0% found this document useful (0 votes)
46 views12 pages

EIS CH 4

Uploaded by

Kartik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
46 views12 pages

EIS CH 4

Uploaded by

Kartik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
CLOUD COMPUTING CHARACTERISTICS OSM RE PAPPU On Demand - We invoke cloud services only when we need them, they are not permanent parts of the IT infrastructure Scalability - ability to expand and reduce resources Multi tenancy - multiple users within the same infrastructure Workload Movement - migrate workloads across servers both inside the data center and across data centers Resiliency - Work is migrated to a different physical resource in the cloud with or without user awareness and intervention. Pay as per use - We pay for cloud services only when we use them Pertinent Issues B LIST Bugs Unexpected Behaviour - An application which perform well at the company's internal data centre , so before installing on cloud we should check once Legal Issues - Cloud systems need to adhere to several regulatory requirements, privacy laws and data security laws. Interoperability — If we keep data with one cloud , difficult to shift to another , as there are no standards for importing / exporting data Security Issues - the management of the data might not be fully trust worthy & the risk of malicious insider attacks in the cloud Software Development in Cloud - Application development processes are flexible enough to keep up with the changes Threshold Policy - there is no standard format for the SLA and also how the cloud service provider will handle sudden increases or decreases in demand etc. Bugs in Large Scale Distributed System - removing bugs and errors in their very large-scale and distributed cloud systems. Drawbacks of Cloud (sia) Security - Data and applications depend ‘on other cloud vendors or providers. Scalability - does not permit the control on these resources as these are not owned by the user or customer. Interoperability - Applications may not reside with a single cloud vendor and ‘two vendors may have applications that do not cooperate with each other Internet connection - data and applications islost. Availability options for infra , o/s & application - customers may have to face restrictions on the availability of applications, operating systems and infrastructure options. ‘ADVANTAGES Flexible LPG se (MAR) 2 Improved Flexibility - fast changes in our work environment L-Less personal training is needed - a minimal learning curve on hardware and software issues. P- Streamline business process - more work done in less time with less resources are possible. G- Globalize workforce M-Minimize Maintenance - too much of non- premise computing resources, maintenance becomes simple M-Monitor Projects effectively - feasible to confine within budgetary allocationsandcompletion cycle times. A-Achieving economies of scale — Output can be increased reducing cost per unit Pervasive Accessibility - Data and applications can be accesses any time anywhere R- Reduce Capital Costs - Not required to spend huge money on hardware, software, or licensing fee: Types of Cloud & it’s Characteristics Private- Secure - as it is owned and managed by the organization itself, Central Control- as it is owned and managed by the organization itself, Weak SLA - Formal SLAs do not exist or are weak as it is between the organization and user of the same organization PUBLIC- Highly Scalable - Available Affordable Less Secure - Since it is offered by a third party and they have full control over the cloud, Stringent SLA - service provider's business reputation and customer strength are totally dependent on the cloud services HYBRID — Scalable - as the public cloud is scalable; the hybrid cloud is also scalable Partially Secure - Private cloud is considered as secured and public cloud has high risk of security breach. Stringent SLA - SLAs are more stringent than the private cloud Complex Cloud Management - complex as it involves more than one type of deployment models. * The Advantages of Hybrid Cloud include the following Community Collaborative - no single company has full control over the whole cloud Cost Effective - complete cloud is being shared by several organizations or community Partially Secure - data can be leaked from one organization to another, though it is safe from the external world. CLOUD COMPUTING SERVICE MODELS IAAS - laaS, a hardware-level service, provides computing resources such as processing power, memory, storage, and networks for cloud users. The user’s need not maintain physical servers as. it is maintained by service provider. * laaS providers provide the infrastructure/ storage required to host the services by the cloud clients. Characteristics of IAAS — Web access Centralized management: Highly scalable Shared infrastructure Metered Services Different instances of IAAS are Network as a Service , Storage as a Service , Database as a service PAAS - PaaS provides the users the ability to develop an application software on the