Introduction to Computing

In: Computers and Technology

Submitted By RiteshSarkar
Words 2175
Pages 9
Introduction to Computing
Introduction
For couple of years, futurists and computer scientists have provided arguments that a collection of evolving technologies—miniature computers named "smart dust" or motes, wireless telecommunication, software agents that are intelligent, antennas, stretchy electronics, and micro-level power systems— embrace the potentiality to convert the work and daily life (Farias et al. 2012). Anyone who eagerly willing in the social impacts and insinuation of new technologies is making intelligence out of this would impose a significant challenge to him. Such type of changes qualitative in nature requires something very different to the conventional tools of analysis for the engineer or economist.
Actor-Network Theory (ANT): its definition and suitability in computing studies
Actor-Network Theory had emerged from the researches done by Michel Callon and Bruno Latour. The progressive constitution of the network has been described by their analysis on a collection of negotiations where the identities are assumed by not only the human but with the non-human actors as well. In this context, representation is comprehended in its political facet, as a method to delegate (Fenwick et al. 2012). The most significant among these negotiations is the "translation," an interaction multifaceted in nature where the actors (1) build up the definitions and meanings that are common, (2) define representatives, and (3) co-operate each other in the quest of objectives that are individual and cooperative.
Again, some researchers opined that Actor-network theory may be treated as a methodical way to facilitate the infrastructure usually left out of the "heroic" description of achievements in the field of science and technology.
Actor-network theory assumes that the whole world is filled up with of cross entities that contains key elements based on both…...

Similar Documents

Cloud Computing

...September 2012 Cloud Computing Content Page 1. Brief of research project 2. Map of a Cloud Computing 3. Introduction 4. Body 5. Conclusion 6. Bibliography NFORMATION SYSTEMS III (MODULE B) Databases Call for Term Research Papers Due Date: Thursday 6 September 2012 Write a research paper between 1000 – 1500 words on any of the given topics. NO PLAGIARISM WILL BE TOLERATED A Hard copy is required. Topics to be considered are the following two areas only: * Temporal Database Systems * Cloud Computing Your paper should consist of an Abstract, an Introduction, a Body, and a Conclusion. It should be written in accordance with the rules in the Information Systems - Communications Module. NO PLAGIARISM WILL BE TOLERATED! For more details please contact your lecturer. 1 Introduction The Cloud can be described as a computing centre, for anyone with a network connection. Access to applications and data anywhere you go anytime from any device is the potential outcome of a Cloud. The consumer-level Cloud is a good starting point for business and sites like Twitter and Facebook act as digital repositories for data and we can access this data from any internet devices, from our iPhones to our desktop computers. Cloud computing is a platform for the next upcoming generation of the Internet. In my essay clouds will be defined and explained as in business benefits of cloud computing, and outlines its major components. A Cloud Computing platform dynamically...

Words: 1290 - Pages: 6

Introduction to Cloud Computing

...The beauty of Cloud Computing lies in the ability to visualize computing as a utility. It has the potential to transform a large part of IT industry, by providing software as a service and shaping the way hardware is designed and purchased. Upcoming developers with innovative ideas for new Internet services no longer require the large capital investments in hardware to deploy their services or the human expense to operate it. They need not be concerned about over provisioning for a service whose popularity does not meet their expectations, thus wasting costly resources, or under provisioning resources for a service which becomes wildly popular, thereby missing out on revenue. Furthermore, companies with large batch-oriented tasks can get results quickly as their programs can scale, since with cloud computing using 1000 servers for 1 hour costs no more than using 1 server for 1000 hours. Such elasticity, without large scale investment is unprecedented in the history of IT. The National Institute of Standards and Technology (NIST) defines five basic characteristics of cloud computing, three service models and four deployment models. The five basic characteristics are: • On Demand Service: The consumer can provision computing capabilities, such as server time and network storage, as and when needed without requiring human interactions with each service provider. • Comprehensive Network Access: Capabilities that are available over the network can be accessed through standard......

Words: 817 - Pages: 4

Cloud Computing

...Introduction VoIP has its advantages, but some disadvantages are since VoIP depends on your broadband connection, if the connection goes down, your phone line goes down as well. The formula is simple: with VoIP, no Internet means no phone. This can be very annoying at home, and catastrophic for your business. But the biggest concern is security. Security is a main concern with VoIP, as it is with other Internet technologies. The most prominent security issues over VoIP are identity and service theft, viruses and malware, denial of service, spamming, call tampering and phishing attacks. Analysis of Cloud Computing In a cloud computing system, there's a significant workload shift. Local computers no longer have to do all the heavy lifting when it comes to running applications. The network of computers that make up the cloud handles them instead. Hardware and software demands on the user's side decrease. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. There's a good chance you've already used some form of cloud computing. If you have an e-mail account with a Web-based e-mail service like Hotmail, Yahoo Mail or Gmail, then you've had some experience with cloud computing. Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn't exist......

Words: 1597 - Pages: 7

Computing

...Capabilities of computing: The continuous of computing technology development and evolving will always enable new capabilities; let us discuss some of these capabilities. Data Access: Computing technology gives the ability to access a huge amount of data by various types of people. Each company today has a big database that has the necessary records for the employees or customers. For example, any hospital has the information of the patients with their medical historical health and medicines taken and so on and even their personal information, this helps the employees to access the patients data easily and from anywhere. Data capture: computing made it very easy to see and utilize information and data that was very difficult to obtain before. As example banking systems enables people to check their bank statements and status such as what amount of money was withdrawal, when and where, being able to retrieve such data will help the customer to be aware of how he is spending his money. Processing speed: Computing forced the activities to be done very quickly in order to success. As example transaction of confirming a room booking in hotel should be done very fast, because many transactions to reserve rooms in this hotel can be done in parallel so if confirming the room does not done quickly others may take the room. Performance of storing a huge amount of data: computing made it possible to store a big amount of data in acceptable time, because all this available data that...

Words: 1712 - Pages: 7

Computing

...CHAPTER ONE GENERAL INTRODUCTION 1. INTRODUCTION Real estate can be described as Property consisting of land and the buildings on it, along with its natural resources such as crops, minerals or water, immovable property of this nature, buildings or housing in general. Estate management is the operation, control, and oversight of commercial, industrial or residential real estate, usually on behalf of an owner. Management indicates a need for the property to be cared for, monitored and accountability given for its usable life and condition. This is much similar to the role of management in any business. This involves the processes, systems and manpower required to manage the life cycle of all acquired property as defined above including acquisition, control, accountability, responsibility, maintenance, utilization, and disposition. One important role of a Property Manager is that of liaison between the Owner of record and the actual tenant/lessee, providing a buffer for those owners who desire to distance themselves from their tenant constituency Other roles of the Property Manager include gathering data on tenant payment habits as well as maintaining and keeping records about tenant contacts, lease terms, property features, security deposits and payment history. 1.2 STATEMENT OF THE PROBLEM Property Managers encounter a number of problems when performing their role of estate management. These are discussed in......

Words: 849 - Pages: 4

Cloud Computing

...CLOUD COMPUTING Prepared for: James Smith DICE Prepared by Leslie Joshua Conestoga College December 12th 2013 Table of Contents Page Introduction........................................................................................................ 1 What is Cloud Computing....................................................................................1 Types of Cloud Service Models.......................................................................2 Types of Cloud Service Deployment Models...................................................2-3 What are the Benefits?........................................................................................3-4 What are the Downsides?....................................................................................4 What is the Future of Cloud Computing...............................................................5 Conclusion.............................................................................................................5 References.............................................................................................................6 List of Illustration 1. Types of Deployment Models..............................................................................3 2. Expected cloud computing Figure growth from 2011 to 2016.............................5 3. Flexibility of cloud computing...............................................

Words: 1715 - Pages: 7

Cloud Computing

...[pic] Cloud computing in general isn’t a term that can be defined with one specific definition as different people from all over the world each have a different understanding of the term cloud computing. Hence the best way to effectively explain the term is to explain it using different examples. Some people believe the term to mean another way of describing IT (information technology), others use it to mean any computing service provided over the Internet or a similar network; and some define it as any bought-in computer service you use that sits outside your firewall. As you can seem, there is no straightforward definition for the term and therefore best way to understand it is to learn about how it works. The main point of cloud computing can be summed up with this one short sentence: “Access your data anytime and anywhere” What is the difference between cloud computing and old fashioned personal computing? An important thing that differentiates cloud computing to the now old fashioned and declining personal computing is the location where all the data is stored. In cloud computing the data is stored on a remote database operated by a third party which can be accessed from most places, as the main requirement to access this cloud storage is only an Internet connection. In personal computing, all data is stored on a hard drive or another form of data storage device such as a usb drive, and once the data storage limit is reached a bigger hard drive...

Words: 1450 - Pages: 6

Cloud Computing

...Executive summary | 2 | Literature review | 3 | Introduction | 4 | Overview of Zenith Infotech | 5 | Process- Marketing and Pricing strategy | 6 | Overview of Zenith Infotech | 7 | Learning | 8 | Future scope | 9 | References | Executive summary Time-to-market, more flexible support for business strategies by IT, and faster response time to competitive conditions are combining to accelerate cloud computing adoption today. This report aims to learn the major aspects of IT sales especially in cloud computing, which involves understanding the technologies involved in the functioning of an IT business model. For this purpose, various articles were referred and few corporate visits were done within the span of two-week of the SLIP. The report discusses various information about overview of top IT companies, types of cloud, virtualization, Saas, Paas, DRaas, Capex, Opex, Marketing and pricing strategies involved in cloud solutions. Our professional mentor was from Zenith Infotech. Zenith Infotech is an international company that specializes in delivering innovative business continuity and cloud computing solutions for IT service providers. The report further discusses Zenith’s products,learnings imbibed from the programme and the future scope of cloud computing in detail. Literature Review 1.Identifying Cloud Computing Security Risks (February 2011) -Paul Wooley Tyco Electronics Abstract Cloud computing services including Infrastructure as a......

Words: 3858 - Pages: 16

Computing

...H & Z Khusa Collection Computing III project (2014 History and Introduction to the Company H & Z Khussa Collection offers exclusive HANDMADE KHUSSA's designed by Hina Fatima and Zara Fatima for girls/ladies (a sole business proprietor). Customized Khussas & Matching Clutches are also available. The business was started with a very low initial capital but within a few years due to the excellent quality of their products the demand grew enormously and now they hold business in several exhibitions and operate online globally too. Statement of problem (Maham Fatima) Older Method Used In the past the business used the manual system of record keeping. The shopkeeper was responsible for making these sales records. He had been provided with entry registers (journals), where he records and maintained the daily sale structures and transactions. The shopkeeper each time makes an entry on his book whenever a transaction is carried out, there is a change in the stock level or a receipt for a certain customer is being made.   The journals were divided into separate sections for receipts, payments, wages and superannuation, bank reconciliation, inventory and others. He recorded the business transactions manually in the appropriate sections for each month.  All transactions were recorded in one of these journals. It recorded the flow of income and expenses and was practical for a small business just starting out.  The cash disbursements journal records the...

Words: 4251 - Pages: 18

Cloud Computing

...IIIT, Hyderabad Cloud Computing for E-Governance A white paper Abstract The worldwide revolution in Internet is changing our lives in terms of the way we work, learn and interact. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. Also, the increasing generalization of technology access by citizen and organizations brings expectations and demands on government. At the same time, governments are also proactive in this domain and are planning new ways of interacting, improving services, optimizing processes and revitalizing democracy by spending amount on IT. It aims to deliver more interactive services to citizens and businesses through E-Governance. For this, cloud computing may lead to significant cost savings. It entails use over the Internet of computing hardware and software infrastructure and applications that are remotely hosted. In this white paper, we describe how this newly emerged paradigm of cloud computing can be helpful for E-Governance. IIIT, Hyderabad January 2010 CLOUD COMPUTING FOR E-GOVERNANCE January 1, 2010 Table of Contents Executive Summary....................................................................................................................................... 3 1. E-Governance Requirements .......................................................................

Words: 4341 - Pages: 18

Cloud Computing

...Cloud Computing Cover Letter Abstract Introduction: 1- Definition of cloud Computing and examples of cloud computing 2- Brief of the history of cloud computing 3- Explaining the benefits and the harms of cloud computing 4- Focus on the security issues Collected Data: 1- Benefits of Cloud Computing. a. Cost-Effective (provider). b. Reliability (user). c. How to make the mentioned benefits better. 2- Harms of Cloud computing. a. Security issues. b. Maintenance. c. Lack of support. d. How to fix these issues. Conclusion: 1- Summary. 2- Answer the question of the introduction briefly by connecting the dots from the collected data. References Figures and Table Abstract Cloud Computing is the new generation of this era. Cloud computing is a controversial subject for the users because of the benefits and the harms. However, there is a contradiction in the users’ about using the cloud computing or not. On the other hand, the programmers and the providers finds cloud computing is beneficial Innovation. Cloud Computing is basically a non-physical storage space for the users and a physical storage space for the provider. The users can use the cloud with limitations restricted by the provider. The providers have a complete control over the cloud which fears the users over their data. On this analytical report, I try to give some reasonable solutions for this issue. Cloud Computing eases......

Words: 555 - Pages: 3

Cloud Computing

...Cloud Computing for Beginners http://www.techno-pulse.com/ Visit Techno-Pulse to learn more about Cloud Computing http://www.techno-pulse.com/ Content • What is Cloud Computing? • • • • • • • • Dynamism Abstraction Resource Sharing What are Cloud Stacks? What is IaaS? What is PaaS? What is SaaS? Cloud Resources http://www.techno-pulse.com/ What is Cloud Computing? In late 90s or even now, ask any web developer, solution architect or anyone involved in web application development in any capacity: Which symbol do you use to represent Internet on numerous white-board meetings? Obviously the most widely used metaphor for Internet was/is cloud. Cloud computing has derived its name from the same line of thinking. Cloud Computing is a style of computing which must cater to the following computing needs: 1. Dynamism 2. Abstraction 3. Resource Sharing Dynamism Your business is growing exponentially. Your computing need & usage is getting bigger with every passing day. Would you add servers & other hardwares to meet the new demand? Assume, Recession is back & your business is losing customers. The servers & hardwares you added during last quarter’s peak season is now idle. Will you sale them? Demand keeps on changing based on world/regional economy, sometimes seasonal traffic burst as well. That’s where Cloud Computing comes to your rescue! You just need to configure & your provider will take care of fluctuating demand. Abstraction Your business should focus on......

Words: 1016 - Pages: 5

Itm425: Introduction to Computing

...barriers that once restricted its use have been overcome.   References B2BSolutions. (2005). Wireless: Where have all the cables gone?. Retrieved November 21, 2010 at: http://www.b2bsolutions.co.nz/files/Wireless%20Terminology.pdf Bluetooth SIG, Inc. (2010). Developing Bluetooth Technology Solutions: The Basics. Retrieved November 26, 2010 at: http://bluetooth.com/English/Technology/Pages/ Basics.aspx Cisco Systems Inc. (2006). Wireless Services Take To The High Seas. Retrieved November 21,2010 at: http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6521/ prod_case_study0900aecd806700a9_ps6305_Products_Case_Study.html CNet Wireless Resource Center. (2007). Your Guide To Cutting The Cord On Computing. Retrieved November 22, 2010 at: http://www.cnet.com/1990-7363_1-6361076-1. html?tag=nav Coustan, D., Strickland, J. (2010). How Smartphones Work. Retrieved November 24, 2010 at: http://communication.howstuffworks.com/smartphone3.htm Mitchell, B. (2010). Wireless Standards - 802.11b 802.11a 802.11g and 802.11n. Retrieved November 21, 2010 at: http://compnetworking.about.com/cs/wireless80211/a/ aa80211standard.htm Marshall, B., Tyson, J., Layton, J. (2010). How Cell Phones Work. Retrieved November 24, 2010 at: http://electronics.howstuffworks.com/cell-phone9.htm Marshall, B., Wilson, T. (2010). How WiFi Works. Retrieved November 24, 2010......

Words: 1299 - Pages: 6

Computing

...join two networks logically or physically using network hardware or software. While establishing connections, gateways use different protocols with topologies. Also gateways set a point of entrance to another WAN or LAN. Mainly routers are used in connecting two or more networks as gateway and it is known that network gateways can operate in different type’s layers on the OSI model. (WEBOPEDIA, 2012) 6.4 The explanation outlines and explains network security administration procedures. Network security is very important part of the network administration which helps to protect the entire network and managing the entire network by using different security methods like anti-viruses, firewalls, spywares, etc. it is the era of computing every work which can be done with the help of computers. Nowadays every user wants to save and protect his data into the computer by using the username and password, firewalls, anti-viruses, spywares, etc. with the help of these security software. Users can protect the data from the unwanted files, viruses, hackers, etc. by using the security purposes. Generations, Distribution and storing of encryption keys: In this method of protecting the data from the outside interference one can change the format the data into any other language or we can say one can change the data into code and then he can easily transmit the data over the network because if the data is in the form of codes then no one can access the data and modify the......

Words: 12246 - Pages: 49

Cloud Computing

...Cloud Computing: A Brief Introduction The origin of the term cloud computing is obscure, but it appears to derive from the practice of using drawings of stylized clouds to denote networks in diagrams of computing and communications systems. The word cloud is used as a metaphor for the Internet, based on the standardized use of a cloud-like shape to denote a network on telephony schematics and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. In the 1990s, telecommunications companies who previously offered primarily dedicated point-to-point data circuits, began offering virtual private network (VPN) services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they saw fit, they were able to utilize their overall network bandwidth more effectively. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider and that which was the responsibility of the users. Cloud computing extends this boundary to cover servers as well as the network infrastructure.[10] The underlying concept of cloud computing dates back to the 1950s; when large-scale mainframe became available in academia and corporations, accessible via thin clients / terminal computers. Because it was costly to buy a mainframe, it became important to find ways to get the greatest return on the investment in them, allowing multiple......

Words: 1672 - Pages: 7