File Content -
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 1
Hii dear friends. Due to lot of changes in Emerging
Technology Chapter. I have prepared a complete set of
questions which are covered 100% concepts from Study
Material with amended Questions which are applicable
from CA Final November 2016 Exam.
Since many friends request for CA Final ISCA notes in
question answer format So now I am submitted to you.
Please give your response if you like these so that I can
further move to other chapters.
- Thanking YouPardeep Rohilla
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 2
Q.1 What is Cloud Computing
∑Cloud computing simply means the use of computing resources as a service
through networks, typically the Internet
∑Cloud computing is both, a combination of software and hardwarebased
computing resources delivered as a networked service.
∑This model of IT enabled services enables anytime accessto a shared pool of
applications and resources.
∑With cloud computing, companies can scale up to massive capacities in an instant
without having to invest in new infrastructure, train new personnel or license
∑Cloud computing is of particular benefital to small and medium-sized business
systems, who wish to completely outsource
their data-center infrastructure; or
large companies, who wish to get peak load capacity without incurring the higher
cost of building larger data centers internally.
∑End users are not need to care about “ How servers and networks are
maintained in the cloud.”
∑In both the instances, service consumers use ‘what they need on the Internet’
and pay only for ‘what they use’.
E.g : Google apps where any application can be accessed using browser & can be
deployed (install)on thousand of computers using internet.
Q.2 What is Pertinent issues.
M.T : For know about issue of cloud - U S E T H I S
∑Unexpected Behaviors :
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 3
∑Security issue :
∑Environment friendly cloud computing :
∑Threshold Policy :
∑Hidden Cost :
∑Software development in cloud :
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 4
Q. 3 Objective/ Goal of Cloud computing ?
M.T : ?माराCONSOLIDATED?ै?ड?ु
ANY WHERE & ANY TIME जबभीNEEDहो
AVAILABLEहो जाते है, वो भी िबनाCOSTकी परवाह िकए! ?योकी हमार# दो?त"ECO-
है& ?मेशा?यान दे ती हैSCALE?ै?ड?ु
∑To consolidateIT infrastructure into a more integrated and manageable
∑To access services and data from anywhereat any time;
∑To enable or improve “Anywhere Access (AA)”for ever increasing users; and
∑To Availability& provision of resources as needed.
∑To scalethe IT ecosystem quickly, easily and cost-effectively based on the
evolving business needs;
∑To create a highly efficient IT ecosystem, where resources are pooled together
and costs are aligned with what resources are actually used;
∑To reduce costsrelated to IT energy/power consumption;
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 5
Q.4 What is Grid Computing ? Explain its reasons for so popular i.e characteristic.
Ans. The computing resources in most of the organizations are underutilized but are
necessary for certain operations. The idea of Grid computing is to make use of such non-
utilized computing power by the needy organizations, and thereby the Return On
Investment (ROI) on computing investments can be increased.
Thus, Grid computing is a network of computing or processor machines managed with a
kind of software such as middleware, in order to access and use the resources remotely.
The managing activity of grid resources through the middleware is called Grid Services.
Grid Services provide access control, security, access to data including digital libraries
and databases, and access to large-scale interactive and long-term storage facilities.
Grid Computing is more popular due to the following reasons:
∑It has the ability to make use of unused computing power, and thus, it is a cost
effective solution (reducing investments, only recurring costs).
∑This enables different resources of computers to work cooperativelyand
collaboratively to solve a scientific problem.
Q. 5 Cloud vs Grid Computing. Explain Some Pertinent similarities & differences?
Ans : Cloud computing evolved (i.e developed) from Grid computing and provides on
demand resource provisioning.
Grid computing requires use of software that can divide and carve out pieces of
program as one large system.
If one piece of software on a node fails, then other pieces of software of software on
other node also fail.
Some pertinent similarities and differences between cloud and grid computing are
highlighted as follows:
A) Similarities :
∑Cloud computing and grid computing both are scalable:
∑Scalability is accomplished through load balancing of application
instances running separately on a variety of operating systems and
connected through Web services.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 6
∑CPU and network bandwidth is allocated and de-allocated on
∑The system's storage capacity goes up and down depending on the
number of users, instances, and the amount of data transferred at a
ÿBoth computing types involve multi-tenancy and multitasking:
∑its mean that many customers can perform different tasks, accessing a
single or multiple application instances.
∑Sharing resources among a large pool of users assists in reducing
infrastructure costs and peak load capacity.
∑Cloud and grid computing provide Service- Level Agreements (SLAs) for
guaranteed uptime availability of, say, 99 percent. If the service slides
below the level of the guaranteed uptime service, the consumer will get
service credit for not receiving data within stipulated time.
B) Differences :
ÿWhile the storage computing in the grid is well suited for large data
storage, it is not economically suited for storing objects as small as
ÿIn a data grid, the amounts of distributed data must be large for
maximum benefit. While in cloud computing, we can store an
object as low as 1 byte and as large as 5 GB or even several
ÿA computational grid focuses on computationally intensive
while cloud computingoffers two types of instances:
standard and high-CPU.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 7
Q. 6 What is Cloud computing ARCHITECTURE ?
Front EndBack EndMiddle ware (back end)
It is device of clientIn cloud computing , Cloud itself is
ÿIt will contains
ÿIt allows computers
to connect each
It needs some application to
back end or say cloud
ÿLotof redundant backup so.
ÿIt includes 100s of storage
devices, servers and various
ÿIt monitors clients demand.
The Cloud Computing Architecture (CCA)of a cloud solution is the structure of the
system, which comprises of
on-premise and cloud resources, services, middleware, and
and the relationships between them.
A cloud computing architecture consists of a Front End and a Back End. They connect to
each other through a network, usually the Internet.
The front end is the side, the
computer user sees and interacts through
, andthe back end is the “cloud” section of
the system, truly facilitating the services.
The details are given as follow:
Front End Architecture
: The front end of the cloud computing system comprises of the
client’s devices (or computer network) and some applications needed for accessing the
cloud computing system. All the cloud computing systems do not give the same inter
face to users. But havee some unique applications which provide network access to its
Web services like electronic mail programs use some existing web browsers such as
Firefox, internet explorer or Google chrome.
Back End Architecture: Back end refers to some service facilitating peripherals. In cloud
computing, the back end is cloud itself, which may encompass various computer
machines, data storage systems and servers. Groups of these clouds make up a whole
cloud computing system.
Theoretically, a cloud computing system can include any type of web application
program such as video games to applications for data processing, software development
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 8
and entertainment. Usually, every application would have its individual dedicated server
There are some set of rules, technically referred as protocols, are followed by this server
and it uses a special type of software
known as middleware.
Middleware allows computers that are connected on networks to communicate with
each other. If any cloud computing service provider has many customers, then there’s
likely to be very high demand for huge storage space. Many companies that are service
providers need hundreds of storage devices. The cloud computing system must have a
redundant back-up copy of all the data of its client’s.
Q.7 What is Cloud computing TYPES or Cloud computing Environment ?
Private PublicCommunity Hybrid
Developed by IT Dept.
within Enterprise. It is more scalable.
cost. A private cloud is shared
organization. It is combo of
Use exclusive for
benefit of org. Admin by third party
& used by general
public(user) It is provision for exclusive
use by specific community
from shared org. When
It also called internal
cloud.It also called Provider
cloud.Suitable for those org. that
can not afford Private cloud
and not rely upon Public
cloud. When Public
E.g : Server of
Facebook. E.g : Server of
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 9
Q.8 What is Private cloud? Also explain its major advantages and limitations in brief.
ÿThis cloud computing environment resides within the boundaries of an
ÿis used exclusively for the organization’s benefits. These are also called internal
ÿThey are built primarily by IT departments within enterprises, who seek to
optimize utilization of infrastructure resources within the enterprise by
provisioning the infrastructure with applications using the concepts of grid and
Advantages of Private Cloud :
ÿThey improve average server utilization; allow usage of low-cost servers and
hardware while providing higher efficiencies;
thus reducing the costs that a
greater number of servers would otherwise entail.
ÿIt provides a high level of security and privacy to the user.
ÿIt is small in size and controlled and maintained by the organization.
Limitation of Private Cloud :
ÿMoreover, one major limitation is that IT teams in the organization may have to
invest in buying, building and managing the clouds independently. Budget is a
constraint in private clouds and they also have loose SLAs.
Also other major limitation is that IT teams in the organization may have to invest
in buying, building and managing the clouds independently.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 10
Q.9 What is the characterstic of Private Cloud ?
Privateबात?ताउ तो: C S कौस?Weak Service level Agreementहै
Certain characteristics of Private Cloud are as follows:
1.Secure: The private cloud is secure as it is deployed and managed by the
organization itself, and hence there is least chance of data being leaked out of
Central Control :As usual, the private cloud is managed by the organization itself,
there is no need for the organization to rely on anybody and its controlled by the
Weak Service Level Agreements (SLAs): SLAs play a very important role in any
cloud service deployment model as they are defined as agreements between the
user and the service provider in private cloud. In private cloud, either Formal
SLAs do not exist or are weak as it is between the organization and user of the
same organization. Thus, high availability and good service may or may not be
Q.10 What is diffrence between On –Premise & Outsourced Private Cloud ?
On Premise Private Cloud On Outsourced Private Cloud
Managed by the organization itself.Managed by the third party.
Everything is same as usual
private cloud except that
herethe cloud is outsourced.
Service Level Agreements (SLAs)
SLAs are defined between the
organization and its users. Users have
broader access rights than general
public cloud users and service
providers are able to efficiently
provide the service because of small
user base and mostly efficient
network. These are usually followed
strictly as it is a third party
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 11
Network management and network
issue resolving are easier. The
networks usually have high bandwidth
and low latency The cloud is fully deployed at
the third party site and
organizations connect to the
third party by means of either
a dedicated connection or
Security and Data Privacy
Comparatively, it is more resistant to
attacks than any other cloud and the
security attacks are possible from an
internal user only. Cloud is relatively less secure
and the security threat is
from the third party and the
ÿThe data is usually stored in the
same geographical location
where the cloud users are
ÿIn case of several physical
locations, the cloud is
distributed over several places
and is accessed using the
ÿThe cloud is located
off site and
ÿwhen there is a
change of location the
data need to be
The performance depends on the
network and resources and can be
controlled by the network
management team. The performance of the
cloud depends on the third
party that is outsourcing the
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 12
Q.11 What is Public cloud? What is the characteristics of Public cloud ? Also explain
its major advantages and limitations in brief.
∑This environment can be used by the general public. This includes individuals,
corporations and other types of organizations.
∑Typically, public clouds are administrated by third parties or vendors over the
Internet, and the services are offered on pay -per-use basis.
∑These are also called provider clouds. Business models like SaaS (Software-as-a-
Service) and public clouds complement each other and enable companies to
leverage shared IT resources and services.
The Advantages & disadvantage of public cloud include the following:
∑It is widely used in the development, deployment and management of enterprise
applications, at affordable costs.
∑It allows the organizations to deliver highly scalable and reliable applications
rapidly and at more affordable costs.
∑There is no need for establishing infrastructure for setting up and maintaining the cloud.
∑Strict SLAs are followed.
∑There is no limit for the number of users.
ÿMoreover, one of the limitationsis security assurance and thereby building
trust among the clients is far from desired but slowly liable to happen.
Further, privacy and organizational autonomy are not possible.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 13
Q.12 Characteristics of Public Cloud are as follows:
भारत मेPublic कीcharacteristic ये है?क: ?यादातर गरीब"ScaleमेHighly Availableहै,
इ?स?लएLess Secureहोने कीवजहसे सरकार ने स?तStringent SLA के ज?रयेaffordableघर
ÿHighly Scalable: The resources in the public cloud are large in number and
the service providers make sure that all requests are granted. Hence public
clouds are considered to be scalable.
ÿHighly Available: It is highly available because anybody from any part of the
world can access the public cloud with proper permission, and this is not
possible in other models as geographical or other access restrictions might
ÿLess Secure: Since it is offered by a third party and they have full control
over the cloud, the public cloud is less secure out of all the other deployment
ÿAffordable: The cloud is offered to the public on a pay-as-you-go basis;
hence the user has to pay only for what he or she is using (using on a per-
hour basis). And this does not involve any cost related to the deployment.
ÿStringent(स?त) SLAs :As the service provider’s business reputation and
customer strength are totally dependent on the cloud services, they follow the
SLAs strictly and violations are avoided.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 14
Q.13 What is Hybrid cloud? What is the characteristics of Public cloud ? Also explain
its major advantages and limitations in brief.
∑This is a combination of both at least one private (internal) and at least
one public (external) cloud computing environments - usually, consisting
of infrastructure, platforms and applications.
∑The usual method of using the hybrid cloud is to have a private cloud
initially, and then for additional resources, the public cloud is used.
∑The hybrid cloud can be regarded as a private cloud extended to the public
aims at utilizing the power of the public cloud by retaining the
properties of the private cloud
∑It is typically offered in either of two ways.
ÿA vendor has a private cloud and forms a partnership with a
public cloud provider or
ÿA public cloud provider forms a partnership/franchise with a
vendor that provides private cloud platforms
Characteristics of Hybrid Cloud are as follows:
ÿScalable: The hybrid cloud has the property of public cloud with a private cloud
environment and as the public cloud is scalable; the hybrid cloud with the help of
its public counterpart is also scalable.
ÿPartially Secure: The private cloud is considered as secured and public cloud has
high risk of security breach. The hybrid cloud thus cannot be fully termed as
secure but as partially secure.
ÿStringent SLAs: Overall the SLAs are more stringent than the private cloud and
might be as per the public cloud service providers.
ÿComplex Cloud Management: Cloud management is complex as it involves more
than one type of deployment models and also the number of users is high.
The Advantages of Hybrid Cloud include the following:
∑It is highly scalable and gives the power of both private and public clouds.
∑It provides better security than the public cloud.
The limitation of Hybrid Cloud is that the security features are not as good as the
public cloud and complex to manage.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 15
Q.14 What is Community cloud? What is the characteristics of Community cloud ?
Also explain its major advantages and limitations in brief.
ÿThe community cloud is the cloud infrastructure that is provisioned for exclusive
use by a specific community of consumers.
ÿFrom organizations that have shared concerns (eg. mission security
requirements, policy, and compliance considerations).
ÿIt may be owned, managed, and operated by one or more of the organizations in
the community, a third party or some combination of them,
ÿand it may exist on or off premises.
ÿIn this, a private cloud is shared between several organizations.
