If you are having trouble viewing this email, click here to view this online

 

VOLUME 33

   ISSUE 33

22 April 2014

Article of the Month Around the World

The Evolution of Computing-Part 2

 

In fact with the dawn of Cloud computing we can see that this vision has moved from a probability to a definite possibility. Cloud computing, in a broad concept, is the provisioning of services over the internet. At the end of the month, the users of such services are billed for an exact quantum describing the amount of usage of the said services (that the user had prescribed for). Therefore in Cloud computing resources (such as hardware, Applications, computing power, data storage and/or platforms) are available to users, without them actually knowing the exact location of where these services originate from.

 



  In fact with the dawn of Cloud computing we can see that this vision has moved from a probability to a definite possibility. Cloud computing, in a broad concept, is the provisioning of services over the internet. At the end of the month, the users of such services are billed for an exact quantum describing the amount of usage of the said services (that the user had prescribed for). Therefore in Cloud computing resources (such as hardware, Applications, computing power, data storage and/or platforms) are available to users, without them actually knowing the exact location of where these services originate from
The advantage of this paradigm is multifaceted. One, in its very nature it allows scalability. This enables a company to request the services for one to a million users in matter of days. Thereby allowing, for example, a company to take into account when their business has peek or cyclical sales and plan their resources allocations accordingly. Such that when more users are required, by just requesting for additional resources, the company can make arrangements for such.
Second, it allows innovation and agility. Typically companies cannot take advantage of the full potential that IT brings. As IT consistently evolve, systems are generally upgraded in a slower pace ( due to restriction in funding/budgeting). Where major feature upgrades are done about every couple of years, which results in the company needing to do an overhaul of the current system, which would have a companywide impact. With the concepts of economies of scale, the sourcing company would be able to provide cutting edge IT services to companies that require such cutting-edge services, in mere minutes.


Third is visible reduction in upfront IT capital expenditures. As company would only bear a utility expense in the form of periodic subscription to a service. As such making a shorten deployment effort by the company.
At present, in every company, there have always been notable gaps between technology investment and ensuring rise in productivity. Therefore it can be seen that this style of utility computing could have significant impact for small to midsize companies in certain industries.
The utility computing model is all about using technology only when you need it, for as long as you need it. I think that this shift to utility computing is inevitable, and it is progressively becoming true. As this is a convenient, flexible and economical alternative to the traditional large scale data centre maintained within the organization. We must not forget that when Edison’s first demonstrated his incandescent light bulb on December 31, 1879, in Menlo Park he had stated: "We will make electricity so cheap that only the rich will burn candles” 7. Because of this audacious thought we can now say, without a shadow of a doubt, that a world without the profession of electricity as a service cannot be envisaged.
References:
1. Paul E. Ceruzzi, 1998 Massachuestte Institute of Technology, A History of Modern Computing, Second Edition.
2. I. Bernard Cohen, 1999, Massachuestte Institute of Technology, Howard Aiken: portrait of a computer pioneer.
3. Nicolas Carr, 2008 W.W.Norton & Company Inc, The Big Switch.
4. google, retrieved 2013, May 9 from http://en.wikipedia.org/wiki/Moore's_law
5. google, retrieved 2013, May 10 from http://en.wikipedia.org/wiki/Utility_computing
6. google, retrieved 2013, May 10 from http://computer.howstuffworks.com/utility-computing1.htm
7. Wikipedia, retrieved 2013, May 9 from http://www.webcitation.org/5umTbqS3d


 

First part of this article was published in March issue

Author:

Kumar is the Secretary to ISACA Sri Lanka Chapter and as an information system audit and assurance professional, is currently working as an Information Systems Auditor at SJMS Associates, an esteemed firm of Chartered Accountants independent correspondent firm to Deloitte Touche Tohmatsu
 

 

 

 

 

 

 

 

 


 

   
   
   
 

 

   
   
   
   
   
   
 

 

   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
 

 
  
  IHeartbleed maliciously exploited to hack network with multifactor authentication
  

“. . . Demonstrating yet another way the catastrophic Heartbleed vulnerability threatens users, malicious hackers were able to exploit the bug to successfully bypass multifactor authentication and fraud detection on an organization's virtual private network (VPN), security researchers said.. ..."
 

  Dangerous spam targets Brits with fake Easter offers
  

'....A large amount of religious scams have also been included in this year’s Easter scam basket in the UK, with many being invited to discover God’s plan for their life in one moment and tempted with Viagra offers the next. Participating in dubious surveys for Easter goodies or rewards may also relieve victims of their personal details and savings right before the holidays.....'

Microsoft Office: 4 Changes, Explained

   

  

'....Microsoft maneuvers to keep Office on top, touting data analysis power, tweaking office 365, and more. What do the moves mean to you?.....'

Millennials Don't Care About The Internet: Secrets Of The Biggest Customer Generation Ever

  

'.... You’ll sooner see a boomer excited by a flush toilet than a millennial impressed by the internet. The customer service and the customer experience implications of this reality are major.......'

Heartbleed Means HealthCare.gov Users Must Reset Passwords

''....  Federal officials are telling Obamacare website account holders to reset their passwords, following revelations of a bug that could allow hackers to steal data.

Officials earlier in the month said the government's main public sites, including HealthCare.gov, were safe from the risks surrounding Heartbleed -- faulty code recently found in a widely-used encryption tool......”

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in March 2014
 
  
  Fake
 Hacked
 Other
   
  Hacked Sites
 

 Statistics - Sri Lanka CERT|CC

Alerts

Red Hat Linux Containers: Not Just Recycled Ideas

'.... Red Hat and its partner, Docker, bring DevOps characteristics to Linux containers, making them lighter-weight vehicles than virtual machines for cloud workloads........'

Wikipedia in Your Salad (Spam)

'....Spammers are constantly trying new ways to bypass filters to deliver spam. One of the more typical methods is the use of word salad spam, wherein spammed messages are filled with random words. We recently noticed a spike in salad spam that’s circulating in the wild. Aside from the sudden increase, what’s interesting about this particular spam run is that it uses exact sentences copied from Wikipedia articles......’

CryptoDefense developers "forget" decryption key on victims' computer

'....A new piece of ransomware is targeting gullible users, but its developers have made a critical mistake that should allow users to decrypt the affected files without paying the demanded ransom......'

Cryptolocker infection forces chamber of commerce to spend $5,000 on new PCs

 

 

'......A chambers of commerce in Vermont has found itself $5,000 (APS3,000) out of pocket after having to replace computers, servers and backup drives infected by the rampaging Cryptolocker malware.......'

Oracle Issues Heartbleed Updates

 

 

'.....Oracle issued an advisory today listing both security updates and detailing what is known and unknown about the Heartbleed vulnerability's impact on Oracle products..”

 
Notice Board
  Training and Awareness Programmes - March 2014
  
DateEventVenue
- 4th April- 6th April Training Programme on Khan academy project National Institute of Education
-

 

7th- 9th April Script writing for " e-Thaksalawa" Learning Management System for Grade 7-8 ICT laboratory, Ministry of Education
- 22nd-25th April Content development for " e-Thaksalawa" Learning Management System for Grade 7 ICT laboratory, Ministry of Education
21st- 25th April Content development Training programme with the "Alice" software ICT laboratory, National Institute of Education

Brought to you by: