As the internet changes our life, cloud of things will change our life again This new technology cloud of things Emerging the following technology(iot-cloud-5g-nano tech-Hci-context awareness-natural interaction) that change the concept from love things and use people to love people and use things •we all specially developing countries /Africa
must catch the cloud of everything (thing-people-process-data)train to address
the 17 SDG Goals but if any one miss it will no hope at all
•The cloud of things technology, helping elderly and handicapped people and holds the promise of fixing the millennium-old human problems of poverty, disease, violence, and poor leadership in Africa and all the world
At a time when all the world are worried about the fast spreading Zika virus, it is figured out that a wearable device could be an effective tool for preventing it, "You can compute the genome of a human being in less than seven days," "One day we will have the genome sequence of all our patients and we are then in the position to compare [that] data on a regular base with reference data."
This allows clinicians to easily identify defects in the genome and can also be used to compute the chance that someone will get a type of cancer
. A true success comes when you help others be successful leaders create leader not followers. s. It is estimated that approximately 50 billion things will be connected to each other through the communication network by 2020. A massive set of data will be created
Or by 2030 for Africa…it will be good for 10 years difference so we can fix all Africa and developing countries problems in 2030 for developed countries in 2020
The IOT will create new services based on real-time physical world data and will transform businesses, industries, and the daily life of people. Smart cities (connected communities), smart planet (green environment), smart building (building, smart homes), smart industry (industrial environment), smart energy (electric grid), smart transport (intelligent transport system), smart living (entertainment, leisure), smart health (health care system) are examples of the Internet of things.
a true success comes when you help others be successful and this true success comes in case of universal adoption of cloud of things in Africa and all the world.
“If cloud of things opportunity does not knock, build a door for it” the only impossible cloud of things journey is the one you never begin
https://onedrive.live.com/?id=94B6ABA85272A3A5%21443&cid=94B6ABA85272A3A5&group=0
http://globecom2015.ieee-globecom.org/program/industry-program/posters
http://www.ijird.com/index.php/ijird/issue/view/6167
https://www.slideshare.net
search by :assem abdl hamied moussa/assem abdel hamed mousa/assem moussa/assem mousa
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
17. Ubiquitous Services
Care about service, not application
Want to receive a message using whatever device is handy
nearby
Message is tailored to work according to device
Issues
What is software infrastructure for integration?
Do we get it by just adopting some standard?
18. Context-Aware Computing
computers will be able to understand enough of a user’s current
situation to offer services, resources, or information relevant to the
particular context
Walk into conference room, my email is projected on a big screen
there
E.g : device will automatically switch itself to “vibrate” instead of
“ring” when it is in the cinema
For example:
Automated call forwarding (context awareness – should where the
person is)
lighting control smart sensor wall - control heating and lighting.
19. Issues : Context Awareness
Current location
Need location detection e.g. GPS or base station Indoors – radio beacon, IR.
User activity
Walking, driving a car, running for a bus – how to detect this?
Ambient environment
In theatre, alone, in meeting
Local resources or services available
Device capabilities
Screen, input, processing power, battery life ….
Current QoS availability – particularly for radio links
20. Intelligent Environment
An intelligent environment is a location (e.g. home, office, hospital,
etc) that is equipped with sensors, actuators and computers that are
networked with each other and the internet.
The components are controlled by "intelligent agent" software that
knows the preferences of the occupants.
It tailors the environment to suit them.
The occupants can talk to the environment using speech and natural
language and the sensors can monitor the environment.
21. Business Services
Ubiquitous Computing will lead to Ubiquitous Commerce (right
message, to the right person, at the right time!)
Work can occur anytime, anywhere becomes all-the-time, everywhere.
Ubiquitous will enable people to focus on their tasks and on
interacting with other people.
Impact on Business Strategy – awareness, accessibility,
responsiveness
Point of Presence! Context!
Change in nature of service providers (bursty, point-of-presence value,
service level commitments)
New services (businesses) will arise…
25. Demographics
• 314 million visually impaired people in the world today
• 45 million blind
• More than 82% of the visually impaired population is age 50 or older
• The old population forms a group with diverse range of abilities
• The disabled are seldom seen using the street alone or public
transportation
26. Mobility Requirements
• Being able to avoid obstacles
• Walking in the right direction
• Safely crossing the road
• Knowing when you have reached a destination
• Knowing which is the right bus/train
• Knowing when to get off the bus/train
All require SIGHT as primary sense
27. Putting all together…
Gill, J. Assistive Devices for People with Visual Impairments.
In A. Helal, M. Mokhtari and B. Abdulrazak, ed., The Engineering Handbook of Smart Technology for Aging, Disability and Independence.
John Wiley & Sons, Hoboken, New Jersey, 2008.