ÿThis model is suitable for organizations that cannot afford a private cloud and
cannot rely on the public cloud either.
Characteristics of Community Clouds are as follows:
ßCollaborative and Distributive Maintenance: In this, no single company has full
control over the whole cloud. This is usually distributive and hence better
cooperation provides better results.
ßPartially Secure: This refers to the property of the community cloud where few
organizations share the cloud, so there is a possibility that the data can be leaked
from one organization to another, though it is safe from the external world.
ßCost Effective: As the complete cloud is being shared by several organizations or
community, not only the responsibility gets shared; the community cloud becomes
cost effective too.
Advantages of Community Clouds are as follows:
ÿIt allows establishing a low-cost private cloud.
ÿIt allows collaborative work on the cloud.
ÿIt allows sharing of responsibilities among the organizations.
ÿIt has better security than the public cloud.
The limitation of the community cloudis that the autonomy of the organization is
lost and some of the security features are not as good as the private cloud. It is not
suitable in the cases where there is no collaboration.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 16
Q.15 Explain, in brief, the characteristics of Cloud Computing.
MT : आशारामi.e Very Popular (A S M)²
Major characteristics of cloud computing are given as follows:
Virtualization: This technology allows servers and storage devices to increasingly share
and utilize applications, by easy migration from one physical server to another.
Performance: It is monitored and consistent and its loosely coupled architecture
constructed using web services as the system interface enables high level of
Agility: The cloud works in the ‘distributed mode’ environment. It shares resources
among users and tasks, while improving efficiency and agility (responsiveness).
High Availability and Reliability: Availability of servers is supposed to be high and more
reliable as the chances of infrastructure failure are minimal.
High Scalability: Cloud environments enable servicing of business requirements for
larger audiences, through high scalability.
Services in Pay-Per-Use Mode: SLAs between the provider and the user must be defined
when offering services in pay per use mode. This may be based on the complexity of
services offered. Application Programming Interfaces (APIs) may be offered to the users
so they can access services on the cloud by using these APIs.
Maintenance: The cloud computing applications are easier, because they are not to be
installed on each user's computer and can be accessed from different places.
Multi-sharing: With the cloud working in a distributed and shared mode, multiple users
and applications can work more efficiently with cost reductions by sharing common
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 17
Q.16 Briefly discuss the advantages of Cloud Computing.
MT : AB QU CA
बेटा आशारान मे कोइbenefit नही है बि?कCA मे है
Major advantages of Cloud Computing are given as follows:
Automatic Software Integration:
ÿIn the cloud, software integration is usually something that occurs automatically.
ÿThis means that we do not need to take additional efforts to customize and
integrate the applications as per our preferences.
ÿThis aspect usually takes care of itself. Not only that, cloud computing allows us
to customize the options with great ease.
Backup and Recovery:
ÿSince all the data is stored in the cloud, backing it up and restoring the same is
relatively much easier than storing the same on a physical device.
ÿFurthermore, most cloud service providers are usually competent enough to
handle recovery of information.
ÿHence, this makes the entire process of backup and recovery much simpler than
other traditional methods of data storage.
ÿIt gives us the advantage of quick deployment.
ÿOnce we opt for this method of functioning, the entire system can be fully
functional in a matter of a few minutes.
ÿOf course, the amount of time taken here will depend on the exact kind of
technology that we need for our business.
ÿStoring information in the cloud gives us almost unlimited storage capacity.
ÿHence, one no more need to worry about running out of storage space or
increasing the current storage space availability.
ÿIt is most cost efficient method to use, maintain and upgrade.
ÿTraditional desktop software costs companies a lot in terms of finance. Adding up
the licensing fees for multiple users can prove to be very expensive for the
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 18
ÿBut The cloud, on the other hand, is available at much cheaper rates and hence,
can significantly lower the company’s IT expenses.
ÿBesides, there are many one-time-payments, pay-as-you-go and other scalable
options available, which make it very reasonable for the company.
Access to Information easy: Once registered in the cloud, one can access the
information from anywhere, where there is an Internet connection. This convenient
feature lets one move beyond time zone and geographic location issues.
Q.17 Discuss challengesto Cloud computing in brief. OR
Discuss the Security and Implementation issues in using Cloud Computing technology
for running the new web application.
MT: G I T A L A D C I
कीIdentification करनेपरS A P A हो जाता है जी!
vDue to the lack of control over the employees and services, it creates
problems relating to design, implementation, testing and deployment.
vSo, there is need of governance model, which controls the standards,
procedures and policies of the organization.
vAuditing and risk management programs are some way to verify the
policy, which can shift the risk landscape.
vIntegrity refers to the prevention of unauthorized modification of data and
vit ensures that data is of high quality, correct, consistent and accessible.
vAfter moving the data to the cloud, owner hopes that their data and
applications are secure.
vIt is important to verify if one’s data has been tampered with or deleted.
vMethods like digital signature, Redundant Array of Independent Disks
(RAID) strategies etc. are some ways to preserve integrity in
vCloud computing. The most direct way to enforce the integrity control is to
employ cryptographic hash function.
vOrg. has direct control over security aspects as well as the federal agencies even
have responsibility to protect the information system from the risk.
vTrust is an important issue in Cloud. Various clients’ oriented studies reveal that
Cloud has still failed to build trust between the client and service provider.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 19
vTrust ensures that service arrangements have sufficient means to allow visibility
into the security and privacy controls and processes employed by the Cloud
provider, and their performance over time.
ÿAvailability refers to the prevention of unauthorized withholding of data and it
ensures the data backup through BCP and DRP.
ÿIn addition, Availability also ensures that they meet the organization’s continuity
and contingency planning requirements.
ÿAvailability can be affected temporarily or permanently, and a loss can be partial
or complete. Temporary breakdowns, sustained and Permanent Outages, Denial
of Service (DoS) attacks, equipment failure, and natural calamities are all threats
Legal Issues and Compliance:
ÿThere are various requirements relating to legal, privacy and data security laws
that need to be studied in Cloud system.
ÿOne of the major troubles with laws is that they vary from place to place, and
users have no assurance of where the data is located physically.
ÿThere is a need to understand various types of laws and regulations that impose
security and privacy duties on the organization and potentially impact Cloud
computing initiatives such as demanding privacy, data location and security
controls, records management.
ÿAuditing is type of checking that ‘what is happening in the Cloud environment’.
ÿIt is an additional layer before the virtualized application environment, which is
being hosted on the virtual machine to watch ‘what is happening in the system’.
ÿit consumes more time, insistent across customers, pricy and motivational
debilitate for everyone.
Data Stealing :
ÿSome of the Cloud providers do not use their own server, instead. They use
server/s from other service providers.
ÿIn that case, there is a probability that the data is less secure and is more prone
to the loss from external server.
ÿIf the external server is shut down due to any legal problem, financial crisis,
natural disaster, and fire creates loss for the user.
ÿIn that case, data protection is an important mechanism to secure the data.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 20
ÿPrevention of unauthorized disclosure of data is referred to as confidentiality.
ÿNormally, Cloud works on public networks; therefore, there is a requirement to
keep the data confidential the unauthorized entities. With the use of encryption
and physical isolation, data can be kept secret.
ÿThe basic approaches to attain confidentiality are the encrypting the data before
placing it in a Cloud with the use of TC3 (Total Claim Capture & Control).
ÿIt ensures to meet the requirements of the organization during an incident.
ÿIt ensures that the Cloud provider has a transparent response process in place
and sufficient mechanisms to share information during and after an incident.
Identity Management and Access control: The key critical success factor for Cloud
providers is to have a robust federated identity management architecture and strategy
internal in the organization.
It is to understand virtualization and other logical isolation techniques that the Cloud
provider employs in its multi-tenant software architecture, and evaluate the risks
required for the organization.
ÿSecurity issues relating to application security still apply when applications move
to a cloud platform.
ÿTo prevent Cloud computing; service provider should have the complete access
to the server with all rights for the purpose of monitoring and maintenance of
ÿInfected applications need to be monitored an recovered by the Cloud security
ÿPrivacy is also considered as one of the important issues in Cloud.
ÿThe privacy issues are embedded in each phase of the Cloud design.
ÿIt should include both the legal compliance and trusting maturity.
ÿThe Cloud should be designed in such a way that it decreases the privacy risk.
Architecture:In the architecture of Cloud computing models, there should be a control
over the security and privacy of the system. The architecture of the Cloud is based on a
specific service model.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 21
Q.18 What is Mobile Computing. How Mobile Computing Works?
ÿMobile Computing refers to the technology that allows transmission of data via a
computer without having to be connected to a fixed physical link.
ÿMobile voice communication is widely established throughout the world and has
had a very rapid increase in the number of subscribers to the various cellular
networks over the last few years.
ÿAn extension of this technology is the ability to send and receive data across
these cellular networks. This is the fundamental principle of mobile computing.
ÿMobile data communication has become a very important and rapidly evolving
technology as it allows users to transmit data from remote locations to other
remote or fixed locations.
ÿThis proves to be the solution of the biggest problem of business people on the
Here is how Mobile Computing works:
∑The user enters or access data using the application on handheld
∑Using one of several connecting technologies, the new data are
transmitted from handheld to site’s information system where files are
updated and the new data are accessible to other system user.
∑Now both systems (handheld and site’s computer) have the same
information and are in sync.
∑The process work the same way starting from the other direction.
The process is similar to the way a worker’s desktop PC access the
organization’s applications, except that user’s device is not physically
connected to the organization’s system.
The communication between the user device and site’s information
systems uses different methods for transferring and synchronizing data,
some involving the use of Radio Frequency (RF) technology.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 22
Q19. Discuss the components of Mobile Computing.
The key components of Mobile Computing are as follows:
ÿThis refers to the infrastructure put in place to ensure that seamless
and reliable communication goes on.
ÿThis would include communication properties, protocols, data
formats and concrete technologies.
ÿThis includes mobile devices or device components that receive or access
the service of mobility.
ÿThey would range from Portable laptops, Smart Phones, Tablet PCs, and
Personal Digital Assistants (PDA) that use an existing and established
network to operate on.
ÿAt the back end, there are various servers like Application Servers,
Database Servers and Servers with wireless support, WAP gateway, a
Communications Server and/or MCSS (Mobile Communications Server
Switch) or a wireless gateway embedded in wireless carrier’s network (this
server provide communications functionality to allow the handheld device
to communicate with the internet or Intranet Infrastructure).
ÿThe characteristics of mobile computing hardware are defined by the size
and form factor, weight, microprocessor, primary storage, secondary
storage, screen size and type, means of input, means of output, battery
life, communications capabilities, expandability and durability of the
ÿMobile Software is the actual programme that runs on the mobile
hardware and deals with the characteristics and requirements of mobile
ÿIt is the operating system of that appliance and is the essential component
that makes the mobile device operates.
ÿMobile applications popularly called Apps are being developed by
organizations for use by customers but these apps could represent risks, in
terms of flow of data as well as personal identification risks, introduction
of malware and access to personal information of mobile owner.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 23
Q20 Benefits of Mobile Computing
MT : if MANAGEMENT EFFECTIVENESSis good, WORK ORDERcan beACCESS&
UPDATEDfromANY JOB LOCATIONat ANYWHERE, ANYTIME.
In general, Mobile Computing is a versatile and strategic technology that increases
information quality and accessibility, enhances operational efficiency, and improves
But, more specifically, it leads to a range of tangible benefits, including the following:
1. It provides mobile workforce with remote access to work order details, such as work order location, contact information, required completion date, asset history
relevant warranties/service contracts.
2. It enables mobile sales personnel to update work order status in real-time, facilitating excellent communication.
3. It facilitates access to corporate services and information at any time, from anywhere.
4. It provides remote access to the corporate Knowledgebase at the job location.5
5. It enables to improve management effectiveness by enhancing information quality, information flow, and ability to control a mobile workforce.
Q.21 Limitations of Mobile Computing
ÿMobile Internet access is generally slower than direct cable connections using
technologies such as General Packet Radio Service (GPRS)
ÿAnd Enhanced Data for GSM (Global System for Mobile Communication)
Evolution (EDGE), and more recently 3G networks.
ÿThese networks are usually available within range of commercial cell phone
towers. Higher speed wireless LANs are inexpensive but have very limited range.
ÿWhen working mobile, one is dependent on public networks, requiring careful use
of Virtual Private Network (VPN).
ÿSecurity is a major concern while concerning the mobile computing standards.
ÿOne can easily attack the VPN through a huge number of networks
interconnected through the line.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 24
ÿWhen a power outlet or portable generator is not available, mobile computers
must rely entirely on battery power.
ÿCombined with the compact size of many mobile devices, this often means
unusually expensive batteries must be used to obtain the necessary battery life.
Mobile computing should also look into Greener IT in such a way that it saves the
power or increases the battery life.
ÿWeather, terrain, and the range from the nearest signal point can all interfere
with signal reception.
ÿReception in tunnels, some buildings, and rural areas is often poor.
Potential health hazards:
ÿPeople who use mobile devices while driving are often distracted from driving are
thus assumed to be more likely involved in traffic accidents.
ÿCell phones may interfere with sensitive medical devices.
ÿThere are allegations that cell phone signals may cause health problems.
Human interface with device:
ÿScreens and keyboards tend to be small, which may make them hard to use.
ÿAlternate input methods such as speech or handwriting recognition require
Q.22 Discuss securityissues of Mobile Computing.
: Wireless networks have relatively more security requirements
than wired network. A number of approaches have been suggested and also the
use of encryption is has been proposed
Confidentiality: Preventing unauthorized users from gaining access to critical
information of any particular user.
Integrity: Ensures unauthorized modification, destruction or creation of
information cannot take place.
Availability: Ensuring authorized users getting the access they require.
Legitimate: Ensuring that only authorized users have access to services.
Accountability: Ensuring that the users are held responsible for their security
related activities by arranging the user and his/her activities are linked if and
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 25
Q. 23 Discuss (technical & business) issues of Mobile Computing i.e “ other
ÿBandwidth utilization can be improved by logging (bulk operations against short
requests) and compression of data before transmission.
ÿThe technique of caching frequently accessed data items can play an important
role in reducing contention in narrow bandwidth wireless networks.
ÿThe cached data can help improve query response time. Since mobile clients
often disconnect to conserve battery power the cached data can support
ÿAs the mobile computers move, they encounter networks with different
features. A mobile computer must be able to switch from infrared mode to radio
mode as it moves from indoors to outdoors.
ÿAdditionally it should be capable of switching from cellular mode of operation to
satellite mode as the computer moves from urban and rural areas.
ÿIn mobile computing; as computers are working in cells and are being serviced by
different network providers, the physical distance may not reflect the true
ÿA small movement may result in a much longer path if cell or network
boundaries are crossed.
ÿIt will also lead to updating of the location dependent information as described
ÿThis can increase the network latency as well as risk of disconnection. Service
connections must be dynamically transferred to the nearest server. However,
when load balancing is a priority this may not be possible.
ÿMobile Computers will rely on their batteries as the primary power source.
ÿBatteries should be ideally as light as possible but at the same time they should
be capable of longer operation times.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 26
ÿPower consumption should be minimized to increase battery life. Chips can be
redesigned to operate at lower voltages.
ÿPower management can also help. Individual Components, be powered down
when they are idle.
Revising the technical architecture:
ÿMobile users are demanding and are important to the business world.
ÿTo provide complete connectivity among users; the current communication
technology must be revised to incorporate mobile connectivity.
ÿAdditionally, application and data architectures must also be revised to support
the demands put upon them by the mobile connectivity.
Reliability, coverage, capacity, and cost:
ÿAt present; wireless network is less reliable, have less geographic coverage and
reduced bandwidth, are slower, and cost more than the wired-line network
ÿIt is important to find ways to use this new resource more efficiently by
designing innovative applications.
Integration with legacy mainframe and emerging client/server applications:
ÿApplication development paradigms are changing.
ÿAs a result of the IT industry's original focus on mainframes, a huge inventory of
applications using communications interfaces that are basically incompatible with
mobile connectivity have been accumulated.
ÿStill the application development trend is geared towards wired network.
End-to-end design and performance:
Since mobile computing involves multiple networks (including wired) and
multiple application server platforms; end-to-end technical compatibility, server
capacity design, and network response time estimates are difficult to achieve.
ÿIn addition to these technical challenges, mobile computing also faces business
ÿThis is due to the lack of trained professionals to bring the mobile technology to
the general people and development of pilot projects for testing its capabilities.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 27
Cloud computing basic Service MODEL
Cloud Computing Service Models
∑Cloud computing is a model that enables the end users to access the shared pool
of resources such as compute, network, storage, database and application as an
on demand service without the need to buy or own it.
∑The services are provided and managed by the service provider, reducing the
management effort from the end user side.
∑The essential characteristics of the cloud include on-demand, self service, broad
network access, resource pooling, rapid elasticity, and measured service.
The National Institute of Standards and Technology (NIST) defines three basic
service models –
Infrastructure as a Service (IaaS),
2. Platform as a Service (PaaS), and
3. Software as a Service (SaaS).
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 28
Q.25 Explain the Infrastructure as a Service (IaaS). What type of services provided by
ÿIaaS, a hardware-level service, provides computing resources such as processing
power, memory, storage, and networks for cloud users to run their application
ÿThis allows users to maximize the utilization of computing capacities without
having to own and manage their own resources.
ÿIaaS changes the computing from a physical infrastructure to a virtual
infrastructure through virtual computing; storage; and network resources by
abstracting the physical resources
The end-users or IT architects will use the infrastructure resources in the form of Virtual
machines (VMs) and design virtual infrastructure, network load balancers etc., based on
The IT architects need not maintain the physical servers as it is maintained by the
Examples of IaaS providers include Amazon Web Services (AWS), Google Compute
A typical IaaS provider may provide the following services as shown below :
(a) Compute:Computing as a Service includes virtual Central Processing Inputs (CPUs)
and virtual main memory for the Virtual Machines (VMs) that are provisioned to the end
(b) Storage:STaaS provides back-end storage for the VM images. Some of the IaaS
providers also provide the back end for storing files.
(c) Network: Network as a Service (NaaS) provides virtual networking components such
as virtual router, switch, and bridge for the VMs.
(d) Load Balancers:Load balancing as a Service may provide load balancing capability at
the infrastructure layer.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 29
Q.26 What is the Characteristics of IaaS ?
Characteristics of IaaS are as follows:
Web access to the resources:
ÿThe IaaS model enables the IT users to access infrastructure resources over the
ÿWhen accessing a huge computing power, the IT user need not get physical
access to the servers.
Centralized management: The resources distributed across different parts are
controlled from any management console that ensures effective resource management
and effective resource utilization.
Elasticity and Dynamic Scaling: Depending on the load, IaaS services can provide the
resources and elastic services where the usage of resources can be increased or
decreased according to the requirements.
Shared infrastructure: IaaS follows a one-to-many delivery model and allows multiple IT
users to share the same physical infrastructure and thus ensure high resource
Metered Services: IaaS allows the IT users to rent the computing resources instead of
buying it. The services consumed by the IT user will be measured, and the users will be
charged by the IaaS providers based on the amount of usage.
Q.27 What is the different Instances of IaaS ?
A.Network as a Service (NaaS):
ÿNaaS, an instance of IaaS, provides users with needed data communication
capacity to accommodate bursts in data traffic during data-intensive activities
such as video conferencing or large file downloads.
ÿIt is an ability given to the end-users to access virtual network services that are
provided by the service provider over the Internet on pay-per-use basis.
ÿIt further allows the network architect to deploy custom routing protocols and
enables the design of efficient in-network services.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 30
NaaS providers operate using three common service models:
1. Virtual Private Network (VPN)
2. Bandwidth on Demand (BoD) and
3. Mobile Virtual Network (MVN).
Storage as a Service (STaaS):
ÿSTaaS, an instance of IaaS, provides storage infrastructure on a
subscription basis to users who want a low-cost and convenient way to
store data, manage off-site backups, mitigate risks of disaster recovery,
and preserve records for the long-term.
ÿSTaaS allows the end users to access the files at any time from any place.
STaaS provider provides the virtual storage that is abstracted from the
physical storage of any cloud data center
Database as a Service (DBaaS):
ÿThis is also related to IaaS and provides users with seamless mechanisms
to create, store, and access databases at a host site on demand.
ÿIt is an ability given to the end users to access the database service
without the need to install and maintain it on the pay-per-use basis.
Backend as a Service (BaaS): It is a type of IaaS, that provides web and mobile
app developers a way to connect their applications to backend cloud storage with
added services such as user management, push notifications, social network
services integration using custom software development kits and application
Desktop as a Service (DTaaS):
ÿIt is an instance of IaaS that provides ability to the end users to use
desktop virtualization without buying and managing their own
ÿDTaaS is a pay-per-use cloud service delivery model in which the service
provider manages the back-end responsibilities of data storage, backup,
security and upgrades.
ÿThe end-users are responsible for securing and managing their own
desktop images, applications, and security. These services are simple to
deploy, are highly secure, and produce better experience on almost all
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 31
Q.27 What about PaaS ? What type of service may be provided by PaaS. Also explain the
characteristic of PaaS ?
ÿPaaS provides the users the ability to develop and deploy an application
on the development platform provided by the service provider.
ÿIn traditional application development, the application will be developed
locally and will be hosted in the central location. In stand-alone application
development, the application will be developed by traditional
development platforms result in licensing - based software,
ÿwhereas PaaS changes the application development from local machine to
ÿFor example- Google App Engine, Windows Azure Compute etc.
Typical PaaS providers may provide :
1.Programming Languages: PaaS providers provide a wide variety of programming
languages like Java, PHP, Python, Ruby etc. for the developers to develop
Application Frameworks: PaaS vendors provide application development
framework like Joomla, WordPress, Sinatra etc. for application development
3.Database: Along with PaaS platforms, PaaS providers provide some of the
popular databases like ClearDB, Cloudant, Redis etc. so that application can
communicate with the databases.
-Other Tools: PaaS providers provide all the tools that are required to
develop,test, and deploy an application.
Characteristics of PaaS are as follows:
ÿAll in One:Most of the PaaS providers offer services like programming languages
to develop, test, deploy, host and maintain applications in the same Integrated
Development Environment (IDE).
ÿWeb access to the development platform:PaaS provides web access to the
development platform that helps the developers to create, modify, test, and
deploy different applications on the same platform.
ÿOffline Access:To enable offline development, some of the PaaS providers allow
the developer to synchronize their local IDE with the PaaS services. The
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 32
developers can develop an application locally and deploy it online whenever they
are connected to the Internet.
∑PaaS services provide built-in scalability to an application that is developed
using any particular PaaS.
∑This ensures that the application is capable of handling varying loads
ÿCollaborative Platform:To enable collaboration among developers, most of the
PaaS providers provide tools for project planning and communication.
ÿDiverse Client Tools: PaaS providers offer a wide variety of client tools like Web
User Interface (UI), Application Programming Interface (API) etc. to help the
developers to choose the tool of their choice.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 33
Q.28 What about SaaS ? What type of service may be provided by SaaS. Also explain the
characteristic of PaaS ?
ÿSaaS provides ability to the end users to access an application over the Internet
that is hosted and managed by the service provider.
ÿThus, the end users are exempted from managing or controlling an application
the development platform, and the underlying infrastructure. SaaS changes the
way the software is delivered to the customers.
ÿIn the traditional software model, the software is delivered as a license-based
product that needs to be installed in the end user device.
ÿSince SaaS is delivered as an on-demand service over the Internet, there is no
need to install the software to the end-user’s devices.
ÿSaaS services can be accessed or disconnected at any time based on the end
ÿSaaS provides users to access large variety of applications over internets that are
hosted on service provider’s infrastructure.
ÿFor example, one can make his/her own word document in Google docs online,
s/he can edit a photo online on pixlr.com so s/he need not install the photo
editing software on his/her system- thus Google is provisioning software as a
Services offered by SaaS providers
(a) Business Services
: SaaS providers provide a variety of business services to
startup companies that include ERP, CRM, billing, sales, and human resources.
(b) Social Networks: Since the number of users of the social networking sites is
increasing exponentially, loud computing is the perfect match for handling the
(c) Document Management: Most of the SaaS providers provide services to create,
manage, and track electronic documents as most of the enterprises extensively
use electronic documents.
(d) Mail Services: To handle the unpredictable number of users and the load on
email services, most of the email providers offer their services as SaaS services.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 34
Characteristics of SaaS are as follows:
1.One to Many: SaaS services are delivered as one-to-many models where a single
instance of the application can be shared by multiple customers.
Web Access: SaaS services allow the end users to access the application from any
location of the device is connected to the Internet.
Centralized Management: Since SaaS services are hosted and managed from the
central location, the SaaS providers perform the automatic updates to ensure
that each customer is accessing the most recent version of the application.
Multi-device Support: SaaS services can be accessed from any end user devices
such as desktops, laptops, tablets, smart phones, and thin clients.
Better Scalability: Most of the SaaS services leverage PaaS and IaaS for its
development and deployment and ensure a better scalability than traditional
High Availability: SaaS services ensure 99.99% availability of user data as proper
backup and recovery mechanisms are implemented
7.API Integration: SaaS services have the capability of integrating with other
software or service through standard APIs.
Q.29 What are the different instances of SaaS ?
ÿTesting as a Service (TaaS): This provides users with software testing capabilities
such as generation of test data, generation of test cases, execution of test cases
and test result evaluation on a pay-per-use basis.
ÿAPI as a Service (APIaaS): This allows users to explore functionality of Web
services such as Google Maps, Payroll processing, and credit card processing
ÿEmail as a Service (EaaS): This provides users with an integrated system of
emailing, office automation, records management, migration, and integration
services with archiving, spam blocking, malware protection.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 35
Q.30 What are the Other Cloud Service Models.
Answer : These are followings :
a. Communication as a Service (CaaS)
b. Data as a Service (DaaS)
c. Security as a Service (SECaaS)
d. Identity as a Service (IDaaS
a. Communication as a Service (CaaS):
ÿCaaS has evolved in the same lines as SaaS.
ÿCaaS is an outsourced enterprise communication solution that can be leased
from a single vender.
ÿThe CaaS vendor is responsible for all hardware and software management and
offers guaranteed Quality of Service (QoS).
ÿIt allows businesses to selectively deploy communication devices and modes on
a pay-as-you-go, as needed basis.
ÿThis approach eliminates the large capital investments. Examples are: Voice over
IP (VolP), Instant Messaging (IM), Collaboration and Videoconferencing
application using fixed and mobile devices.
b. Data as a Service (DaaS):
ÿDaaS provides data on demand to different types of users, systems or application.
ÿThe data may include text, images, sounds, and videos.
ÿData encryption and operating system authentication are commonly provided for
ÿDaaS users have access to high-quality data in a centralized place and pay by
volume or data type, as needed.
ÿHowever, as the data is owned by the providers, users can only perform read
operations on the data.
ÿDaaS is highly used in geography data services and financial data services.
c. Security as a Service (SECaaS):
ÿIt is an ability given to the end user to access the security serviceprovided by the
service provider on a pay-per-use basis.
ÿIt is a new approach to security in which cloud security is moved into the cloud
itself whereby cloud service users will be protected from within the cloud using a
unified approach to threats.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 36
vFour mechanisms of Cloud security that are currently provided are:
2.Web content filtering,
3.Vulnerability management and
d.Identity as a Service (IDaaS):
ÿIt is an ability given to the end users; typically an organization or
ÿto access the authentication infrastructure that is built, hosted, managed
and provided by the third party service provider.
ÿGenerally, IDaaS includes directory services, authentication services, risk
and event monitoring, single sign-on services, and identity and profile
Q.31 What is Green IT or Green Compounding ? What are the objective of Green
ÿIn other words, it is the study and practice of establishing / using
computers and IT resources in
a more efficient and environmentally
friendly and responsible way.
ÿComputers consume a lot of natural resources, from the raw materials
needed to manufacture them, the power used to run them, and the
problems of disposing them at the end of their life cycle.
ÿThis can include "designing, manufacturing, using, and disposing of
computers, servers, and associated subsystems - such as monitors,
printers, storage devices
efficiently and effectively with minimal or no
impact on the environment”.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 37
vThe objective of Green computing are as below:
∑To reduce the use of hazardous materials,
∑Maximize energy efficiency during the product’s lifetime, and
∑Promote the recyclability of defunct products and factory waste.
∑Implementation of energy-efficient CPUs, Servers etc.
∑Reduced resource consumption and proper disposal of electronic
Q.32 ‘The work habits of computer users and businesses can be modified to minimize
adverse impact on the global environment’. Discuss some of such steps, which can be
followed for Green IT.
Discuss best practices of Green IT.
Some of such steps for Green IT include the following:
A. Develop a sustainable Green computing plan
∑Involve stakeholders to include checklists, recycling policies, recommendations
for disposal of used equipment,
∑Follow Government guidelines and recommendations for purchasing green
computer equipment in organizational policies and plans;
∑Encourage the IT community for using the best practices and encourage them to
consider green computing practices and guidelines.
∑On-going communication about and campus commitment to green IT best
practices to produce notable results.
∑Include power usage, reduction of paper consumption, as well as
recommendations for new equipment and recycling old machines in
organizational policies and plans; and
∑Use cloud computing so that multiple organizations share the same computing
resources, thus increasing the utilization by making more efficient use of
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 38
∑Dispose e-waste according to central, state and local regulations;
∑Discard used or unwanted electronic equipment in a convenient and
environmentally responsible manner.
∑Manufacturers must offer safe end-of-life management and recycling options
when products become unusable; and
∑Recycle computers through manufacturer’s recycling services.
C. Make environmentally sound purchase decisions
∑Purchase of desktop computers, notebooks and monitors based on
∑Provide a clear, consistent set of performance criteria for the design of products;
∑Recognize manufacturer efforts to reduce the environmental impact of products
by reducing or eliminating environmentally sensitive materials.
∑Use Server and storage virtualization that can help to improve resource
utilization, reduce energy costs and simplify maintenance.
D. Reduce Paper Consumption
∑Reduce paper consumption by use of e-mail and electronic archiving;
∑Use of “track changes” feature in electronic documents, rather than redline
corrections on paper;
∑Use online marketing rather than paper based marketing;
∑Use E-mail marketing solutions that are more affordable, flexible and interactive
than traditional marketing because of free and low-cost online invoicing solutions
that help cut down on paper waste;
∑Use smaller fonts and margins, and selectively print required pages.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 39
E. Conserve Energy
ÿUse Liquid Crystal Display (LCD)monitors rather than Cathode Ray Tube (CRT)
ÿDevelop a thin-client strategy wherein thin clients are smaller, cheaper, simpler
for manufacturers to build than traditional PCs or notebooks and most
importantly use about half the power of a traditional desktop PC;
ÿUse notebook computersrather than desktop computers whenever possible;
ÿUse the power-management features to turn off hard drives and displays after
several minutes of inactivity;
ÿPower-down the CPU and all peripherals during extended periods of inactivity;
ÿTry to do computer-related tasks during contiguous, intensive blocks of time,
leaving hardware off at other times;
ÿPower-up and power-down energy-intensive peripherals such as laser printers
according to need;
ÿEmploy alternative energy sources for computing workstations, servers, networks
and data centers; and
ÿAdapt more of Web conferencing offers instead of travelling to meetings in
order to go green and save energy.
Q. 33 Green IT Security Services and Challenges ?
Green IT Security Services: IT solution providers are offering green security services in
MT : S I C S
ÿWhat to look in green security products, the challenges in the security services
how security services fare in a recessionie Security Issue.
ÿThe basic aim is to increase the customer's energy savings through green security
services and assess that ‘how sustainable computing technology can
to help the environment’.
ÿIf not administered properly with other green computing technologies, green
security can be more
ÿThere is no standard to knowing ‘how to evaluate a client's infrastructure to
accommodate green technology
. So it is really a vital issue’.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 40
Q.34 What is BYOD ? Also describe the benefits of BYOD ?
ÿBYOD stands for (Bring Your Own Device).
ÿIt refers to business policy that allows employees to use their preferred
computing devices, like smart phones and laptops for business purposes.
ÿIt means employees are welcome to use personal devices (laptops, smart phones,
tablets etc.) to connect to the corporate network to access information and
ÿThe BYOD policy has rendered the workspaces flexible, empowering employees
to be mobile and giving them the right to work beyond their required hours.
ÿTherefore it has led to an increase in employees’ satisfaction.
ÿBYOD also reduced IT desktop costs for organizations as employees are willing to
buy, maintain and update devices.
Advantages of BYOD
: Employees love to use their own devices when at work. This also
reduces the number of devices an employee has to carry; otherwise he would be
carrying his personal as well as organization provided devices.
Lower IT budgets: The employees could involve financial savings to the organization
since employees would be using the devices they already possess, thus reducing the
outlay of the organization in providing devices to them.
IT reduces support requirement i.e reduced maintenance cost : IT department does not
have to provide end user support and maintenance for all these devices resulting in cost
Early adoption of new Technologies: Employees are generally proactive in adoption of
new technologies that result in enhanced productivity of employees leading to overall
growth of business.
Increased employee efficiency: The efficiency of employees is more when the employee
works on his/her own device. In an organization provided devices, employees have to
learn and there is a learning curve involved in it.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 41
ÿQ.34 What is BYOD Threats ?
MT : I N D I A
ÿEvery business decision is accompanied with a set of threats and so is BYOD
ÿBYOD program that allows access to corporate network, emails, client data etc. is
one of the top security concerns for enterprises.
So Overall, these risks can be classified into four areas as outlined below:
ÿIt is normally exemplified and hidden in ‘Weak BYOD Policy’.
ÿThe effective implementation of the BYOD program should not only cover the
but alsomandate the development of a robust implementation
ÿAbsence of a strong BYOD policy would fail to communicate employee
expectations, thereby increasing the chances of device misuse.
ÿSo it is very important to develop proper effective policy to stop misuse of data of
ÿIt is normally exemplified and hidden in ‘Lack of Device Visibility’.
ÿIf company-owned devices are used by all employees within an organization,
then it has complete visibility of the devices connected to the network. This helps
to analyze traffic and data exchanged over the Internet.
ÿBut As BYOD permits employees to carry their own devices (smart phones,
laptops for business use),
the IT practice team is unaware about the number of
devices being connected to the network.
ÿAs network visibility is of high importance, this lack of visibility can be hazardous.
ÿIt is normally exemplified and hidden in ‘Loss of Devices’.
ÿA lost or stolen device can result in an large financial and reputational problem to
an organization as the device may hold sensitive corporate information.
ÿData lost from stolen or lost ealsy access to company emails, corporate intranet.
ÿCompany trade secrets can be easily retrieved from a misplaced device by
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 42
ÿIt is normally exemplified and hidden in ‘Application Viruses and Malware’.
ÿA related report revealed that a majority of employees’ phones and smart
devices that were connected to the corporate network weren’t protected by
security software. concurrently.
ÿFurther Organizations are not clear in deciding that ‘who is responsible for
– the organization or the user’.
Q. 35 What is Web 2.0 ?
∑Web 2.0 is the term given to describe a second generation of the World Wide
∑It is focused onthe ability of people to collaborateand share information
∑One of the most significant differences between Web 2.0 and the traditional
World Wide Web (referred as Web 1.0) is that Web 2.0 facilitates greater
collaboration and information sharing among Internet users, content providers
∑Thus it can be said that the migration is from the “read-only web” to “read-
∑.The power of Web 2.0 is the creation of new relationships between
collaborators and information
∑Blogs, wikis, and Web services are all seen as components of Web 2.0.
∑Web 2.0 tries to tap the power of humans connected electronically through its
new ways at looking at social collaboration.
∑The main agenda of Web 2.0 is to connect people in numerous new ways and
utilize their collective strengths, in a collaborative manner.
∑In this regard, many new concepts have been created such as Blogging, Social
Networking, Communities, Mash-ups, and Tagging.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 43
Q.36 Components of Web 2.0 for Social Networks ?