development platform provided by the service provider Cloud providers deliver a computing platform including operating system, programming language, software development tools, database etc SAAS - SaaS provides ability to the end users to access an application over the Internet that is hosted and managed by the service provider. Thus, the end users are exempted from managing or controlling an application, the development platform, and the underlying infrastructure. SaaS provides users to access large variety of applications over internets that are hosted on service provider's infrastructure. Different instances of SAAS are Testing as a Service , Application Program Interface as a service , Email as a service Introduction It means employees can bring their own device at the work place provided it is company policy It will save cost for the companies It will also increase efficiency of the employees Web 3.0 Web 1.0 & Web 2.0 are within boundaries of organization , but as more & more devices like oven , mobiles , cars are connected to internet, internet is omnipresent and should be utilised in best manner Web 3.0 uses SEMANTICS technology to drag & drop mash up , widgets , collect data about user behaviour & generate content based on interest of user Advantages Happy Employees - reduces the number of devices, otherwise he would be carrying his personal as well as organization provided devices. Increased Employee Efficiency - efficiency of employees is more when the employee works on his / her own device Early Adoption of New Technology - proactive in adoption of new technologies Less IT Cost - Employees could involve financial savings to the organization Less Maintainance Cost - IT department Emerging B.Y.0.D Threats INDIA Implementation Risk - Mandate the development of a robust implementation policy. Absence of a strong BYOD policy would fail to communicate employee expectations, thereby increasing the chances of device misuse Network Risk - But if the company hasa policy of BYOD, the IT practice team maybe unaware about the number of devices being connected to the network Device Risk - A lost or stolen device can result in an enormous financial and reputational embarrassment does not have to provide end user support and maintenance Components of Web 3.0 Semanti machines are able to take decisions on their own by finding, combining and acting upon relevant information on the web. Web services - software system that supports computer- to-computer interaction over the Internet. Application Risk - not clear in deciding that ‘who is responsible for device security -organization or the user’ WEB 4.0 Web 4.0 is set to evolve; proposed to be autonomous, proactive, content-exploring, self- learning, collaborative, and content generating agents based on fully matured semantic and reasoning technologies as well as Artificial Intelligence. These services will support adaptive content presentation that will use the Web database via an intelligent agent WEB 5.0 - The Web 5.0, “The Telepathic Web/The Symbionet Web” is set to be highly complex future Web generation, to be present after the year 2030 in which things like brain implants are expected to be popular. Brain implants will give people the ability to communicate with the internet through thought like to think of a question and open up a web page even without giving any physical command. ‘ations of Mobile Computing BIPS HUMAN Insufficient Bandwidth - Mobile Internet access is generally slower than direct cable connections Transmission Interferences - Weather, terrain, and the range from the nearest signal point can all interfere with signal reception Power Consumption - power outlet is not available, mobile computers must rely entirely on battery power Potential Health Hazards - traffic accidents. Cell phones may interfere with sensitive medical devices Security Standards - dependent on public network i.e. Internet. Security is major concern as one can easily attack public network including VPN Human Interface - Screens and keyboards tend to be small, which may make them hard to use. Benefits of Mobile Computing * Mobile work force with access to work order details * Users can work anytime * Productivity can be increased as can work effectively & efficiently from any location Improve services offered to customer * Improves management effectiveness Introduction Mobile Computing refers to the technology that allows transmission of data via any portable device without being connected to fixed physical link Components Mobile Hardware - includes mobile devices or device components that receive or access the service of mobility. Mobile Software - actual Program that runs on the mobile hardware. Mobile Communication — Refers to infrastructure put in place to ensure that seamless and reliable communication goes on Drawbacks NEW METHODS Advantages Immediate Payment Service (IMPS) -Itis an instant cana interbank electronic fund transfer service through (TDs) ‘mobile phones. + Anywhere ’ Mobile Banking - It is a service provided by a bank