29. Wearable Computing
• Wearable computers are an attractive way to deliver a ubiquitous
computing system’s interface to a user, especially in non-office-
building environment.
42. Wearable Computing & Ubiquitous
Computing
Properties and Problems with Ubiquitous Computing
Privacy issues
Difficulty with personalized information:
I am Tom !
Oh, it’s Tom
Let me check
my databse
Oh, it’s Tom
Let me check
my databse
Tom:
Age: 25
Favorite Song:
My heart will go on
Tom:
Age: 25
Email:
Tt@yahoo.com
OK, let me check
his email
OK, I will play
this song
Hi all, I am Mike,
your new Boss
My god, a new man!
I have to update
my database!
Me Too!
It’s really
troublesome!
43. Wearable Computing & Ubiquitous Computing
Properties and Problem with Wearable Computing
I am Tom !
Tom:
Age: 25
Favorite Song:
My heart will go on
Email: Tt@yahoo.com
OK, let me check
his email
OK, I will play
this song
44. Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
1. Localized information:
2. Localized control
I am Tom !
Device Table:
--------------------
1.Computer
2.Recorder
3.Printer
A New device!
It should be
added to my DB.
Where is the
printer’s driver?
should I
install it?
45. Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
Resource management:
Oh my,
What should I do?
I am Tom !
Hi all, I am Mike
Tom:
Age: 25
Favorite Song:
My heart will go on
Email: Tt@yahoo.com
Mike:
Age: 30
Favorite Song:
Salvage Garden
Email: Mm@yahoo.com
49. What is Ubiquitous Computing ?
• Ubiquitous computing is the method of enhancing computer
use by making many computers available throughout the
physical environment, but making them effectively invisible
to the user
– Mark Weiser
• Ubiquitous computing, or calm technology, is a paradigm
shift where technology becomes virtually invisible in our
lives.
- Marcia Riley
Definitions:
52. Three Waves of Computing
● Mainframe computing (60’s-70’s)
– Massive computers to execute big data processing
applications
– very few computers in the world
● Desktop computing (80’s-90’s)
– one computer at every desk to help in business related
activities
– Computers connected in intranets to a massive global
network
(internet), all wired
● Ubiquitous computing (00’s?)
– Tens/hundreds of computing devices in every room/person,
becoming
“invisible” and part of the environment
56. What Ubiquitous Computing Isn't
• A Mobile Computer – even if you have access to “everything”
you do it through only one access point.
• Multimedia Computing – while it may employ sound and
video it should fade into the background rather than demand the
focus of your attention.
• Virtual reality - where virtual reality puts people inside a
computer-generated world, ubiquitous computing forces the
computer to live out here in the world with people.
58. Other related fields:
• Sensor networks
• Human-computer interaction
• Artificial intelligence
59. Other related fields:
1-Sensor Networks
• A sensor network consist of a large number
of tiny autonomous computing devices,
each equipped with sensors, a wireless
radio, a processor, and a power source.
• Sensor networks are envisioned to be
deployed unobtrusively in the physical
environment to monitor a wide range of
environmental phenomena
• e.g., environmental pollutions, seismic
activity, wildlife
60. Other related fields:
2. Human Computer Interaction (HCI)
• HCI is the study of interaction between people (users) and
computers.
• Goal of HCI: to improve the interaction between users and
computers by making computers more user-friendly and
receptive to the user's needs.
• Long term goal of HCI: to design systems that minimize the
barrier between the human's cognitive model of what they want
to accomplish and the computer's understanding of the user's
task.
61. Other related fields:
3. Artificial Intelligence
• AI can be defined as intelligence exhibited by an artificial
(non-natural, manufactured) entity.
• AI is studied in overlapping fields of computer science,
psychology and engineering, dealing with intelligent
behavior, learning and adaptation in machines, generally
assumed to be computers.
• Research in AI is concerned with producing machines to
automate tasks requiring intelligent behavior.
62. Monument in
a Museum
environment
with RFID
Lab in
a campus
with RFID
tags
Info for botanical
science students using
RFID - Botanical
environment
Library in
a campus
with RFID
tags
72. Example Projects
• Pervasive computing projects have emerged at major universities and in
industry:
o Project Aura (Carnegie Mellon University)
o Oxygen (Massachusetts Institute of Technology)
o Portalano (University of Washington)
o Endeavour (University of California at Berkeley)
o Place Lab (Intel Research Laboratory at Seattle)
73. Example Projects :
ProjectAura (1)
• Aura (Carnegie Mellon University)
o Distraction-free (Invisible) Ubiquitous Computing.
74. Example Projects :
Project Aura (2)
• Moore’s Law Reigns Supreme
o Processor density
o Processor speed
o Memory capacity
o Disk capacity
o Memory cost
o ...