Major components that have been considered in Web 2.0 include the following:
RSS-generated Syndication: RSS (Really Simple Syndication) is a format for syndicating
web content that allows feed the freshly published web content to the users through
the RSS reader.
Communities:These are an online space formed by a group of individuals to share their
thoughts, ideas and have a variety of tools to promote Social Networking. There are a
number of tools available online, now-a-days to create communities, which are very
cost efficient as well as easy to use.
Blogging:A blog is a journal, diary, or a personal website that is maintained on the
internet, and it is updated frequently by the user. Blogging allows a user to make a post
to a web log or a blog. Blogs give the users of a Social Network the freedom to express
their thoughts in a free form basis and help in generation and discussion of topics.
Mash-ups:This is the facility, by using which people on the internet can congregate
services from multiple vendors to create a completely new service.
An example may be combining the location information from a mobile service provider
and the map facility of Google maps in order to find the exact information of a cell
phone device from the internet, just by entering the cell number.
Wiki:A Wiki is a set of co-related pages on a particular subject and allow users to share
content. Wikis replace the complex document management systems and are very easy
to create and maintain.
Folksonomy: This allows the free classification of information available on the web,
which helps the users to classify and find information, using approaches such as tagging.
Also known as Social Bookmarking, In which tagged pages are stored on the web
increasing the accessibility from any computer connected to the Internet.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 44
Usage of Ajax and other new technologies: Ajax is a way of developing web applications
that combines XHTML and CSS (Cascading Style Sheets) standards based presentation
that allows the interaction with the web page and data interchange with XML
(eXtensible Markup Language) and XSLT (eXtensible Stylesheet Language
File Sharing/Podcasting:This is the facility, which helps users to send their media files
and related content online for other people of the network to see and contribute.
Q.36 Types and Behavior of Social Networks ?
Social Contact Networks: These types of networks are formed to keep contact with
friends and family. These have become the most popular sites on the network today.
They have all components of Web 2.0 like blogging, tagging, wikis, and forums
Examples of these include Orkut, Facebook and Twitter.
Study Circles: These are social networks dedicated for students, where they can have
areas dedicated to student study topics, placement related queries and advanced
research opportunity gathering. These have components like blogging and file sharing.
Examples of these include, CA Club, CA knowledge portal etc.
Social Networks for Specialist Groups: These types of social networks are specifically
designed for core field workers like doctors, scientists, engineers, members of the
corporate industries. A very good example for this type of network is LinkedIn.
Networks for Fine Arts:These types of social networks are dedicated to people linked
with music, painting and related arts and have lots of useful networking information for
all aspiring people of the same line.
Police and Military Networks: These types of networks, though not on a public domain,
operate much like social networks on a private domain due to the confidentiality of
Sporting Networks: These types of social networks are dedicated to people of the
sporting fraternity and have a gamut of information related to this field. Examples of
these include Athlinks.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 45
Q.37 What is the major APPLICATION of Web 2.0 ?
Social networks built on Web 2.0 concepts has become so cost affordable and easy to
use that more and more people are migrating to this wave.
Web 2.0 finds applications in different fields, some of which are as follows:
ÿSocial Media/Social Network is an important application of web 2.0.
ÿAs it provides a fundamental shift in the way people communicate and share
ÿThe social web offers a number of online tools and platforms that could be used
by the users to share their data, perspectives, and opinions among other user
ÿWeb 2.0 offers excellent opportunities for marketing by engaging customers in
various stages of the product development cycle.
ÿIt allows the marketers to collaborate with consumers on various aspects such as
product development, service enhancement, and promotion.
ÿCollaboration with the business partners and consumers can be improved by the
companies by utilizing the tools provided by Web 2.0 paradigm.
ÿConsumer-oriented companies use networks such as Twitter and Facebook as
common elements of multichannel promotion of their products.
ÿWeb 2.0 technologies can help the education scenario by providing students and
faculty with more opportunities to interact and collaborate with their peers.
ÿBy utilizing the tools of Web 2.0, the students get the opportunity to share what
they learn with other peers by collaborating with them.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 46
Q.38 What is benefits for social media by using web 2.0 ?
MT : A B C Social Platform
It has provided a number of benefits to social networks. These are followings : 1. (
Adoption Fast )
Web 2.0 techniques are very people centric activities and thus, adaptation is very
Concepts of Web 2.0 like blogging are some things that people do on a day-to-
day basis and no new knowledge skills are required.
Closer i.e People Coming Closer)
People are coming much closer to another and all social and geographical
boundaries are being reduced at lightning speed, which is one of the biggest
sustenance factors for any social network.
4. (Social Collaboration)
Using Web 2.0 also increases the social collaborationto a very high degree and
this in turn helps in achieving the goals for a social network
5.(Platform for social Media)It provides a platform where users of the network
need not to worry about the implementation or underlying technology at a very
affordable cost and a very easy pickup time.
Q.39 challenges for social media by using web 2.0 ?
(1) One of the major aspects is data security and privacy and in such public domains, there is a huge chance of data leak and confidentiality loss.
Because there are usually no centrally mandated administrative services to
take care of such aspects.
(2) Privacy of individual users also arises and can create a huge problem if malicious user manage to the social networks.
(3) A majority of the social networks are offline, and for bringing these under the purview of online social networks, a lot of education and advertising
needs to be done, which itself becomes a cost burden, when the people
involved are not computer literate.
(4) A huge amount of effort would be needed to promote the area in the area of world which are developing and do not have the basic amenities.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 47
Q.40 What is Web 3.0 ?
ÿThe term Web 3.0, also known as the Semantic Web, describes sites wherein the
computers will be generated raw data on their own without direct user
ÿWeb 3.0 is considered as the next logical step in the evolution of the Internet
and Web technologies.
ÿFor Web 1.0 and Web 2.0; the Internet is confined within the physical walls of
the computer, but as more and more devices such as smart phones, cars and
other household appliances become connected to the web, the Internet will be
omnipresent and could be utilized in the most efficient manner.
ÿWeb 2.0 technologies allows the use of read/write web, blogs, interactive web
applications, rich media, tagging or folksonomy while sharing content, and also
social networking sites focusing on communities.
ÿBut At the same time, Web 3.0 standard uses semantic web technology, drag
and drop mash-ups, widgets, user behavior, user engagement, and consolidation
of dynamic web contents depending on the interest of the individual users. Web
3.0 technology uses the “Data Web” Technology, which features the data
records that are publishable and reusable on the web through queryable
ÿThe Web 3.0 standard also incorporates the latest researches in the field of
ÿAn example of typical Web 3.0 application is the one that uses content
management systems along with artificial intelligence. These systems are
capable of answering the questions posed by the users, because the application
is able to think on its own and find the most probable answer, depending on the
context, to the query submitted by the user. In this way, Web 3.0 can also be
described as a
“machine to user”standard in the internet.
The two major components of Web 3.0 are as follows:
ÿThis provides the web user a common framework that could be used to share and reuse
the data across various applications, enterprises, and community boundaries.
ÿThis allows the data and information to be readily intercepted by machines, so that the
machines are able to take contextual decisions on their own by finding, combining and
acting upon relevant information on the web.
Chapter 8 Emerging Technology By : Pardeep Rohilla Page 48
2) Web Services:
ÿIt is a software system that supports computer-to-computer interaction over the Internet.
ÿFor example - the popular photo-sharing website Flickr provides a web service that could
be utilized and the developers to programmatically interface with Flickr in order to search