or © Easy & © Difficult = Debit other financial institution that allows its customers to Convenieni for non- Card conduct different types of financial transactions techntelt Mobile Wallets © Less Risk Credit |) Unified Payment interface (UPI) * Discount person Mobile Applications (BHARAT INTERFACE FOR from Take © Risk of Card} money) Bkin (aharat interface for Money) i : data a Mobile App developed by National Payments ° Written Smart} Corporation of india (NPC!) based on UPI (Unified Record © Over- Card Pavment interface) By Competitive spending Unstructured Supplementary Service Data - A - Bi increasetl Tevolutionary idea, where to make payments through Advantage i 2. Net mobiles there is neither need for internet nor any to Business Business Banking | smart phone. Environment Cost ‘Aadhar Enabled Payment Services © Need of Cryptocurrency -s a digital currency produced by a meendly public network, rather than any government, that uses cryptography to ensure that payments are sent and received safely Internet e-Rupi- Voucher or OR Code , Person & Purpose soecific It is a system of interrelated computing devices , mechanical & digital machines , objects , animals or people that are provided with unique identifiers & ability to transfer data over a network without human to human or human to computer interaction . Risks Product Manufacturer * Impact on Business — Out of business , if loT becomes necessary product feature * Data Storage & Analyics — Keep data secured or it can create problem for entity as well as individual * Intentional obsolescence of device — Companies which want usertouse | new product , may dump old products, by disabling | o/s of old product Risk to user (SP) * Security — Hit by network related issues like hacking, | virus , stealing confidential data * Privacy, Autonomy& — | Control — Individuals may loose control , their | personal data can be made | public Technology Risks~Every device | has different hardware & software , which makes task of developing application tough Environmental Risk due to technology — Impact on environment house air quality , soil etc due to use of heavy earth metals Internet of Things Application Home Devices - Home owners can keep track of all activities in house through their hand held devices. Office Activities - Human resource managers shall be able to see how many people have had a cup of coffee from vending machine and how many are present ‘Swatch Mission - Under SWACHH mission government can tag all dustbins with IOT sensors. They (dustbins) generate a message once they are full. Electronic chip - This chip allows him/her to connect to home / office ‘Once connected person can enter home / office and perform designated function Wearables — Apple smart watch Smart Grids - extract information on the behaviors of consumers and electricity suppliers in an automated fashion ‘Smart City - water distribution and traffic management to waste management and environmental monitoring. ‘Smart Retail - improve store operations, increasing purchases, reducing theft, enabling inventory management, and enhancing the consumer's shopping experience. ‘Smart Supply Chain- tracking of goods while they are on the road or in transit or helping suppliers exchange inventory information Connected Car - navigate in our complex world, Connected Health - remote ‘monitoring equipment to advance and smart sensors to equipment integration. Industrial Internet of Things - different parameters, such as pressure, temperature, and utilization of the machine. wif INTRODUCTION It is the process of creating logical resources from available physical resource It means to create virtual version of device / resource such as servers, storage, O/S where framework divides resource into one or more environment j VIRTUALISATION Applications DPS ME Test * Disaster Recovery - Virtual machines can be used as "hot standby" environments for physical production servers. © Portable Appn - Running an application from a removable drive, without installing it on the system's main disk drive. * Portable Workspaces - portable workspaces ‘on devices like iPods and USB memory sticks. * Server Consolidation - consolidate many physical servers into fewer servers, which in turn host virtual machines © Testing & Training - Hardware virtualization also help to act as training platforms — ld Common Types of Virtualization Hardware Virtualization (Server) ~The basic idea of Hardware virtualization is to consolidate many small physical servers into ‘one large physical server so that the processor can be used more effectively. The software that creates a virtual machine on the host hardware is called a hypervisor or Virtual Machine Manager. Network Virtualization (Mobile Network) -It is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others Storage Virtualization (Cloud) — It is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console. d INTRODUCTION In this multiple computers come together in a network and resources are shared with each other in the system In this all