Countries’ legal coverage of internet and digital information, a prerequisite.

privacyInternet able and/or virtual companies from social media to ISPs operate and conduct business in a multinational to global realm. Facebook, Twitter, and Google are among the major global internet powered companies. Their scale of operations puts them in comfortable positions where they are able to serve the market at super convenient costs without the need to worry about losses. This ability  attracts a lot of customers to sign up (clicking on the terms and conditions with vague understanding of their implications) to access a lot of the free services, tools and applications they offer.

As a result theses companies have become information banks as the higher the frequency of input and content shared by users make them very susceptible to hacking, data mining, and the companies themselves use the users information intentionally or unintentionally for their gain. Privacy and security issues are already a major concern for users globally. Governments, companies, groups and individuals have over the years been subjected to exposure, allegations, and legal actions for violating these rights to individuals’ freedom of personal privacy and protection over their digital information.

Due to the traversing nature of the internet extending the boundaries of countries with different legal systems and requirements there is no definite international laws governing users rights and freedom to their information when it comes to digital applications therefore the onus is on individual (or groups) of countries to create and promote laws for internet and digital privacy and security.

In New Zealand there  is currently no definitive law but policymakers are working on addressing these issues. The European Union already has its legal and policy directive set on digital privacy. It is envisaged that many will follow suit to address security and privacy issues, from managing them to legal sanctioning through the enforcement of policy directives.

 

Made in China 2025

blog_madeinchina2025

China is currently dominating the world by many accounts in terms of its manufacturing, economic and financial prowess. Many companies big and small want a piece of the China pie. Even though the politics and how the government intervenes in the management of its country are to some extent a concern with the highly reported human rights an other international contraventions violations,  the international business community at large are not deterred to doing business in China.

With the inception of the Made In China 2025 program in more recent years, the program aims to bring its manufacturing up a notch by becoming an intelligent manufacturer which means that it is trying shift away from being a copycat manufacturer into an innovative and inventive creator of products by way of research and development of new and innovative technologies alongside its e-business and e-commerce channels. It is engaging in strategic partnerships with its 3 largest online and eCommerce companies Baidu, Alibaba, and Tencent (BAT) to develop and reach its targeted goals in the eCommerce sector which is its largest market segment both locally and globally. Ultimately this program will propel China forward  when it begins to reach its potential.

The United States (China’s number one competitor) is currently imposing protectionist policies on its immigration and foreign trade policies to many of the world economies and its former partner nations.  Will this move by America present an opportunity or threat for China and its Made In China 2025 program?

Aritificial Intelligence – Is the future safe?

As electronic and digital technology advances with the aim to improve and help make our lives easier  I have noticed that it is increasingly progressing from an accessory tool to a basic human essential living requirement. The invasive, fun and essential functionalities of technology with the ubiquitous not forgetting cheaper or mostly free accessibility (free wordpress account 🙂 ) are all but sucking in and gripping  the masses like a vacuum.

Technology has served its purpose helping make our lives easier but has come to the point where cars will be driven autonomously – don’t have to drive! Most of our daily life processes have all been crammed into application and websites where we don’t have to do a lot of work – an access to a smartphone and you’re set for life. Now that the Internet of Things has become operational like everything else before, it will only be a matter of time before the technology becomes really affordable  for us to have  (a short time maybe) with more ease and more functionalities that we won’t have to lift a sweat as everything will be done be done just by commanding and/ or even thinking. Moore’s Law at its best.

This begs the next question Artificial Intelligence!

The first time I came across artificial intelligence or AI, I freaked out because it was through the movie Terminator (I watched all the installments). It was a serious apocalyptic foretaste and man Arnold Schwarzenegger was very convincing in his embodiment of AI  – A powerful military defence program becoming self aware and turning against its creators hence machines against humanity resulting in massive destruction and annihilation of the world with the minority of remnant humans becoming the resistance to  the AI. What about the Matrix movies?

