Premium Essay

Evolution and Revolution of Cloud Computing

In: Computers and Technology

Submitted By RajulAlam
Words 12543
Pages 51
Copyright by Rajul Alam
2013

HIDDEN TEXT: Optional—If you do not include a copyright page, delete entire page and the following page break.

HIDDEN TEXT: NOTE: this page in hard copy with all original signatures must be submitted with the dissertation to the Graduate School; this is required whether the document is in electronic format or on paper. Whereas, the page included in the electronic document will be unsigned unless it is scanned in.
The Dissertation Committee for Rajul Alam Certifies that this is the approved version of the following dissertation (or treatise):

THE IMPACT OF USERS AND SUPPLIERS IN THE CLOUD COMPUTING TECHNOLOGY
“THE QUESTION IS….
ARE WE ON TRACK TO EVOLUTION OR REVOLUTION?”

RAJUL ALAM
SN: 1013999 rajul.alam.10@ucl.ac.uk Word Limit: 118 + 346 + 10,529

Committee: | ELAINE AXBY, Supervisor |

“This dissertation is submitted as part requirement for the Information Management for Business programme at University College London. It is substantially the result of my own work except where explicitly indicated in the text.”

“The dissertation may be freely copied and distributed provided the source is explicitly acknowledged.”
The impact of users and suppliers in the cloud computing technology by Rajul Alam, MSi Information Management for Business

HIDDEN TEXT: Given first name, and previous academic degrees (B.A. or higher) B.A., B.S., etc. Your official name is the name which appears on your UT transcript.

MSIN9001: Dissertation
Presented to the Faculty of the Graduate School of
University College London in Partial Fulfillment of the Requirements for the Degree of

Information Management for Business
HIDDEN TEXT: The degree sought must be worded in the form given in the Graduate Catalog, such as Doctor of Philosophy, Doctor of Musical Arts, Doctor of Education.

University College London at...

Similar Documents

Free Essay

Internet of Things

...the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing......

Words: 858 - Pages: 4

Premium Essay

Week 1 Work

...Week 1: Information Systems in the Digital Firm - Lecture Print This Page Information Systems in the Digital Firm Evolution | Current State | Trends | Tutorial The Evolution, Current State, and Trends of Information Systems In addition to the material currently described, an introduction to cloud computing and user involvement in IT projects also will be included in this lecture. This is required as foundational knowledge for the chapters to come. We will explore it at a business level and a minimal technical level. Evolution The business landscape has changed over the past seventy years in every significant way. Without information systems, these changes would not have occurred. To gain a perspective on the evolution of information systems, we can review the significant computer inventions from the first computer through to cloud computing. As computer technology progressed, new skills had to be learned, and new methods of management evolved to replace old hierarchical styles with new team based methods. Increased productivity resulting in new information technology caused the downsizing of employees that began in the late 1980s and has continued. Information systems consultants identified productivity gains, so large that they cut the numbers in half and still weren't believed. Many of the products and services we use every day had not been invented just five or ten years ago. The ability to communicate electronically with anyone anywhere in......

Words: 1124 - Pages: 5

Premium Essay

Clound Computing

...EBM510 - Information Processing and the Web Cloud Computing Research Paper Mahesh BahuleyanNair 000-14-6974 Abstract This research paper is to recommend or suggest cloud computing as an alternative to the obsolete and highly expensive traditional computing mechanisms. Cloud computing is a new general purpose Internet-based technology through which information is stored in servers and provided as a service and on-demand to clients. Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk. Cloud computing is a generalized term for anything that involves delivering hosted services over the Internet. These services are broadly divided into threesome categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The study darken computing was inspired by the darken symbol that's often utilized to equal the Internet in flowcharts and diagrams. A darken assist has threesome...

Words: 3819 - Pages: 16

Premium Essay

Cloud Computing

...Information System Challenges in Management Table of Contents 1.0 Introduction 3 2.0 Future IT Trends 4 Internet of Things 4 Cloud Computing 4 BYOD (Bring Your Own Device) 5 Enterprise Mobility 5 Big Data 6 Enterprise Social Networking 6 3D Printing 7 Wearable Computing 8 3.0 Uses and Impact of future technology on organizations 9 4.0 Published case studies and Observations 15 5.0 Key Findings 16 Changing customer landscape 16 Rise of collaborative models 16 Personalization of products and services 16 6.0 Conclusion 17 7.0 Bibliography and References 18 1.0 Introduction Information technology (IT) is an area in which new developments are taking place more and more rapidly. IT has gone through many evolution cycles and today we are in the era of Web 2.0 and 3rd Platform of IT. Technology we used during last decade has become museum exhibits and what was then showcased in Science fictions has become more reality today. Consumer and business tech are merging, where the two going to be barely separable. The 3rd Platform is changing the way we interact with everything. Speculating on what's going to happen over the next few years is of course entertaining. The future of business has always been driven by developments in technology, and the digital revolution is of equivalent substance to the previous industrial revolution. This has important implications for the future of business. Major IT trends opens up great opportunities to develop new......

Words: 4106 - Pages: 17

Premium Essay

Pookie

...than the sum of its parts. Defining IT Infrastructure If you define a firm’s IT infrastructure in terms of technology you limit the discussion to the hardware and software components. By broadening the definition to that of service-based, you are then bringing into the discussion the services generated by the first two components. Also, you are including the persware element that we discussed in Chapter 1. As technology advances the types of hardware and software available, it becomes more critical for the firm to focus on the services that a firm can provide to its customers, suppliers, employees, and business partners. To round out the list of IT infrastructure components you need to add the following services to computing hardware and software: • Computing services: Provide platforms that ensure a coherent digital environment • Telecommunications services: Determine appropriate data, voice, and video that connect employees, customers, and...

Words: 8576 - Pages: 35

Free Essay

Computer

...IT leaders will find 10 useful tips for how to handle some of 2013's biggest IT challenges, including security issues, consumerization of IT, transparency and collaboration demands from stakeholders, general cost cuts, and mutiple options for cloud-based services. Download 13 Infrastructure Decisions That Result In Poor IT Security Sponsored by: GLOBAL KNOWLEDGE This white paper presents 13 somewhat common infrastructure decisions that can result in poor IT security. It is possible that your organization can improve its security in one or more of these areas. Take the time to assess your current security policy in each of these areas to see if there is room for refinement or improvement. Download 2012 Gartner Magic Quadrant Report Sponsored by: RIVERBED TECHNOLOGY, INC. Riverbed is positioned in the Leaders Quadrant of the 2012 Gartner Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision. Download 5 Steps to Understanding Cloud Computing Networks Sponsored by: DELL, INC. Uncover the two main missions of cloud computing networks and how you can accomplish these goals. In addition, uncover the five requirements for successful cloud...

Words: 1208 - Pages: 5

Premium Essay

It Dosent Matter

...The author expressed his belief that investments associated with IT aren't bringing strategic benefits to the enterprise in it, because in the moment, when one company is adopting new technologies, for her competitors are making it exactly alone. The above article made Carr of the enemy of outfitters, the software and persons working for the IT industry from Nicholasa. the Spectrum of opponents of the columnist is very wide. In many issues such giants disagree with it as the Microsoft, the Intel, HP in particular CIO and IT specialists. From it has always been obvious that, at least theoretically, the computing power similarly, as the electric energy could be delivered via a network. In this way the "central generator" would be able to act much more productively and flexibly, than dispersed, private data centers. " - Carr states. The author shows a lot of reasons for changes which are supposed to come. A fact that it is possible to treat computers, data warehouses, the network and the majority of used applications as goods largely is one of them ustandaryzowany. Hereinafter Carr is adding that even with reference to IT specialists it is hard to talk about their uniqueness. The majority performs the legwork utrzymaniowe - exactly the same, like of them odpowiednicy in competitive companies. The columnist is emphasizing that at present the majority of data centers is using only from 25 sources up to the 50% had. In the same time he is consuming the gigantic amount of the......

Words: 2419 - Pages: 10

Premium Essay

Job Performance

...Business Computing Business Computing Survey of IS Theory Name: Muhammad Rashid Student Number: S0222212 Tutor: Ron Perkins Due Date: 16th May 2013 Central Queensland University (Sydney Campus) Survey of IS Theory Name: Muhammad Rashid Student Number: S0222212 Tutor: Ron Perkins Due Date: 16th May 2013 Central Queensland University (Sydney Campus) Table of Contents 1.0 Technical, Business and System Competencies 1 1.1 Technical Competency 1 1.2 Business Competency 2 1.3 System Competency 2 2.0 Four Major Information Systems 3 2.1 Management Information System 3 2.2 Knowledge Management System 4 2.3 Customer Relationship Management 4 2.4 Supply Chain Management System 5 3.0 Cloud Computing 5 3.1 Characteristics of Cloud Computing 6 3.1.1 Elasticity & Scalability 6 3.1.2 Provisioning 6 3.1.3 Standardisation 6 3.1.4 Billing and Service Usage 7 3.2 Issues with Cloud Computing before Implementation 7 4.0 Technology Review 7 5.0 Operating Systems in Personal Computers 8 5.1 Features of Microsoft Windows 8 9 6.0 Enterprise Systems 10 6.1 Benefits of implementing Enterprise Systems 10 6.2 Challenges caused by implementing Enterprise Systems 11 7.0 Intelligent Systems 11 7.1 Types of Intelligent Systems 12 7.1.1 Expert Systems 12 7.1.2 Artificial Neural Networks 12 7.1.3 Motion Controls 13 7.1.4 Genetic Algorithms 13 8.0 Web Services 13 9.0 Educational......

Words: 4438 - Pages: 18

Premium Essay

Locating Topics of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Terry L Green THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. | | BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments......

Words: 2699 - Pages: 11

Premium Essay

Blah

...Several Cloud Computing Platforms Junjie Peng Xuejun Zhang Zhou Lei, Bofeng Zhang, Wu Zhang, Qing Li School of computer science & High performance computing center Shanghai University Shanghai, 200072 P.R. China School of computer science & High Qinghua machinery factory at Changzhi performance computing center Changzhi, 046012 P.R China Shanghai University Shanghai, 200072 P.R. China Abstract—Cloud computing is the development of parallel computing, distributed computing and grid computing. It has been one of the most hot research topics. Now many corporations have involved in the cloud computing related techniques and many cloud computing platforms have been put forward. This is a favorable situation to study and application of cloud computing related techniques. Though interesting, there are also some problems for so many flatforms. For to a novice or user with little knowledge about cloud computing, it is still very hard to make a reasonable choice. What differences are there for different cloud computing platforms and what characteristics and advantages each has? To answer these problems, the characteristics, architectures and applications of several popular cloud computing platforms are analyzed and discussed in detail. From the comparison of these platforms, users can better understand the different cloud platforms and more reasonablely choose what they want. Keywords-cloud computing; virtualization; utility computing; IaaS; PaaS; SaaS I. INTRODUCTION Cloud......

Words: 3393 - Pages: 14

Premium Essay

Test

...Week 1: Information Systems in the Digital Firm - Lecture | | | Information Systems in the Digital Firm Evolution | Current State | Trends | Tutorial The Evolution, Current State, and Trends of Information Systems In addition to the material currently described, an introduction to cloud computing and user involvement in IT projects also will be included in this lecture. This is required as foundational knowledge for the chapters to come. We will explore it at a business level and a minimal technical level. | | Evolution | | The business landscape has changed over the past seventy years in every significant way. Without information systems, these changes would not have occurred. To gain a perspective on the evolution of information systems, we can review the significant computer inventions from the first computer through to cloud computing. As computer technology progressed, new skills had to be learned, and new methods of management evolved to replace old hierarchical styles with new team based methods. Increased productivity resulting in new information technology caused the downsizing of employees that began in the late 1980s and has continued. Information systems consultants identified productivity gains, so large that they cut the numbers in half and still weren't believed. Many of the products and services we use every day had not been invented just five or ten years ago. The ability to communicate electronically with anyone anywhere in the......

Words: 5656 - Pages: 23

Premium Essay

Cloud Computing

...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...

Words: 5878 - Pages: 24

Premium Essay

Information System Dissertation

...Information Systems Dissertation The Impact of Cloud Computing on Small and Medium Sized Enterprises. Word Count: 12,497 Abstract In recent years a new computing paradigm has emerged: Cloud Computing. Whilst there seem to be an endless number of definitions for this new term, including one by the National Institute of Standards and Technology (NIST) that is nearly 800 words long, nobody seems to be able to settle on a true characterisation of the subject matter. In its simplest form cloud computing can be described as IT-as-a-service. Instead of building your own IT infrastructure to host databases or software, a third party hosts them on their own servers. Companies have access to their data and software over the internet (which in most diagrams is depicted as a cloud). However, is this new paradigm simply a new term for something we are already doing or is it truly going to change the future of IT as we know it? This dissertation investigates the phenomenon commonly known as cloud computing, focussing closely on its impact on small and medium sized enterprises (SME’s), and ultimately attempts to assess the future of cloud computing. The research throughout this paper is based solely on secondary research. No primary research into the topic area has been made. In order to gain a broad view and understanding of the topic various existing papers and studies, on the topic of cloud computing and technology adoption within SME’s, have been studied and......

Words: 18031 - Pages: 73

Premium Essay

Tech

...T-Mobile G1. The Android of 2013 is a world away from that 2008 version, where the Android Market was in its infancy, there were no native video playback capabilities and the G1 had no multi-touch support. But Google is going to have to keep innovating and improving its mobile OS to keep the lion's share of the smartphone market. We've taken a peek into the future to consider what Android might look like in the year 2020. With new Android monikers now appearing about once a year, its codename should start with an "R" - Rhubarb Pie, Rocky Road or Rice Pudding, perhaps? Or maybe even Rolos, given the tie-up deals Google is putting in place these days? Here are the four key features we think could play the biggest part in Android's ongoing evolution over the next seven years: 1. Maps in Android in 2020 Apple's Maps app may not have set the world alight when...

Words: 3468 - Pages: 14

Premium Essay

How the Digital Revolution Has Made Consumer-Marketer Relationship More Interactive and Dynamic

...For many years, marketers have considered the customer as the most important aspect and structured all activities to ensure his satisfaction. This is an idea that is quickly becoming more popular and important in the present market environment. Competition has become ever greater and the market is becoming more characterized by similar products. The challenge that many marketers have to deal with is to have a clear understanding of the diversity that accompanies behaviour of consumers and provide goods and services that are in accordance to this. This is because digital tools provide marketers with the chance to not only collect but to also analyze data that has become even more complex on the purchasing patterns that consumers adopt. This paper therefore examines how the exchange between consumers and marketers has become highly dynamic, interactive and participative. Consumer Behaviour The subject of what causes consumers to behave as they do is one that has attracted a number of researchers. Going back as far as 300 years ago, economists such as Nicholas Bernoulli and John von Neumann began to analyze what exactly forms the background for the decisions made by consumers. Their work largely focused on the action of buying and was driven by utility theory(Knight & Weedon, 2009). This theory argues that consumers often make the choices that they do based on the outcomes that they expect to get out of these decisions(Boulding et al, 2005). Consumers are therefore......

Words: 2762 - Pages: 12