Privacy Comparatively, it is more resistant to attacks than any other cloud and the security attacks are possible from an internal user only. Cloud is relatively less secure and the security threat is from the third party and the internal employee. Location ÿThe data is usually stored in the same geographical location where the cloud users are present. ÿIn case of several physical locations, the cloud is distributed over several places and is accessed using the Internet. ÿThe cloud is located off site and ÿwhen there is a change of location the data need to be transmitted through long distances. Performance The performance depends on the network and resources and can be controlled by the network management team. The performance of the cloud depends on the third party that is outsourcing the cloud. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 12 Q.11 What is Public cloud? What is the characteristics of Public cloud ? Also explain its major advantages and limitations in brief. Public Clouds: ∑This environment can be used by the general public. This includes individuals, corporations and other types of organizations. ∑Typically, public clouds are administrated by third parties or vendors over the Internet, and the services are offered on pay -per-use basis. ∑These are also called provider clouds. Business models like SaaS (Software-as-a- Service) and public clouds complement each other and enable companies to leverage shared IT resources and services. The Advantages & disadvantage of public cloud include the following: ∑It is widely used in the development, deployment and management of enterprise applications, at affordable costs. ∑It allows the organizations to deliver highly scalable and reliable applications rapidly and at more affordable costs. ∑There is no need for establishing infrastructure for setting up and maintaining the cloud. ∑Strict SLAs are followed. ∑There is no limit for the number of users. ÿMoreover, one of the limitationsis security assurance and thereby building trust among the clients is far from desired but slowly liable to happen. Further, privacy and organizational autonomy are not possible. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 13 Q.12 Characteristics of Public Cloud are as follows: भारत मेPublic कीcharacteristic ये है?क: ?यादातर गरीब"ScaleमेHighly Availableहै, इ?स?लएLess Secureहोने कीवजहसे सरकार ने स?तStringent SLA के ज?रयेaffordableघर ?दए है! ÿHighly Scalable: The resources in the public cloud are large in number and the service providers make sure that all requests are granted. Hence public clouds are considered to be scalable. ÿHighly Available: It is highly available because anybody from any part of the world can access the public cloud with proper permission, and this is not possible in other models as geographical or other access restrictions might be there. ÿLess Secure: Since it is offered by a third party and they have full control over the cloud, the public cloud is less secure out of all the other deployment models. ÿAffordable: The cloud is offered to the public on a pay-as-you-go basis; hence the user has to pay only for what he or she is using (using on a per- hour basis). And this does not involve any cost related to the deployment. ÿStringent(स?त) SLAs :As the service provider’s business reputation and customer strength are totally dependent on the cloud services, they follow the SLAs strictly and violations are avoided. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 14 Q.13 What is Hybrid cloud? What is the characteristics of Public cloud ? Also explain its major advantages and limitations in brief. ∑This is a combination of both at least one private (internal) and at least one public (external) cloud computing environments - usually, consisting of infrastructure, platforms and applications. ∑The usual method of using the hybrid cloud is to have a private cloud initially, and then for additional resources, the public cloud is used. ∑The hybrid cloud can be regarded as a private cloud extended to the public cloud and aims at utilizing the power of the public cloud by retaining the properties of the private cloud . ∑It is typically offered in either of two ways. ÿA vendor has a private cloud and forms a partnership with a public cloud provider or ÿA public cloud provider forms a partnership/franchise with a vendor that provides private cloud platforms Characteristics of Hybrid Cloud are as follows: ÿScalable: The hybrid cloud has the property of public cloud with a private cloud environment and as the public cloud is scalable; the hybrid cloud with the help of its public counterpart is also scalable. ÿPartially Secure: The private cloud is considered as secured and public cloud has high risk of security breach. The hybrid cloud thus cannot be fully termed as secure but as partially secure. ÿStringent SLAs: Overall the SLAs are more stringent than the private cloud and might be as per the public cloud service providers. ÿComplex Cloud Management: Cloud management is complex as it involves more than one type of deployment models and also the number of users is high. The Advantages of Hybrid Cloud include the following: ∑It is highly scalable and gives the power of both private and public clouds. ∑It provides better security than the public cloud. ∑ The limitation of Hybrid Cloud is that the security features are not as good as the public cloud and complex to manage. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 15 Q.14 What is Community cloud? What is the characteristics of Community cloud ? Also explain its major advantages and limitations in brief. ÿThe community cloud is the cloud infrastructure that is provisioned for exclusive use by a specific community of consumers. ÿFrom organizations that have shared concerns (eg. mission security requirements, policy, and compliance considerations). ÿIt may be owned, managed, and operated by one or more of the organizations in the community, a third party or some combination of them, ÿand it may exist on or off premises. ÿIn this, a private cloud is shared between several organizations. ÿThis model is suitable for organizations that cannot afford a private cloud and cannot rely on the public cloud either. Characteristics of Community Clouds are as follows: ßCollaborative and Distributive Maintenance: In this, no single company has full control over the whole cloud. This is usually distributive and hence better cooperation provides better results. ßPartially Secure: This refers to the property of the community cloud where few organizations share the cloud, so there is a possibility that the data can be leaked from one organization to another, though it is safe from the external world. ßCost Effective: As the complete cloud is being shared by several organizations or community, not only the responsibility gets shared; the community cloud becomes cost effective too. Advantages of Community Clouds are as follows: ÿIt allows establishing a low-cost private cloud. ÿIt allows collaborative work on the cloud. ÿIt allows sharing of responsibilities among the organizations. ÿIt has better security than the public cloud. The limitation of the community cloudis that the autonomy of the organization is lost and some of the security features are not as good as the private cloud. It is not suitable in the cases where there is no collaboration. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 16 Q.15 Explain, in brief, the characteristics of Cloud Computing. MT : आशारामi.e Very Popular (A S M)² Major characteristics of cloud computing are given as follows: Virtualization: This technology allows servers and storage devices to increasingly share and utilize applications, by easy migration from one physical server to another. Performance: It is monitored and consistent and its loosely coupled architecture constructed using web services as the system interface enables high level of performance. Agility: The cloud works in the ‘distributed mode’ environment. It shares resources among users and tasks, while improving efficiency and agility (responsiveness). High Availability and Reliability: Availability of servers is supposed to be high and more reliable as the chances of infrastructure failure are minimal. High Scalability: Cloud environments enable servicing of business requirements for larger audiences, through high scalability. Services in Pay-Per-Use Mode: SLAs between the provider and the user must be defined when offering services in pay per use mode. This may be based on the complexity of services offered. Application Programming Interfaces (APIs) may be offered to the users so they can access services on the cloud by using these APIs. Maintenance: The cloud computing applications are easier, because they are not to be installed on each user's computer and can be accessed from different places. Multi-sharing: With the cloud working in a distributed and shared mode, multiple users and applications can work more efficiently with cost reductions by sharing common infrastructure. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 17 Q.16 Briefly discuss the advantages of Cloud Computing. MT : AB QU CA बेटा आशारान मे कोइbenefit नही है बि?कCA मे है Major advantages of Cloud Computing are given as follows: Automatic Software Integration: ÿIn the cloud, software integration is usually something that occurs automatically. ÿThis means that we do not need to take additional efforts to customize and integrate the applications as per our preferences. ÿThis aspect usually takes care of itself. Not only that, cloud computing allows us to customize the options with great ease. Backup and Recovery: ÿSince all the data is stored in the cloud, backing it up and restoring the same is relatively much easier than storing the same on a physical device. ÿFurthermore, most cloud service providers are usually competent enough to handle recovery of information. ÿHence, this makes the entire process of backup and recovery much simpler than other traditional methods of data storage. Quick Deployment: ÿIt gives us the advantage of quick deployment. ÿOnce we opt for this method of functioning, the entire system can be fully functional in a matter of a few minutes. ÿOf course, the amount of time taken here will depend on the exact kind of technology that we need for our business. Unlimited Storage: ÿStoring information in the cloud gives us almost unlimited storage capacity. ÿHence, one no more need to worry about running out of storage space or increasing the current storage space availability. Cost Efficiency: ÿIt is most cost efficient method to use, maintain and upgrade. ÿTraditional desktop software costs companies a lot in terms of finance. Adding up the licensing fees for multiple users can prove to be very expensive for the establishment concerned. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 18 ÿBut The cloud, on the other hand, is available at much cheaper rates and hence, can significantly lower the company’s IT expenses. ÿBesides, there are many one-time-payments, pay-as-you-go and other scalable options available, which make it very reasonable for the company. Access to Information easy: Once registered in the cloud, one can access the information from anywhere, where there is an Internet connection. This convenient feature lets one move beyond time zone and geographic location issues. Q.17 Discuss challengesto Cloud computing in brief. OR Discuss the Security and Implementation issues in using Cloud Computing technology for running the new web application. MT: G I T A L A D C I कीIdentification करनेपरS A P A हो जाता है जी! Governance: vDue to the lack of control over the employees and services, it creates problems relating to design, implementation, testing and deployment. vSo, there is need of governance model, which controls the standards, procedures and policies of the organization. vAuditing and risk management programs are some way to verify the policy, which can shift the risk landscape. Integrity: vIntegrity refers to the prevention of unauthorized modification of data and vit ensures that data is of high quality, correct, consistent and accessible. vAfter moving the data to the cloud, owner hopes that their data and applications are secure. vIt is important to verify if one’s data has been tampered with or deleted. vMethods like digital signature, Redundant Array of Independent Disks (RAID) strategies etc. are some ways to preserve integrity in vCloud computing. The most direct way to enforce the integrity control is to employ cryptographic hash function. Trust: vOrg. has direct control over security aspects as well as the federal agencies even have responsibility to protect the information system from the risk. vTrust is an important issue in Cloud. Various clients’ oriented studies reveal that Cloud has still failed to build trust between the client and service provider. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 19 vTrust ensures that service arrangements have sufficient means to allow visibility into the security and privacy controls and processes employed by the Cloud provider, and their performance over time. Availability: ÿAvailability refers to the prevention of unauthorized withholding of data and it ensures the data backup through BCP and DRP. ÿIn addition, Availability also ensures that they meet the organization’s continuity and contingency planning requirements. ÿAvailability can be affected temporarily or permanently, and a loss can be partial or complete. Temporary breakdowns, sustained and Permanent Outages, Denial of Service (DoS) attacks, equipment failure, and natural calamities are all threats to availability. Legal Issues and Compliance: ÿThere are various requirements relating to legal, privacy and data security laws that need to be studied in Cloud system. ÿOne of the major troubles with laws is that they vary from place to place, and users have no assurance of where the data is located physically. ÿThere is a need to understand various types of laws and regulations that impose security and privacy duties on the organization and potentially impact Cloud computing initiatives such as demanding privacy, data location and security controls, records management. Audit: ÿAuditing is type of checking that ‘what is happening in the Cloud environment’. ÿIt is an additional layer before the virtualized application environment, which is being hosted on the virtual machine to watch ‘what is happening in the system’. ÿit consumes more time, insistent across customers, pricy and motivational debilitate for everyone. Data Stealing : ÿSome of the Cloud providers do not use their own server, instead. They use server/s from other service providers. ÿIn that case, there is a probability that the data is less secure and is more prone to the loss from external server. ÿIf the external server is shut down due to any legal problem, financial crisis, natural disaster, and fire creates loss for the user. ÿIn that case, data protection is an important mechanism to secure the data. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 20 Confidentiality: ÿPrevention of unauthorized disclosure of data is referred to as confidentiality. ÿNormally, Cloud works on public networks; therefore, there is a requirement to keep the data confidential the unauthorized entities. With the use of encryption and physical isolation, data can be kept secret. ÿThe basic approaches to attain confidentiality are the encrypting the data before placing it in a Cloud with the use of TC3 (Total Claim Capture & Control). Incident Response: ÿIt ensures to meet the requirements of the organization during an incident. ÿIt ensures that the Cloud provider has a transparent response process in place and sufficient mechanisms to share information during and after an incident. Identity Management and Access control: The key critical success factor for Cloud providers is to have a robust federated identity management architecture and strategy internal in the organization. Software isolation: It is to understand virtualization and other logical isolation techniques that the Cloud provider employs in its multi-tenant software architecture, and evaluate the risks required for the organization. Application Security: ÿSecurity issues relating to application security still apply when applications move to a cloud platform. ÿTo prevent Cloud computing; service provider should have the complete access to the server with all rights for the purpose of monitoring and maintenance of server. ÿInfected applications need to be monitored an recovered by the Cloud security drivers. Privacy: ÿPrivacy is also considered as one of the important issues in Cloud. ÿThe privacy issues are embedded in each phase of the Cloud design. ÿIt should include both the legal compliance and trusting maturity. ÿThe Cloud should be designed in such a way that it decreases the privacy risk. Architecture:In the architecture of Cloud computing models, there should be a control over the security and privacy of the system. The architecture of the Cloud is based on a specific service model. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 21 Q.18 What is Mobile Computing. How Mobile Computing Works? ÿMobile Computing refers to the technology that allows transmission of data via a computer without having to be connected to a fixed physical link. ÿMobile voice communication is widely established throughout the world and has had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. ÿAn extension of this technology is the ability to send and receive data across these cellular networks. This is the fundamental principle of mobile computing. ÿMobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. ÿThis proves to be the solution of the biggest problem of business people on the move. Here is how Mobile Computing works: ∑The user enters or access data using the application on handheld computing device. ∑Using one of several connecting technologies, the new data are transmitted from handheld to site’s information system where files are updated and the new data are accessible to other system user. ∑Now both systems (handheld and site’s computer) have the same information and are in sync. ∑The process work the same way starting from the other direction. The process is similar to the way a worker’s desktop PC access the organization’s applications, except that user’s device is not physically connected to the organization’s system. The communication between the user device and site’s information systems uses different methods for transferring and synchronizing data, some involving the use of Radio Frequency (RF) technology. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 22 Q19. Discuss the components of Mobile Computing. The key components of Mobile Computing are as follows: 1.Mobile Communication: ÿThis refers to the infrastructure put in place to ensure that seamless and reliable communication goes on. ÿThis would include communication properties, protocols, data formats and concrete technologies. 2. Mobile Hardware: ÿThis includes mobile devices or device components that receive or access the service of mobility. ÿThey would range from Portable laptops, Smart Phones, Tablet PCs, and Personal Digital Assistants (PDA) that use an existing and established network to operate on. ÿAt the back end, there are various servers like Application Servers, Database Servers and Servers with wireless support, WAP gateway, a Communications Server and/or MCSS (Mobile Communications Server Switch) or a wireless gateway embedded in wireless carrier’s network (this server provide communications functionality to allow the handheld device to communicate with the internet or Intranet Infrastructure). ÿThe characteristics of mobile computing hardware are defined by the size and form factor, weight, microprocessor, primary storage, secondary storage, screen size and type, means of input, means of output, battery life, communications capabilities, expandability and durability of the device. 3. Mobile Software: ÿMobile Software is the actual programme that runs on the mobile hardware and deals with the characteristics and requirements of mobile applications. ÿIt is the operating system of that appliance and is the essential component that makes the mobile device operates. ÿMobile applications popularly called Apps are being developed by organizations for use by customers but these apps could represent risks, in terms of flow of data as well as personal identification risks, introduction of malware and access to personal information of mobile owner. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 23 Q20 Benefits of Mobile Computing MT : if MANAGEMENT EFFECTIVENESSis good, WORK ORDERcan beACCESS& UPDATEDfromANY JOB LOCATIONat ANYWHERE, ANYTIME. In general, Mobile Computing is a versatile and strategic technology that increases information quality and accessibility, enhances operational efficiency, and improves management effectiveness. But, more specifically, it leads to a range of tangible benefits, including the following: 1. It provides mobile workforce with remote access to work order details, such as work order location, contact information, required completion date, asset history relevant warranties/service contracts. 2. It enables mobile sales personnel to update work order status in real-time, facilitating excellent communication. 3. It facilitates access to corporate services and information at any time, from anywhere. 4. It provides remote access to the corporate Knowledgebase at the job location.5 5. It enables to improve management effectiveness by enhancing information quality, information flow, and ability to control a mobile workforce. Q.21 Limitations of Mobile Computing Insufficient Bandwidth: ÿMobile Internet access is generally slower than direct cable connections using technologies such as General Packet Radio Service (GPRS) ÿAnd Enhanced Data for GSM (Global System for Mobile Communication) Evolution (EDGE), and more recently 3G networks. ÿThese networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range. Security Standards: ÿWhen working mobile, one is dependent on public networks, requiring careful use of Virtual Private Network (VPN). ÿSecurity is a major concern while concerning the mobile computing standards. ÿOne can easily attack the VPN through a huge number of networks interconnected through the line. Power consumption: Chapter 8 Emerging Technology By : Pardeep Rohilla Page 24 ÿWhen a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. ÿCombined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life. Mobile computing should also look into Greener IT in such a way that it saves the power or increases the battery life. Transmission interferences: ÿWeather, terrain, and the range from the nearest signal point can all interfere with signal reception. ÿReception in tunnels, some buildings, and rural areas is often poor. Potential health hazards: ÿPeople who use mobile devices while driving are often distracted from driving are thus assumed to be more likely involved in traffic accidents. ÿCell phones may interfere with sensitive medical devices. ÿThere are allegations that cell phone signals may cause health problems. Human interface with device: ÿScreens and keyboards tend to be small, which may make them hard to use. ÿAlternate input methods such as speech or handwriting recognition require training. Q.22 Discuss securityissues of Mobile Computing. Answer Security Issues : Wireless networks have relatively more security requirements than wired network. A number of approaches have been suggested and also the use of encryption is has been proposed . 1. Confidentiality: Preventing unauthorized users from gaining access to critical information of any particular user. 2. Integrity: Ensures unauthorized modification, destruction or creation of information cannot take place. 3. Availability: Ensuring authorized users getting the access they require. 4. Legitimate: Ensuring that only authorized users have access to services. 5. Accountability: Ensuring that the users are held responsible for their security related activities by arranging the user and his/her activities are linked if and when necessary. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 25 Q. 23 Discuss (technical & business) issues of Mobile Computing i.e “ other than security.” Answer : Bandwidth: ÿBandwidth utilization can be improved by logging (bulk operations against short requests) and compression of data before transmission. ÿThe technique of caching frequently accessed data items can play an important role in reducing contention in narrow bandwidth wireless networks. ÿThe cached data can help improve query response time. Since mobile clients often disconnect to conserve battery power the cached data can support disconnected operations. Location Intelligence: ÿAs the mobile computers move, they encounter networks with different features. A mobile computer must be able to switch from infrared mode to radio mode as it moves from indoors to outdoors. ÿAdditionally it should be capable of switching from cellular mode of operation to satellite mode as the computer moves from urban and rural areas. ÿIn mobile computing; as computers are working in cells and are being serviced by different network providers, the physical distance may not reflect the true network distance. ÿA small movement may result in a much longer path if cell or network boundaries are crossed. ÿIt will also lead to updating of the location dependent information as described above. ÿThis can increase the network latency as well as risk of disconnection. Service connections must be dynamically transferred to the nearest server. However, when load balancing is a priority this may not be possible. Power Consumption: ÿMobile Computers will rely on their batteries as the primary power source. ÿBatteries should be ideally as light as possible but at the same time they should be capable of longer operation times. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 26 ÿPower consumption should be minimized to increase battery life. Chips can be redesigned to operate at lower voltages. ÿPower management can also help. Individual Components, be powered down when they are idle. Revising the technical architecture: ÿMobile users are demanding and are important to the business world. ÿTo provide complete connectivity among users; the current communication technology must be revised to incorporate mobile connectivity. ÿAdditionally, application and data architectures must also be revised to support the demands put upon them by the mobile connectivity. Reliability, coverage, capacity, and cost: ÿAt present; wireless network is less reliable, have less geographic coverage and reduced bandwidth, are slower, and cost more than the wired-line network services. ÿIt is important to find ways to use this new resource more efficiently by designing innovative applications. Integration with legacy mainframe and emerging client/server applications: ÿApplication development paradigms are changing. ÿAs a result of the IT industry's original focus on mainframes, a huge inventory of applications using communications interfaces that are basically incompatible with mobile connectivity have been accumulated. ÿStill the application development trend is geared towards wired network. End-to-end design and performance: Since mobile computing involves multiple networks (including wired) and multiple application server platforms; end-to-end technical compatibility, server capacity design, and network response time estimates are difficult to achieve. Business challenges: ÿIn addition to these technical challenges, mobile computing also faces business challenges. ÿThis is due to the lack of trained professionals to bring the mobile technology to the general people and development of pilot projects for testing its capabilities. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 27 Cloud computing basic Service MODEL Q.24 Cloud Computing Service Models Answer : ∑Cloud computing is a model that enables the end users to access the shared pool of resources such as compute, network, storage, database and application as an on demand service without the need to buy or own it. ∑The services are provided and managed by the service provider, reducing the management effort from the end user side. ∑The essential characteristics of the cloud include on-demand, self service, broad network access, resource pooling, rapid elasticity, and measured service. The National Institute of Standards and Technology (NIST) defines three basic service models – 1. Infrastructure as a Service (IaaS), 2. Platform as a Service (PaaS), and 3. Software as a Service (SaaS). Chapter 8 Emerging Technology By : Pardeep Rohilla Page 28 Q.25 Explain the Infrastructure as a Service (IaaS). What type of services provided by Iaas ? Answer : ÿIaaS, a hardware-level service, provides computing resources such as processing power, memory, storage, and networks for cloud users to run their application on-demand. ÿThis allows users to maximize the utilization of computing capacities without having to own and manage their own resources. ÿIaaS changes the computing from a physical infrastructure to a virtual infrastructure through virtual computing; storage; and network resources by abstracting the physical resources . The end-users or IT architects will use the infrastructure resources in the form of Virtual machines (VMs) and design virtual infrastructure, network load balancers etc., based on their needs. The IT architects need not maintain the physical servers as it is maintained by the service providers. Examples of IaaS providers include Amazon Web Services (AWS), Google Compute Engine. A typical IaaS provider may provide the following services as shown below : (a) Compute:Computing as a Service includes virtual Central Processing Inputs (CPUs) and virtual main memory for the Virtual Machines (VMs) that are provisioned to the end users. (b) Storage:STaaS provides back-end storage for the VM images. Some of the IaaS providers also provide the back end for storing files. (c) Network: Network as a Service (NaaS) provides virtual networking components such as virtual router, switch, and bridge for the VMs. (d) Load Balancers:Load balancing as a Service may provide load balancing capability at the infrastructure layer. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 29 Q.26 What is the Characteristics of IaaS ? Characteristics of IaaS are as follows: Web access to the resources: ÿThe IaaS model enables the IT users to access infrastructure resources over the Internet. ÿWhen accessing a huge computing power, the IT user need not get physical access to the servers. Centralized management: The resources distributed across different parts are controlled from any management console that ensures effective resource management and effective resource utilization. Elasticity and Dynamic Scaling: Depending on the load, IaaS services can provide the resources and elastic services where the usage of resources can be increased or decreased according to the requirements. Shared infrastructure: IaaS follows a one-to-many delivery model and allows multiple IT users to share the same physical infrastructure and thus ensure high resource utilization. Metered Services: IaaS allows the IT users to rent the computing resources instead of buying it. The services consumed by the IT user will be measured, and the users will be charged by the IaaS providers based on the amount of usage. Q.27 What is the different Instances of IaaS ? A.Network as a Service (NaaS): ÿNaaS, an instance of IaaS, provides users with needed data communication capacity to accommodate bursts in data traffic during data-intensive activities such as video conferencing or large file downloads. ÿIt is an ability given to the end-users to access virtual network services that are provided by the service provider over the Internet on pay-per-use basis. ÿIt further allows the network architect to deploy custom routing protocols and enables the design of efficient in-network services. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 30 NaaS providers operate using three common service models: 1. Virtual Private Network (VPN) 2. Bandwidth on Demand (BoD) and 3. Mobile Virtual Network (MVN). B. Storage as a Service (STaaS): ÿSTaaS, an instance of IaaS, provides storage infrastructure on a subscription basis to users who want a low-cost and convenient way to store data, manage off-site backups, mitigate risks of disaster recovery, and preserve records for the long-term. ÿSTaaS allows the end users to access the files at any time from any place. STaaS provider provides the virtual storage that is abstracted from the physical storage of any cloud data center C. Database as a Service (DBaaS): ÿThis is also related to IaaS and provides users with seamless mechanisms to create, store, and access databases at a host site on demand. ÿIt is an ability given to the end users to access the database service without the need to install and maintain it on the pay-per-use basis. D. Backend as a Service (BaaS): It is a type of IaaS, that provides web and mobile app developers a way to connect their applications to backend cloud storage with added services such as user management, push notifications, social network services integration using custom software development kits and application programming interfaces. E. Desktop as a Service (DTaaS): ÿIt is an instance of IaaS that provides ability to the end users to use desktop virtualization without buying and managing their own infrastructure. ÿDTaaS is a pay-per-use cloud service delivery model in which the service provider manages the back-end responsibilities of data storage, backup, security and upgrades. ÿThe end-users are responsible for securing and managing their own desktop images, applications, and security. These services are simple to deploy, are highly secure, and produce better experience on almost all devices Chapter 8 Emerging Technology By : Pardeep Rohilla Page 31 Q.27 What about PaaS ? What type of service may be provided by PaaS. Also explain the characteristic of PaaS ? ÿPaaS provides the users the ability to develop and deploy an application on the development platform provided by the service provider. ÿIn traditional application development, the application will be developed locally and will be hosted in the central location. In stand-alone application development, the application will be developed by traditional development platforms result in licensing - based software, ÿwhereas PaaS changes the application development from local machine to online. ÿFor example- Google App Engine, Windows Azure Compute etc. Typical PaaS providers may provide : 1.Programming Languages: PaaS providers provide a wide variety of programming languages like Java, PHP, Python, Ruby etc. for the developers to develop applications. 2. Application Frameworks: PaaS vendors provide application development framework like Joomla, WordPress, Sinatra etc. for application development . 3.Database: Along with PaaS platforms, PaaS providers provide some of the popular databases like ClearDB, Cloudant, Redis etc. so that application can communicate with the databases. 4. -Other Tools: PaaS providers provide all the tools that are required to develop,test, and deploy an application. Characteristics of PaaS are as follows: ÿAll in One:Most of the PaaS providers offer services like programming languages to develop, test, deploy, host and maintain applications in the same Integrated Development Environment (IDE). ÿWeb access to the development platform:PaaS provides web access to the development platform that helps the developers to create, modify, test, and deploy different applications on the same platform. ÿOffline Access:To enable offline development, some of the PaaS providers allow the developer to synchronize their local IDE with the PaaS services. The Chapter 8 Emerging Technology By : Pardeep Rohilla Page 32 developers can develop an application locally and deploy it online whenever they are connected to the Internet. ÿBuilt-in Scalability: ∑PaaS services provide built-in scalability to an application that is developed using any particular PaaS. ∑This ensures that the application is capable of handling varying loads efficiently. ÿCollaborative Platform:To enable collaboration among developers, most of the PaaS providers provide tools for project planning and communication. ÿDiverse Client Tools: PaaS providers offer a wide variety of client tools like Web User Interface (UI), Application Programming Interface (API) etc. to help the developers to choose the tool of their choice. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 33 Q.28 What about SaaS ? What type of service may be provided by SaaS. Also explain the characteristic of PaaS ? ÿSaaS provides ability to the end users to access an application over the Internet that is hosted and managed by the service provider. ÿThus, the end users are exempted from managing or controlling an application the development platform, and the underlying infrastructure. SaaS changes the way the software is delivered to the customers. ÿIn the traditional software model, the software is delivered as a license-based product that needs to be installed in the end user device. ÿSince SaaS is delivered as an on-demand service over the Internet, there is no need to install the software to the end-user’s devices. ÿSaaS services can be accessed or disconnected at any time based on the end user’s needs. ÿSaaS provides users to access large variety of applications over internets that are hosted on service provider’s infrastructure. ÿFor example, one can make his/her own word document in Google docs online, s/he can edit a photo online on pixlr.com so s/he need not install the photo editing software on his/her system- thus Google is provisioning software as a service. Services offered by SaaS providers : (a) Business Services : SaaS providers provide a variety of business services to startup companies that include ERP, CRM, billing, sales, and human resources. (b) Social Networks: Since the number of users of the social networking sites is increasing exponentially, loud computing is the perfect match for handling the variable load. (c) Document Management: Most of the SaaS providers provide services to create, manage, and track electronic documents as most of the enterprises extensively use electronic documents. (d) Mail Services: To handle the unpredictable number of users and the load on email services, most of the email providers offer their services as SaaS services. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 34 Characteristics of SaaS are as follows: 1.One to Many: SaaS services are delivered as one-to-many models where a single instance of the application can be shared by multiple customers. 2. Web Access: SaaS services allow the end users to access the application from any location of the device is connected to the Internet. 3. Centralized Management: Since SaaS services are hosted and managed from the central location, the SaaS providers perform the automatic updates to ensure that each customer is accessing the most recent version of the application. 4. Multi-device Support: SaaS services can be accessed from any end user devices such as desktops, laptops, tablets, smart phones, and thin clients. 5. Better Scalability: Most of the SaaS services leverage PaaS and IaaS for its development and deployment and ensure a better scalability than traditional software. 6. High Availability: SaaS services ensure 99.99% availability of user data as proper backup and recovery mechanisms are implemented . 7.API Integration: SaaS services have the capability of integrating with other software or service through standard APIs. Q.29 What are the different instances of SaaS ? ÿTesting as a Service (TaaS): This provides users with software testing capabilities such as generation of test data, generation of test cases, execution of test cases and test result evaluation on a pay-per-use basis. ÿAPI as a Service (APIaaS): This allows users to explore functionality of Web services such as Google Maps, Payroll processing, and credit card processing services etc. ÿEmail as a Service (EaaS): This provides users with an integrated system of emailing, office automation, records management, migration, and integration services with archiving, spam blocking, malware protection. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 35 Q.30 What are the Other Cloud Service Models. Answer : These are followings : a. Communication as a Service (CaaS) b. Data as a Service (DaaS) c. Security as a Service (SECaaS) d. Identity as a Service (IDaaS a. Communication as a Service (CaaS): ÿCaaS has evolved in the same lines as SaaS. ÿCaaS is an outsourced enterprise communication solution that can be leased from a single vender. ÿThe CaaS vendor is responsible for all hardware and software management and offers guaranteed Quality of Service (QoS). ÿIt allows businesses to selectively deploy communication devices and modes on a pay-as-you-go, as needed basis. ÿThis approach eliminates the large capital investments. Examples are: Voice over IP (VolP), Instant Messaging (IM), Collaboration and Videoconferencing application using fixed and mobile devices. b. Data as a Service (DaaS): ÿDaaS provides data on demand to different types of users, systems or application. ÿThe data may include text, images, sounds, and videos. ÿData encryption and operating system authentication are commonly provided for security. ÿDaaS users have access to high-quality data in a centralized place and pay by volume or data type, as needed. ÿHowever, as the data is owned by the providers, users can only perform read operations on the data. ÿDaaS is highly used in geography data services and financial data services. c. Security as a Service (SECaaS): ÿIt is an ability given to the end user to access the security serviceprovided by the service provider on a pay-per-use basis. ÿIt is a new approach to security in which cloud security is moved into the cloud itself whereby cloud service users will be protected from within the cloud using a unified approach to threats. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 36 vFour mechanisms of Cloud security that are currently provided are: 1.Email filtering, 2.Web content filtering, 3.Vulnerability management and 4.Identity management. d.Identity as a Service (IDaaS): ÿIt is an ability given to the end users; typically an organization or enterprise; ÿto access the authentication infrastructure that is built, hosted, managed and provided by the third party service provider. ÿGenerally, IDaaS includes directory services, authentication services, risk and event monitoring, single sign-on services, and identity and profile management. Q.31 What is Green IT or Green Compounding ? What are the objective of Green compounding ? ÿIn other words, it is the study and practice of establishing / using computers and IT resources in a more efficient and environmentally friendly and responsible way. ÿComputers consume a lot of natural resources, from the raw materials needed to manufacture them, the power used to run them, and the problems of disposing them at the end of their life cycle. ÿThis can include "designing, manufacturing, using, and disposing of computers, servers, and associated subsystems - such as monitors, printers, storage devices efficiently and effectively with minimal or no impact on the environment”. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 37 vThe objective of Green computing are as below: ∑To reduce the use of hazardous materials, ∑Maximize energy efficiency during the product’s lifetime, and ∑Promote the recyclability of defunct products and factory waste. ∑Implementation of energy-efficient CPUs, Servers etc. ∑Reduced resource consumption and proper disposal of electronic waste (e-waste). Q.32 ‘The work habits of computer users and businesses can be modified to minimize adverse impact on the global environment’. Discuss some of such steps, which can be followed for Green IT. Or Discuss best practices of Green IT. Some of such steps for Green IT include the following: A. Develop a sustainable Green computing plan ∑Involve stakeholders to include checklists, recycling policies, recommendations for disposal of used equipment, ∑Follow Government guidelines and recommendations for purchasing green computer equipment in organizational policies and plans; ∑Encourage the IT community for using the best practices and encourage them to consider green computing practices and guidelines. ∑On-going communication about and campus commitment to green IT best practices to produce notable results. ∑Include power usage, reduction of paper consumption, as well as recommendations for new equipment and recycling old machines in organizational policies and plans; and ∑Use cloud computing so that multiple organizations share the same computing resources, thus increasing the utilization by making more efficient use of hardware resources. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 38 B. Recycle ∑Dispose e-waste according to central, state and local regulations; ∑Discard used or unwanted electronic equipment in a convenient and environmentally responsible manner. ∑Manufacturers must offer safe end-of-life management and recycling options when products become unusable; and ∑Recycle computers through manufacturer’s recycling services. C. Make environmentally sound purchase decisions ∑Purchase of desktop computers, notebooks and monitors based on environmental attributes; ∑Provide a clear, consistent set of performance criteria for the design of products; ∑Recognize manufacturer efforts to reduce the environmental impact of products by reducing or eliminating environmentally sensitive materials. ∑Use Server and storage virtualization that can help to improve resource utilization, reduce energy costs and simplify maintenance. D. Reduce Paper Consumption ∑Reduce paper consumption by use of e-mail and electronic archiving; ∑Use of “track changes” feature in electronic documents, rather than redline corrections on paper; ∑Use online marketing rather than paper based marketing; ∑Use E-mail marketing solutions that are more affordable, flexible and interactive than traditional marketing because of free and low-cost online invoicing solutions that help cut down on paper waste; ∑Use smaller fonts and margins, and selectively print required pages. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 39 E. Conserve Energy ÿUse Liquid Crystal Display (LCD)monitors rather than Cathode Ray Tube (CRT) monitors; ÿDevelop a thin-client strategy wherein thin clients are smaller, cheaper, simpler for manufacturers to build than traditional PCs or notebooks and most importantly use about half the power of a traditional desktop PC; ÿUse notebook computersrather than desktop computers whenever possible; ÿUse the power-management features to turn off hard drives and displays after several minutes of inactivity; ÿPower-down the CPU and all peripherals during extended periods of inactivity; ÿTry to do computer-related tasks during contiguous, intensive blocks of time, leaving hardware off at other times; ÿPower-up and power-down energy-intensive peripherals such as laser printers according to need; ÿEmploy alternative energy sources for computing workstations, servers, networks and data centers; and ÿAdapt more of Web conferencing offers instead of travelling to meetings in order to go green and save energy. Q. 33 Green IT Security Services and Challenges ? Green IT Security Services: IT solution providers are offering green security services in many ways. MT : S I C S ÿWhat to look in green security products, the challenges in the security services market and how security services fare in a recessionie Security Issue. ÿThe basic aim is to increase the customer's energy savings through green security services and assess that ‘how sustainable computing technology can immediately impact to help the environment’. ÿIf not administered properly with other green computing technologies, green security can be more costly. ÿThere is no standard to knowing ‘how to evaluate a client's infrastructure to accommodate green technology . So it is really a vital issue’. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 40 Q.34 What is BYOD ? Also describe the benefits of BYOD ? BYOD: ÿBYOD stands for (Bring Your Own Device). ÿIt refers to business policy that allows employees to use their preferred computing devices, like smart phones and laptops for business purposes. ÿIt means employees are welcome to use personal devices (laptops, smart phones, tablets etc.) to connect to the corporate network to access information and application. ÿThe BYOD policy has rendered the workspaces flexible, empowering employees to be mobile and giving them the right to work beyond their required hours. ÿTherefore it has led to an increase in employees’ satisfaction. ÿBYOD also reduced IT desktop costs for organizations as employees are willing to buy, maintain and update devices. Advantages of BYOD Happy Employees : Employees love to use their own devices when at work. This also reduces the number of devices an employee has to carry; otherwise he would be carrying his personal as well as organization provided devices. Lower IT budgets: The employees could involve financial savings to the organization since employees would be using the devices they already possess, thus reducing the outlay of the organization in providing devices to them. IT reduces support requirement i.e reduced maintenance cost : IT department does not have to provide end user support and maintenance for all these devices resulting in cost savings. Early adoption of new Technologies: Employees are generally proactive in adoption of new technologies that result in enhanced productivity of employees leading to overall growth of business. Increased employee efficiency: The efficiency of employees is more when the employee works on his/her own device. In an organization provided devices, employees have to learn and there is a learning curve involved in it. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 41 ÿQ.34 What is BYOD Threats ? MT : I N D I A ÿEvery business decision is accompanied with a set of threats and so is BYOD program too; ÿBYOD program that allows access to corporate network, emails, client data etc. is one of the top security concerns for enterprises. So Overall, these risks can be classified into four areas as outlined below: Implementation Risks: ÿIt is normally exemplified and hidden in ‘Weak BYOD Policy’. ÿThe effective implementation of the BYOD program should not only cover the technical issues but alsomandate the development of a robust implementation policy. ÿAbsence of a strong BYOD policy would fail to communicate employee expectations, thereby increasing the chances of device misuse. ÿSo it is very important to develop proper effective policy to stop misuse of data of organization. Network Risks: ÿIt is normally exemplified and hidden in ‘Lack of Device Visibility’. ÿIf company-owned devices are used by all employees within an organization, then it has complete visibility of the devices connected to the network. This helps to analyze traffic and data exchanged over the Internet. ÿBut As BYOD permits employees to carry their own devices (smart phones, laptops for business use), the IT practice team is unaware about the number of devices being connected to the network. ÿAs network visibility is of high importance, this lack of visibility can be hazardous. Device Risks: ÿIt is normally exemplified and hidden in ‘Loss of Devices’. ÿA lost or stolen device can result in an large financial and reputational problem to an organization as the device may hold sensitive corporate information. ÿData lost from stolen or lost ealsy access to company emails, corporate intranet. ÿCompany trade secrets can be easily retrieved from a misplaced device by outsider. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 42 Application Risks: ÿIt is normally exemplified and hidden in ‘Application Viruses and Malware’. ÿA related report revealed that a majority of employees’ phones and smart devices that were connected to the corporate network weren’t protected by security software. concurrently. ÿFurther Organizations are not clear in deciding that ‘who is responsible for device security – the organization or the user’. Q. 35 What is Web 2.0 ? ∑Web 2.0 is the term given to describe a second generation of the World Wide Web. ∑It is focused onthe ability of people to collaborateand share information online. ∑One of the most significant differences between Web 2.0 and the traditional World Wide Web (referred as Web 1.0) is that Web 2.0 facilitates greater collaboration and information sharing among Internet users, content providers and enterprises. ∑Thus it can be said that the migration is from the “read-only web” to “read- write web” ∑.The power of Web 2.0 is the creation of new relationships between collaborators and information . ∑Blogs, wikis, and Web services are all seen as components of Web 2.0. ∑Web 2.0 tries to tap the power of humans connected electronically through its new ways at looking at social collaboration. ∑The main agenda of Web 2.0 is to connect people in numerous new ways and utilize their collective strengths, in a collaborative manner. ∑In this regard, many new concepts have been created such as Blogging, Social Networking, Communities, Mash-ups, and Tagging. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 43 Q.36 Components of Web 2.0 for Social Networks ? Major components that have been considered in Web 2.0 include the following: RSS-generated Syndication: RSS (Really Simple Syndication) is a format for syndicating web content that allows feed the freshly published web content to the users through the RSS reader. Communities:These are an online space formed by a group of individuals to share their thoughts, ideas and have a variety of tools to promote Social Networking. There are a number of tools available online, now-a-days to create communities, which are very cost efficient as well as easy to use. Blogging:A blog is a journal, diary, or a personal website that is maintained on the internet, and it is updated frequently by the user. Blogging allows a user to make a post to a web log or a blog. Blogs give the users of a Social Network the freedom to express their thoughts in a free form basis and help in generation and discussion of topics. Mash-ups:This is the facility, by using which people on the internet can congregate services from multiple vendors to create a completely new service. An example may be combining the location information from a mobile service provider and the map facility of Google maps in order to find the exact information of a cell phone device from the internet, just by entering the cell number. Wiki:A Wiki is a set of co-related pages on a particular subject and allow users to share content. Wikis replace the complex document management systems and are very easy to create and maintain. Folksonomy: This allows the free classification of information available on the web, which helps the users to classify and find information, using approaches such as tagging. Also known as Social Bookmarking, In which tagged pages are stored on the web increasing the accessibility from any computer connected to the Internet. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 44 Usage of Ajax and other new technologies: Ajax is a way of developing web applications that combines XHTML and CSS (Cascading Style Sheets) standards based presentation that allows the interaction with the web page and data interchange with XML (eXtensible Markup Language) and XSLT (eXtensible Stylesheet Language Transformations). File Sharing/Podcasting:This is the facility, which helps users to send their media files and related content online for other people of the network to see and contribute. Q.36 Types and Behavior of Social Networks ? Social Contact Networks: These types of networks are formed to keep contact with friends and family. These have become the most popular sites on the network today. They have all components of Web 2.0 like blogging, tagging, wikis, and forums Examples of these include Orkut, Facebook and Twitter. Study Circles: These are social networks dedicated for students, where they can have areas dedicated to student study topics, placement related queries and advanced research opportunity gathering. These have components like blogging and file sharing. Examples of these include, CA Club, CA knowledge portal etc. Social Networks for Specialist Groups: These types of social networks are specifically designed for core field workers like doctors, scientists, engineers, members of the corporate industries. A very good example for this type of network is LinkedIn. Networks for Fine Arts:These types of social networks are dedicated to people linked with music, painting and related arts and have lots of useful networking information for all aspiring people of the same line. Police and Military Networks: These types of networks, though not on a public domain, operate much like social networks on a private domain due to the confidentiality of information. Sporting Networks: These types of social networks are dedicated to people of the sporting fraternity and have a gamut of information related to this field. Examples of these include Athlinks. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 45 Q.37 What is the major APPLICATION of Web 2.0 ? MT : Social networks built on Web 2.0 concepts has become so cost affordable and easy to use that more and more people are migrating to this wave. Web 2.0 finds applications in different fields, some of which are as follows: Social Media: ÿSocial Media/Social Network is an important application of web 2.0. ÿAs it provides a fundamental shift in the way people communicate and share information. ÿThe social web offers a number of online tools and platforms that could be used by the users to share their data, perspectives, and opinions among other user communities. Marketing: ÿWeb 2.0 offers excellent opportunities for marketing by engaging customers in various stages of the product development cycle. ÿIt allows the marketers to collaborate with consumers on various aspects such as product development, service enhancement, and promotion. ÿCollaboration with the business partners and consumers can be improved by the companies by utilizing the tools provided by Web 2.0 paradigm. ÿConsumer-oriented companies use networks such as Twitter and Facebook as common elements of multichannel promotion of their products. Education: ÿWeb 2.0 technologies can help the education scenario by providing students and faculty with more opportunities to interact and collaborate with their peers. ÿBy utilizing the tools of Web 2.0, the students get the opportunity to share what they learn with other peers by collaborating with them. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 46 Q.38 What is benefits for social media by using web 2.0 ? MT : A B C Social Platform It has provided a number of benefits to social networks. These are followings : 1. ( Adoption Fast ) Web 2.0 techniques are very people centric activities and thus, adaptation is very fast. 2. ( Blogging) Concepts of Web 2.0 like blogging are some things that people do on a day-to- day basis and no new knowledge skills are required. 3. ( Closer i.e People Coming Closer) People are coming much closer to another and all social and geographical boundaries are being reduced at lightning speed, which is one of the biggest sustenance factors for any social network. 4. (Social Collaboration) Using Web 2.0 also increases the social collaborationto a very high degree and this in turn helps in achieving the goals for a social network . 5.(Platform for social Media)It provides a platform where users of the network need not to worry about the implementation or underlying technology at a very affordable cost and a very easy pickup time. Q.39 challenges for social media by using web 2.0 ? (1) One of the major aspects is data security and privacy and in such public domains, there is a huge chance of data leak and confidentiality loss. Because there are usually no centrally mandated administrative services to take care of such aspects. (2) Privacy of individual users also arises and can create a huge problem if malicious user manage to the social networks. (3) A majority of the social networks are offline, and for bringing these under the purview of online social networks, a lot of education and advertising needs to be done, which itself becomes a cost burden, when the people involved are not computer literate. (4) A huge amount of effort would be needed to promote the area in the area of world which are developing and do not have the basic amenities. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 47 Q.40 What is Web 3.0 ? ÿThe term Web 3.0, also known as the Semantic Web, describes sites wherein the computers will be generated raw data on their own without direct user interaction. ÿWeb 3.0 is considered as the next logical step in the evolution of the Internet and Web technologies. ÿFor Web 1.0 and Web 2.0; the Internet is confined within the physical walls of the computer, but as more and more devices such as smart phones, cars and other household appliances become connected to the web, the Internet will be omnipresent and could be utilized in the most efficient manner. ÿWeb 2.0 technologies allows the use of read/write web, blogs, interactive web applications, rich media, tagging or folksonomy while sharing content, and also social networking sites focusing on communities. ÿBut At the same time, Web 3.0 standard uses semantic web technology, drag and drop mash-ups, widgets, user behavior, user engagement, and consolidation of dynamic web contents depending on the interest of the individual users. Web 3.0 technology uses the “Data Web” Technology, which features the data records that are publishable and reusable on the web through queryable formats. ÿThe Web 3.0 standard also incorporates the latest researches in the field of artificial intelligence. ÿAn example of typical Web 3.0 application is the one that uses content management systems along with artificial intelligence. These systems are capable of answering the questions posed by the users, because the application is able to think on its own and find the most probable answer, depending on the context, to the query submitted by the user. In this way, Web 3.0 can also be described as a “machine to user”standard in the internet. The two major components of Web 3.0 are as follows: 1) Semantic Web: ÿThis provides the web user a common framework that could be used to share and reuse the data across various applications, enterprises, and community boundaries. ÿThis allows the data and information to be readily intercepted by machines, so that the machines are able to take contextual decisions on their own by finding, combining and acting upon relevant information on the web. Chapter 8 Emerging Technology By : Pardeep Rohilla Page 48 2) Web Services: ÿIt is a software system that supports computer-to-computer interaction over the Internet. ÿFor example - the popular photo-sharing website Flickr provides a web service that could be utilized and the developers to programmatically interface with Flickr in order to search for images.




Comments

CAclubindia's WhatsApp Groups Link


Trending Downloads