Artificail Intelligence
Enter a caption

Currently with the existing technology, AI will in a matter of years be a fruition as it is  has garnered a lot of attention for political, philosophical and technological reasons. the idea of giving a machine the ability to think an behave like a human is a huge pill to swallow. Among those expressing concerns over AI of its potential threats AI has over humans are Steven Hawking, Elon Musk and Bill Gates to name a few.

For me AI is a very complex engineering feat that requires a lot of ethical considerations on every aspect of its operation . There is science and then there is humanity to consider. The future of AI is on the horizon however are we all confident that is the next best thing for us? Let us not let our instinct of aggression overcome us but think before developing.

Week12: Internet of Things

Internet of Things (IoT)

The internet of things has is bound to radically transform the world through its potential abundance of applications which will inevitably revolutionise the world through different industries. But for people to be able to embrace the technology there has to be a perhaps radical thought process or reimagining the landscape of the present and thinking beyond the unimaginable.

The world is increasingly becoming demanding as needs of citizens are increasing day by day the pressure to provide innovative products to meet these needs is ever-present. Internet of Thing provides this avenue with vocational based technology, data mining, and intelligence and providing almost instant contextual prescriptions thus providing value adding activities.

One observation of the IoT is its ability to provide faster automation and access as viewed through the Industry 4.0 clip from lecture two. The clip also revealed the technology’s superior ability to uniquely identify individual units of production customise products from consumer responsiveness thereby boosting efficiency and cost savings. Or the Google car’s self-driven ability which replaces people’s driving giving them more time and opportunity to concentrate on other activities while travelling. The Nest smart home technology with its energy efficiency functions also reduces energy usage producing sustainability resources and usages

 

Another advantage the IoT’s technology to be able to collect, store and analyse massive amounts of data that it collects and analyses this data therefore augmenting and prompting responses from people. Through the use of sensor, tagging and tracking technology it can be used for public utilities in the form of transportation services. That is responding to estimated times of arrival or departure from a bus stop, the pricing or booking, discount offering and many more. Or in a shop the shopper can is identified and presented options with coupons based on the shoppers historical shopping and browsing history at the shop through a smartphone applications and many more options.

Its superior capability of collecting, analyse, predict and in a single looping action delivers its transformative potential the change the outlook of the world today.

 

Issues

There is so many possibilities with IoT yet these possibilities are not all that positive as there are some externalities that this technology is no exception to. The article on the Fusion Blog (2015) of the light bulb performing a denial of service attack on the smart home because it  was blown it kept sending packets of signals to the main hub for to fix it that eventually the signals completely become a DoS attack completely shutting down the also l the house functions. Even robots were continuously functioning outside their pre-programming parameters. Even from the hypothetical but practical reading about the smart home catching a virus is somehow depicts the complex and intricate nature of the technology itself being interwoven. Finally, the non-disclosure of the technology’s full functionalities becomes a concern when there are mishaps or unknown technological overrides of the system becomes invasive and to an extent places risk on human lives. In this clip and this clip, vehicles’ electronic control units and radio units  are easier to hack and control which are inevitably linked to many of the crucial functions of the vehicle and the implications are very threatening and costly. vehicles linked to the internet via their electronics are at high risks of being hacked and manipulated as explained by the experts.

 

Implications of IoT and the future:

  • Integrated world, in the future all things will be interconnected and able to communicate with each other
  • Increased innovation leads to increased personalising, IoT will enable efficient use of resources to personalise products and services to meet each individuals’ needs
  • Sustainability, IoT be able to utilise resources in a sustainable manner
  • Hi security concerns as hacking, virus and DoS forms of attacks.
  • Lack of privacy since IoT will be reliant on every bit of personal information from citizens to enable it to function effectively
  • High interactivity between machines and humans as the IoT has the potential to augment and prompt human responses unlike internet enabled technology
  • IoT ubiquitous
  • More leisure time as IoT enables to automate normal human functions all around as a consequence humans will have more free time on their hands

 

These are some of the implications I can think of and the future of IoT still remains to be seen as there is more need for more research to establish it future potential and uses.

 

 

References:

Gallagher, S. (2015, August 23). Highway to hack: Why we’re just at the beginning of the auto-hacking era. Retrieved October 09, 2016, from http://arstechnica.com/security/2015/08/highway-to-hack-why-were-just-at-the-beginning-of-the-auto-hacking-era/

The Nightmare on Connected Home Street. (n.d.). Retrieved October 09, 2016, from https://www.wired.com/2014/06/the-nightmare-on-connected-home-street/

  1. (2013, December 05). Industrie 4.0 – The Fourth Industrial Revolution. Retrieved October 09, 2016, from https://www.youtube.com/watch?v=HPRURtORnis
  2. (2014, May 27). A First Drive. Retrieved October 09, 2016, from https://www.youtube.com/watch?v=CqSDWoAhvLU

H. (n.d.). This Guy’s Light Bulb Performed a DoS Attack on His Entire Smart House. Retrieved October 09, 2016, from http://fusion.net/story/55026/this-guys-light-bulb-ddosed-his-entire-smart-house

 

 

 

 

 

Week 11: Technologies for mobile commerce and location-based services

Comment on the recent TechCrunch article “The Future Of The Web Is All About Context”.

The article discusses issues with the internet in the sense it has the ability has the ability to collect and store massive amounts of data but in its essence what is the meaning of data if there is no value gained of the data if it cannot be transformed into meaningful insights that creates value.

It states that the restricted access to data in the form of siloed data stored in social sites creates difficulties in synthesising personal information to find correlations among the very individuals. So when users type a word due to the lack of historical information related to them the web is constraint to producing random results/choices with lesser chance of presenting the right result.

The future lies in context. That is the ability for technology to collect, store, analyse and leverage the data  to produce a more informed result that is in context to the user based on his or her historical experiences that is  prior browsing activities which could be anything.

Since the inception of internet, it has revolutionised the world in many fields and increased the capacity and livelihood of people all over. The exponential growth of technological improvements has given the internet the ability to collect analyse an interpret data with increased intelligence which enables it to make informed predictions or prescriptions at the behest of the user.

 

Identify an additional example of disruptive innovation in connection with mobile commerce use

On line travel agencies have disrupted brick and mortar agents that airlines have cut down on these agencies as the cost advantage, scale and the variety of multifunctional utilities of virtual agents mutually boost the airlines advantages as well. I have chosen the online travel agent Expedia. Expedia has eight global brands which includes Expedia.com, Hotels. Com Hotwire.com, Trivago. Founded in 1996 with its diversified portfolio of businesses engaging in the tourism and hospitality industry it is market leader in in this particular field. The following is the description of the functions and offerings for a person using the Expedia mobile app.

expedia-description

expedia

 

https://play.google.com/store/apps/details?id=com.expedia.bookings

 

http://freepps.top/apps/travel-local/expedia-hotels-flights?gclid=CKGisIqCxs8CFcmVvQodT8QDOw

 

Week 10: MSYS559

Applications of the divide-and-conquer principle mention in the 1st video

On non IT application of the concept there are other social and political, and economical applications of the principle that I have come across. For example in the political sphere, especially in the democratic systems we have a spit on political parties with members who are inclined to the political parties’ policies and ideologies and when the winning party gets into parliament they rule aggressively over the others even though they all want to serve the people and purposes regardless. In military, when the United States invaded Iraq in 2003 to remove the dictatorship there, one of the first thing they did was dismantle the army and their armoury so when the army become fragmented and weak the US were able to spread their rule over the country. Also in the colonial era during the 1800s in the Pacific where I am from originally the colonisers used religion and educated a few indigenous people and then commanded them to organise the rest of the people so that they can control the others.

On the IT front from reading the literature the divide conquer is a complex algorithm paradigm that is used to solve efficient algorithms of all kinds. The divide and conquer rule can be a tool for solving conceptually difficult problems. It performs a way of breaking the problem into sub problems and of combining sub problems to original problems. So dividing and conquer it reduces the problem. The divide and conquer algorithms also make efficient use of memory caches – when a sub-problem is small enough it an all its sub-problems can, in principle be solved with the cache. The same advantage exists with regards to hierarchical storage systems as well as for multi-level cache systems

The core building block of an SOA

According to informIT (2016), the basic construct or building block of SOA is a service. The development or evolution of software engineering has overtime gone from procedural to structure to object oriented to component-based and now service development. Each evolution builds on the previous as illustrated by figure 1 below

Fig 1: Levels of abstraction

cba

Source: InformIT (2016)

What a service is

A service being identified as the fundamental block of an SOA is a logical self-contained business function which serves in the SOA through the following attributes:

Stateless: services of an SOA neither remembers the last thing they were asked to do nor worry about the next thing as services are not dependent on the context or state of other services but only on their functionality. For example on the world wide web where each request from a user or web page or URL results in the requested pages being served but not remembered later by the server when requested later.

Discoverable: A service must be discovered by potential consumers of the service. Services published are exposed by service providers in the SOA directory to be discovered and utilised by consumers

Self-describing: The SOA service interface describes, exposes and provides a point of entry to the service. The interface allows the user to discover and connect to the service without requiring the consumer to understand the technical implementation details.

Composable: SOA services are, by nature, composite. They can be composed from other services and in turn can be combined with other services produce new solutions for business.

Loose coupling: allows the concerns of application features to be separated into independent pieces. This separation of concern provides a mechanism for one service to call another without being tightly bound to it. For instance an account service has open account, authorisation and audit features representing delineations of responsibilities and three separations of concerns.

Governed policy: services are built by contract. Relationships between services are built on SLAs (Service-level agreements) promoting process consistency and reducing complexity

.

 

 Why is the generic model from the first video fits well to an SOA like the one from IBM?

The generic model which is a structured layers based on the divide-and-conquer principle in with a bottom up functionality approach. More similarly is the IBM SOA solution stack with five functional layers of with a bottom up approach. As per the video two of our lecture we see observe that both models operate on a structured layers with functional bottom up oriented.

Fig 2: SOA IBM stackibm

Source: IBM

What SOA has to do with business processes?

Business processes is a choreography or holistic approach which represent the backbone of the business. This dynamic side of the business is realised through the business processes gauging from the literature on SOA and business processes. Again looking at the IBM SOA stack a service orientation can be realised by service compositions which may be interim as and orchestration or choreography and the ability to insert human intervention and running transactions.

What ITIL can do as a tool for SOA management and governance?

ITIL is about creating IT operations and perspective for enterprises ITIL can expose the traditional IT management processes for monitoring and managing SOA applications. To provide an infrastructure capable of handling complex interactions of its services, SOA needs something like ITIL underneath which has ITIL and SOA effort underway.

ITIL enables the complete process to create the service results, to determine the role and responsibility in each process, to complete the rules in each process, and to complete the rules in each process, and to complete the process in overall lifecycle service governance. SOA governance consists of five steps:

  •         Planning
  •         Designing
  •         Implementing
  •         Controlling
  •         Evaluating

These elements and phases are mapped with service strategy, design, transition, operation and continual service improvement.

References:

By Kerrie Holley and Ali Arsanjani.
(n.d.). Informit. Retrieved October 03, 2016, from
http://www.informit.com/articles/article.aspx?p=1663690

By clicking Submit, you agree to
the developerWorks terms of use. (n.d.). SOA terminology overview, Part 1:
Service, architecture, governance, and business terms. Retrieved October 03,
2016, from http://www.ibm.com/developerworks/library/ws-soa-term1/

Divide and conquer algorithms.
(n.d.). Retrieved October 03, 2016, from
https://en.wikipedia.org/wiki/Divide_and_conquer_algorithms

Gruman, G. (2007, March 30). The
ITIL-SOA Connection. Retrieved October 03, 2016, from
http://www.cio.com/article/2439399/itil/the-itil-soa-connection.html

SOA Reference Architecture
Technical Standard : Business Process Layer. (n.d.). Retrieved October 03,
2016, from https://www.opengroup.org/soa/source-book/soa_refarch/busproc.htm

Topic, B. (n.d.). IEEE Xplore
Document – The mapping of interconnected SOA governance and ITIL v3.0. Retrieved
October 03, 2016, from http://ieeexplore.ieee.org/document/6021574/?denied

 

Week 9 Topic: Technological foundations of Business Intelligence (BI) and data warehouses

What Changes Occur in the presence of big fast , possible fast unstructured data

The size of the data is larger than tera and petabytes. The large scale and rise of size makes it difficult to store and analyse using traditional tools and applications. Big data comes from a variety of sources therefore the heterogeneity of this data creates problems for mining and analysing the data.

Finding the right analytical tool with the functionality of managing the a DW architectural system is ongoing  because of its dynamic nature therefore certain applications are developed through open or closed source DI/DW software continually to address this massive volume, velocity and variety of data.

Is the DW structure the same? if not what needs to change to be adapted?

According to Data warehouse architecture (2016),Different data warehousing systems have different structures. Some may have an Operational Data Store, while some may have an  multiple data marts. Some may have a small number of data sources and, while some may have dozens of data sources therefore it is wise to present different layers of data and warehouse architecture rather than discussing the specifics of any one system.

week-9

In general, all data warehouse systems have the above layers.

The structure has been covered by the lecturer in class already but there are or customised tools that organisations have to (out)source or apply in certain phases along the architecture. For example the Hadoop Ecosystem technologies can be applied potentially for the whole architecture. There are other accompanying and relevant applications that also perform the same function or complement Hadoop as well, some are listed below:

 

For the ETL layer  other popular  tools used for its application are :

  • IBM WebSphere Information Integration (Ascential DataStage)
  • Ab Initio
  • Informatica
  • Talend

At the Data presentation level other tools are:

 

In conclusion, it is unavoidable to stress the eminence of the Hadoop ecosystem  for BI,DW, DI and analytics as Hadoop technologies are mostly compatible with other BI technologies including its complementing technologies along each tier of the DW architecture from  Data sourcing to Data presentation (dashboards). Therefore is gaining popularity among many  relevant organisations. Also supporting the observation on the nature of data unstructured data are the three DW models discussed in our lectures and from literature supports the relevant to specific characteristics of data. Because of its open source nature there are a lot of inputs from various talented professionals from different fields in terms of code writing to amplify its ability as the veracity of data evolves with technology.

References

Data Warehouse Architecture. (n.d.). Retrieved September 26, 2016, from http://www.1keydata.com/datawarehousing/data-warehouse-architecture.html

Data Warehousing. (n.d.). Business Intelligence, 45-62. doi:10.1002/9780470753866.ch3

An open source, distributed version control and bug tracking system for Windows, Mac OS X, and Linux. (n.d.). Retrieved September 26, 2016, from http://veracity-scm.com/

 

Smartphone revolutionizing eCommerce in the underdeveloped nations – Papua New Guinea case

Aiyura-Valley-copy

Many of the developing nations are rapidly catching up with the rest of the world especially with the application of internet and digital technologies in terms of communication and business processes.

Undeniably there is a great disparity in terms of infrastructural development and other socio-economic indicators with the developed world but in terms of the knowledge of web associated technologies both  digital and electronics and their applications, the gap is getting smaller with many developing nations.

This phenomenon is largely attributed to the increasing usage of smartphones within these countries. It is not regional phenomena but observed all over the world as countries become connected through mobile coverage progressively to the smartphone age that has upped the level of the masses from communicating to doing other essential tasks of their daily lives like banking, buying and selling and paying for essential services. of course there are negatives associated with this change but for this blog I will only be restricted to the eCommerce aspects.

Papua New Guinea a developing country in the Pacific has not been susceptible to this change. Since the introduction of mobile telecommunication and the opening its doors to competition  within this industry sector has led to cheaper handsets, free sims, free sign ups, low and affordable rates of recharge or top-ups as companies compete for more customers. This has resulted in widespread transfer and/or adoption of mobile phones among the population that they have become an essential personal item for almost all Papua New Guineans. A rough estimation outs about 75% of the population are being subscribers to mobile services providers, 10% have land line telephones while the rest don’t own phones or don’t have access to them.

Before the introduction of smart phones, they used  prepaid deals  for power bills using prepaid recharges via a mobile service provider. Did banking as well on mobile phones but were limited. The introduction of smartphones have more than diversified the functions and enable them to go further in terms of the social media marketing through buy and sell pages setup  via Facebook, paying for TV subscription using mobile accounts to receiving international money transactions through banking apps. Many businesses are now reacting to this large and lucrative market of mobile phone users and are developing apps or forming strategic partnerships with mobile telecommunications companies (telcos) to push their products through this medium. Competition has further squeezed telcos into exercising  business models  based on low prices to achieve economies of scale for stable revenue streams (and profit margins) hence mobile technologies and services will get cheaper in the  future strengthening the development of smartphones  and a lot of eCommerce opportunities.

MSYS 559 Week 8: Big Data

Target Corporation – Big Data Example.

Researching for an example I can across Target Corporation (Target) one of the largest retailers in the world just behind Walmart. Target assigns every customer a Guest ID number, tied to their credit card, name, or email address and uses this information to piece together their shopping history and any demographic information collected from them or from other sources (Hill, 2012). From this background information and context, the data can be analysed to determine who to target for coupons.  Target is continuously experimenting into its big data analytics as it, like everyone, else is fed petabytes of data into its systems every day from its shoppers so its crucial function is to organise the data first before it is able to drive its business intelligence forward. It has been experimenting with a myriad of technologies like robots and video cameras to improve its processes. Below is an overview of its model:

Fig 1: Target Business Model

business-model

Source: Sidhu 2013

 

One very popular story that made Target famous back in 2012 was its successful prediction of a pregnancy. Below is a depiction of Target big data analytics based on the example of prediction of the pregnancy though the use of big data analytics.

Fig 2: Example of Business model toward a possible pregnant shopper

target-buiness-model

Source: Sidhu, 2013

 

 

Google/Nest

Collection of data , cost effectiveness, inefficiencies and optimization are some of the enormous transformation potential the NEST technology is able to deliver for utility provision. Producing exact details for components, machine usage and regulating on a large scale network of home devices to save and apply utilities efficiently gives it imminence as a valuable technological asset in the monetization strategies for both the public and private sectors at large. Its myriad of crucial and potential abilities for property owners and utilities providers will possibly see it as an integral component feature of future dwellings at the same time lifting Google’s big data ability to greater heights.

 

Other implications of Big Data in the future

  • Degradation of moral and ethical views in terms of respecting for other’s privacy and personal boundaries
  • Random government spying and intelligence collection on unsuspecting persons
  • Possible tagging and RFID of humans.
  • Humans becoming too reliant on the technology ( and lazy)
  • Personal customization of products and services
  • Augmented behaviour (prompting and inducing people to respond and react to the signals sent from machines) for example like to pregnancy example from Target

 

Implications

The implications for me personally is threatening because basically the technology in a way is trying to take away that basic human right or freedom to choose. Big data in the future we will take away our ability to think and articulate to determine what we should be choosing or not and we humans will become very reliant in the choices and results provided for us by machines.  This will continually degrade our mental capacity and human rights to make choices for ourselves. At the moment we are running to our computers to do literally all our daily chores so what about big data?

Big Data right term?

Big data is ideally the right term since massive amounts of data are continually streaming into concerned organisations 24/7 365 days of the year and it will get more intense and massive with the Internet of Things reaching its full potential.

 

Viewings/Readings :

https://innovation-engineering.co/tag/big-data

https://corporate.target.com/careers/career-areas/business-intelligence-analytics

http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/#7c10d31734c6

https://www.youtube.com/watch?v=FtzWghAekpw

 

 

 

 

 

Week 7: Cloud computing

The business models appear appropriate for the cloud

From the literature and research there are and a lot of organisations both in the private and public that have embraced and are embracing cloud technology either through an adoption of it to their systems and processes or a complete migration of the of cloud services into their business models. We constantly are reminded through the lectures of AWS, Google. Microsoft, IBM and other big tech organisations providing cloud solution platforms to meet organisations’ operational needs and many organisations have embraced a lot of these services because of their increased functionalities, scalability which translates into innovation, productivity and efficiency for many of these organisations. Basically cloud computing is another means of outsourcing business process.

Now we will focus on identifying business models that will suit the three main cloud service models Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). To make the selection process easier we see these service models at a cloud computing strategy at three levels of business this will aid in the determining which is the most suitable (business) model to apply.

A business model refers to a…”plan implemented by a company to generate revenue and make a profit from operations. It includes components and functions of the business as well as the revenue it generates and the expenses it incurs.”(Investopedia, 2016). Therefore the type of business model of an organisation will determine the type cloud computing service to apply. For public organisations is different because they provide services for citizens regardless of their ability to pay (Reference,2016).

Businesses who are engaged in the provision of utilities like electricity, water, gas etc, services which need constant monitoring in terms of metred usage and of standardising the quality. This can extend to public utilities like weather forecasting, flood, wind, water level monitoring in which dedicated and reliable real-time updates and information sharing among stakeholders is critical and needs special applications and infrastructure that can run on the cloud providers infrastructure for the to be able to deliver to multiple end users. This type of model is appropriate for IaaS where you pay as you go for the services. New Zealand government is intensively investing and migrating its IT systems and networks to IaaS for its agencies and departments since 2013.

For PaaS generally service providers usually sink their cost into their other offerings or services. It is hard to pay as you go for this layer of service since final consumers hardly see or thinks of this layer. Therefore the costs associated with this layer somehow have to be added on to infrastructure costs. For example a mobile app developer can use specialised platform services from Google or Microsoft to develop an app but the end user pays for the application and the developer pay the platform providers. Most business models which are based around virtualisation of their processes, infrastructure and software engage PaaS.

For SaaS there are a wide ranging number of services available that requires different solutions for the user. SaaS is widely used in all fields and is mostly characterised as an on-demand outsourcing resource for organisations. For instance companies who want to do accounting for their finances can either pay a subscription or license for the use of a particular accounting software or viewers wishing to extend their viewing experience can subscribe to Netflix. Many SaaS are free while premium versions are purchasable. SaaS being the final layer of the cloud based services has a myriad of offerings where the cost for IaaS and PaaS are sunken into offerings cost.

Take a look at papers 2 (CloudFlare) and 3 (Privacy Protection) and discuss what they say about cloud security.

 

CloudFlare Keyless SSL

Cloudflare is a leading firm in the developing and securing organisations securing data on networks systems riding on the cloud technology. Cloudflares invention Keyless SSL allows organisations to use its data centre locations around the world to fend off denial of service attacks on their websites. One of the threatening issues surrounding cloud computing is security against malicious attacks causing data loss or stolen data from which has very dire consequences on the companies – the worst situation for many of  these companies is to be locked out of their own systems and networks,  lose or have their encryption keys stolen,  hence denial of service. Prior to Keyless SSL organisations spent huge sums of money on hardware in data centres which didn’t work because no matter what they built their fences, they were still under attacks from denial of service attacks. Regulatory requirements also limited them from using other cloud technologies as well as existing content delivery methods. Also organisations didn’t want to commit their encryption keys to a third party because of trust and security reasons.

 

So what the keyless SSL does in a non-technical aspect connects to the server first and sends a hello message to the client through a preselection server test and selects the server which supports its client. This hello message include an exchange of numbers from server and client. After the hello message is sent a handshake takes place between CloudFlare and the client, then the client’s web browser sends a Pre-Master Secret – a combination of two shared random numbers encrypted using the server’s public key. The numbers are then passed back onto application sitting in the virtual private network connection for decryption. The client, Cloudflare’s service, backend server all have the same session key. So ance that is complete the CloudFlare data centre manages the session with the client, caching the session key and using it to encrypt cached static contents from organisations website back to the client.

 

So basically Keyless SSL grants corporate and simultaneous ownership of the same key at the same time to open and run a session at different location on the cloud with its widespread data centres.  It can store cache data temporarily on a server for a limited amount of time and then erases sending the key back to the client.

 

How can we protect our information in the era of cloud computing? – Article review.

The article stressed the importance of the information storage on decentralised systems as opposed to centralised cloud based storage which is ideal in terms of resilience and privacy

Although the highly centralised nature of the cloud system keeps low cost for companies they are highly vulnerable to attacks because of its centralised nature. This system is vulnerable as well in the sense that service can be lost when any of the service networks access paths fail and if there is a flaw in data copied then the copies carry that flaw with them.

The author suggests utilizing decentralised system of peer-to-peer system. This is where resources are pooled and mixed together instead of putting them together in one basket as is the structure with cloud storage since all the members are consuming as well as giving resources in terms of strength will be stronger than centralised.

The author also points out that with advances in fibre optic connections and mobile network will induce decentralised storage applications through the utilisation of mobile devices for isolated storage makes bits of information distributed making them difficult to attacks and data theft also information need not to be cached. This technology is predicted to grow with the advancement of technology.

Discuss Pros & Cons of New Zealand‘s Cloud First Strategy, the domestic all-of-government approach to cloud computing

 The Ministry of Internal Affairs is mandated as the lead agency for the implementation of  all public service and non-Public Service departments as well for cloud computing services . Since 2013 a total of 45 departments as well as agencies have migrated their ICT and IT systems and networks onto IaaS through partnerships with several vendors. Since then the three has been comprehensive strategies and approaches developed for public organisations’ transition and operation of cloud services with vendors such that many of the risks associated with these services are mitigated. One main example of this is the case by case approach after risk assessments for each agency.

In July of this year the government has taken up to accelerate the adoption of cloud services to its agencies signifying the government’s confidence in the cloud first strategy signifying its confidence to cloud computing. Therefore we will try to state some generic pros and cons scenarios for the policy, adoption and operation of the cloud services since most of the considerations around the use of the cloud have been thought and addressed by the information security and privacy considerations.

 

PROS CONS
·         On demand self-service – organisations will be able to use resources with interaction of service provider’s staff

 

·         Broad Network Access  – organisations can be able to access resources over networks such as the internet from a range of devices

 

·         Virtualisation of technologies are used to facilitate multi tenancy and enabling computing resources to be dynamically assigned and reallocated to customer demand hence resource pooling.

 

·         Resources can be quickly provisioned and released, sometimes automatically based on demand. Organisations can easily increase and decrease their use of cloud service to meet their needs.

 

·         Organisations pay only for the resources they actually use within the service.

·         Offshore hosting regulatory requirements need to be assessed since overseas countries

·         Legal jurisdiction. The legal complexity makes it risky. Data sovereignty will be a problem if it is not solved appropriately.

 

·         Third party services hosting manages the resources for and on behalf of the organisation therefore the organization does not have control over infrastructure and security of their own data and IT infrastructure resources

 

·         Multiple suppliers of cloud services in the form of Datacom (IaaS), IBM(IaaS) and Revera (IaaS) means different requirements when dealing with each service providers and the notion. Also included Microsoft has provided Office productivity as a service OPaaS.

 

·         Centralised virtual systems are prone to attacks than decentralised systems.

 

 

 

 

Readings:

https://www.reference.com/business-finance/public-sector-organization-5b35cd6b0989a481

http://link.springer.com/article/10.1007/s12599-009-0071-2

 

file://galaxy.its.waikato.ac.nz/HOME/Downloads/2011%20Cloud_Computing_for_Enterprise_Architectures.pdf

 

http://eprints.leedsbeckett.ac.uk/648/1/vchang_ccgrid_2010_poster.pdf

 

Dictionary.com, “business model,” in Investopedia.com. Source location: Investopedia Inc.

 

http://dictionary.reference.com/browse/business model .

 

https://www.ict.govt.nz/assets/ICT-System-Assurance/Cloud-Computing-Information-Security-and-Privacy-Considerations-FINAL2.pd

 

https://www.ict.govt.nz/guidance-and-resources/information-management/requirements-for-cloud-computing/

 

https://www.ict.govt.nz/guidance-and-resources/information-management/requirements-for-cloud-computing/

 

https://www.ict.govt.nz/guidance-and-resources/information-management/requirements-for-cloud-computing/