• Glaring Exception
o Human Attention
Adam & Eve 2000 AD
Human Attention
75. Example Projects :
Project Aura (3)
• Aura Thesis:
o The most precious resource in computing is human attention.
• Aura Goals:
o Reduce user distraction.
o Trade -off plentiful resources of Moore’s law for human attention.
o Achieve this scalably for mobile users in a failure -prone, variable-
resource environment.
76. Example Projects :
Project Aura (4)
The Airport Scenario
>>Jane wants to send e-mail from the airport before her flight leaves.
– She has several large enclosures
– She is using a wireless interface
>>She has many options.
Simply send the e-mail
Is there enough bandwidth?
Compress the data first
Will that help enough?
Pay extra to get reserved bandwidth
Are reservations available?
Send the “diff” relative to older file
Are the old versions around?
Walk to a gate with more bandwidth
Where is there enough bandwidth?
>>How do we choose automatically?76/30
77. Example Projects :
Project Aura (5)
The Mobile Task Scenario
Aura saves Scott’s task.
Scott enters office and gets strong authentication and
secure access.
Aura restores Scott’s task on desktop machine and uses a
large display.
Scott controls application by voice.
Bradley enters room.
Bradley gets weak authentication, Scott’s access changes to
insecure.
Aura denies voice access to sensitive email application.
Scott has multi-modal control of PowerPoint application.
Aura logs Scott out when he leaves the room.
77/30
78. Example Projects:
Oxygen
Oxygen (MIT)
Pervasive human-centered
computing.
Goal of Oxygen is bringing
abundant computation and
communication, as
pervasive and free as air,
naturally into people's lives.
79. Example Projects :
Oxygen (2)
To support highly dynamic and varied human activities, the Oxygen system must be
pervasive— it must be everywhere, with every portal reaching into the same information
base;
embedded— it must live in our world, sensing and affecting it;
nomadic— it must allow users and computations to move around freely, according to
their needs;
adaptable— it must provide flexibility and spontaneity, in response to changes in user
requirements and operating conditions;
powerful, yet efficient— it must free itself from constraints imposed by bounded
hardware resources, addressing instead system constraints imposed by user demands and
available power or communication bandwidth;
intentional— it must enable people to name services and software objects by intent, for
example, "the nearest printer," as opposed to by address;
eternal— it must never shut down or reboot; components may come and go in response
to demand, errors, and upgrades, but Oxygen as a whole must be available all the time.
80. Related Projects:
Portalano
Portolano (University of Washington)
An expedition into invisible computing.
Expedition goals:
Connecting the physical world to the world-wide information fabric
instrument the environment: sensors, locators, actuators
universal plug-and-play at all levels: devices to services
optimize for power: computation partitioning, comm. opt.
intermittent communication: new networking strategies
Get computers out of the way:
don't interfere with user’s tasks
diverse task-specific devices with optimized form-factors
wide range of input/output modalities
Robust, trustworthy services:
high-productivity software development
Self-organizing, active middleware, maintenance, monitoring
higher-level, meaningful services
81. Related Projects:
Portalano (2)
Scenario
Alice begins the day with a cup of coffee and her
personalized newspaper.
When her carpool arrives, she switches to reading the news
on her handheld display, where she notices an advertisement
for a new 3-D digital camera.
It looks like something that would interest her shutterbug-
friend Bob, so Alice asks her address book to place the call.
82. Related Projects:
Portalano (4)
Scenario (3)
When the camera arrives, Bob snaps some photos of his
neighbor's collection of antique Portuguese navigation
instruments.
After reviewing the photo album generated automatically by a
web-based service, Bob directs a copy of his favorite image to the
art display in his foyer.
He also sends a pointer to the photo album to Alice and instructs
his scheduling agent to set up a lunch date so that he can thank
her for the suggestion.
83. Related Projects:
Portalano (3)
Scenario (2)
Bob's home entertainment system softens the volume of his custom
music file as his phone rings.
Alice begins telling Bob about the camera, and forwards him a copy of
the advertisement which pops up on his home display.
Bob is sold on the product, and after hanging up with her, he asks his
electronic shopping agent
to check his favorite photography
stores for the lowest price
and make the purchase.
84. Other Scenarios
Buy drinks by Friday (1)
Take out the last can of soda
Swipe the can’s UPC label, which
adds soda to your shopping list
Make a note that you need soda for
the guests you are having over this
weekend
85. Other Scenarios
Buy drinks by Friday (2)
Approach a local supermarket
AutoPC informs you that you are
near a supermarket
Opportunistic reminder: “If it is
convenient, stop by to buy
drinks.”
86. Other Scenarios
Buy drinks by Friday (3)
- Friday rolls around and you have
not bought drinks
- Deadline-based reminder sent to
your pager
87. Other Scenarios
Screen Fridge
Provides :
Email
Video messages
Web surfing
Food management
TV
Radio
Virtual keyboard
Digital cook book
Surveillance camera
88. Other Scenarios
Edible computers: The pill-cam
Miniature camera
Diagnostic device
It is swallowed
Try this with an ENIAC computer!
89. Other Scenarios
Artificial Retina
Direct interface with nervous
system
Whole new computational
paradigm (who’s the
computer?)
90. Overview—Third Paradigm Computing
Phase I
One person many computers
Advances in
OS and UI
Networks
Wireless
Microprocessor Cost/Perf. >>
Displays
Activated the World
Results
100s of wireless computing
devices per person per office
Displays (1” to wall sized)
Compact devices to mediate
support & organize all
activities
Phase II
Computer – A Dramatic M/C
Path I - Invisible Path
Growth in Technology
Tabs
Pads
Boards
Results
Prototypes failed to be
invisible !
Ubicomp in Post-Modernism
Path II (2000—2020) Focus
New Directions
Level of Embeddedness
Dangling String Display !
Nomadicity
90
91. Other Scenarios
The Active Badge
This harbinger of inch-scale computers contains a small
microprocessor and an infrared transmitter.
The badge broadcasts the identity of its wearer and so can
trigger automatic doors, automatic telephone forwarding and
computer displays customized to each person reading them.
The active badge and other networked tiny computers are
called tabs.
93. Other Scenarios
Smart Dust
Nano computers that couple:
Sensors
Computing
Communication
Grids of motes (“nano
computers”)
94. a robot hardware
platform called iCAT
uses a set of logical rules
to convey emotional
states as it makes
decisions, with the goal
of improving human-
robot interaction.
It looks confused if it’s
in trouble, smiles if it
gets something right…
Emotional kitty:
95. is wirelessly connected to the Internet.
It roams around the home providing
an audio and video link to keep an eye
The Rovio robotic webcam
96. Gordon Bell , a principal researcher
at Microsoft, aims to amass an archive of
his life by capturing a digital record of all of
his interactions with people and machines. To
help, he wears a device around his neck called
‘SenseCam’, developed at Microsoft’s research
lab in Cambridge, UK. Sense Camis a wearable
camera
containing sensors that result in a picture being
taken whenever there are changes in light,
movement and ambient temperature. The result
is a digital ‘slide show’of many of the events in
everyday life.
A digital life:
97. A ring worn by electric guitar players
that uses motion sensors and a
wireless transmitter to
create different kinds of sound effects
by various hand gestures.
Hot Hand device:
98. Animated Textiles developed by
Studio sub Tela at the Hexagram
Institute, Montreal, Canada. These
two jackets ‘synch up’ when the
wearers hold hands, and the
message scrolls from the back of
one person to the other.
99. (a concept from Philips Design) is based
on stretchable, flexible
electronic substrates that integrate energy
supply, sensors, actuators, and display.
By changing color or even shape
according to your mood, it explores
how wearable technology can
be playful, sensual,
Mood affected, bio-activity
stimulated
Electronic sensing jewelry
100. The next thing in the digital
economy? Visa Micro Tag
does away with the need to
swipe a credit card or give
your card to the cashier.
Just wave the tag in front
of a secure reader and the
payment is made
101. The Ubiquitous Computing Challenge
Society and ubiquitous computing could form an evolutionary
symbiosis
Research is needed to guide and focus the evolution to the goal:
uncertainty and privacy
Can systems autonomically adapt to satisfy evolving human needs?
Ubiquitous Computing is the arena for pervasive computing
champions to fight out for their best ideas
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120. UC – Here And Now
• Most work now is concentrating on the mobile infrastructure
for wireless networking
• TCP/IP and OSI are unprepared for handling mobility
(machine's name, and its network address are variant ).[6]
• “Calm Technology”: Calmness is a new challenge that UC
brings to computing [7]
• “The Periphery”: Calm technology will move easily from the
periphery of our attention, to the center, and back.
121.
122.
123.
124.
125.
126.
127. “Our computers should be like our childhood:
an invisible foundation that is quickly forgotten,
but always with us,
and effortlessly used throughout our lives.”
Mark Weiser
As Said….
141. Unused resources
Economics of Cloud Users
• Pay by use instead of provisioning for peak
Static data center Data center in the cloud
Demand
Capacity
Time
Resources
Demand
Capacity
Time
Resources
141141
148. 3 Main Types or Personalities
Software-as-a-Service (SaaS): A wide range of
application services delivered via various business
models normally available as public offering
Platform-as-a-Service (PaaS): Application
development platforms provides authoring and
runtime environment
Infrastructure-as-a-Service (IaaS): Also known
as elastic compute clouds, enable virtual hardware
for various uses
Cloud Computing
149. IaaS
Cloud Programming Environment and
Tools: Web 2.0, Mashups, Concurrent and
Distributed Programming, Workflow
Cloud Hosting Platforms: QoS
Negotiation Admission Control, Pricing,
SLA Management, Monitoring
Cloud Physical Resources: Storage,
virtualized clusters, servers, network.
Scientific Computing, Enterprise ISV,
Social Networking, Gaming
Amazon EC2, GoGrid, RightScale, Jovent
Animoto, Sales Force, Google
Document
User
Applications
User-level and
infrastructure
level Platform
Google AppEngine, MapReduce, Aneka,
Microsoft Azure
Infrastructure
SaaS
PaaS
CloudEconomy
149
157. What is the cloud?
IT as a service
Cloud allows access to services without user technical knowledge or control of
supporting infrastructure
Best described in terms of what happened to mechanical power over 100 yrs ago
Now computers are simple devices connected to the larger cloud
Data processing, storage and software applications that used to run locally are
now being supplied by big central computing stations. They're becoming, in
essence, computing utilities.
What is
Cloud Computing?
157
158. What is cloud and cloud computing?
Cloud
Demand resources or services over Internet
scale and reliability of a data center.
159. What is cloud and cloud computing?
Cloud computing
Is a style of computing in which dynamically scalable and often
virtualized resources are provided as a serve over the Internet.
Users need not have knowledge of, expertise in, or control over
the technology infrastructure in the "cloud" that supports them.
161. Why Cloud Computing?
• Pay per use
• Instant Scalability
• Security
• Reliability
• APIs
162. Characteristics of cloud computing
• Virtual
software, databases, Web servers,operating systems, storage
and networking as virtual servers.
• On demand
add and subtract processors, memory, network bandwidth,
storage.
163. Cloud
Features & Benefits
for Users
Highly virtualized and
standardized infrastructures
Massive scalability
Fault tolerant & highly reliable
Intra- & Inter-cloud load balance
No need to install or update
SW or HW; access from any
browser
Unlimited use
Always on
Access from anywhere
Many services to choose from
163
170. Examples:
• Your current CRM package is not managing the
load or you simply don’t want to host it in-house.
Use a SaaS provider such as Salesforce.com
• Your email is hosted on an exchange server in your
office and it is very slow. Outsource this using
Hosted Exchange.
170
SaaS
173. Platform delivery model:
• Platforms are built upon Infrastructure, which is expensive
• Estimating demand is not a science!
• Platform management is not fun!
PaaS
177. Examples:
• You need to host a large file (5Mb) on your
website and make it available for 35,000 users
for only two months duration. Use Cloud Front
from Amazon.
• You want to start storage services on your
network for a large number of files and you do
not have the storage capacity…use Amazon S3.
177
PaaS
180. Examples:
• You want to run a batch job but you don’t have the
infrastructure necessary to run it in a timely manner. Use
Amazon EC2.
• You want to host a website, but only for a few days. Use
Flexi scale.
IaaS
180
188. Advantages of Cloud Computing Instant software updates:
Another advantage to cloud computing is that you are no longer faced with
choosing between obsolete software and high upgrade costs.
When the application is web-based, updates happen automatically - available the
next time you log into the cloud.
When you access a web-based application, you get the latest version - without
needing to pay for or download an upgrade.
Improved document format compatibility.
You do not have to worry about the documents you create on your machine being
compatible with other users' applications or operating systems.
Where Word 2007 documents cannot be opened on a computer running Word
2003, all documents can be read!
There are potentially no format incompatibilities when everyone is sharing
documents and applications in the cloud.
188
189. Advantages of Cloud Computing
Lower computer costs:
You do not need a high-powered and high-priced computer to run cloud
computing's web-based applications.
Since applications run in the cloud, not on the desktop PC, your desktop PC
does not need the processing power or hard disk space demanded by
traditional desktop software.
When you are using web-based applications, your PC can be less expensive,
with a smaller hard disk, less memory, more efficient processor...
In fact, your PC in this scenario does not even need a CD or DVD drive, as
no software programs have to be loaded and no document files need to be
saved.
189
190. Advantages of Cloud Computing
Improved performance:
With few large programs hogging your
computer's memory, you will see better performance from your PC.
Computers in a cloud computing system boot and run faster because they have fewer
programs and processes loaded into memory…
Reduced software costs:
Instead of purchasing expensive software applications, you can get most of what you
need for free-ish!
That is right - most cloud computing applications today, such as the Google Docs suite,
are totally free.
That is a lot better than paying $200+ for similar Microsoft Office software - which
alone may be justification for switching to cloud applications.
190
191. Advantages of Cloud Computing
Unlimited storage capacity:
Cloud computing offers virtually limitless storage.
Your computer's current 200 Gbyte hard drive is small compared to the hundreds
of Pbytes available in the cloud.
Whatever you need to store, you can.
Increased data reliability:
Unlike desktop computing, in which if a hard disk crashes and destroy all your
valuable data, a computer crashing in the cloud should not affect the storage of
your data.
That also means that if your personal computer crashes, all your data is still out
there in the cloud, still accessible.
In a world where few individual desktop PC users back up their data on a regular
basis, cloud computing is a data-safe computing platform!
191
192. Advantages of Cloud Computing
Universal document access:
That is not a problem with cloud computing, because you do not take your
documents with you.
Instead, they stay in the cloud, and you can access them whenever you have a
computer and an Internet connection.
All your documents are instantly available from wherever you are.
Latest version availability:
Another document-related advantage of cloud computing is that when you edit
a document at home, that edited version is what you see when you access the
document at work.
The cloud always hosts the latest version of your documents; as long as you
are connected, you are not in danger of having an outdated version.
192
193. Advantages of Cloud Computing
Easier group collaboration:
Sharing documents leads directly to better collaboration.
Many users do this as it is an important advantages of cloud computing - multiple
users can collaborate easily on documents and projects.
Because the documents are hosted in the cloud, not on individual computers, all you
need is an Internet connection, and you are collaborating.
Device independence:
You are no longer tethered to a single computer or network.
Changes to computers, applications and documents follow you through the cloud.
Move to a portable device, and your applications and documents are still available.
193
194. Disadvantages of Cloud Computing
Requires a constant Internet connection:
Cloud computing is impossible if you cannot connect to the Internet.
Since you use the Internet to connect to both your applications and
documents, if you do not have an Internet connection you cannot access
anything, even your own documents.
A dead Internet connection means no work and in areas where Internet
connections are few or inherently unreliable, this could be a deal-breaker.
When you are offline, cloud computing simply does not work.
194
195. Disadvantages of Cloud Computing
Does not work well with low-speed connections:
Similarly, a low-speed Internet connection, such as that found with dial-up
services, makes cloud computing painful at best and often impossible.
Web-based applications require a lot of bandwidth to download, as do large
documents.
If you are labouring with a low-speed dial-up connection, it might take
seemingly forever just to change from page to page in a document, let
alone to launch a feature-rich cloud service.
In other words, cloud computing is not for the broadband-impaired!
195
196. Disadvantages of Cloud Computing
Can be slow:
Even with a fast connection, web-based applications can sometimes be
slower than accessing a similar software program on your desktop PC.
Everything about the program, from the interface to the current document,
has to be sent back and forth from your computer to the computers in the
cloud.
If the cloud servers happen to be backed up at that moment, or if the
Internet is having a slow day, you would not get the instantaneous access
you might expect from desktop applications.
196
197. Disadvantages of Cloud Computing
Features might be limited:
This situation is bound to change, but today many web-based applications simply
are not as full-featured as their desktop-based applications.
For example, you can do a lot more with Microsoft PowerPoint than with Google
Presentation's web-based offering.
The basics are similar, but the cloud application lacks many of PowerPoint's
advanced features.
If you are a power user, you might not want to leap into cloud computing just yet.
197
198. Disadvantages of Cloud Computing
Stored data might not be secure:
With cloud computing, all your data is stored on the cloud.
The questions is How secure is the cloud?
Can unauthorised users gain access to your confidential data?
Cloud computing companies say that data is secure, but it is too early to be
completely sure of that.
Only time will tell if your data is secure in the cloud.
Stored data can be lost:
Theoretically, data stored in the cloud is safe, replicated across multiple
machines.
But on the off chance that your data goes missing, you have no physical or local
backup.
Put simply, relying on the cloud puts you at risk if the cloud lets you down.198
199. Disadvantages of Cloud Computing
HPC Systems:
Not clear that you can run compute-intensive
HPC applications that use MPI/OpenMP!
Scheduling is important with this type of application – as you want all
the VM to be co-located to minimise communication latency!
General Concerns:
Each cloud systems uses different protocols and different APIs… so it
may not be possible to run applications between cloud based systems.
Amazon has created its own DB system (not SQL 92), and workflow
system (many popular workflow systems out there) – so your normal
applications will have to be adapted to execute on these platforms.