computers come together and they can solve complex problems Types of Resources Computations - This contains the CPUs which perform the computation or process the given request. Storage - Each machine usually contains some storage and together a grid use large volume of storage resources. Communication - This resource helps in data flow between different servers Special Equipment - Some machines may be designated to only be used for medical research. Software & Licenses - Software is one of the most expensive resources of grid and installing software at each server requires software and license Application Areas (CIA) Complex Science & Engineering research Civil Engineers work together to design , execute & analyse shake table experiments (Earthquake structure for building structure) Insurance company from partner hospitals for fraud detection Application server offloads excess load to other server ‘Amazon uses grid to move resources to E-BUSINESS Benefits Management PVR ke Resources underutilize kar rahi he Management - The grid offers management of priorities among different projects. Parallel CPU Capacity - helps to use many CPUs of different servers in parallel which further helps to increase the performance, Virtual resources & Virtual Organizations - provide collaboration among large number of organizations and large no of users for performing complex task. Reliability — There are multiple processors, if one fails there is another Resource Balancing - perform the resource balancing by using all the resources in an optimum manner to provide efficient performance. Access to Additional Resources - Additional resources than multiple servers and storage devices based on requirements. Making use of Underutilized Resources - Exploiting these underutilized resources and thus has the possibility of substantially increasing the efficiency of resource usage. Security Constraints Single sign-on - A user should be authenticated once and they should be able to acquire resources, use them, and release them Support for secure group communication - Secure group communication to provide coordinated activities for group Support for multiple Implementation - Security policy which should provide a common security to multiple resources / installations based on public and private key cryptography. Interoperability with local security solutions - Access to local resources should have local security policy at a local level. Protection of credential - User's password and private key should be protected Disadvantages Risks Benefits Security in LIC is PERISHABLE Quality issues - original product differs from the one that was ordered. Delay in goods and Hidden costs - ordered from another country Access to internet — Lacks personal touch Problem of anonymity - authenticate users in the virtual global market where anyone can sell to or buy from anyone User Security - Due to the increased Anytime Access Convenience Various Options Time Saving Easy to find Reviews Coupon & Deals spywares and malwares in the internet. Legal Issues - new legal issues which the vendor needs to handle properly. The user data protection laws are also getting more Seller stringent Repudiation of Contract - sale Increased Customer order or purchase by the trading Internet Connecorie rey neta partner or customer maybe Base denied. available in rural or remote areas Non-recognition of electronic transaction - may not be recognized as evidence in courts of law Lack of authenticity of transactions - electronic may not be authentic and reliable Data loss Attack from hacker Denial of Services - non- availability of system as it may be affected by viruses, e-mail bombs and floods. Problem of piracy - Intellectual property may not be adequately protected Privacy & Security - often issues of security and privacy due to lack of personalized digital access and cnowledge security & Credit Card issues — here is cloning possible of debit . credit cards Instant Transactions Reduction in costs Reduction in time Creation of new markets Easier entry into new markets Provides a dynamic market Better Quality of Goods High Start up Costs — Start up cost in form of internet connection , hardware/ software . set-up cost & maintainance of web pages Culture Impediments to E- Business - Many customers are uncomfortable with ecommerce and prefer traditional shopping only Government Perishable Food Items - perishable food items or high-cost items such as jewellery and antiques may never get into e-commerce Instrument to fight corruption Reduction in use of ecologically damaging material E-Commerce Models & E-Commerce Markets ‘Some of the E-Markets are as follows : E-Shops (Amazon , Nike) - allow manufacturers to bypass intermediate operators and thereby reduce costs and delivery times E-Malls (Brand factory) - conglomeration of different shops ituated in a convenient location in e-commerce. E-Auctions (Government websites that run auctions) - bidding process for products and services can take place between competing buyers Portal (Amazon Prime) - control of content can be a source of revenue for firms through charging firms for advertising or charging consumers a subscription for access. Buyer Aggregator (Zomato) - brings together large numbers of individual buyers so that they can gain the types of savings Virtual Communities (What's App Group) - customers who share a common interest E-Marketing (Youtube Advts) - information on websites also empowers customers and helps them achieve their objectives E-Procurement - Specialize in providing up-todate and real-time information on all aspects of the supply of materials to businesses. E-Distribution - Helps distributors to achieve efficiency savings by managing large volumes of customers, automating orders, ‘communicating with partners and facilitating value-adding services such as order tracking Commercial laws Governing E-Commerce © Income Tax Act, 1961 Companies Act , 2013 Foreign Trade Act , 1992 The Factories Act , 1948 The Custom Act , 1962 The Goods and Service Tax Act , 2017 Indian Contract Act , 1872 The Competition Act , 2002 e Foreign Exchange Management Act , 1999 Consumer Protection Act , 1986 Special Laws governing E-Commerce = IT Act, 2000 ™ Reserve Bank of India . 1932 Some Business Models for E-Commerce . Business to Consumer (B to C) - focuses on sell-side activities. Business to Business (B to B) - repeat commerce between a company and its suppliers or other partners. Consumer to Consumer (Cto C) - commercial extension of community activities. Consumer to Business (C to B) - consumers set prices and companies bid to match those prices Consumer to Government (C to G) Business to Government (B TO G) Government to Consumer (G to C) - Consumers can reach higher authority digitally. The aim is to reduce the average time for fulfilling citizen’s requests for various government User - Selling products like medicine / drugs need to ensure that such products are not delivered to wrong person/user E-Commerce Vendor E-Commerce Catalogue & Product Display - gauge the products / services being sold. A good catalogue makes a lot of difference to whole customer experience. Showroom & Offline Purchase - products can be sold fast if customers are able to feel / touch / see those products Different ordering methods Guarantees - Money back guarantees help generate a security in customer's mind that in case of any problems there money shall be safely returned back. Privacy Policy - Represents policy adopted by the e- ‘commerce vendor vis-8-vis customer data/information. Security - Vendor is using appropriate security including security systems like SSL ‘Suppliers & SCM - They have enough and the right goods suppliers , they (suppliers) financially and operational safe. ‘Marketing & Loyalty Programs - Loyalty programs, establish a long-term relationship with customer Warehouse - These operations have become very critical to the success of the whole ecommerce business. Shipping - Fast returns have become Unique Selling Preposition (USP) for many e-commerce vendors, so these vendors need very effective and efficient return processing. Technology Infrastructure Mobile Applications - A mobile app is a software application programmed to run specifically on a mobile device. One option many companies have is to create a website that is mobile friendly Web portal - Web Portal is the application through which user interacts with the ecommerce vendor. The front end through which user interacts for an e-commerce transaction Payment Gateway - The payment mode through which ‘customers shall make payments. Computers, Servers & Database - These are the backbone for the success of the venture. Big ecommerce organization invest huge amount of money / time in creating these systems. Digital Library - A Digital Library is a special library with a focused collection of digital objects that can include text, visual material, audio material, video material, stored as electronic media formats (along with means for organizing, storing, and retrieving the files and media contained in the library collection. Data Interchange — Secured Protocols like HTTPS , SSL Internet / Network - Controls in E-Commerce (CE) C-Communication of organizational policy to customer - it is necessary to make the following information clear throughout your website including: Privacy Policies, Information security, Shipping and billing policies, Refund policies C- Compliance with Industry standards - All e- Commerce organisations are required to be complying with and adhere to the rules outlined by the law E-Educating the participant about nature of risk - Every participant needs to be educated towards risk associated with such transactions . All bank in India, allowing on line payments put ads on their websites “Dos and Don'ts for online payments E- Protect your E-commerce business from Intrusion Virus , Hackers , Password , Sensitive data Guidelines of E-Commerce Billing Product Guarantee / Warranty Shipping Delivery Return Payment Steps in E-Commerce Work Flow Diagram Customer Login Product Selection Customer Places Order Payment Gateway Dispatch & Shipping Delivery Tracking Cash on Delivery Architecture of E-Commerce 1Tier 2 Tier - In this work of input , process , output & storage is shared between client & server 3 Tier — In this input & output is done by client , processing is done by application server & storage is. done by Database server Introduction It means usage of computers & IT resources in a more efficient & environment friendly & responsible way Itis environment friendly usage of computer & related resources Make Environmentally Sound Purchase Decisions Purchase of desktop computers , notebooks & monitors based on environment benefits Provide clear , consistent set of performance for design of products Select such manufacturer which use less enviroment sensitive material , design for longetivity & reduce packaging material Use server & storage Virtualization that can reduce energy cost & increase utilization Green Security Challenges If administered properly, Green IT can become cost efficient How can sustainable technology immediately help environment How to evaluate client's infrastructure to accommodate Green IT isa vital issue Role of security , tools, methods that reduce company's environmental impact Develop a Sustainable Green Computing Plan Involving Stakeholders to include checklists , recycling policies , recommendations for disposal , Govt guidelines On communication about & campus commitment to green IT best practises Frame Guidelines for using best practices Recycle old equipment , make environmentally sound purchase. decision , reduce paper , & reduce power Use cloud computing , so multiple organizations share same ‘computing resources ensuring best utiliz Reduce Paper Consumption Use e-mail & e-papers Use of track changes feature in word rather than doing corrections on paper Use online marketing rather than paper marketing , e-mail marketing is greener , less paper , low cost While printing use both sides of paper , recycle regularly , use small fonts & margins Recycle Old Equipments Disposal e-waste according to central, state & local regulations Discard used or unwanted equipments in convenient & environmentally responsible manner Manufacturers must offer safe end of life management & recycling options (Hardware retirement plan) Recycle computers through manufacturer's recycling services Conserve Energy Use LCD rather than CRT monitors Develop a thin client strategy when clients are smaller , cheaper , simpler for manufacturers rather than traditional PC’s Use notebook rather than desktop whenever possible Power down CPU during extended period of inactivity Power up & down energy intensive peripherals according to need Employ alternative energy sources for computing workstations , servers etc ‘Adapt more use of web conferences rather than travelling to meetings to save energy Block Chain Technology Introduction Itis distributed ledger technology is shared, peer to peer & decentralized open ledger of transactions systems with no trusted parties in between It is every transaction is permenant and cannot be changed or altered It uses chain of blocks with each block representing the digital information stored in public database Application of Blockchain Technology Financial — Automated trade lifecycle in terms of transaction log of any transaction of asset or property — laptops, smartphones Economic Forecasts — Financial & economic forecasts based on decentralised prediction markets, decentralised voting & stock trading Government - Land registration, vehicle registration, e-voting Healthcare — Sharing of data by increasing privacy, security & interoperability of data by eliminating third party Travel Industry — Storing important documents like passport, ID, reservation, travel insurance etc Risks in Blockchain Technology Who is responsible for maintaining data, as there is no central authority & who is accountable for anything wrong? If consensus is tempered, financial transaction can become inaccurate & unreliable As there is no central authority, difficult in establishment of Development & Maintenance of process controls activi As more & more data is getting added, itis difficult to find competent people to design & perform effective monitoring Artificial Intelligence & Machine Learning Al-When machines are able to use memory , knowledge , judgment , experience , understanding , reasoning & imagination to solve problems & adapt to new situations it is Artificial Intelligence ML - It is a type of Al, that provides computers with ability to learn without being explicitly programmed Risks of Al & ML(TDS) Application of Al & ML It may kill human skills of thinking the unthinkable Autonomous Vehicles Medical Diagonisis Incorrect data can lead to incorrect decision Proving Mathematical Security threats - Countries are algorithms discussing to have a KILL button in all Al capable machines, otherwise machines will start controlling humans Playing Games Search Engines Online Assistants

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy