EIS Quick Bites: NOV 2018 by Prof. Om Trivedi

Size: px
Start display at page:

Download "EIS Quick Bites: NOV 2018 by Prof. Om Trivedi"

Transcription

1 Chapter 4: Emerging Computing Technologies CLOUD COMPUTING Cloud computing refers to the delivery of computing resources over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. 5 CHARACTERISTICS Key: R 2 OBME Resource Pooling Resiliency On Demand Self-service Broad Network Service Measured Services Elasticity 4 DEPLOYMENT MODELS 3 SERVICE MODELS Public Cloud SaaS Private Cloud PaaS Community Cloud IaaS Hybrid Cloud

2 Cloud Computing Architectural Considerations

3 Software as a Service (SaaS) EIS Quick Bites: NOV 2018 by Prof. Om Trivedi SERVICE MODELS OF CLOUD COMPUTING Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Other Cloud Service Models SaaS includes a PaaS system Foundation of cloud 1. Data as a Service complete software offering on the cloud. Users can access a software application hosted by the cloud vendor on pay peruse basis. A SaaS provider goes a level above the Software as a Service setup. A PaaS provider gives subscribers access to the components services. Provides clients with access to server hardware, storage, bandwidth and other fundamental computing resources. Provides access to shared resources on (DaaS): Provides data on demand of the users, systems and applications including security of data. 2. Security as a Service (SECaaS: gives subscribers that they need basis, without Security service access to both require to revealing details like provided by the resources applications. and develop and operate location and hardware to clients. service provider on a pay-per-use Instances of SaaS: 1. Testing as a Service (TaaS) 2. API as a Service (APIaaS) 3. as a Service (EaaS) applications over the internet. Instances of IaaS: 1. Network as a Service (NaaS) 2. Storage as a Service (STaaS) 3. Database as a Service (DBaaS) 4. Backend as a Service (BaaS) 5. Desktop as a Service (DTaaS) basis. 3. Identity as a Service (IDaaS): Authentication services, risk and event monitoring, single sign-on services, and identity and profile management. Communication as a Service (CaaS) CaaS is customized SaaS. CaaS is an outsourced enterprise communication solution that can be leased from a single vendor. The CaaS vendor is responsible for all hardware and software management and offers guaranteed Quality of Service (QoS). It allows businesses to selectively deploy communication devices and modes on a payas-you-go, as needed basis. Examples: Voice over IP (VoIP), Instant Messaging (IM), Collaboration and Video conferencing application using fixed and mobile devices.

4 CHARACTERISTICS OF DEPLOYMENT MODELS Key: CS is Using SaaS CLOUD DEPLOYMENT MODELS: ADVANTAGES AND LIMITATION

5 Advantages of Cloud Computing Key: (RARE & Flexible GST launched by PM) 1. Reduced Spending on IT Infrastructure 2. Accessibility 3. Reduced Capital Cost 4. Economies of Scale 5. Flexibility Disadvantages of Cloud Computing Key: (TIPS) 1. Technical Issues 2. Interoperability 3. Prone to Attack 4. Security in the Cloud 6. Globalize the Workforce 7. Streamline the Workforce 8. Training of Workforce less Needed 9. Projects Monitored more Effectively 10. Minimized Maintenance MOBILE COMPUTING Mobile Computing, is the use of portable computing devices (such as laptop and handheld computers) in conjunction with mobile communications technologies to enable users to access the Internet and data on their home or work computers from anywhere in the world. COMPONENTS 1. Mobile Communication 2. Mobile Hardware 3. Mobile Software BENEFITS Key: (WIDE & Improved Availability 1. Workforce productivity 2. Improved business processes 3. Dynamic and efficient business offerings 4. Efficient incident management 5. Improved customer service 6. Availability of data at multiple locations LIMITATIONS Key: (Health TIPS for Human) 1. Health hazards 2. Transmission Interference 3. Insufficient Bandwidth 4. Power consumption 5. Security Standards 6. Human Interface with Devices

6 GRID COMPUTING Grid computing is a special kind of Parallel Computing With complete computers (Grid and Donors) Connected through networks Many computers create the impact of a Super-Computer They have access of each other Grid computing is a special kind of Distributed Computing too. Applications of Grid Computing Resources of Grid Computing Key: (Spl. Comm. Sw. for CS) Benefits of Grid Computing Key: (Parallel Resource VS. Reliability and Mgt. of Addl. Resources) Security Architecture on Grid Key: (ISP s Support for 2 Exportability) 1. Civil Engineering 1. Computation 1. Parallel Computing 1. Interoperability Research 2. Storage 2. Resource Pooling with local security 2. Large scale Science 3. Communication 3. Virtualization solutions and Engineering 4. Software and 4. Security of Data 2. Single Sign-on Researches 3. Shake-table Experiments 4. Data mining by Insurance Companies and Hospitals 5. To support e- business workloads Licence 5. Special Devices, Equipment, policies; etc Resources 5. Reliability 6. Management 7. Additional Resource Access 8. Resource balancing 3. Protection of Credentials 4. Support for secure group communication 5. Support for multiple implementations 6. Exportability Virtualization Virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system. The core concept of Virtualization lies in Partitioning, which divides a single physical server into multiple logical servers. Once the physical server is divided, each logical server can run an operating system and applications independently.

7 Hardware Virtualization Network Virtualization Storage Virtualization Applications of Virtualization Key: (Portable 2 STD) Hardware Virtualization or Platform Virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system. Software executed on these virtual machines is separated from the underlying hardware resources. Network virtualization is a method of combining the available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time. Storage virtualization is the apparent pooling of data from multiple storage devices, even different types of storage devices, into what appears to be a single device that is managed from a central console. 1. Portable Application 2. Portable Workspace 3. Server Consolidation 4. Testing and Training 5. Disaster Recovery

8 GREEN COMPUTING OR GREEN IT Green Computing refers to the study and practice of environmentally sustainable computing. The study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems such as monitors, printers, storage devices, networking and communications systems efficiently and effectively with minimal or no impact on the environment. Objective of Green Computing Green Computing Best Practices Key: (CR 2 P 2 ) 1. Promote the recyclability or biodegradability. 2. Reduce the use of hazardous materials. 3. Implement energy-efficient Central processing Units (CPU), servers and peripherals. 4. Maximize energy efficiency. 1. Conserve Energy 2. Reduce Paper Consumption 3. Recycle 4. Develop a Sustainable Green Computing Plan 5. Make Environmentally Sound Purchasing Decisions BYOD (Bring Your Own Device) BOYD is a business policy that allows employees to use their preferred computing devices, like smart phones and laptops for business purposes. BYOD policy has rendered the workspaces flexible, empowering employees to be mobile and giving them the right to work beyond their required hours. BYOD Advantages Key: (BEST & Happy Employee ) 1. Lower IT Budgets 2. Increased Employee Efficiency 3. IT reduces Support Requirement 4. Early Adoption of New Technologies 5. Happy Employees BYOD Disadvantages Key: (DANI ) 1. Device Risk 2. Application Risk 3. Network Risk 4. Implementation Risk

9 Web 3.0 or Semantic Web Web 3.0 is an advancement over Web 2.0. Web 3.0 is an extension of the World Wide Web. It can be linked to an artificial intelligence assistant that understands its user and personalizes everything. It refers to a new evolution of the web, its third generation, and includes specific innovations and practices. Components of Web Semantic Web 2. Web Services Internet of Things (IOT) Definition Applications of IOT Risk to Product manufacturer IOT is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people. Provided with unique identifiers and the ability to transfer data over a network without requiring humanto-human or human-tocomputer interaction. 1. Smart city 2. Smart Home 3. Connected Cars 4. Smart Retail 5. IOT in agriculture 6. IOT in Healthcare 7. Home security CCTV monitored through hand held devices. 8. Office machines shall be connected through net. 1. Manufacturers may be out of business 2. Data storage and analytics Risk of these products to the user 1. Security 2. Privacy, autonomy and control 3. Intentional obsolescence of devices 4. Technology Risk 5. Environmental Risk due to Technology Artificial Intelligence Artificial intelligence (AI) is a field of science and technology based on disciplines such as computer science, biology, psychology, linguistics, mathematics, and engineering. Artificial Intelligence (AI) The effort to develop computer-based systems that can behave like humans, with the ability to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making.

10 Machine Learning Definition Applications Risk Machine Learning is a type of Artificial Intelligence (AI). Machine learning focuses on the development of computer programs that can change when exposed to new data. The process of machine learning is similar to that of data mining. 1. Autonomous vehicles (Ex.: drones and self-driving cars). 2. Medical diagnosis, in cancer research. 3. Predicting the chances of an individual getting ill by a disease. 4. Playing games (Chess or Go), and predicting the outcomes. 5. Search engines (Google search). 6. Online assistants (Siri). 1. AI relies heavily on the data it gets. Incorrect data can lead to incorrect conclusions. 2. AI (robots) carries a security threat. 3. AI, in the long term may kill human skills of thinking the unthinkable.