199
200. -Pay-as-you- USE
-Subscription fee is based on the number of
users per month
-Minimal Cost for annual subscription
IT/application resources
-Faster implementation and Productivity
optimization
-More control over relationship with vendor
-Better risk sharing with vendor
-Exit options are simple and easy
200
On premise vs. SaaS
-Capital Expenses- You pay upfront
Annual maintenance costs
-Cost for applications, maintenance, infrastructure,
Database server and IT/application resources
-Time taken to install is much higher & configure
applications
-Not much control over vendor after purchase
-You are responsible for the management of the
software installed
-Customers may be on many different releases
of the software
-Upgrading to the newer version of the software
could cost you
Licensed Software Software-as-a-Service (SaaS) Solutions
203. 203
Top Reasons Why you should consider SaaS?
OPEX not CAPEX:
• “Pay as you go”
operational expense
rather than a capital
expenditure
• A subscription-based
on usage metrics (instead of
a perpetual license)
Lower cost-of-business
solution ownership
Predictability of costs over
time
The management, support,
and upgrading of the software
and the infrastructure that
supports it is the responsibility
of the solution provider
Economic Reasons
More rapid access to state-
of-the-art technology
Highly responsive and
scalable (upwards and
downwards) solutions that
cover entire business
processes
• Greater ability to
scale as business needs
change
User access to the
application
is over the Internet
• Ubiquitous and
relatively inexpensive
Flexible and customizable
solutions
Functional Reasons
Reliable access to data,
anywhere, anytime
Increased risk mitigation
with better support for
compliance
More rapid time-to-
production
Improved security,
performance, and availability
Avoidance of vendor lock-
in
Shift in focus to core
business management, rather
than disproportionate attention
on the computer environment;
redeploy headcount to
strategic IT initiatives
Expected Results
204. 7.Analyzing TCO Cost Drivers.
Cost Drivers Traditional On-Premises Software Cloud Application
Capital Expenses Upfront purchase of software and hardware
May require network infrastructure
enhancements, facilities
Need to support third party monitoring, test
tools,
security products
None
Pay-as-you-go subscription pricing
All inclusive: maintenance, support,
training, and upgrades all hardware,
networking, storage, database,
administration
Design and Deployment May take months to deploy
Professional services can cost up to 3X the
initial
software purchase
Difficult for vendor to build best practices
Requires staff or contract labor to research,
design, integrate, test, tune, launch, and train
Deploy in weeks
Lower cost using consistent set of best
practices
Ongoing Infrastructure Ongoing software maintenance, upgrades
Ongoing hardware replacement once every
three
years
Requires a network monitoring and
management
tools
May require additional networking equipment
and bandwidth to accommodate incremental
traffic
The vendor provides as part of the
subscription
205. # Item On Premise SAAS
Number Value Number Value
1 Infrastructure 29,000.00 -
1.1 Servers with OS 2 6,000.00 0 -
1.2 Software licenses
( Database)
1 4,000.00 0 -
1.3 Internal server
security
1 2,000.00 0 -
206. # Item On Premise SAAS
Number Value Number Value
1.4 Backup 1 2,000.00 0 -
1.5 DR site 1 5,000.00 0 -
1.6 Other
overheads
1 10,000.00
2 Software 100,000.00
2.1 License fee 1 80,000.00 0 -
207. # Item On Premise SAAS
Number Value Number Value
2.2 ESS licenses
(cal)
50 20,000.00 0 -
3 Setup 1 150,000.00 100,000.00
3.1 Installation and
setup
100 150,000.00 60 90,000.00
208. # Item On Premise SAAS
Number Value Number Value
Total one time
cost
279,000.00 100,000.00
4 Recurring cost 225,000.00 300,000.00
4.1 Annual
maintenance -5
yrs @ 20%
5 80,000.00 0 -
209. # Item On Premise SAAS
Number Value Number Value
4.2 Monthly
subscription -5 yrs
@10 $
0 - 500 300,000.00
4.3 Server
maintenance
5 25,000.00 0
4.5 Resource
overheads
5 120,000.00
Total cost for 5
years
504,000.00 400,000.00
Total saving $ 104,000.00
<number>
In the Ubiquitous learning campus atmosphere Individualized Learning Environment can also be supported using RFID enabled learning where in RFID tagged Labs, Library etc enable the learner with awareness as well as elaborate learning in that specific area. RFID enabled monuments in any location help in acquiring detailed knowledge pertaining to them. Similarly for a science student with a specialization in botanical sciences RFID enabled botanical environment can be of extensive use in studying various trees present in any botanical environment.
<number>
The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness.
Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications.
Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers.
PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
<number>
The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness.
Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications.
Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers.
PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
<number>
The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness.
Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications.
Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers.
PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
<number>
The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness.
Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications.
Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers.
PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
<number>
The most precious resource in a computer system is no longer its processor, memory, disk or network. Rather, it is a resource not subject to Moore's law: User Attention. Today's systems distract a user in many explicit and implicit ways, thereby reducing his effectiveness.
Project Aura will fundamentally rethink system design to address this problem. Aura's goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. Meeting this goal will require effort at every level: from the hardware and network layers, through the operating system and middleware, to the user interface and applications.
Project Aura will design, implement, deploy, and evaluate a large-scale system demonstrating the concept of a “personal information aura” that spans wearable, handheld, desktop and infrastructure computers.
PROJECT WEBSITE: http://www.cs.cmu.edu/~aura/
1/16/16
<number>
Work on ubiquitous computing is still at an early phase. Most work now is concentrating on the mobile infrastructure for wireless networking. Because ubiquitous computing envisions hundreds of wireless computers in every office, its need for wireless bandwidth is prodigious.
A second challenge of the mobile infrastructure is handling mobility. Networking developed over the past twenty years with the assumption that a machine's name, and its network address, were unvarying. However, once a computer can move from network to network this assumption is false.
Existing protocols such as TCP/IP and OSI are unprepared for to handle machine mobility without change. A number of committees and researchers are now working on methods of augmenting or replacing existing protocols to handle mobility.
A third challenge of the mobile infrastructure is window systems. Most window systems, such as those for the Macintosh and for DOS, are not able to open remote windows over a network. Even window systems designed for networking, such as X, have built into them assumptions about the mobility of people. The X window system protocol, for instance, makes it very difficult to migrate the window of a running application from one screen to another
Ubiquitous computing will require a new approach to fitting technology to our lives, an approach we call "calm technology".
CALM tech:
The most potentially interesting, challenging, and profound change implied by the ubiquitous computing era is a focus on calm. If computers are everywhere they better stay out of the way, and that means designing them so that the people being shared by the computers remain serene and in control.
Calmness is a new challenge that UC brings to computing. When computers are used behind closed doors by experts, calmness is relevant to only a few. Computers for personal use have focused on the excitement of interaction. But when computers are all around, so that we want to compute while doing something else and have more time to be more fully human
“The Perifery: when driving our attention is centered on the road, the radio, our passenger, but not the noise of the engine. But an unusual noise is noticed immediately, showing that we were attuned to the noise in the periphery, and could come quickly to attend to it.
A calm technology will move easily from the periphery of our attention, to the center, and back. This is fundamentally encalming, for two reasons.
First, by placing things in the periphery we are able to attune to many more things than we could if everything had to be at the center.
Second, by recentering something formerly in the periphery we take control of it.
Not all technology need be calm. A calm videogame would get little use; the point is to be excited.
We must learn to design for the periphery so that we can most fully command technology without being dominated by it.
DANGLING STRING - Created by artist Natalie Jeremijenko, the "Dangling String" is an 8 foot piece of plastic spaghetti that hangs from a small electric motor mounted in the ceiling. The motor is electrically connected to a nearby Ethernet cable, so that each bit of information that goes past causes a tiny twitch of the motor. A very busy network causes a madly whirling string with a characteristic noise; a quiet network causes only a small twitch every few seconds.
INNER OFFICE WINDOWS - The hallway window extends our periphery by creating a two-way channel for clues about the environment. Whether it is motion of other people down the hall (its time for a lunch; the big meeting is starting), or noticing the same person peeking in for the third time while you are on the phone (they really want to see me; I forgot an appointment), the window connects the person inside to the nearby world.
<number>
And we have one of the largest distributed network in the world -- we have deployed 120000 servers in all major continents and in more than 120 countries.
<number>
Microsoft showed how Gen 4 characteristics could be put in place in both the company's smaller data centers and in its mega-data centers. The portion of the video showing off the Gen 4 mega-data center almost looks like a series of interconnected tiny power plants.
<number>
<number>
Cloud computing is a new paradigm and people are saying it will revolutionize the IT industry. It provides all IT needs through three services: SaaS, PaaS and IaaS
<number>
<number>
Aleric partners with Global Enterprises to further their business interests utilizing Cloud Computing. We provide technology and services where cloud-based business applications can be timely deployed and tailored to our partner’s needs - by market or industry. Aleric cloud platform is unique in its formation and history – combining over a decade of industry experience in Global Management, Enterprise Security, and Virtualization. Aleric offers a consulted approach that works in partnership, teamwork, and mutually beneficial ways to ensure the success and best-practice/ROI of our partners.
<number>
<number>
Aleric partners with Global Enterprises to further their business interests utilizing Cloud Computing. We provide technology and services where cloud-based business applications can be timely deployed and tailored to our partner’s needs - by market or industry. Aleric cloud platform is unique in its formation and history – combining over a decade of industry experience in Global Management, Enterprise Security, and Virtualization. Aleric offers a consulted approach that works in partnership, and mutually beneficial ways to ensure the success and best-practice/ROI of our partners.
<number>