Questions and Answers

Q1. What are the different types of softwares? Explain each type.

 Types of Softwares:-

1. Systems Software

2. Application Software

3. Embedded Software

• Systems Software:-

1. Designed to operate and control the Computer Hardware.

2. Designed to provide a platform for running Application Software.

3. May also include Software Development tools (like a Compiler, Linker or Debugger).

• Application Software:-

1. Helps a computer to perform useful tasks beyond the running of the computer itself.

2. Examples include Accounting Software, Enterprise Software, Graphics Software, Media Players, and Office Suites.

• Embedded Software:-

1. Software written to control machines or devices that are not typically thought of as computers.

2. Specialized for the particular Hardware that it runs on

3. Time and Memory Constraints.

4. Mostly Initiated/Controlled not through Human Interface, but through Machine Interface

Q2. What is operating software and what are its applications??

Operating software (OS)

An operating software/system or OS is a software program that enables the computer hardware to communicate and operate with the computer software. The operating system is the most important program that runs on a computer. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers. Application programs usually require an operating system to function.

An understanding of how a user uses a System.

For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers.

Examples of popular modern operating systems include Android, BSD, iOS, GNU/Linux, OS X, QNX, Microsoft Windows,Windows Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.

The following schematic explains the entire function of the Operating Software (Operating System)

Operating software types As computers have progressed and developed so have the operating systems. Below is a basic list of the different operating systems and a few examples of operating systems that fall into each of the categories. Many computer operating systems will fall into more than one of the below categories.

 GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. See the GUI definition for a complete definition. Below are some examples of GUI Operating Systems.

 System 7.x

 Windows 98

 Windows CE

 Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and different times. See the multi-user definition for a complete definition for a complete definition. Below are some examples of multi-user operating systems.

 Linux

 Unix

 Windows 2000

 Multiprocessing - An operating system capable of supporting and utilizing more than one computer processor. Below are some examples of multiprocessing operating systems.

 Linux

 Unix

 Windows 2000

 Multitasking - An operating system that is capable of allowing multiple software processes to run at the same time. Below are some examples of multitasking operating systems.

 Unix  Windows 2000

 Multithreading - Operating systems that allow different parts of a software program to run concurrently. Operating systems that would fall into this category are:

 Linux

 Unix

 Windows 2000

Application of Operating Software

 Personal Computer

 Mobile phone

 Military Purposes

 Video Games

 Supercomputers

 Web-servers

Q3. What are the future trends in computer Hardware? What is Moore's law, and explain its significance in development of computers.

Moore’s Law states that:

1) The power of microprocessors doubles every 18 months

2) Computing power doubles every 18 months

3) The price of computing falls by half every 18 months

The exponential increase in processing power and the decrease in cost of producing microprocessors since the 1960s has resulted in rapid development in computer hardware over the past 40 years. It is also used as by the semi-conductors industry as a baseline for long term growth and to set targets their research and development activities

Based on the above trends in computer Hardware, we can predict the following future trends: 1) Processing speed: Increased exponentially over the past 60 years. Roughly, increases by 100% every 18 months.

2) Size: Size has been getting smaller and smaller. The early computers used to be large enough to fill an entire room. Today’s computers can be easily carried in the palm of a hand. Computers which are smaller and lighter tend to be more comfortable for the user. This is likely to be a driver for design of lighter computers in the future.

3) Mobility: Over the past 10 years, with the advancements in microprocessors have meant many handheld phones and tablets are now performing functions traditionally performed by computers. Due to the increasing advances in communication technologies, mobile devices are well on the way to replace desk computers as the most used devices to access the internet.

4) Cost: Only Government and large institutions were able to afford them. Over the years, the price has steadily fallen. The cost of computer hardware will keep on declining, even more so vis-à-vis computer software, and this will result in increased penetration for computers throughout the world.

Questions

Q1- WHAT IS NETWORKING AND WHAT ARE THE USES OF NETWORKING IN BUSINESS APPLICATIONS?

Ans:

Networking: Networking is a a collection of autonomous computers interconnected by a single technology. Computers are able to exchange information. It is a practice of linking two or more computing devices together.

(1) Client-Server Model:

For smaller companies, all the computers are likely to be in a single office orperhaps a single building, but for larger ones, the computers and employees maybe scattered over dozens of offices and plants in many countries. Nevertheless, a sales person in Headquarters of a company might sometimes need access to a product inventory. Networking maybe used to join the individual networks at different sites into one extended network.In other words, the mere fact that a user happens to be far awayfrom his data should not prevent him from using the data.

This whole arrangement is called the client-server model. It is widely usedand forms the basis of much network usage. The most popular realization is thatof a Web application, in which the server generates Web pages based on its databasein response to client requests that may update the database. The client-servermodel is applicable when not only the client and server are both in the same building (andbelong to the same company), but also when they are far apart. For example,when a person at home accesses a page on the World Wide Web, the same modelis employed, with the remote Web server being the server and the user’s personalcomputer being the client. Under most conditions, one server can handle a largenumber (hundreds or thousands) of clients simultaneously.

(2) Communication Medium:

A computer network can provide a powerful communication medium among employees. Virtually every company that has two or more computers now has email (electronic mail), which employees generally use for a great deal of daily communication.

Employees at distant locations can see and hear each other as they hold a meeting. This technique of Computer Networking is a powerful tool for eliminating the cost and time previously devoted to travel.

Desktop sharing letsremote workers see and interact with a graphical computer screen. This makes iteasy for two or more people who work far apart to read and write a shared blackboardor write a report together. When one worker makes a change to an online document, the others can see the change immediately, instead of waiting severaldays for a letter. Such a speedup makes cooperation among far-flung groups ofpeople easy where it previously had been impossible.

More ambitious forms ofremote coordination such as telemedicine are only now starting to be used (e.g., remote patient monitoring) but may become much more important.

(3) E-commerce:

A third goal for many companies is doing business electronically, especiallywith customers and suppliers. This new model is called e-commerce (electroniccommerce) and it has grown rapidly in recent years. Airlines, bookstores, andother retailers have discovered that many customers like the convenience of shoppingfrom home. Consequently, many companies provide catalogues of their goodsand services online and take orders online. Manufacturers of automobiles, aircraft,and computers, among others, buy subsystems from a variety of suppliersand then assemble the parts. Using computer networks, manufacturers can place orders electronically as needed. This reduces the need for large inventories andenhances efficiency.

Q2 – What are the different parameters according to which computer networks can be distinguished? Categorize computer networks according to these parameters.

Ans. Computer networks can be distinguished according to their architecture, topology or geography/scope. These parameters are described below:

- Architecture-The architecture of a network describes its logical arrangement or configuration. It basically describes how the client, who is the requester of services, communicates with the server, who is the provider of services.

- Topology– The topology of a computer network describes its physical arrangement in terms of how the nodes of the network connect with each other, to a network backbone or to a central hub. It basically describes the structure of the network in terms of the physical connections and patters used to connect the network entities.

- Geography/Scope – This element describes how the various nodes of a network are distributed and how distant they are from each other. It describes their relative geographical separation.

Categorization of networks according to these parameters is done below:

Division according to architecture: In terms of the architecture, computer networks can be divided as below

 Two – Tier(or client tier) – This is the simplest architecture where a client is directly connected to a data server and the client holds the application logic

 Three –Tier – This architecture has an additional application server between client and server tiers and this application server hosts the processing logic thereby freeing client of that responsibility  Multi – Tier – In this architecture, the application as well as the data server tiers are divided across multiple servers which may or may not be present at geographically different locations.

 Peer to Peer – In this architecture, there are no separate clients or servers. A client can act as both the client as well as a server at different times.

Computer Networks

Architecture Geography Topology Wise Wise Wise

Peer Two Three Multi to Ring Star Bus Mesh Tree LAN MAN WAN Tier Tier Tier Peer

Complete Incomplete

Division according to topologies: In terms of the topology, computer networks can be divided as follows

 Bus – The simplest topology where all nodes are connected to a single network backbone

 Ring – All the nodes are connected to two adjacent nodes and hence they together form a ring

 Star – Every node is connected to a central network hub

 Mesh – All nodes have direct routes to all other nodes. In an incomplete mesh, some redundant routes may be pruned

 Tree – The nodes are arranged in a tree like manner where each node is connected to a subtree of nodes or is a terminal node

Division according to scope/geography: In this classification, networks may be divided as follows

 LAN (Local Area Network) – Here all the nodes of a network are present in either the same building or in the same campus. The nodes are close enough to be connected via direct cables originating from routers

 MAN (Metropolitan Area Network) – In this scope, the nodes is present in different buildings across a wider area and special communication systems like private networks or virtual private networks are used. Computer systems in a set of offices in a city is an example of this type  WAN (Wide Area Network)- In this scope, the nodes are wide apart with even entire continental spaces or oceans may separate them. Hence in this type, satellite communication and other long distance modes of connecting to the network are used.

Q3- What is wireless technology ?What are various emerging trends in wireless technology ? Discuss.

Different methods and standards of wireless communication have developed across the world, based on various commercially driven requirements. These technologies can roughly be classified into four individual categories, based on their specific application and transmission range.

and infrared ininfrared

1) Personal Area Network (PAN)

A Personal Area Network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The reach of a PAN is typically a few meters. PAN’s can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet.

Personal area networks may be wired with computer buses such as USB and FireWire. However, a Wireless Personal Area Network (WPAN) is made possible with network technologies such as Infrared (IrDA) and Bluetooth.

Bluetooth: Bluetooth is an industrial specification for wireless personal area networks (PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect and exchange information between devices such as personal digital assistants (PDAs), mobile phones, laptops, PCs, printers, digital cameras and video game consoles via a secure, globally unlicensed short-range radio frequency.

Bluetooth is a radio standard and communications protocol primarily designed for low power consumption, with a short range (power class dependent: 1 metre, 10 metres, 100 metres) based around low-cost transceiver microchips in each device.

Infrared (IrDA): The Infrared Data Association (IrDA) defines physical specifications communications protocol standards for the short range exchange of data over infrared light, for typical use in Personal Area Networks.

Some common applications of infrared technology are listed below.

1. Augmentative communication devices

2. Car locking systems

3. Computers a. Mouse b. Keyboards c. Floppy disk drives d. Printers

4. Emergency response systems etc.

2) Local Area Network (LAN)

A wireless LAN or WLAN is a wireless Local Area Network, which is the linking of two or more computers without using wires. It uses radio communication to accomplish the same functionality that a wired LAN has. WLAN utilizes spread-spectrum technology based on radio waves to enable communication between devices in a limited area, also known as the basic service set. This gives users the mobility to move around within a broad coverage area and still be connected to the network.

IEEE 802.11: IEEE 802.11, the Wi-Fi standard, denotes a set of Wireless LAN/WLAN standards developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The 802.11 family currently includes six over-the-air modulation techniques that all use the same protocol. The most popular (and prolific) techniques are those defined by the b, a, and g amendments to the original standard.

3)Metropolitan Area Network (MAN)

Wireless Metropolitan Area Network (MAN) is the name trademarked by the IEEE 802.16 Working Group on Broadband Wireless Access Standards for its wireless metropolitan area network standard (commercially known as WiMAX), which defines broadband Internet access from fixed or mobile devices via antennas. Subscriber stations communicate with base-stations that are connected to a core network. This is a good alternative to fixed line networks and it is simple to build and relatively inexpensive.

4)Wide Area Network (WAN)

A Wide Area Network or WAN is a computer network covering a broad geographical area. Contrast with personal area networks (PAN’s), local area networks (LAN’s) or metropolitan area networks (MAN’s) that are usually limited to a room, building or campus. The largest and most well-known example of a WAN is the Internet.

WAN’s are used to connect local area networks (LAN’s) together, so that users and computers in one location can communicate with users and computers in other locations. Many WAN’s are built for one particular organisation and are private. Others, built by Internet service providers, provide connections from an organisation's LAN to the Internet.

Emerging trends in various technologies -

-WiMAX: WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in June 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as WirelessMAN. The Forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL".The range of WiMAX probably generates more confusion than any other single aspect of WiMAX. It is common to see statements in the media describing WiMAX multipoint coverage extending 30 miles. In a strict technical sense (in some spectrum ranges) this is correct, with even greater ranges being possible in point to point links. In practice in the real world (and especially in the license- free bands) this is wildly overstated especially where non line of sight (NLOS) reception is concerned.

Due to a variety of factors, the average cell ranges for most WiMAX networks will likely boast 4-5 mile range (in NLOS capable frequencies) even through tree cover and building walls. Service ranges up to 10 miles (16 Kilometers) are very likely in line of sight (LOS) applications (once again depending upon frequency). Ranges beyond 10 miles are certainly possible but for scalability purposes may not be desirable for heavily loaded networks. In most cases, additional cells are indicated to sustain high quality of service (QOS) capability. For the carrier class approach, especially as regards mobility, cells larger than this seem unlikely in the near future.

-Rapid growth in medical monitoring applications

Now wireless sensor technology is allowing us to easily monitor the critical life-signs of patients. Previously, the lack of suitable sensors, combined with an un-workable tangle of wires, has severely limited medical applications.

Now patients can be monitored effectively for serious conditions such as sleep apnoea, while in bed sleeping. Or monitoring critical parameters such as heart rate, while a patient is undergoing strenuous physical exercise and the connection of wires is impractical.

-Wireless medical implants Medical applications are undergoing massive growth as it becomes increasingly possible to monitor patients with tissue-implantable wireless-linked sensors.

This is one of the most important of the emerging wireless technology trends as these applications can potentially improve the quality of life for so many who suffer from a chronic medical condition.

-Radio Frequency Identification

Radio Frequency Identification is one of the wireless technology trends that is rapidly gaining momentum worldwide.

You can use it for identifying and tracking products, as they move from manufacturer to supplier and even between countries. This technology takes asset management to a whole new level. More and more people are tracking manufactured goods in real time, using wireless telemetry .

Questions & Answers

Q.1 What is Internet, Intranet & Extranet?

What are their various advantages & disadvantages?

What are their business applications?

An Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.

An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization.

An extranet is a computer network which allows controlled access from the outside, for specific business or educational purposes. In a business-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users.

Following are the advantages of these above:

Internet:

 Faster Communication & Social Networking: The foremost target of Internet has always been speedy communication and it has excelled way beyond the expectations. New innovations are only going to make it faster and more reliable.  Information Resources: Information is probably the biggest advantage that Internet offers. Internet is a virtual treasure trove of information. Any kind of information on any topic under the sun is available on the Internet. Today, it is almost required that students should use it for research or the purpose of gathering resources.

 Entertainment: It is another popular reason why many people prefer to surf the Internet. In fact, the Internet has become quite successful in trapping the multifaceted entertainment industry. Downloading games or just surfing the celebrity websites are some of the uses people have discovered.

Intranet:

 Time Saving: Intranets allow organizations to distribute information to employees on an as-needed basis.

 Communication: Intranets can serve as powerful tools for communication within an organization.

 Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internet worked enterprise.

 Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents. This can potentially save the business money on printing, duplicating documents.

 Enhance collaboration: Information is easily accessible by all authorized users, which enables teamwork.

 Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX.

 Rich in Format: Intranet allows employees to view documents in various rich formats ((e.g. Word, Excel, PowerPoint, PDF, video, audio). Multimedia programs can be used with intranet as well, allowing for better communication and information being shared very fast.

Extranet:

 Exchange large volumes of data using Electronic Data Interchange (EDI)

 Share product catalogs exclusively with trade partners

 Collaborate with other companies on joint development efforts

 Jointly develop and use training programs with other companies

 Provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks

 Improved quality.

 Lower travel costs.

 Lower administrative & other overhead costs.

 Reduction in paperwork.  Delivery of accurate information on time.

 Improved customer service.

 Better communication.

 Overall improvement in business effectiveness.

Following are the disadvantages of these above:

Internet:

 Theft of personal information such as name, address, credit card number etc.

 Virus threats nothing but a program which disrupts the normal functioning of your system.

 Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system.

 Pornography: This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet.

 Social Disconnect: Thanks to the Internet, people now only meet on social networks. More and more people are getting are drifting apart from their friends and family. Even children prefer to play online games rather than going out and mingling with other kids.

With all its falls the internet has the potential to make your life simple and convenient, as well as wreak havoc in your life. Its influence is mostly dictated by the choices you make while you are online. With clever use, you can manage to harness its unlimited potential.

Intranet:

 A company may not have person to update their

 Fear of sharing information and the loss of control

 Limited bandwidth for the business

 Unauthorized access

 Abuse of access

 Denial of service

 Information overload lowers productivity

 True purpose of the Intranet is unknown to many employees/departments

 Hidden or unknown complexity and costs

Extranet:  The suppliers & customers who don’t have technical knowledge feel problem.

 Faceless contact.

 Information can be misused by other competitors.

 Fraud may be possible.

 Technical Employees are required.

Following are the business applications of these above:

Internet:

 Download programs and files

 E-Mail

 Voice and Video Conferencing

 E-Commerce

 File Sharing

 Information browsing

 Search the web addresses for access through search engine

 Chatting and many more…

Intranet:

 Sharing of company policies/rules & regulations

 Access employee database

 Distribution of circulars/Office Orders

 Access product & customer data

 Sharing of information of common interest

 Launching of personal/departmental home pages

 Submission of reports

 Corporate telephone directories

Extranet:

 Supply-chain management  Customer communications

 Distributor promotions

 Online continuing education/training

 Customer service

 Order status inquiry

 Inventory inquiry

 Account status inquiry

 Warranty registration

 Claims

 Online discussion forums

Q.2 Discuss in details the emerging trends in Internet.

Following are some of the current emerging trends in Internet:

 Emerging markets are driving the world's online future. In 2012, the world had 2.4 billion Internet users, with a growth of 8 percent since 2011. Much of that growth comes from emerging markets. Future Internet growth potential remains very high for many overseas markets. Despite contributing significantly to Internet growth, some countries have only a small percentage of their total populations online, representing tremendous potential for future growth.

 Most top websites are American, but most Internet users are not. Eighty percent of the Top 10 global Internet properties -- including Facebook, Google, and Twitter -- are from companies headquartered in the United States.

 Smartphone adoption soars -- especially in emerging markets. Smartphone subscriber growth remains rapid, with 1.5 billion current subscribers, and 31 percent growth in 2013. There is also ample room for market development, with only 21 percent global penetration currently. Some of the fastest Smartphone adoption rates are found in India, Indonesia, Russia, and Mexico.

 Mobile traffic makes up a sizeable share of global Internet traffic. In 2008, mobile traffic accounted for less than 1 percent of all online traffic. Fast forward to May 2013, and mobile traffic now makes up 15 percent. In China, mobile Internet access actually surpassed PC access in the second quarter of 2012.

 Mobile OS and showcase using iPad or Android – More people access the Internet on their mobile devices than on any other device. We are rapidly approaching the time where designs must be created for the mobile Web first. The goal will be to enable each and every store colleague to transact, checkout and take payments without going to the tills. With iOS 6 and Android 4.2 Jellybean, the features you can enable in the customer assisted app are endless.  Advanced website browsing on mobile/iPad/tablets – Along with the above assisted scenarios, potential growth of mobile/iPad in retail eCommerce is enormous. With the current projections, in the next couple of years mobile/iPad will exceed desktop numbers. Companies are actively taking advantage of mobile functions.

 Social media like Facebook & others – Facebook has more than 850M+ subscribers, and it is a known fact that number grows by 20% or more every year in emerging countries. Companies will take more and more advantage from the various set of data about users’ daily activity using Facebook Connect, like offering promotions on products which they most commented on or identifying what their friends mostly like and recommending the same when they visit the store.

 Time based availability – Some of the hottest and most successful sites are those that have a time-critical response component.

 Getting It Right on Every Device-Responsive design will be a must have for mobile sites, ensuring your site is designed for optimal viewing no matter what mobile or tablet device is being used.

Q.3 what is protocol?

What are the different types of protocols?

Explain the IPV6 protocol in detail.

A protocol is a set of rules that govern data communications. A protocol defines what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and timing. The Internet Protocol (IP) is the principal communications protocol in the internet protocol suite for relaying datagram across network boundaries. Its routing function enables inter-networking & essentially establishes the internet.

Some of the most commonly used protocols are TCP, IP, UDP, POP, SMTP, HTTP, and FTP.

Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP) that provides an identification and location system for computers on networks and routes traffic across the Internet. Every device on the Internet must be assigned an IP address in order to communicate with other devices. With the ever-increasing number of new devices being connected to the Internet, the need arose for more addresses than IPv4 is able to accommodate.IPv6 is the next generation Internet Protocol (IP) address standard that will supplement and eventually replace IPv4, the protocol most Internet services use today. To allow the Internet to continue to grow and spread across the world, implementing IPv6 is necessary. Therefore, network operators and enterprises will need to implement IPv6 in order to ensure long-term network growth and global connectivity.IPv6 is an important part of ensuring continued growth and accessibility of your services to the rest of the Internet and emerging markets in particular. As the Internet progressively becomes a dual IPv4/IPv6 network, ensuring that you are IPv6 enabled will be critical for retaining universal Internet connectivity for your clients, users, and subscribers, business partners and suppliers. Every company – even those not directly involved in the Internet industry – ought to have IPv6 on its strategic roadmap, and move IPv6 deployment higher on its to-do list.

The new IPV6 protocol would provide the following advantages over the old IPV4 protocol:

 Prevent Increased Costs: Companies will need to spend more to cope with the scarcity of IPv4 addresses, whether it’s in workarounds, buying networking gear or trying to buy more IPv4 addresses. The fact is, it is more expensive if you don’t plan for it.

 Prevent Disruption to Your Websites: Businesses that do not commit to IPv6 transition, and do not start to take the proper steps to initiate this process now, will risk accessibility problems of their websites and other Internet-connected locations and services. A recent McKinsey Global Institute Internet Matters report claimed that 75 percent of the economic value produced by the Internet benefits traditional industries, not Internet-based enterprises.

 Growth of Your Global Business Depends on It: Some parts of the world are completely out of new IPv4 addresses, including emerging economies that are experiencing the most economic growth. The use of IPv6 will soon be a requirement for companies looking to tap into these growth opportunities.

 Avoid Diminishing Experience for Your Customers and Access to Your Supply Chain: If the IPv6 transition happens as expected, most users won’t notice any change in their Internet use, but those that are still operating on IPv4 will have a diminished experience sooner or later.

Organizations that continue to rely solely on IPv4 with no plans to implement IPv6 in the near future risk running into a host of business challenges, from increased costs and limited website functionality, to inhibiting critical growth opportunities in emerging markets and beyond. The only long-term solution to this shortage, and subsequent business disruptions, is adoption of IPv6, providing a practically unlimited number of addresses.

Question 1:

Discuss the evolution of database over time from traditional database to modern database and enlist its benefits to business.

Ans. 1968 File-Based: predecessor of database, Data was maintained in a flat file.

Benefits: Various access methods, e.g., sequential, indexed, random

[1968-1980] Era of Hierarchical Database:

Benefits : Efficient searching, Less redundant data, Data independence & Database security and integrity.

Network Data Model:

Benefits : Ability to handle more relationship types, Ease of data access, Data Integrity & Data Independence.It can efficiently manage a large number of different data types, Objects with complex behaviors are easy to handle using inheritance and polymorphism, Reduces the large number of relations by creating objects.

Question 2:

What are data warehousing and data mart. Explain their business applications. What is Data Mart? Ans. Concepts: In computing, a data warehouse or enterprise data warehouse (DW, DWH, or EDW) is a database used for reporting and data analysis. It is a central repository of data which is created by integrating data from one or more disparate sources. Data warehouses store current as well as historical data and are used for creating trending reports for senior management reporting such as annual and quarterly comparisons. The data stored in the warehouse are uploaded from the operational systems (such as marketing, sales etc., shown in the figure to the right). The data may pass through an operational data store for additional operations before they are used in the DW for reporting.

Application:

Retail :-

1. Data warehousing’s early adopters

2. Capturing data from their POS systems

 POS = point-of-sale

3. Industry analysts predict that brick-and-mortal retailers will see a slowdown in sales growth over the next several years (Silverman, 1998).

4. Market Basket Analysis

5. In-Store Placement

6. Use decision support to understand which items are being purchased, where they belong, and modify configurations in order to maximize the # of items in the market basket.

7. Retailers are able to negotiate more effectively with their suppliers

8. Display space, product placement

9. Product Pricing

o Price elasticity models manipulate detailed data to determine not only the best price, but often different prices for the same product according to different variables

o Permits differential pricing

10. Product Movement and Supply chain

11. Analyzing the movement of specific products and the quantity of products sold helps retailers predict when they will need to order more stock

12. Product sales history allows merchandisers to define which products to order, the maximumnumber of units and the frequency of reorders

13. Automatic replenishment with JIT delivery

Financial Services:- 1. The pioneers of the data warehouse

o Business intelligence has become a business mandate as well as a competitive weapon.

o 1999 Financial Services Modernization Act:- Requires financial service and insurance companies to disclose how they will use data collected from their customer

2. Profitability Analysis

 Cannot know the true value of a customer without understanding how profitable that customer is

 Used by many banks to help dictate the creation of new products or the expunging of old ones.

3. Risk Management and Fraud Prevention

 DW provides a banking compnay with a scientific approach to risk management

 Helps pinpoint specific market or customer segment that may be higher risk than others

 Examines historical customer behavior to verify that no past defaults have occurred

 Ever gotten a call from you credit card company asking about a recent purchase

4. Propensity Analysis and Event-Driven Marketing

 Helps bank recognize whether a customer is likely to purchase a given product and service, and even when such a purchase might occur

 Example:Loan for college tuition may mean a graduation gift or wedding in the future

5. Distribution Analysis and Planning

o By understanding how and where customers perform their transactions, banks can tailor certain locations to specific customer groups.

o Allows banks to make decisions about branch layouts, staff increases or reductions, new technology additions or even closing or consolidating low-traffic branches

Telecommunications:-

1. Churn

 Differentiate between the propensity to churn and actual churn. Differentiate between product church and customer churn

2. Fraud Detection  Data mining tools can predict fraud by spotting patterns in consolidated customer information and call detail records

3. Product Packaging and Custom Pricing

 Using knowledge discover and modeling, companies can tell which products will see well together, as well as which customers or customer segments are most likely to buy them

 Packaging of vertical features

 Voice products such as caller ID, call waiting

 Employ price elasticity models to determine the new package's optimal price

4. Network Feature Management

 By monitoring call patterns and traffic routing, a carrier can install a switch or cell in a location where it is liable to route the maximum amount of calls

 Historical activity analysis can help telecommunications companies predict equipment outages before they occur

5. Call Detail Analysis

 Analysis of specific call records

 Helps provide powerful information about origin and destination patterns that could spur additional sales to important customers

Data Mart:- A data mart is a small data warehouse focused on a specific area of interest. Data warehouses can be subdivided into data marts for improved performance and ease of use within that area. Alternatively, an organization can create one or more data marts as first steps towards a larger and more complex enterprise data warehouse.

Question 3:

What is data mining? What are its various elements and data mining tasks? What are various business applications of data mining?

Ans. Data mining is the process of analysing data from different perspectives and summarizing it into useful information Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The term is a buzzword and misused to mean any form of large-scale data or information processing. Data mining uses information from past data to analyse the outcome of a particular problem or situation that may arise. Data mining works to analyse data stored in data warehouses that are used to store that data that is being analysed. That particular data may come from all parts of business, from the production to the management. Managers also use data mining to decide upon marketing strategies for their product. They can use data to compare and contrast among competitors. Data mining interprets its data into real time analysis that can be used to increase sales, promote new product, or delete product that is not value-added to the company.

Major elements of data mining:

1) Extract, transform, and load transaction data onto the data warehouse system

2) Store and manage the data in a multidimensional database system

3) Provide data access to business analysts and information technology professionals

4) Analyse the data by application software

5) Present the data in a useful format, such as a graph or table

In short the three key tasks that we do are:

 Analyse

 Reorganize

 Summarize

How data mining works:

The analytical techniques used in data mining are often well-known mathematical algorithms and techniques. What is new is the application of those techniques to general business problems made possible by the increased availability of data and inexpensive storage and processing power. Also, the use of graphical interfaces has led to tools becoming available that business experts can easily use.

 Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials.

 Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities.

 Associations: Data can be mined to identify associations. The beer-diaper example is an example of associative mining.

 Sequential patterns: Data is mined to anticipate behaviour patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer's purchase of sleeping bags and hiking shoes

Applications of data mining:

6. Customer targeting Data mining is the analysis of historical business activities, stored as static data in data warehouse databases, to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition algorithms to sift through large amounts of data to assist in discovering previously unknown strategic business information. Examples of what businesses use data mining for include performing market analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent customer attrition and acquire new customers, cross-sell to existing customers, and profile customers with more accuracy. In today’s world raw data is being collected by companies at an exploding rate. For example, Wal-Mart processes over 20 million point-of-sale transactions every day. This information is stored in a centralized database, but would be useless without some type of data mining software to analyse it. If Wal-Mart analysed their point-of-sale data with data mining techniques they would be able to determine sales trends, develop marketing campaigns, and more accurately predict customer loyalty.

7. Credit card policy analysis Every time we use our credit card, a store loyalty card, or fill out a warranty card data is being collected about our purchasing behaviour. Many people find the amount of information stored about us from companies, such as Google, Facebook, and Amazon, disturbing and are concerned about privacy. Although there is the potential for our personal data to be used in harmful, or unwanted, ways it is also being used to make our lives better. For example, Ford and Audi hope to one day collect information about customer driving patterns so they can recommend safer routes and warn drivers about dangerous road conditions

8. Customer relations management Data mining in customer relationship management applications can contribute significantly to the bottom line. Rather than randomly contacting a prospect or customer through a call centre or sending mail, a company can concentrate its efforts on prospects that are predicted to have a high likelihood of responding to an offer. More sophisticated methods may be used to optimize resources across campaigns so that one may predict to which channel and to which offer an individual is most likely to respond (across all potential offers). Additionally, sophisticated applications could be used to automate mailing. Once the results from data mining (potential prospect/customer and channel/offer) are determined, this "sophisticated application" can either automatically send an e-mail or a regular mail. Finally, in cases where many people will take an action without an offer, "uplift modelling" can be used to determine which people have the greatest increase in response if given an offer. Uplift modelling thereby enables marketers to focus mailings and offers on persuadable people, and not to send offers to people who will buy the product without an offer. Data clustering can also be used to automatically discover the segments or groups within a customer data set

9. Human resource management: Data mining can also be helpful to human resources (HR) departments in identifying the characteristics of their most successful employees. Information obtained – such as universities attended by highly successful employees – can help HR focus recruiting efforts accordingly. Additionally, Strategic Enterprise Management applications help a company translate corporate-level goals, such as profit and margin share targets, into operational decisions, such as production plans and workforce levels.

10. Astronomy

11. Molecular biology & genetics

12. Surveillance Data mining has been used to fight terrorism by the U.S. government. Programs include the Total Information Awareness (TIA) program, Secure Flight (formerly known as Computer-Assisted Passenger Pre-screening System (CAPPS II)), Analysis, Dissemination, Visualization, Insight, Semantic Enhancement (ADVISE). These programs have been discontinued due to controversy over whether they violate the 4th Amendment to the United States Constitution, although many programs that were formed under them continue to be funded by different organizations or under different names. In the context of combating terrorism, two particularly plausible methods of data mining are "pattern mining" and "subject-based data mining"

13. Pattern mining:

"Pattern mining" is a data mining method that involves finding existing patterns in data. In this context patterns often means association rules. The original motivation for searching association rules came from the desire to analyse supermarket transaction data, that is, to examine customer behaviour in terms of the purchased products. For example, an association rule "beer >potato chips (80%)" states that four out of five customers that bought beer also bought potato chips.

In the context of pattern mining as a tool to identify terrorist activity, the National Research Council provides the following definition: "Pattern-based data mining looks for patterns (including anomalous data patterns) that might be associated with terrorist activity — these patterns might be regarded as small signals in a large ocean of noise." Pattern Mining includes new areas such a Music Information Retrieval (MIR) where patterns seen both in the temporal and non-temporal domains are imported to classical knowledge discovery search methods.

14. Subject based data mining:

"Subject-based data mining" is a data mining method involving the search for associations between individuals in data. In the context of combating terrorism, the National Research Council provides the following definition: "Subject-based data mining uses an initiating individual or other datum that is considered, based on other information, to be of high interest, and the goal is to determine what other persons or financial transactions or movements, etc. are related to that initiating datum.”

15. Knowledge Grid:

Knowledge discovery "On the Grid" generally refers to conducting knowledge discovery in an open environment using grid computing concepts, allowing users to integrate data from various online data sources, as well make use of remote resources, for executing their data mining tasks. The earliest example was the Discovery Net developed at Imperial College London, which won the "Most Innovative Data-Intensive Application Award" at the ACM SC02 conference and exhibition, based on a demonstration of a fully interactive distributed knowledge discovery application for a bioinformatics application. Other examples include work conducted by researchers at the University of Calabria, who developed Knowledge Grid architecture for distributed knowledge discovery, based on grid computing.

1. What is Knowledge Management?

“The business of a business is business in itself. Profits are a business necessity. Hence Knowledge Management becomes a business imperative!” In our daily life, we deal with huge amount of data and information. Data and information is not knowledge until we know how to dig the value out of it. This is the reason we need Knowledge Management. There is no universal definition of Knowledge Management, just as there is no agreement as to what constitutes knowledge in the first place.

"Knowledge Management is the process of capturing, distributing, and effectively using knowledge."

Knowledge Management is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise's information assets. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers.

Knowledge Management is primarily about managing the knowledge of and in organizations.

The most central thrust in Knowledge Management is to capture and make available, so it can be used by others in the organization, the information and knowledge that is in people's heads as it were, and that has never been explicitly set down.

Another way to view and define Knowledge Management is to describe it as the movement to replicate the information environment known to be conducive to successful R&D—rich, deep, and open communication and information access—and deploy it broadly across the firm. In the post-industrial information age, an increasingly large proportion of the working population consists of information workers. The role of the researcher, considered the quintessential information worker, has been studied in depth with a focus on identifying environmental aspects that lead to successful research, and the strongest relationship by far is with information and knowledge access and communication. It is quite logical then to attempt to apply those same successful environmental aspects to knowledge workers at large, and that is what in fact Knowledge Management attempts to do.

Knowledge Management may be viewed in terms of:

People – How do you increase the ability of an individual in the organisation to influence others with their knowledge?

Processes – Its approach varies from organization to organization. There is no limit on the number of processes

Technology – It needs to be chosen only after all the requirements of a Knowledge Management initiative have been established.

Or

Culture –The biggest enabler of successful knowledge-driven organizations is the establishment of a knowledge- focused culture

Structure – the business processes and organisational structures that facilitate knowledge sharing

Technology – a crucial enabler rather than the solution.

In traditional management of early twentieth century that dealt with the optimum utilization of labour, parts, and other physical resources, capital was considered limited to the factories, machines, and other human-made inputs into the production process. In the modern corporation with a KM initiative, the concept of capital is extended to include ephemeral intellectual capital and its impact on individual and organizational behaviour.

The three major components of intellectual capital are:

1. Human capital

The knowledge, skills, and competencies of the people in the organization. Human capital is owned by the employees and managers that possess it. Without a KM system in place, when employees and managers leave the company; they take their skills, competencies, and knowledge with them.

2. Customer capital

The value of the organization’s relationships with its customers, including customer loyalty, distribution channels, brands, licensing, and franchises. Because customers often form bonds with a salesperson or customer representative, customer capital typically is jointly owned by employee and employer. The proportion of customer capital held by employees and employers depends on the relative contribution of customer loyalty to customer capital.

3. Structural capital

The process, structures, information systems, and intellectual properties that is independent of the employees and managers who created them. Intellectual properties are sometimes considered as a separate, fourth component of intellectual capital.

Since management in every organization manipulates human, structural, and customer capital, every organization uses Knowledge Management to some degree, though not necessarily in a sophisticated, formalized way. Not only does the relative percentage of the three types of intellectual capital vary from one company to the next, but the percent of human, customer, and structural capital varies from company to company, as well.

2. List the major technologies that support Knowledge Management and correlate with Knowledge Management life cycle?

The following diagram reflects the main technologies that currently support Knowledge Management systems.

A large number of tools, many computer based, significantly boost the effectiveness of KM.

• Infrastructure: groupware, intranets, document management, KM suites

• Thinking: concept mapping, creativity tools

• Gathering, discovering: search engines, alerting, push, data mining, intelligent agents

• Organizing, storing: data warehousing, OLAP, metadata, XML

• Knowledge worker support: case based reasoning, decision support, workflow, community support, simulation

• Application specific: CRM, expertise profiling, competitive intelligence

Hardware and Software: hardware is the electronic components and related periphery technologies that allows end users to input data, the hardware processes that data, and outputs the data transformed into information through one of the periphery technologies such as a monitor, printer, speakers, or other similar output technology. Hardware also serves as a storage device: storage devices save data and applications. Common storage devices include CDs, DVDs, and USB drives.

Software: Software generally is defined as “a series of data and instructions written by computer programmers using a programming language to perform a certain tasks”.

Common Hardware technologies used in business include: Desktop computers, laptops, mainframes, MS Windows, Mac OS, UNIX, Linux, servers, web servers, and blade servers.

Common Software technologies used in business include: enterprise applications, productivity and Office Applications, communication and information-sharing software, and entertainment and Media development software

Database Processing: is the system of collecting, storing, and processing data for the purpose of gathering information, managing information, and creating new knowledge from the stored data.

Database Management Systems: Data processing in business is most often done using Database Management Systems (DBMS). A DBMS is used to create, process, and maintain a database.

Some common inputs and outputs of a DBMS include; tables and forms to input data, queries to retrieve data, and reports to output and present data.

Enterprise Database Managements Systems: This is a database system that supports a multi-user environment. These are most often used in large businesses that require employees to input and process data using a variety of different applications. Common enterprise technologies include Microsoft’s MySQL Server and Oracle’s Oracle.

Data Communications & Internet Technologies: data communication technologies common in businesses include local area networks (LANs) and wide area networks. (WANs). A LAN is a series of networked computers and devices located within a single building, room, or campus. A WAN is a series of connected computer and devices that span a large geographic area such as a city.

Internetworking technologies are primarily made up of protocols that are used to communicate data across the Internet. These technologies are part of the Internet Protocol Suite. (This is found in the KM in Business PPT)

Common Internet technologies protocols include: the hypertext transfer protocol (HTTP), Simple Mail transfer protocol (SMTP), File transfer protocols (FTP), and hypertext mark-up language (HTML).

These technologies roughly correlate to four main stages of the KNOWLEDGE MANAGEMENT life cycle:

1. Knowledge is acquired or captured using intranets, extranets, groupware, web conferencing, and document management systems

2. An organizational memory is formed by refining, organizing, and storing knowledge using structured repositories such as data warehouses.

3. Knowledge is distributed through education, training programs, automated knowledge based systems, expert networks.

4. Knowledge is applied or leveraged for further learning and innovation via mining of the organizational memory and the application of expert systems such as decision support systems.

All of these stages are enhanced by effective workflow and project management.

3. Explain the business implications of Knowledge Management for corporations.

“The business of a business is business in itself. Profits are a business necessity. Hence Knowledge Management becomes a business imperative!”

The business implications of Knowledge Management are:

• Leadership is essential

Someone in senior management has to own the KM effort. This manager is often termed the chief knowledge officer (CKO) if the task is all-encompassing, or the chief information officer (CIO) or other senior manager may take it on as an additional responsibility. Regardless of who takes the role, it involves achieving buy-in at all levels in the organization.

• Knowledge Management works

The potential benefits of Knowledge Management are numerous and can potentially benefit every type of business, especially those involved in the information technology and service industries. What can a senior manager expect from implementing KM in a corporation? Under optimum conditions, KM promises reduced costs, improved service, increased efficiencies, and retention of intellectual assets. • Knowledge Management requires training

Employee and manager education is fundamental to the proper operation of every phase of the KM process. Employees and managers have to be trained to focus on the overall process even while they are attending to specific problems.

• Expectations must be managed

Implementing a KM program involves fundamental changes in how employees and managers interact, communicate, command, and get things done. Before reporting lines, responsibilities, and management directives shift to meet the KM demands of the corporation, employees and managers must be prepared for the change. However, since most people fear change, especially if it means disrupting a way of life that they’ve grown accustomed to, productivity can suffer unless employee expectations are managed proactively.

An effective approach is to demonstrate the process on a clearly defined, obvious goal that is an easy win.

• Practical Knowledge Management is technology dependent

Each of the steps in the KM process, as well as tracking knowledge assets, can be enhanced by information technologies. For example, the process of information creation is supported by the ubiquitous word processor running on a PC, and painless acquisition is made possible by the web and associated networking hardware. Similarly, storing and manipulating huge stores of data are made possible by database servers and software, and getting data in the hands of users benefits from handheld devices and wireless networks that provide anytime, anyplace access to information.

• Knowledge Management is a process, not a product

Knowledge Management is a dynamic, constantly evolving process, and not a shrink-wrapped product. Knowledge is an organizational process rather than a static collection of data that can be stored in a database. Typical KM practices in a modern corporation include acquiring knowledge from customers, creating new revenues from existing knowledge, capturing an employee’s knowledge for reuse later, and reviewing the predictors of a successful KM initiative.

• Knowledge Management Principles Apply in Varying Degrees

Every successful business operation, from the corner deli to the top Fortune 500 companies, uses Knowledge Management to some degree, even if only in an unsophisticated, ad hoc way. However, the work that some companies engage in is so dependent on individual talent, such as musical or graphical artistry, that the only practical way to capture the relevant knowledge is through a lengthy personal apprenticeship.

Other work can be defined to the point that virtually anyone with a modicum of training can fill a vacancy anywhere in the company. For example, since McDonald’s hires workers with a wide range of abilities and experiences, its training program leaves virtually no room for variation in process. Even seemingly insignificant tasks, such as the method in which are fries salted (from the back to the front of the deep fryer rack), are fully defined, leaving little room for misinterpretation of the intended process.

• Knowledge Management Isn’t Perfect—Yet In most organizations, Knowledge Management is a work-in-progress, with some subtle and some obvious imperfections. For example, the transfer of data, information, and knowledge from person to person, person to computer system, or one generation of employees to the next is an imperfect process that rarely occurs smoothly and always involves loss of information. Loss of information happens when recording standards shift, when a longer-lasting storage medium requires transfer of information, when data must be migrated between storage locations or translated from one form of representation to another, and when the computer hardware used to interpret the data becomes obsolete.

• Significant Legal Issues Exist

Knowledge Management deals with the ownership and manipulation of intellectual property, from copyrighted materials, trademarks, patents, and patent applications to trade secrets. A patent portfolio can add significant value to a company. However, in many instances, intellectual property instruments are useful primarily in defending a court case.

What’s more, the time lag between applying for patent protection and receiving a patent may be years. Given the time pressure to bring products and services to market, the time and expense of patenting a process or device may make it more feasible for the company simply to keep the information as a trade secret.

However, relying on trade secrets is associated with a risk of employees leaving with proprietary knowledge, even with nondisclosure and no compete agreements in place. Trade secrets also don’t contribute to the valuation of the company to the degree that patents do, since a competing company may file a patent application, potentially barring the company from using its trade secrets. Some companies are attempting to avoid the intellectual property courts altogether by publishing their findings early to prevent the competition from patenting the product or service. This KM approach is especially attractive in the software industry, where virtually any program can be reverse-engineered and replicated in a matter of weeks to months.

• Extensive Training and Retraining May Be Required

A significant investment in employee and management training may be required if a KM program is to succeed. Knowledge Management works best when employees and management willingly and regularly contribute to the pool of corporate knowledge. However, willingness without training in process and the use of the technology for storing and retrieving corporate knowledge typically results in costly errors and inefficiency. Most companies with successful KM programs have employee and management training programs in place. For example, a customer service representative who deals with customers via the telephone has to know how to access the list of frequently asked questions (FAQs) on specific topics and how to enter new questions into the system so that the questions and their answers can be made available to others customer service reps.

• Overhead Can Be Considerable

Administrative and employee overhead associated with Knowledge Management can cut into efficiency and effectiveness, especially when the typical transaction is very brief. Customers may resent being asked personal questions when they place orders, for example. Saving and submitting customer questions for management to review and include in the store of FAQs in the corporate web site takes time. At issue is whether the expected return on investment in the time spent creating a bank of FAQs or other information makes economic sense.

• Knowledge Management Is in Flux Changes in the KM industry, including abuse of the Knowledge Management vocabulary and concepts by vendors and consultants, obfuscates what would otherwise be simple comparisons of products and services. For example, many database companies and reengineering consultants became KM companies overnight by simply modifying copy in their sales brochures. Companies intent on implementing a KM program have to wade through the unsubstantiated claims from vendors, many of which are made with jargon that serves only to obscure simple (and less expensive) concepts.

• Knowledge Management Takes Time

Realistic implementation times for developing a workable KM system range from a few months to years, depending on the complexity of the processes that must be analysed, the size of the company, the number of employees, and the managers involved. Even in the most technologically challenging KM implementation, the pace of corporate cultural change, not the availability of resources or technology, is the rate-limiting step.

• Investment Requirements Can Be Significant

Establishing and maintaining a KM program can be an expensive proposition. A KM system for customer support is an on-going investment, not a one-time expense. Consider that as soon as the sales reps stop adding questions and answers to the bank of FAQs, the value of the KM system drops precipitously. Eventually, the point will be reached when the time spent searching through the FAQs might not be worth the time or effort of the customer support staff.

• Corporate Legacy Must Be Acknowledged

In designing a KM system, it’s generally easier to start from scratch. It isn’t surprising that the dream of most knowledge officers is to have a new venture built from scorched earth with no history and no legacy data. However, the reality is that most KM programs are implemented in existing companies with established processes for handling orders, deciding on best practices, and dealing with customer support issues. As such, these processes and attitudes will have to be folded into the new KM process. In other words, the KM program should complement the existing business and strengthen existing processes—not turn the company inside out, resulting in processes optimized for Knowledge Management, and no employees to execute them.

Whether Knowledge Management makes sense for a particular business application depends on the business, the corporate culture, and budgetary limitations.

Question / Answers:

1] Define ERP and explain how it helps to achieve business integration?

Enterprise resource planning (ERP) is business management software that allows an organization to use a system of integrated applications to manage the business

Enterprise resource planning (ERP) systems are systems that have basic goal to form backbone of all company operations and to unite these operations under same IT infrastructure.

Ways in which ERP helps in achieving Business integration:  Data integration-

In today’s world, businesses swim in pool of data. Problem is not just only in procuring data but also in sorting it and avoiding duplications.

ERP helps in obtaining as well as integrating data such as from what customers purchase to where they come from, and from manufacturing costs to shipping taxes etc. It integrates financial information, Accounting information, sales information, customer order information, Human resources information etc.

ERP can remove duplications and interpret the data in a way that will aid your business’s bottom line.

 People from different department can access what they need, when they need-

Before ERP, in most companies, each department had its own computer files and system on which they worked. Accounting department had list of all outstanding invoices whereas purchase department had list of all outstanding purchase orders.

Before ERP one department was not able to access data of another department.

So if purchase manager had to know about certain invoice, he had to call accounts department and ask for information which was time consuming.

But with ERP and integrated database, he can easily access data and answer back to vendor.

It improves efficiency across the board, allowing your team to address specific needs, issues, or strategies as they arise.

 Cost reduction-

The integration of data helps organisation in numerous ways to reduce cost e.g. Reduction in inventory

ERP helps manufacturing process flow more smoothly and it improves visibilities of the order fulfilment process in the company. That lead to reduced inventories used to make products i.e. WIP inventory. It also helps in better planning deliveries to customers, reducing the finished good stocks at the warehouses and the shipping docks.

 Marketing help and prediction-

With push of a button one can know what people are purchasing, who is referring them, where are they coming from, what else they purchase and more. This invaluable data will drive one`s marketing strategy decisions moving forward, as one adjust one`s message to suit the personalities and desires of one`s audience. Think of it as one`s own personal market researcher.

 Managing Customer Relationship- Customers today look for a positive experience, which means so much more than simply enjoying your product. They want to feel listened to and cared for throughout the entire purchasing process. This means having a responsive ticket tracking system; a reliable confirmation page; and the ability to follow up with and respond to customer. ERP systems can automate all of these relationship management processes. And if one takes care of one`s relationships, one may just have a loyal customer for lifetime.

 Standardizing HR information:

In companies with multiple business units, Human Resource Department (HR) may not have unified, simple method for tracking employees` time and communicating them about benefits and services. ERP helps in business activities by integrating information about various personnel at various levels. It can be helpful in developing effective communication channel. It can provide information useful in performing activities such as Recruitments, Transfers, Promotions, Training, Performance Appraisal, Retention and other human resource management activities.

In ERP packages, the data of related business functions is automatically updated at the time a transaction occurs. For this reason, one is able to grasp business details in real time, and carry out various types of management decisions in a timely manner based on that information.

2] What are business modules in ERP? What are its merits and demerits?

-> Most common business modules in an ERP system are: 1) Finance Module. 2) Human Resources 3) Manufacturing Module 4) Plant Maintenance 5) Materials Management 6) Quality Management 7) Marketing Module

8) Sales and distribution

Merits:

• Improved integration :Ability to automatically update data between related functions and components, leading to better decision making

• Reduction of lead time and better inventory management.

• Improved resource utilization by reducing forced outages, breakdowns etc

• Improved Supplier Performance: The quality of raw materials or components and capability of the vendor to deliver them in time are of critical importance for the success of the organization, ERP monitors supplier list and determines the best quality suppliers. • Increased flexibility to capitalize on opportunities while they are available. To create a flexible organization that can adapt to the changes in environment rapidly.

• Reduced Quality Costs: Reduces internal failure costs , external failure costs, appraisal costs and prevention costs as ERP provides tools for Total Quality Management programs within an organization

• Better analysis and planning capabilities

• Improved information accuracy & decision making capability

• Use of Latest technology such as open systems, client / server technology and internet/intranet

Demerits:

 Expensive to purchase and even more expensive to customize.

 Limited customization possible for ERP

 It needs effort from company to adjust its processes.

 When setting up system, the changes can be costly in time and money.

 If proper training not given, it can be difficult to control system.

3] What is SAP? What are different products of SAP?

-> Xerox decided to exit the computer industry. They asked IBM to migrate their business systems to IBM technology. As part of IBM's compensation for the migration, IBM was given the rights to the SDS/SAPE software, reportedly for a contract credit of $80,000. Five IBM engineers from the AI department, Dietmar Hopp, Klaus Tschira, Hans-Werner Hector, Hasso Plattner, and Claus Wellenreuther, all from Mannheim, Baden-Württemberg were working in an enterprise-wide system based on this software, only to be told that it would be no longer necessary. Rather than abandon the project, they decided to leave IBM and start another company.

In June 1972 they founded Systemanalyse und Programmentwicklung ("System Analysis and Program Development") as a private partnership under the German Civil Code.

Products:

SAP's products focus on Enterprise Resource Planning (ERP). The company's main product is SAP ERP. The current version is SAP ERP 6.0 and is part of the SAP Business Suite. Its previous name was R/3. The "R" of SAP R/3 stood for realtime. The number 3 related to the 3-tier architecture: database, application server and client (SAPgui). R/2, which ran on Mainframe architecture, was the predecessor of R/3.

ERP Financials

Streamlines and automates financial operations – while ensuring regulatory compliance and gaining real-time insight into overall performance. Enhances core financial capabilities and generates accurate reports in real time. Captures processes from different applications – for a single version of financial truth and reduces cost of goods sold (COGS), maximizes profitability. ERP Human Capital Management

Better management of your most valuable assets, your people. It provides support for recruiting, on boarding and administration to professional development and promotion. It improves workforce efficiency, productivity and satisfaction. It delivers best-in-class HR processes at the lowest possible cost. It predicts and plans for future workforce needs and demands.

ERP Sales and Service

Provides support for a wide range of customer-focused processes, from selling products and delivering services to aftermarket warranty claims, service orders, and returns. It simplifies and accelerates the entire order-to-cash cycle. It helps in delivering orders on time and improving customer satisfaction. It streamlines processes and reduces operational costs. It helps boost productivity and increase sales and profit margins.

ERP Procurement and Logistics Execution

It maximizes cost savings with support for end-to-end procurement and logistics processes. It enables self-service requisitioning to invoicing and payments. It streamlines and optimizes the flow of materials. It actively manages your end-to-end procure-to-pay processes. It reduces unnecessary stock and improve spend performance.

ERP Product Development and Manufacturing

It helps in accelerating entire manufacturing processes. It helps in planning, scheduling, monitoring and analysis. It helps in improving efficiency across the value chain. It helps in proactively identifying and fixing potential issues with real-time tracking and analysis. It enables a quick respond to changes in demand with accelerated planning and execution. It improves plant performance with real-time visibility into shop floor processes.

ERP Corporate Services

It streamlines and enables greater control of corporate services. It helps in enterprise asset and quality management, travel, portfolio and project management. It tightly integrates services with processes that span the enterprise. It maximizes the transparency of corporate services. It increases the efficiency and effectiveness of your business operations. It reduces financial and environmental risks and enhances employee safety. It helps in ensuring that company policies are applied to all processes.

Integrated Business Management On Demand

It helps run all business management processes on an affordable, cloud-based suite, ideally suited for SMEs and subsidiaries of large corporations. Helps accelerate financial, customer relationships, HR, procurement, and supply processes. It helps in gaining timely insights into business with the help of integrated analytics and reporting. One can access key business functionality anywhere, on a broad range of mobile devices. One can rely on SAP to maintain and manage your business.

Q.1 Define E-Government. Discuss objectives of E-Government Services.

 E-government is very simply about applying information and communication technology to all aspects of a government’s business where it makes sense to improve efficiency and effectiveness in the achievement of policy and program outcomes.  United Nations definition

“E-government is defined as utilizing the Internet and the world-wide-web for delivering government information and services to citizens.”

 World Bank definition

“E-Government refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and mobile computing) that have the ability to transform relations with citizens, businesses, and other arms of government. These technologies can serve a variety of different ends: better delivery of government services to citizens, improved interactions with business and industry, citizen empowerment through access to information, or more efficient government management. The resulting benefits can be less corruption, increased transparency, greater convenience, revenue growth, and/or cost reductions.

Objectives

 To pursue real economic development goals not just “technology push”

 To create the right policy and institutional frameworks from the start.

 To maximize effectiveness of ICT initiatives within Government.

 To manage the increasing costs of IT in government

 To generate savings by applying IT in backend processes or other programmatic areas

 To map path from pilot experiments to sustainable, scalable systems

 To design technology architecture (infrastructure, data, standards) for the public sector

 To integrate organizational silos and deliver citizen services through common channels.

Q.2 Define E-Governance. Discuss different delivery models.

 E-Governance is a process of reform in the way Governments work, share information, engage citizens and deliver services to external and internal clients for the benefit of both government and the clients that they serve. Governments harnesses information technologies such as Wide Area Networks (WAN), Internet, World Wide Web, and mobile computing reach out to citizens, business, and other arms of the government to:

 Improve delivery of services to citizens, businesses and employees Engage citizens in the process of governance through interaction Empower citizens through access to knowledge and information and Make the working of the government more efficient and effective

 Results in enhanced transparency, convenience and empowerment; less corruption; revenue growth; and cost reduction

Different Delivery Models

 Departments going on-line  Citizen visit many departments, each one may be more efficient

 Could be a first step in the absence of high band width network

 Assisted; restrictive timings, single agency-complete service

 Conveniently located Community Service Centers

 Assisted counters manned by public/private agencies

 Services from single/ multiple agencies under one roof: payment, licenses, certificates

 Larger time window but not 24X7

 Complete service from all department difficult-bill payments, receive applications

 Self Service through a Portal one stop shop

 24X7, multiple agencies, partial service (submit applications)

 Back end computerization and Integration needed for data sharing

 High internet penetration; willingness and ability of citizen to use

 Security and mutual trust (builds with successful outcome)

 Usage builds up gradually. Adoption rate has to be driven.

Q.3 Discuss success & risk factors of E-Governance. Discuss impact of E-Governance. Success Factors  Strong Political and Administrative Leadership , detailed Project Management

 Clearly identified goals and benefits

 Significant Process Reengineering Required

 Adopt established standards and protocols –minimize customization

 Start Small, scale up through stages, manage expectations

 In-source Analysis ; Outsource design, software development, data preparation, training, etc.

 Training Expenses should not be minimized

 Public Private Partnerships

Risk Factors

 Implementation and use should sustain over long periods and measurable benefits delivered to all stakeholders-need for evaluation

 Frequent changes in administrative leadership. Short tenure of implementers: hurried implementation and/or lack of resources

 Inappropriate definition of project scale and scope.

 E-government not implemented in a context of wider change/ administrative reform.

 Does not lead to overall cost reduction or value addition

 Close identification of a project with a single champion

 Resistance from vested interests not countered effectively

 Partial automation(back-end not computerized) and automation without reengineering.

 Use of untested fancy technology.

 E-government can offer new opportunities for fraud and corruption

Impact of E-Governance

 Introduces transparency in data, decisions/actions, rules, procedures and performance of Govt. agencies

 Automates processes to take away discretion

 Entry point for simplification of rules and reengineering

 Makes decisions traceable-tracks actions

 Builds accountability-greater access to information through web publishing-role of civil society

 Provides documentation to citizens for follow up  Introduces competition amongst delivery channels

 Standardized documentation of comments/ objections leads to effective supervision-through comparative indicators

 Centralizes and integrates data for better audit and analysis.

Questions and answers – Business Intelligence Group 8

1) What is BI and what are BI implementation challenges?

Business intelligence is valuable, timely, accurate, high-value, and actionable business insights, and the work processes and technologies used to obtain them. Business intelligence technologies transform raw data into meaningful and useful information for business purposes. Common functions of business intelligence technologies are reporting, online analytical processing, analytics, data mining, complex event processing, business performance management, benchmarking etc.

Important BI implementation challenges are –

1) Resistance to BI adaption - A BI initiative can change the way in which business users do their data analysis. It might also entail changes to the procedures in place at the organization. Thus a BI deployment can face resistance from business users as well as various IT teams. Building strong relationships within IT and data management teams is necessary to counter this challenge. Also required is full backing of the top management to drive adaption of BI and new reporting standards in the organization. A company can also form central BI committee or center of excellence to drive BI initiatives.

2) Data volatility – Data sources, downstream application or the process can change while a large scale BI implementation is still going on. Planning in advance for data volatility by maintaining data hierarchies and relationships is crucial to counter this. Also it will be helpful if BI implementation plan is integrated with other project plans.

3) Functionality limitation – It is highly important to be aware of your BI requirements and communicate them to the vendors in clear terms. Various BI products available should be thoroughly studied and checked against requirements before doing selection. In depth study must be carried out even while selecting the vendor. The ability of the vendor to execute the project, availability of skills, vendor track record are some of the points one should check.

4) BI penetration – Even if BI is implemented it is of no help if people are not using it. Getting more and more employees to make used of BI functionalities is necessary to the success of BI program. Thus getting the used involved well in advance before BI implementation begins and providing them with proper training is a must.

5) Clean data – Data quality is a severe challenge faced during BI implementation. Different source systems have varying layers of controls and business-rule consistency. Many a times data in different sources are in different formats. Correcting the data at the source and modifying the procedures is required to counter this.

6) Scope creep - BI projects have a notoriously high incidence of scope creep because BI covers many departments and often touches many different preexisting systems. This can be countered by employing good business analyst who can provide excellent business requirements, by building flexibility into the project plan and by adhering to strict change management processes.

2) State applications of business intelligence in real life scenarios.

Business intelligence has been used to identify cost-cutting ideas, uncover business opportunities, roll ERP data into accessible reports, react quickly to retail demand and optimize prices.

BI software can give companies more leverage during negotiations by making it easier to quantify the value of relationships with suppliers and customers.

Some of the important real life applications of BI are -

1. Hospitals –

Value-based reimbursement models are rapidly changing the face of healthcare. To compete in the new era of patient-centered medical homes, accountable care organizations and initiatives related to reducing the cost of care, hospitals of all sizes need business intelligence (BI).

Hospitals increasingly are expected to measure, report on, and manage a wide variety of operational, financial and clinical indicators. Ultimately, reimbursement is at stake, with incentives handed to hospitals whose data shows lower costs and better patient care—and penalties assessed on those whose data falls short.

2. Retail Shops-

There are intelligent retailers such as Wal-Mart and Tesco are heavy users of BI. Take Tesco, for example, who has become the second most powerful retailer on the planet. This has not happened by chance but through applying the principles of an intelligent company. Tesco have identified two factors above all: making sure everyone in the company is actively engaged in trying to improve performance - all the time; and having the data and analytical skills to test ideas and turn insights into customer and business relevant actions.

3. Restaurants-

Restaurant chains such as McDonalds, CKE and T.G.I. Friday’s have successfully applied the principles of an intelligent company. They use BI to make strategic decisions, such as what new dishes to add to or remove from their menus and which underperforming stores to close. They also use BI for tactical matters such as renegotiating contracts with suppliers and identifying opportunities to improve inefficient processes. At the US- headquartered CKE Restaurants, which includes major US brands such as the Hardee’s and Carl’s Jr. quick-service restaurant chains, the process for new product introduction calls for rigorous testing at a certain stage.

Testing begins with brainstorming, in which several cross-functional groups develop a variety of new product ideas. Only some of them make it past the next phase, judgmental screening, during which a group of marketing, product development, and operations people will evaluate ideas based on experience and intuition. Those that make the cut are actually developed and then tested in stores, with well-defined measures and control groups. At that point, executives decide whether to roll out a product system wide, modify it for retesting, or kill the whole idea.

4. Industries-

Yahoo Inc. is another intelligent company that used BI effectively to improve their website. The organization receives many millions of hits to its home page each hour. To test alteration to the home page they randomly assign one or two hundred thousand users to an experimental group and have several million other visitors as a control group. By doing so, they can quickly see whether or not the alterations to the home page leads to the assumed change in the behavior of the customer. This in turn allows them to optimize their offerings to enhance revenues and profits. The results of these experiments can often be seen within minutes, and Yahoo! typically runs about 20 experiments at any given time.

3) Name any 5 BI vendors and state features of their products –

1) IBM –

1) IBM Cognos BI 10.2, Cognos Insight, SPSS Modeler 15, Analytical Decision Management 7.0 and Analytic Answers are some of the major BI products by IBM

2) IBM Cognos Express 10.1, provides comprehensive BI suite functionality along with budgeting, planning and forecasting capabilities at a lower license cost. This is ideal for departmental, workgroup or smaller company business analytics requirements.

3) Analytic Answers is a cloud based IBM product which offers analytics-as-a-service. You simply use a web browser to upload sets of data and download results which are expressed in terms that can be acted on promptly.

4) IBM products are chosen for the comprehensive functionality and ability to integrate easily with information infrastructure i.e. databases and servers.

5) IBM Cognos products are difficult to use as compared to its competitors and they are mainly used for creating static reports as of yet.

2) SAP 1) SAP is the global market share leader of the BI and analytics platforms market. The major system integrators all have large SAP and BusinessObjects practices. Access to people (internal or external) who know SAP BW or BusinessObjects is rarely difficult.

2) SAP offers an integrated mobile BI toolkit so that developers can leverage the SAP Mobile Platform, (formerly known as Sybase Unwired Platform), thereby offering customer mobile analytics app design, device management and device security.

3) SAP Predictive Analysis, is its predictive analytics offering which integrates analytical capabilities with the real- time and in-memory capabilities. Advanced analytics products can be used for uses cases such as Customer Segmentation Accelerator, and Business Planning and Consolidation.

3) Oracle –

1) Oracle Business Intelligence Enterprise Edition (OBIEE), is an IT-driven, unified metadata-centric BI and analytics platform that's best suited for building large, IT-managed and centrally governed global deployments. OBIEE customers report among the largest average deployment sizes in terms of users, data and company size.

2) Oracle products are chosen because of ease of integration optimization with broader oracle stack. Oracle BI offers more than 80 prebuilt analytic applications for Oracle E-Business Suite (EBS), PeopleSoft, JD Edwards, Siebel, Fusion (on-premises and in the cloud) and other enterprise applications.

3) Oracle's newest engineered system, Exalytics In-Memory Machine, provides an optimized hardware and software configuration that includes OBIEE, Oracle Essbase, Oracle Endeca Information Discovery, and in-memory software (based on Oracle's acquisition of TimesTen) designed for large and complex analytics workloads, including dynamic planning and what-if and scenario analysis.

4) OBIEE is primarily used for systems of record, static and parameterized reporting, as well as dashboards centrally developed by IT and delivered to report consumers.

4) Microsoft

1) The company's strategy has been to enhance the BI capabilities in three of its core offerings with each release — including Microsoft Office (specifically Excel), Microsoft SQL Server and Microsoft SharePoint — to increase their value and drive upgrades.

2) Microsoft's product success is driven in part by its IT-oriented BI authoring tools within SQL Server, which are based on Visual Studio, the broadly adopted development environment.

3) By incorporating BI capabilities into its most ubiquitous products, and by removing deployment barriers, Microsoft virtually guarantees its BI offering's continued and even expanded adoption, particularly in organizations that have standardized on Microsoft for information management. 4) Because Microsoft's BI platform capabilities exist across three different tools (Office, SQL Server and SharePoint) that also perform non-BI functions, integrating the necessary components and building the applications is left to the organization. Microsoft's do-it-yourself approach puts more of the BI solution's development and integration onus for the platform components on customers, compared with the all-in-one purpose-built BI platforms offered by most other vendors in the BI market.

5) Microsoft lags behind most other BI vendors in delivering mobile BI capabilities. It has been slow to deliver BI on mobile devices.

5) SAS

1) SAS's portfolio includes tools in areas such as BI, performance management, data warehousing and data quality; however, unlike most other BI platform vendors, SAS primarily focuses on advanced analytical techniques, such as data mining and predictive modeling.

2) SAS's products are used to report the use of large datasets and perform analysis with above-average complexity. They are difficult to use as well.

3) Visual Analytics, is its product that merges dashboard design with diagnostic analytics and the use of predictive models — a possibility not yet available in some of its competitors' tools.

4) SAS's dominance in predictive analytics and statistics is challenged on many fronts. IBM is still the main challenger with SPSS and other analytic assets, but wide support of open-source R by large competitors, such as Oracle, SAP and other smaller vendors, are most serious

1. What is Cloud Computing? What are its advantages and disadvantages?

Ans: Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity grid.

Cloud computing allows a company to pay for only as much capacity as is needed, and bring more online as soon as required as the way electricity, fuel and water are consumed. It’s an On-demand provision of computational resources (data, software) via a computer network, rather than from a local computer

. Typical requirements and models:

 platform (PaaS),

 software (SaaS),

 infrastructure (IaaS),

 Services-based application programming interface (API)

Following are the advantages of cloud computing:

1. Reduced spending on technology infrastructure :

By using the Cloud infrastructure on “pay as used and on demand”, all of us can save in capital and operational investment. 2. Reduced capital costs

You do not need a high-powered and high-priced computer to run cloud computing's web-based applications.

Since applications run in the cloud, not on the desktop PC, your desktop PC does not need the processing power or hard disk space demanded by traditional desktop software.

When you are using web-based applications, your PC can be less expensive, with a smaller hard disk, less memory, more efficient processor.

In fact, your PC in this scenario does not even need a CD or DVD drive, as no software programs have to be loaded and no document files need to be saved.

3. Universal document access

Universal document access is not a problem with cloud computing, because you do not take your documents with you.

Instead, these documents stay in the cloud, and one can access them whenever one has a computer and an Internet connection.

Documents are instantly available from wherever you are.

4. Almost Unlimited Storage

Storing information in the cloud gives you almost unlimited storage capacity as the infrastructure responsibility is with the cloud provider.

5. Improved performance

With few large programs on your computer's memory, you will see better performance from your PC.

Computers in a cloud computing system boot and run faster because they have fewer programs and processes loaded into memory.

6. Backup and Recovery

Since all the data is stored in the cloud, backing it up and restoring the same is easy. The cloud service providers are usually competent enough to handle recovery.

7. Increased collaboration

This helps in increased collaboration by allowing all employees – wherever they are – to sync and work on documents and shared apps simultaneously.

8. Document Control

If a company doesn’t use the cloud, workers have to send files back and forth over email, meaning only one person can work on a file at a time and the same document has tonnes of names and formats.

Here, many people can access the file at the same time due to a ‘central’ storage. 9. Increased data reliability

Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data.

If your personal computer crashes, all your data is still out there in the cloud, still accessible

In a world where few individual desktop PC users back up their data on a regular basis, cloud computing is a data- safe computing platform.

Hence, more work can be done in less time with less people.

Following are the disadvantages of cloud computing:

Like many other technological capabilities, cloud computing too has its advantages

1. Requires a fast constant Internet connection

The use of cloud computing technology requires the user to connect to the cloud via the internet. So, cloud computing is impossible if you cannot connect to the Internet.

Since you use the Internet to connect to both your applications and documents, if you do not have an Internet connection you cannot access anything, even your own documents.

Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible.

2. Stored data can be lost:

Theoretically cloud computing technology is safe but on the off chance that your data goes missing, you have no physical or local backup.

3. Security in the Cloud

Cloud computing involves surrendering the company’s sensitive information to a third-party cloud service provider. This could potentially put a company to great risk.

4. Prone to Attacks

Surrendering the data can make company vulnerable to external hack attacks and threats. An example of this can be hacking of a personal ‘gmail account’.

2. Explain the types of cloud and their business applications?

Ans: The different types of cloud are Public cloud, Private cloud, Community cloud and Hybrid cloud.

Public cloud: These are made available to its users by a service provider who hosts the cloud infrastructure. Public cloud providers like Microsoft and Google own and operate the infrastructure and offer access over the Internet. With this model, customers have no visibility or control over where the infrastructure is located. All customers on public clouds share the same infrastructure pool with limited variation and security protections.

Public Cloud customers benefit from economies of scale, because infrastructure costs are spread across all users, allowing each individual client to operate on a low-cost, “pay-as-you-go” model. Another advantage of public cloud infrastructures is that they are typically larger in scale than private cloud. Public clouds offer the greatest level of efficiency in shared resources; however, they are also more vulnerable than private clouds.

A public cloud is typically used when:

 Range of applications or services is consumed by lots of consumers, e.g: e-mail, social networking sites, on-demand-gaming etc.

 Savings on the amount to be spent on maintenance of the resources is important.

 Operating a start-up or for a small enterprise

Private cloud: These clouds are dedicated to a particular organization. Private clouds allow businesses to host applications in the cloud, while addressing concerns regarding data security and control, which is often lacking in a public cloud environment. It is not shared with other organizations, whether managed internally or by a third- party, and it can be hosted internally or externally.

There are two variations of private clouds:

1. On-Premise Private Cloud: This type of cloud is hosted within an organization’s own facility. A businesses IT department would incur the capital and operational costs for the physical resources with this model. On-Premise Private Clouds are best used for applications that require complete control and configurability of the infrastructure and security.

2. Externally Hosted Private Cloud: Externally hosted private clouds are also exclusively used by one organization, but are hosted by a third party specializing in cloud infrastructure. The service provider facilitates an exclusive cloud environment with full guarantee of privacy. This format is recommended for organizations that prefer not to use a public cloud infrastructure due to the risks associated with the sharing of physical resources.

Private clouds are more expensive but also more secure when compared to public clouds. Roughly 76% of IT decision-makers will focus exclusively on the private cloud, as these clouds offer the greatest level of security and control.

Private Cloud can be used when:

 An organisation needs data control but wants cloud efficiencies

 It wants consistency across services

 Organisation has more server capacity than your organization can use

Community cloud: It is a multi-tenant (single instance of software runs on multiple clients) cloud service model that is shared among several organizations and is governed, managed and secured commonly by all the participating organizations or a third party managed service provider. Community clouds are a form of private clouds built and operated specifically for a targeted group. These communities have similar cloud requirements and their ultimate goal is to work together to achieve their business objectives.

The goal of community clouds is to have participating organizations realize the benefits of a public cloud with the added level of privacy, security, and policy compliance usually associated with a private cloud. Community clouds can be either on-premise or off-premise.

Community clouds are suited in the following manner:

Government can exploit this concept to enforce standardization across domains and create a level playing field e.g.: A private number portability cloud for a group of service providers.

Hybrid cloud: These are a composition of two or more clouds (private, community or public) that remain unique entities but are bound together offering the advantages of multiple deployment models. In a hybrid cloud, one can leverage third party cloud providers in either a full or partial manner; increasing the flexibility of computing. Combining a traditional private cloud with the resources of a public cloud can be used to manage any unexpected surges in workload.

Hybrid cloud architecture requires both on-premise resources and off-site server based cloud infrastructure. By spreading things out over a hybrid cloud, we can keep each aspect of a business in the most efficient environment possible. The downside is that one has to keep track of multiple cloud security platforms and ensure that all aspects of a business can communicate with each other.

Hybrid clouds are best suited when:

 A company wants to use a SaaS application but is concerned about security.

 A company offers services that are tailored for different vertical markets.

 An organisation can provide public cloud to your customers while using a private cloud for internal IT.

3. Explain different service models of cloud computing with their advantages and disadvantages?

Ans: Cloud computing vendors provide their services according to several service models: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS).

1. SAAS

These are cloud services that allow customers to access software application over the internet. The application is hosted over the cloud and the users can access the application via any internet enabled device. SAAS is referred to as software on demand and it is like renting software rather than buying it. E.g. Twitter, facebook, Google Apps

Advantages of using SAAS:  No additional hardware costs: The hardware is maintained by the cloud provider

 Multitenant Architecture: A multitenant architecture, in which all users and applications share a single, common infrastructure and code base that is centrally maintained. Because SaaS vendor clients are all on the same infrastructure and code base, vendors can innovate more quickly and save the valuable development time previously spent on maintaining numerous versions of outdated code.

 No initial setup costs: Applications are ready to use once the user subscribes them.

 Pay for what you use: You can access a piece of application and just pay for it.

 Usage is scalable: if a user decides they need additional services they can access them on demand without needing to install new software or hardware.

 Updates are automated: the updates will usually be deployed automatically by the cloud provider.

 Cross device compatibility; SaaS applications can be accessed via any internet enabled device, such as internet enabled phones and tablets

 Accessible from any location; You can access the application from anywhere via internet.

 Applications can be customized and whitelabelled; with some software, customization is available meaning it can be altered to suit the needs and branding of a particular customer.

Disadvantages of the SaaS:

 Security and privacy of critical data

 Risk of service disruption due to internet connectivity issues

2. PAAS

These are cloud computing services that allow the developers to build applications and services over the internet. Cloud providers deliver a computing platform typically including operating system, programming language execution environment, database, and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers.

Examples of PaaS include: Amazon Elastic Beanstalk, Cloud Foundry, Heroku

Below are some of the features that can be included with a PaaS offering:

 Operating system

 Server-side scripting environment

 Database management system

 Server Software  Support

 Storage

 Network access

 Tools for design and development

 Hosting

Advantages of PaaS to application developers:

 No investment in physical infrastructure: clients will only need to rent the resources they need rather than invest in fixed, unused and therefore wasted capacity.

 Makes development possible for ‘non-experts’; with some PaaS offerings anyone can develop an application. They can simply do this through their web browser utilizing one-click functionality. Salient examples of this are one-click blog software installs such as WordPress.

 Flexibility: They can ‘pick and choose’ the features they feel are necessary from the tools provided in the platform by cloud provider

 Teams in various locations can work together; as an internet connection and web browser are all that is required, developers spread across several locations can work together on the same application build.

 Security; security is provided, including data security and backup and recovery.

Disadvantages of PaaS

 PaaS clients cannot necessarily create and delete multiple virtual machines as easily as their IaaS counterparts.

 PaaS does not represent a complete product in the way that Software as a Service (SaaS) offerings do. An organization must still undergo a development effort in order to design, build, and test programs before they can be deployed to the end users.

3. IAAS

In the case of IaaS the cloud resource provided is specifically that of virtualized hardware, in other words, computing infrastructure. The services include offerings as virtual server space, network connections, bandwidth, IP addresses and load balancers. Physically, the pool of hardware resource is pulled from a multitude of servers and networks usually distributed across numerous data centers, all of which the cloud provider is responsible for maintaining. The client, on the other hand, is given access to the virtualized components in order to build their own IT platforms. Eg:Amazon EC2, Google Compute Engine, HP Cloud

How IaaS can be utilized by enterprise:

 Enterprise infrastructure; by internal business networks, such as private clouds and virtual local area networks, which utilize pooled server and networking resources and in which a business can store their data and run the applications they need to operate day-to-day. Expanding businesses can scale their infrastructure in accordance with their growth whilst private clouds (accessible only by the business itself) can protect the storage and transfer of the sensitive data that some businesses are required to handle.

 Cloud hosting; the hosting of websites on virtual servers which are founded upon pooled resources from underlying physical servers. A website hosted in the cloud, for example, can benefit from the redundancy provided by a vast network of physical servers and on demand scalability to deal with unexpected demands placed on the website.

 Virtual Data Centers (VDC); a virtualized network of interconnected virtual servers which can be used to offer enhanced cloud hosting capabilities, enterprise IT infrastructure or to integrate all of these operations within either a private or public cloud implementation.

Advantages of IAAS:

 Scalability; resource is available as and when the client needs it and, therefore, there are no delays in expanding capacity or the wastage of unused capacity

 No investment in hardware; the underlying physical hardware that supports an IaaS service is set up and maintained by the cloud provider, saving the time and cost of doing so on the client side

 Utility style costing; the service can be accessed on demand and the client only pays for the resource that they actually use

 Location independence; the service can usually be accessed from any location as long as there is an internet connection and the security protocol of the cloud allows it

 Physical security of data centre locations; services available through a public cloud, or private clouds hosted externally with the cloud provider, benefit from the physical security afforded to the servers which are hosted within a data centre

 No single point of failure; if one server or network switch, for example, were to fail, the broader service would be unaffected due to the remaining multitude of hardware resources and redundancy configurations. For many services if one entire data center were to go offline, never mind one server, the IaaS service could still run successfully.

Disadvantages:

1. Success of use of the service depends on the capability of the vendor. 2. In the short run the costs may appear low but in the long cost of renting out services may prove costly. 3. Due to the shared nature of the infrastructure used, the applications may need new and special kind of security. 4. Governance issues: As data could be stored anywhere over the cloud, it’s important to determine the nature of data stored. Many countries have strict regulations on the location of the data.

a) What is IT project Management? Explain its Emerging trends and challenges.

IT Project management is the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed project requirements in the most efficient manner in the least possible time with least possible cost.

Emerging trends in Project Management

1. Breaking the triple constant

 Redesign systems- Organizations look to have a good mix of project, program and portfolio managers. Systems should be redesigned thinking beyond the triple constraint.

 Delivery of results- The combined power of project portfolio, program and project management enables delivering business results not limited to the triple constraint.

 Consideration of all factors- If a project is delivered on time, within budget and with required quality, but its outcome doesn't provide expected value, the project should not be considered successful.

2. Multiple project functions

 Projects will start to be identified in different business functions where they might not exist very often, such as sales, marketing, alliances, human resources, etc. Marketing managers, sales managers, HR managers, finance managers and the like have to acquire project management skills to deliver better results in their respective functions.

 Organizations should refine their project management strategy to include project lifecycles for all projects and training for all managers. Project Management Centers of Excellence (COE) have to focus on creating special learning assets to train managers on project management in other functions.

3. SMAC project management

 Social media management is the way forward, and projects must incorporate this in their culture

 Accounting for cloud computing, the approach must include refined templates, checklists, best practices, risk registers etc.

 Even a medium like Twitter can be used well if managers are educated on these trends and how their usage will affect them.

4. Increased emphasis on soft skills  Communication- Among the most difficult skills for a project manager, it comes into play during difficult conversations and negotiations.

 Leadership- While it is necessary to rally the team and deliver on time, it is also important to adapt your style to the people on your team.

 Goal-setting- As it is frustrating for team members if they do not know what their goal is, it should be such that each person feels responsible for his work.

 Mentoring- Acts as a bridge between senior and junior members, whose payoff is committed team members who will deliver.

5. PMOs as profit centers

 PMOs will be transformed from cost centers to profit centers. PMOs will build very high-end consulting skills and offer services to business units on a profit basis. PMOs will focus on an 'outside-in' perspective and move away from an 'inside-out' perspective. PMO drivers will be around customers, markets and the economy, and not just limited to internal efficiencies.

 This means that project managers have to understand the outside-in perspective. They have to focus on outcome and the value to be delivered to customers.

6. Every employee is a project manager

 Mini-projects- A mindset of planning, execution, monitoring and controlling is needed. Every task should be considered a mini project.

 Cultural change- In organizations currently, only a few people focus on project management. By following the above step, self-reliance is promoted.

 On-the-job training- The best way to train employees to think like project managers is through on-the-job training.

------

b) Explain basic principles of Project Cost management. Also explain cost modeling.

Basic Principles of Cost Management

 Cost is a resource sacrificed or foregone to achieve a specific objective or something given up in exchange

 Costs are usually measured in monetary units like dollars

 Project cost management includes the processes required to ensure that the project is completed within an approved budget

o Cost Estimating  Project managers must take cost estimates seriously if they want to complete projects within budget constraints

 It’s important to know the types of cost estimates, how to prepare cost estimates, and typical problems associated with IT cost estimates

o Cost Budgeting

 Cost budgeting involves allocating the project cost estimate to individual work items over time

 The WBS is a required input to the cost budgeting process since it defines the work items

 An important goal is to produce a cost baseline

o A time-phased budget that project managers use to measure and monitor cost performance

o Cost Control

 Project cost control includes:

o Monitoring cost performance

o Ensuring that only appropriate project changes are included in a revised cost baseline

o Informing project stakeholders of authorized changes to the project that will affect costs

 Many organizations around the globe have problems with cost control

o Algorithmic Cost modeling

 Cost is estimated as a mathematical function of product, project and process attributes whose values are estimated by project managers

o Effort = A ´ SizeB ´ M

o A is an organisation-dependent constant, B reflects the disproportionate effort for large projects and M is a multiplier reflecting product, process and people attributes

 Most commonly used product attribute for cost estimation is code size

 Most models are basically similar but with different values for A, B and M

 Is the basis for modern costing methods such as COCOMO (Constructive Cost Model) and SLIM (Software Lifecycle Management).

------

c) Explain in brief the steps of defining and maintaining the project scope. Also explain Project risk management process.

Scope Management Process

 Scope planning: deciding how the scope will be defined, verified, and controlled

 Scope definition: reviewing the project charter and preliminary scope statement and adding more information as requirements are developed and change requests are approved

 Creating the WBS: subdividing the major project deliverables into smaller, more manageable components

 Scope verification: formalizing acceptance of the project scope

 Scope control: controlling changes to project scope

The purpose of Scope Management is to ensure the project includes all the work required, and only the work required, for completing the project successfully. In scope management the emphasis is on identifying and controlling what is or is not included in the project.

Consequently, the objective of this scope management process is to provide a methodology for:

 Describing the process and tools used to define the project scope;

 Developing a project scope statement;

 Defining and developing the Work Breakdown Structure;

 Describing the scope verification activities; and

 Describing how the project scope will be controlled.

Scope is defined and then refined during an iterative process that begins in the Project Identification Stage and continues into the Delivery Stage. The process is conducted in consultation with subject matter experts (SMEs) and stakeholders, becoming increasingly detailed as the project progresses. The fully defined project scope will contain the following elements:

 Project goals, business outcomes and objectives;

 Product scope description;

 Project boundaries;

 Specifically excluded activities;

 Deliverables and associated acceptance criteria;

 Project constraints; and  Project assumptions.

IT Project Risk Management Processes

 Risk Planning: It involves developing a proper plan for handling risks.

 Risk Identification: It identifies the possible risks that can occur in the project.

 Risk Assessment: It analyses the types of risk that can occur and the impact each of these can have on the project

 Risk Strategies: It decides the strategies that need to be followed for handling each type of risk.

 Risk Monitoring and Control: After proper steps have been taken, it becomes essential to continuously monitor them and ensure that they do not occur. Proper control measures need to be in place.

 Risk Response: It takes actions when a risk occurs.

 Risk Evaluation: Evaluating the action and consequences of the risk occurred.

Q.1 Explain the evolution of MRP. What is Manufacturing Resource Planning II? Describe the process involved and also state the advantages and disadvantages in implementing it. Material Requirements Planning (MRP) is a software based production planning and inventory control system used to manage manufacturing processes.

An MRP system is intended to simultaneously meet three objectives:

• Ensure materials and products are available for production and delivery to customers.

• Maintain the lowest possible level of inventory.

• Plan manufacturing activities, delivery schedules and purchasing activities

Prior to MRP, and before computers dominated industry, reorder-point/reorder-quantity (ROP/ROQ) type methods like EOQ (Economic Order Quantity) had been used in manufacturing and inventory management. In 1964, Joseph Orlicky as a response to the TOYOTA Manufacturing Program, developed Material Requirements Planning (MRP). The first company to use MRP was Black & Decker in 1964, with Dick Alban as project leader. In 1983 Oliver Wight developed MRP into manufacturing resource planning (MRP II).

Manufacturing Resource Planning (MRP II) is defined by APICS (American Production and Inventory Control Society, Estd. 1957) as a method for the effective planning of all resources of a manufacturing company. Ideally, it addresses operational planning in units, financial planning in dollars, and has a simulation capability to answer "what-if" questions and extension of closed-loop MRP.

This is not exclusively a software function, but a marriage of people skills, dedication to data base accuracy, and computer resources. It is a total company management concept for using human resources more productively.

Purpose

MRP II integrates many areas of the manufacturing enterprise into a single entity for planning and control purposes, from board level to operative and from five-year plan to individual shop-floor operation. It builds on closed-loop Material Requirements Planning (MRP) by adopting the feedback principle but extending it to additional areas of the enterprise, primarily manufacturing-related.

Key functions and Features

MRP II is not a proprietary software system and can thus take many forms. It is almost impossible to visualise an MRP II system that does not use a computer, but an MRP II system can be based on either purchased / licensed or in-house software.

Almost every MRP II system is modular in construction. Characteristic basic modules in an MRP II system are:

• Master Production Scheduling (MPS)

• Item Master Data (Technical Data)

• Bill of Materials (BOM) (Technical Data)

• Production Resources Data (Manufacturing Technical Data) • Inventories & Orders (Inventory Control)

• Purchasing Management

• Material Requirements Planning (MRP)

• Shop Floor Control (SFC)

• Capacity planning or Capacity Requirements Planning (CRP)

• Standard Costing (Cost Control)

• Cost Reporting / Management (Cost Control)

• Distribution Resource Planning (DRP) together with ancillary systems such as:

• Business Planning

• Lot Traceability

• Contract Management

• Tool Management and related systems such as:

• General Ledger

• Accounts Payable (Purchase Ledger)

• Accounts Receivable (Sales Ledger)

• Sales Order Management

• Distribution Requirements Planning (DRP)

• *Automated+ Warehouse Management

• Project Management

• Technical Records

• Estimating

• Computer-aided design/Computer-aided manufacturing (CAD/CAM)

• CAPP

The MRP II system integrates these modules together so that they use common data and freely exchange information, in a model of how a manufacturing enterprise should and can operate. The MRP II approach is therefore very different from the “point solution” approach, where individual systems are deployed to help a company plan, control or manage a specific activity. MRP II is by definition fully integrated or at least fully interfaced.

 MRP II systems can provide:

• Better control of inventories

• Improved scheduling

• Productive relationships with suppliers

For Design / Engineering:

• Improved design control

• Better quality and quality control

For Financial and Costing:

• Reduced working capital for inventory

• Improved cash flow through quicker deliveries

• Accurate inventory records

• Timely and valid cost and profitability information

 Drawbacks of MRP II

• Hidden costs

• Potential losses due to long lead times

• Poor on-time customer delivery performance

Q.2] Describe the various IT applications used in FMCG industry. Also provide examples.

The various technologies used in FMCG are:

1) Cloud Computing

2) Neural Networks

3) Video Walls

4) RFID

a) Cloud Computing:

Cloud computing is defined as an updated version of utility computing. They are nothing but virtual servers available over the internet. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Shared architecture philosophy, on the other hand, does support elastic scalability.

Advantages:

1. Cost Efficient

2. Almost Unlimited Storage

3. Backup and Recovery

4. Easy Access to Information

5. Quick Deployment

Disadvantages:

1. Security in the Cloud

2. More Prone to attack

3. Technical Issues

4. Maintenance

Eg:

1) The cloud based implementation by Media Cart and Shoprite in New Jersey for better consumer experience.

b) Neural Networks

 Neural Networks is something very similar to the Nervous system of our body

 An excitation is signalled by a value of 1 and a value of 0 indicates inhibition

 Neural networks are "trained" by presenting it examples of input and the corresponding desired output

 Used in Forecasting and Data mining

 Neural networks are used in cases where the outcome is fuzzy in nature

c) Virtual Walls

 Giant screens which were earlier used to for advertising.

 However, with the evolution of technology, they are now being used as a means to interface with the consumer.

 These giant screens are strategically placed at locations all over the city, which can be easily accessible to the general public.  A modern day Virtual Wall consists of a QR code which when scanned gives details about the desired product.

 The scan of the QR code leads the consumer to the online order portal, where the consumer can place and order for the product and can also get it delivered at his doorstep.

 This has currently been implemented by P&G in Czech Republic.

d) RFID – Radio Frequency Identification Technology

 RFID technology is basically used for easy location of products.

 By collaborating it Internal Mapping technology, they can be used successfully to deliver a better customer experience in a mall.

 It has been implemented by Shoprite shopping mall at New Jersey in 2008.

Below is the flow chart for describing the use of this technology by the customer.

Q.3 What are the various applications of ITM in construction industry? Also provide examples.

1. Project Management Solutions

• ITM provides custom built solutions for budgeting, monitoring and controlling all aspects of cost for all major construction projects to aid in effective project management.

• In order to facilitate managing projects across geographies, ITM provides custom built solutions required for tracking and reporting the progress and performance of the construction projects with support for multi-language, multi-currency and multi-regional setting.

• ITM applications can be built for Procurement support and inventory management.

Benefits of Management Systems

• Regulatory report filing which will be mandatory in India once the Real Estate (Regulation and Development) bill is passed.

• Tools are available to facilitate better financial control.

• Tools are available for better communications with suppliers and customers.

• Faster access to common data spread across all sites. Thus the developer need not visit multiple sites to manage them.

• There are myriad new and improved means to attract customers.

• Faster completion of work via efficient supply chain management.

• Streamline coordination between managers, suppliers and contractors.

• Easier to manage large quantity of data

2. Mobile IT and RFID Solutions

• Mobile Inspection and Progress Monitoring via mobile applications save time and travel.

• Mobile Workforce Tracking solutions enable monitoring the employee activities.

• Scheduling Materials via Mobile.

• Fleet and Equipment Management.

• Tracking Asset via Mobile.

3. Document Management Systems

 Electronic Document Management (EDM) is a well known system consisting of a private network that uses internet protocol to transmit information.

 All these project documents are stored on a single server and the user interface can be as simple as an FTP (File Transfer Protocol) site or a user friendly web page complete with a search engine

 Electronic document management systems do away with the time-consuming process of sifting through paper files at the risk of discovering the document was not properly put away by the last person to pull it.

 EDM systems allow files to be recalled at the click of a mouse, while providing information on when and by whom the file was last viewed and/or marked up.

 Documents can be scanned and stored to create an electronic database accessible to users across an enterprise. Cloud-based EDM systems can also allow out-of-office users to access company and project- related documents through a wireless connection.

4. 3-D MODELLING AND BUILDING INFORMATION MODELS

 3-D Modelling and building information models allow 3-Dimensional visualization of construction projects, so that clients, design engineers and contractors can perform visualized walk-through, view realistic renderings of buildings before actual construction and even examine construction frequencies in 4- Dimensional animations.

 Contractors can use the model to analyze the constructability of highly detailed areas and visualize potential problem areas.

 This type of early-on constructability verification can save considerable time and money by preventing expensive re-work or on-site corrections.

5. CONSTRUCTION SEQUENCING AND 4-D MODELING

4D Concept

 4D Models link components in 3D CAD models with activities from the design, procurement, and construction schedules.

 The use of the term 4D is intended to refer to the fourth dimension: time, i.e. 4D is 3D + schedule (time).

 4D models enable exploration and improvement of the project executing strategy, facilitate improvements in constructability with corresponding gains in on-site productivity, and make possible the rapid identification and resolution of time-space conflicts.  4D CAD models have proven particularly helpful in projects that involve many stakeholders, in projects undergoing renovation during operation, and in projects with tight, urban site conditions.

Example of 4D Project

 Walt Disney Imagineering used 4D models to plan the construction of the Paradise Pier portion of Disney’s recently opened California Adventure in Anaheim, CA.

 Tight site conditions, a must-meet completion deadline, and many non-construction stakeholders made the project ideal for the application of 4D project management.

 The 4D model enabled the project team to produce a better set of specifications and design drawings for the construction of the project, resulting in fewer unplanned change orders, a smaller construction team, and a comfortable completion of the project ahead of schedule.

6. Popular computer applications for construction activities

 SmartBidNet: Consisting of bid management systems, this iPhone app will allow you create and track your bid process with your subcontractors, and companies, in a secure and reliable way. SmartBidNet will provide you with accessible information to make bid projects easier and on time.

 GoBIM: BIM applications are now used everywhere in the construction industry. GOBIM application will provide you the possibility to navigate 3D BIM models and their associated data. However, the size of the model that GoBIM can handle is dependent on three factors, number of triangles, number of parameters, and number of materials.

Following are the examples of some leading software companies and their applications

 Aconex: Web-based system for managing project information such as drawings, documents, tenders and correspondence.

 Causeway: Application for Designing, cost management and financial supply chain management.

 CMCS: CMCS offers PPMIS, a portfolio and project management solution.

 Construction Computer Software (CCS): Provides solutions for Construction Estimating and Project Control system.

 Primavera: Oracle subsidiary, provides project portfolio management solutions.

 Vico: Vico’s 5D Virtual Construction suite is designed to bring the benefits of building information modeling to construction companies.  TCS: Provides Asset Management Solutions, Collaboration & Document Management Solutions, Engineering and Design Back Office etc.

Q 1: Give the brief details on application of IT in ?

Application of Information Technology In Indain Railways

1. Passenger Reservation System (PRS) - A countrywide online passenger reservation and ticketing system, developed and maintained by CRIS, is a complex online distributed client server application developed in C and Fortran programming languages on Digital OpenVMS operating system using RTR (Reliable Transaction Router) as middleware. CONCERT (Country-wide Network of Computerised Enhanced Reservation & Ticketing) interconnects the four regional computing systems at New Delhi, Mumbai, Kolkata, and Chennai into a National PRS grid. It allows a passenger from any location to book train tickets from any station to any station. It handles reservations, modifications, and cancellations / refunds. It performs reservation for over 1.6 million seats and berths daily. It has complex rules, validations and fare computation techniques interwoven in the application.

2. The computerization of the Freight Operations Information System of Indian Railways - FOIS enables management and control of freight movement, optimization of asset utilization, and generation of freight invoices ("Railway Receipts"). Many of IR's important freight customers pay through the electronic payment gateway interfaced with FOIS. Approximately 72% of the freight revenue of the Railways is paid through the payment gateway.

3. The Internet based E-ticketing reservation system, whose front-end has been developed by CRIS.

4. The computerisation of the Unreserved Ticketing System Unreserved Ticketing System of Indian Railways - Unreserved ticketing constitutes a major component of the IR’s overall ticketing volume and is an important source of revenue. UTS delivers fast and efficient unreserved ticketing from dedicated counters replacing manual Printed Card Tickets/EFTs/BPTs with centralised online sales accounting. The solution architecture lends itself to easy integration with handheld terminals, smart cards, automatic vending machines, etc.

5. National Train Enquiry System and RailRadar for latest train running timings and live train tracking.

6. Web Enabled Claims- The web-based software enables the general public to not only file claim cases through the web but also track the progress of their claims. All the rules and regulations for claims and accident case filing along with contact details of all claims offices are available on the website.

7. Rail Budget Compilation System (RBCS)- Developed for budgetary inputs from the different zones and production units of the Indian Railways, RBCS facilitates capturing of data, building of database, analysis of demands and pruning of the estimates for inclusion in the Railway Budget.

8. Vigilance Software System (VSS) - VSS is designed specially for the requirements of Vigilance on Indian Railways and has been implemented in all the Zonal Railway Headquarters. VSS maintains information on vigilance cases / complaints including various reports and correspondence.

9. "I-Pass" addresses functionalities for Personnel and Finance Departments. I-Pass contains two major modules: Financial Accounting System (FAS) and Payroll System (PS).

10. Workshop Information System (WISE) - WISE is a MIS project for the various railway workshops around the country. Currently it is in operation in 15 workshops, viz. Kharagpur, Jagadhri, Ajmer,Kota, Charbagh, Liluah, Kanchrapara, Matunga, Lower Parel, Parel, Bhusawal, Secunderabad, Lallaguda, Jamalpur. WISE provides managerial reports to the various Workshop managements. The project utilizes the ORACLE DBMS. WISE is being upgraded to an ERP-based system.

11. Railway crew management - The Crew Management System (CMS) is software which provides information regarding railway crew at all times. It provides information regarding the presence of crew at home station or at out station, maintains their status-wise records, and assigns crew to trains. It also maintains information regarding periodic and other rests, road learning & traction knowledge. The software system gives SMS alerts to management and supervisors in case the crew levels fall below a critical level likely to affect train operations. It is capable of booking crew on Coaching, Shunting, and Freight services in the form of Links and Rosters. The software system has tools to support the safety monitoring of the crew by nominated Inspectors, monitoring of the crew knowledge through a Quiz administered through the kiosks in the crew lobbies, and enables the crew to read the latest safety circulars.

12. Control Office Application (COA) provides a solution for the rail traffic Controllers of each Division to manage the trains running in their section. COA is running in all the Divisional Control offices in the Indian Railways. The COA application is interfaced with other applications such as the National Train Enquiry System (NTES) to provide train running information to the passengers and railway managers.

13. E-Procurement System :- Indian Railways E-Procurement Systems provides a secure, fair, and transparent method of procurement of material by the Railways through a web-based interface. This system enables suppliers to securely upload their tenders to a central server in encrypted form, which can then be decrypted only by authorized officials of the Railways after the date and time of tender opening. All time stamps are authenticated by the National Physical Laboratory. The system is in operation in all Zonal Railways and units of IR. E-Procurement Tendering Modules has been implemented in All Indian Railways Zones and Production Units, Apart from this service has been extended to CORE, RDSO, RailTel, . E-Auction was launched in March 2012 and since then it has been adopted by 12 Zonal Railways which will be rolled out to All Indian Railways very soon. Payment Gateway has also been implemented and running successfully since Jan 2012 with some new features implemented for the first time with any E-commerce Web Application in India like Lien Feature.

14. Software for Locomotive Asset Management (SLAM) is a software system under development at CRIS which shall cater for Electric Locomotive Asset Management on Indian Railways.

15. Asset Management systems such Locomotive Management System for Diesel locomotives, Freight Maintenance Management System for wagons (freight railcars), Coaching Maintenance Management System (CMM), and Track Management System are under development and implementation at pilot sites. In addition, an ERP system has been implemented in the , Chennai, in January 2012.

Q.2 What are the impacts of IT on Hospitality and tourism?

Answer: Information and Communication Technology in tourism sector is of special significance. This is due to its special product behavior, various high tech information and communication technologies are in use in the tourism sector around the world. They are used for tourism product development, marketing, distribution and training of tourism sector personnel. These technologies are so indispensable in order to find out and satisfy the ever- changing demands for tourism products. Though there are many definitions for tourism, it could be simply defined as a “travel and stay of a non-resident”. In order to travel to a particular area there must be a reason. For example a person may travel for leisure, business, visiting friends and relatives, health, education etc. He/she chooses a destination for one or the other reason. Transport is necessary to travel and accommodation to stay at the destination. So, tourism as an industry has three major components: Attraction, Accommodation and Transport. In the developed world, today, all these components have reached at their zenith in satisfying their customers’ needs aided by modern technology. These components have also came a long way to offer a range of products which suit the needs of multitude tourists around the world, and are still working hard to cater to an ever changing test of them. Tourism is ranking the top ahead of all other categories of international trade. This is evident from the statistical information compiled from all over the world by WTO (World Tourism Organization). The number of international arrival shows an evolution from a mere 5 million in 2011 to 20 million in 2012.The trend shows a tremendous increase both in the number of tourists and income in the coming years.

INFORMATION TECHNOLOGY AND THE TOURISM INDUSTRY COMPONENTS

As indicated above the tourism industry is made up of three major components: namely,

(i) Transport sector, which includes air, water and surface transport,

(ii) Accommodation sector, all types of establishments that offer lodging to visitors

(Hotel, Motel, Guest houses, caravans etc.) (iii) Attraction sector which comprises manmade and natural attractions which are developed to satisfy visitors educational, recreational, aesthetic needs etc.

TRANSPORT SECTOR

Transport provides the essential link between tourism origin linkage destination and it facilitates the movement of holidaymakers, business travelers, people visiting friends and relatives and those undertaking educational and health tourism. Before setting out on a journey of any kind, every traveler makes sure which Transport Company has a good safety record. To this effect, airplanes coaches and even taxis are equipped with good communication equipment. An Airplane flies with the help of modern information technology equipment which provides information ranging from weather, altitude and other information to the pilot to communication made during emergency by the pilot with other airplanes and air traffic control stations. In-flight entertainment is also a product of information technology, video games, video films are examples. In the case of buses/coaches and taxis, in many countries with developed tourism business, they are equipped with radio communication systems for various uses. For example, the driver or the tour guide updates the Tour Company headquarters about the progress of the tour throughout the touring period. This communication ensures the safety of tourists. Fast and easy information flow is of paramount importance to build confidence in the travelling public. In recent years, the confidence built due to the use of modern IT has been demonstrated by a tremendous increase in the number of travelers worldwide.

ACCOMMODATION SECTOR

In the accommodation sector also the contribution of information technology is prominent. Any individual or group wishing to travel to any part of the world now has an easy access to the accommodation service providers. A visitor can access an information about the kind of hotels at the destination, their ranges of product, the price and other relevant information without leaving his/her office or home. What one has to do is to ring up a travel agency and get the expert advice. This will help any visitor greatly as to where to stay during any kind of away from home. Here the information can be obtained aided by still or moving pictures in order to give an exact feature of an accommodation, facilities and services of ones choice. At a destination also visitors are at ease during their stay in every respect, in getting information about their business, family or other information back home. They are also at ease to relax with the videos and television entertainment programs, which nowadays are part and parcel of many accommodation units.

ATTRACTION SECTOR

In the case of attractions both manmade and natural attraction owners need to communicate or inform their customers and potential customers about their product. Information about the kind of attraction, where they are located and how to get there is of vital importance. The attraction owners particularly the national tourist offices discharge their duty of promoting their country’s tourist attractions using the information technology products. Information through promotional videos, Internet web Sites, television advertisements and travel documentaries are the main information dissemination tools.

Travel Agencies and the role of information technology

One of the unique characteristics of tourism products is the need of the role played by the so-called travel agencies. These travel agencies are also known as, tour operators, conference organizers booking agents etc. They are so important because of the nature of the tourism product, perishables and intangibility. This means service products including tourism, cannot be stored for a litter sale, and cannot be inspected for their quality before purchase respectively. This entails a very big effort for marketing and distribution of these products. Tourism product supply is fragmented both geographically and as product component, coupled with their relatively low capital volume; individual components cannot afford to market and distribute their product for the dispersed potential and actual customers on their own. For instance, an airline company, which flies many destinations, can have a representative but cannot have so many offices or product distribution channels in all routes it serves. Or, in Addis Ababa itself for example, Ethiopian Airlines has few offices to distribute and market its product. However, one can also buy Ethiopian Airline ticket from many other travel agencies in the city. One can imagine if the airline can run these many say sixty offices on its own which are usually with high fixed costs. This makes the travel agents an indispensable partner both in efficiently distributing and marketing the product and substantially reducing the cost of operation for the airline. As these are working on commission basis, the cost of operation for the airline is relatively low. These travel agencies are performing this indispensable task of being intermediary by the use of computers and computer reservation systems (CRS).

CRS (Computer Reservation System)

The airline CRS systems were the pioneers of computer applications in the 1950s and are now virtually indispensable to airlines because they enable their revenue streams to be maximized by efficient inventory control (an inventory in this context refers to an airline’s stock of passenger seats that is available for sale). However, these days, hotel and car hiring companies by renting the service from the airline companies are also employed these systems. The technology works by using computers of special kind and leased telephone lines. The travel agent is connected on line to the central host computer system or CRS. The host computer is always a mainframe with massive database attached. The mainframe host polls each travel agent terminal every second or so, to see if it has any messages to send. In this system it is possible that airliners, Hotels and car rental companies can talk to the travel agent and vise versa. This system contributes to a great extent in increasing sales volume and giving precise information on the availability and selling the products efficiently ensuring substantial profit gain.

GDS (Global Distribution Systems)

GDSs are systems which distribute reservation and information services to sales outlets around the world. Unlike the CRSs used solely by an airline or hotel chain, GDS distribute more than one CRS to users who are usually travel agents. GDSs were formed from the airlines of several CRSs, each of which had its airline backer. Once formed, there was a period of some consolidation and shakeout, after which four main GDSs emerged. These are Amadeus, Galileo, Sabre and World Span. These worlds leading GDSs are switches or simply computers that are connected on the one side to many different supplier systems and on the other side to many end users. The end users of switch comprise travel agents with a single reservation system to support the sale of airline seats and related travel products such as hotel-and car hire, via a single computer terminal, usually a Personal Computer. All the GDSs are owned by a group of airline companies. Eleven carriers of different countries for example own Galileo and there are 500 participating airlines companies. GDSs require massive investment because they are extremely large computer systems that link several airlines and travel principals into a complex network of PCs, telecommunications and large main frame computers. It is not important here to go into the complex operation how these GDSs are working. However it is pertinent to say that GDS are the macro version of CRSs with a specialized and improved information technology for the distribution of Travel products.

Internet: Travel and Tourism

So far it has been dealt with an information technology where intermediaries, travel agents, tour operators etc. are an indispensable part in the distribution and marketing of travel and tourism products, and as an important point of sale or product outlets. Here I will discuss about an information technology where the producer and the consumer are directly communicating, by putting the indispensability of travel intermediaries in question. As I have said elsewhere in this article, the intangibility of the product where risk and uncertainty for the customer is higher, his need for reliable pre-purchase information is stronger. The potential customer’s decision risk and dependence on information is further increased because he cannot see, inspect compare or try out tourist services before deciding to use them. This is not met perfectly than through Internet, which is the latest product of information technology. This interactive information-supplying medium is user friendly and gives enormous information of all kind related to travel. Apart from supplying information on world leading and emerging tourist destination of all kind, it is now possible to book and buy holidays through Internet using plastic money. It gives information on all Airlines, Hotels and Car hire companies, which are in its database. Microsoft is a travel agent. Its Internet site branded Expedia is one of the most important examples of the new generation of travel intermediaries. Distribution of travel and tourism products using the Internet has a substantial cost reduction advantage for providers of tourism services. The cost incurred by suppliers in receiving a customer booking is the one, which is costly. So, Internet gives a practical aid both in supplying information and receiving bookings or selling tourism products on the principals’ behalf.

Marketing tourism products on the Internet is also possible. This is done through the page of the company’s Internet site. Once the company got access to the Internet, it gets various opportunities. Of these, Electronic-mail (e-mail) is one. As a tourism product supplier, especially with business travel as a selected target market, it makes possible to communicate the person through his/her e-mail address wherever the client is. Unlike telephone communication, there is no need for the presence of the receiver of the message during message transmission. It also gives a typed copy of the message. E-mail communication medium is very cheap yet efficient and effective. On the other hand, marketing on the Internet has an advantage of being used by all companies of all size as long as they can establish their Web Site on the Internet.

Q.3: What are the different functions performed by the Information Technology to support the various service sector? Explain it with example.

Answer: Services, the 'tertiary sector' of the economy, covers a wide gamut of activities like trading, banking and finance, infotainment, real estate, transportation, security, management and technical consultancy among several others. The contribution from services sector today stands over 40 per cent of the total GDP in India. The sector currently employs close to 20 million people in India. The TIFAC study on services covered nine select sub-sectors ranging from advertising, HRD services, testing and certification to Government administration. Information Technology (IT) revolution takes places everywhere. Organization’s implementing IT are able to provide better services and thereby able to improve their businesses manifold. In earlier days IT has enormously been used in manufacturing sector regarding product designing and development, product modification etc. Now-a-days the importance of IT has been strongly felt and applied in the services sector.

Application of IT in Hospitals

The hospital management is taking place with the application of IT. Starting from the reception by recording a patient's name, the IT has been used everywhere in an hospital. A patient's record comprising his name, age, sex, disease found, blood group, height, weight, blood pressure level, etc. has been maintained as database in a computer in the hospital. So whenever the patient arrives his previous record can be verified. Similarly when the surgeries take place, the hospitals use computers and specialized software for judgments of diseases/problems and for curing the diseases. For billing purposes also the computers have been used widely in hospitals.

Application of IT in Pharmaceutical Shops

Because of the increase in competition, IT has also been applied in pharmaceutical shops. Whenever any medicine enters the shop, all the information related to the medicine – its name, quantity, manufacturing date, expiry date, its content, price and other information can be entered into a computer system. Whenever the sales take place, computerized billing would be provided to the customers. The bill would carry plenty of information for the benefit of customers indicating the name of the medicine, quantities purchased by them, its price, manufacturing and expiry date. Whenever any medicine has been sold the software created would also give indications to the manager/supervisor of a pharmaceutical shop related to the number of quantities sold, number of quantities available in the shop and the computer also warn them regarding the date of expiry.

Application of IT in Educational Institutions

The Government of India has come out with a statement stating that Information Technology (IT) is India's Tomorrow. Hence the educational institutions have to use IT for teaching the childrens. Latest hardware and software can be used and the latest computer languages and packages have to be taught to the students. It is not enough if student of computer science alone has been taught about IT, but also the students of other disciplines have to be taught about IT. Because, the application of IT takes place everywhere.

Application of IT in Share Trading

Gone are the days when stock brokers use to shout at the trading hall of a stock exchange quoting their price. Now-a-days with the help of computer terminal and internet connection, purchasing and selling of share takes place everywhere. A client can look at the transactions taking place through the computers. The volume of the shares traded and the turnover has got consistently improved because of the online share trading.

Application of IT in Banking

Tremendous improvement has taken place in the Indian banking sector because of the IT revolution. All the private and foreign banks have gone for 100 percent computerization. At a rapid fast, the government owned nationalized banks are also improving their number of computerized branches. With the help of computerization, the transaction takes place at a faster rate and the waiting time of a customer in a queue is getting minimized. E – Banking is emerging in the Indian banking sector. The banks provide the facility of internet banking, phone and mobile banking with the help of IT. All the branches of a bank are networked. The networking also takes place between two or more branches in order to provide easy accessibility for a customer. The cost incurred on infrastructure, furniture and employees has got decreased because of the application of IT.

Application of IT in Advertising Agencies

'Creativity' is the slogan chanted in Ad Agencies. Creativity involves doing things differently. Things can be done differently with the help of IT. The Ad Agencies use lot of software for creating advertisements. Lot of animations and graphics can be done using IT tools.

Application of IT in Marketing Research Agencies

Marketing Research (MR) agencies involve in lot of research activities starting from research survey on product development till distribution and measurement of customer response. Gone are the days of manual analysis of data. The MR agencies use sophisticated statistical software packages for data analysis and interpretation. Some of the statistical software packages are created by their own for customized problems. Hence, application of IT tools take place in full swing at MR agencies.

Application of IT in Indian Railways

The Indian Railways has the proud of being the 'largest employer'. The application of IT, has provided various benefits for the Indian Railways and its passengers. With the issue of computerized railway tickets, the errors have been minimized. A passenger can book the train ticket from any part of the country. A passenger can also book the train ticket at his convenient place, as the online reservation system has been introduced.

Application of IT in other services sector

Now-a-days the reservation for film shows take place through online ticket booking. The cinema theatres in order to avoid queues and unnecessary rush follow the system of online ticket booking so that through internet anyone can book tickets at their convenient places. In order to reduce the queue, computerization takes place in petrol bunks also. Computerization ensures speedier billing and reduces the queue in petrol bunks. In Regional Transport Offices, computerization ensures prompt and quick delivery of service to the peoples. The leading libraries are also computerized these days. Application of IT tools provides various benefits for the libraries and readers. The books available in the libraries and those on circulation can easily be found. The issue and return date can easily be identified and other information related to the library can also easily be sought. IT also paves way for online shopping. Websites like Amazon.com: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more, fabmart.com etc. provide online shopping facilities. Online hundi system has been introduced by some of the leading temples in India. With the help of online hundi system, those interested in donating amount to these temples can remit their amount with the help of credit card numbers through internet.

Application of IT in BPO & KPO:

There are various BPO and KPO are present across the world. Following are the some of the major roles in which IT plays an important role.

Communication

For many companies, email is the principal means of communication between employees, suppliers and customers. Email was one of the early drivers of the Internet, providing a simple and inexpensive means to communicate. Over the years, a number of other communications tools have also evolved, allowing staff to communicate using live chat systems, online meeting tools and video-conferencing systems. Voice over internet protocol (VOIP) telephones and smart-phones offer even more high-tech ways for employees to communicate.

Inventory Management

When it comes to managing inventory, organizations need to maintain enough stock to meet demand without investing in more than they require. Inventory management systems track the quantity of each item a company maintains, triggering an order of additional stock when the quantities fall below a pre-determined amount. These systems are best used when the inventory management system is connected to the point-of-sale (POS) system. The POS system ensures that each time an item is sold, one of that item is removed from the inventory count, creating a closed information loop between all departments.

Data Management

The days of large file rooms, rows of filing cabinets and the mailing of documents is fading fast. Today, most companies store digital versions of documents on servers and storage devices. These documents become instantly available to everyone in the company, regardless of their geographical location. Companies are able to store and maintain a tremendous amount of historical data economically, and employees benefit from immediate access to the documents they need.

Management Information Systems

Storing data is only a benefit if that data can be used effectively. Progressive companies use that data as part of their strategic planning process as well as the tactical execution of that strategy. Management Information Systems (MIS) enable companies to track sales data, expenses and productivity levels. The information can be used to track profitability over time, maximize return on investment and identify areas of improvement. Managers can track sales on a daily basis, allowing them to immediately react to lower-than-expected numbers by boosting employee productivity or reducing the cost of an item.

Customer Relationship Management

Companies are using IT to improve the way they design and manage customer relationships. Customer Relationship Management (CRM) systems capture every interaction a company has with a customer, so that a more enriching experience is possible. If a customer calls a call center with an issue, the customer support representative will be able to see what the customer has purchased, view shipping information, call up the training manual for that item and effectively respond to the issue. The entire interaction is stored in the CRM system, ready to be recalled if the customer calls again. The customer has a better, more focused experience and the company benefits from improved productivity.

Questions & Answers –

Q1. Explain what is information audit and information security? Also, explain with examples what are the impacts of new trends in technology on film & media industry?

The Information Audit (IA) –

It extends the concept of auditing holistically from a traditional scope of accounting and finance to the organizational information management system. Information is representative of a resource which requires effective management and this led to the development of interest in the use of an IA.

Role and scope of an IA –

 To identify an organisation’s information resource

 To identify an organisation’s information needs

 To identify the cost/benefits of information resources

 To identify the opportunities to use the information resources for strategic competitive advantage

 To integrate IT investment with strategic business initiatives

 To identify information flow and processes

 To develop an integrated information strategy and/or policy

 To create an awareness of the importance of Information Resource Management (IRM)

 To monitor/evaluate conformance to information related standards, legislations, policy and guidelines

Information Security – • Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)

• Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that people cannot read, or worse yet, secretly modify messages intended for other recipients.

• Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone.

The CIA triad (confidentiality, integrity and availability) is one of the core principles of information security.

Emerging trends in technology & their impact on film & media industry -

 Processing power has increased, software is getting more and more integrated and complex, hardware that is needed to run programs is getting smaller and cost-effective

 For the industry this means new editing software, more powerful digital imaging programs and new formats like digital projection, DVDs and Blue-ray disks.

 Digital cinema provides a clearer picture, a better cinematographic experience and faster and easier distribution and is now becoming an industry standard  People meters used by Indian Television Audience Measurement

 The media integration and convergence encourages increased intertextuality and franchising video games, special edition DVDs, theme park rides, action figures

For example, movies like Quantum of Solace & Avatar used XBOX 360 & UbiSoft video game developers, respectively, for creating a pre-launch hype in the consumer market. Games like tombraider & hitman gave a platform to scriptwriters in turning a successful gaming concept into a blockbuster. Universal studio has had created Jurassic Theme Park which boosted the success of the sequels of the movie. Special edition DVDs were launched by the distribution house of Lord Of The Ring. Automated action figures & merchandise have always been captured the teen market. With 4D theatres technology has equipped the consumer for getting a better experience from the engaged time.

Q2. What is technological convergence? Cite examples.

Technological convergence is the tendency for different technological systems to evolve toward performing similar tasks. Convergence can refer to previously separate technologies such as voice (and telephony features), data (and productivity applications), and video that now share resources and interact with each other synergistically.

Telecommunications convergence, network convergence or simply convergence are broad terms used to describe emerging telecommunications technologies, and network architecture used to migrate multiple communications services into a single network. This involves the converging of previously distinct media such as telephony and data communications into common interfaces on single devices.

Technological convergence is important for consumers as it helps to ensure greater price transparency. Convergence also presents us with the potential to choose from and access a far wider and more diverse range of films in different media. Convergence gives a boost to the market of animation designers & offers an aesthetic choice to filmmakers by creating films that look like videogames - 300 (2006), Sin City (2005), Avatar (2009) and vice versa. Just as the audience’s ability to choose between different ways of consuming TV programmes is greatly enhanced by digital technology (e.g. the emergence of BBC’s iPlayer), so too is the ability of institutions to create different ways to make films and to deliver them to audiences. The ability to create and distribute content in a much larger variety of ways will accelerate the segmentation of the film industry.

Convergence in this instance can defined as the interlinking of computing and other information technologies, media content, and communication networks that have risen as the result of the evolution and popularization of the Internet as well as the activities, products and services that have emerged in the digital media space.

Examples –

Convergent solutions include both fixed-line and mobile technologies :

 Using Internet for voice telephony

 Video on demand

 Fixed-mobile convergence

 Mobile-to-mobile convergence  Location-based services

 Integrated products and bundles

 IP Multimedia Subsystem

 Session Initiation Protocol

 IPTV

 Voice over IP

 Voice call continuity

 Digital video broadcasting - handheld

Q3. What are the cons (for institutions) & the pros (for the audience) of digital film piracy?

Cons for institutions –

 It costs millions to create films and the aim of creating them, amongst other things, is to make a profit. If people are recording the films themselves in cinemas and distributing them online or otherwise, they are making no money for the institution that has made the film.

 The quality of films that are illegally filmed and obtained is also usually much worse than the real quality. This can reflect badly on the film creators and also dissatisfies the viewer where ever they may be watching it.

 The money incoming from the sales of piracy market is usually fluxed back in the piracy chain leading to the obvious growth of cybercrimes.

Impact of increased download speeds on the online movie download rate -

As the download speed increased, the time taken to download online files of bigger sizes decreased & downloading a movie online became as easy as sharing it with a portable drive. With, assured searches of keywords asked, intermediaries like mediashare, filestube, rapidshare, bit & utorrents such accesses became even simpler.

Pros for the audience -

 The obvious advantage of watching a pirated film rather than an officially bought copy of it is that you most probably have to pay a less charge.

 Also, often it is easy to get hold of early copies of the movies that may not be out on DVD yet. For many people, these advantages often weigh out the disadvantage of the quality not being as good as the original print of the movie.

Q1) what are the major problems faced by Indian farmers in agriculture?

The major problems are:

1. High cost of insecticides & pesticides: Since most of the Indian farmers are quite poor, they cannot afford to buy the latest insecticides and pesticides and hence fail to protect their harvest both in the field and during storage. Prices of key insecticides and pesticides have increased 5-15 per cent over the past year and experts see prices rising further due to short supply. There is 10-15 per cent shortage in the total demand for select molecules.

The industry also attributes the rise in prices to an increase in the production cost, followed by the rise in crude oil prices. Farmers are facing a tough time due to a steep rise in the overall cost of production. Going by the claims of industry sources, the generic agro-chemicals like weedicides, herbicides and pesticides, including cypermethrin, 2, 4-D amine, 2, 4-D ethyl ester and glyphosate are in short supply in the country and the imports from China are becoming costlier. A rise in prices of these generic agro-chemicals would mainly affect paddy and cotton growing farmers.

2. High cost of fertilizers and other agricultural inputs: Also, they are often unable to afford the costly fertilizers. Whereas the cow dung is used as kitchen fuel, as a result of which, the soil doesn’t get replenished of its nutrients. The Government can shift to a system of direct transfer of fertilizer subsidy to farmers in a phased manner, starting with monitoring movement of fertilizers up to the retail points. This will help farmers buy high- priced complex fertilizers at reasonable prices, but the issue of fiscal deficit continues to impact the sector. Also, in a vast country such as India, implementation of any policy at the grassroots level always has certain limitations

3. Low rains and scarcity of ground water: Inadequate irrigation system and overdependence on monsoons leads to low crop yields in India. Irrigation in India refers to the supply of water from Indian rivers, tanks, wells, canals and other artificial projects for the purpose of cultivation and agricultural activities. In country such as India, 64 % of cultivated land is dependent on monsoons.[1] The economic significance of irrigation in India is namely, to reduce over dependence on monsoons, advanced agricultural productivity, bringing more land under cultivation, reducing instability in output levels, creation of job opportunities, electricity and transport facilities, control of floods and prevention of droughts

4. Low financial support & insurance security from state: There is very little monetary support from the Government to the farmers and often the farmers have to borrow money from money lenders at high interest rates. Modified seeds cost nearly twice as much as ordinary ones, necessitating larger loans.

5. There has been minimal financial support from the government for small farmers. Many small farmers don’t qualify for bank credit, forcing farmers to turn to moneylenders, who charge up to 20% interest on a four-month loan. As collateral, farmers often sign away the title to their land. The benefit of India’s 2008 farmer relief package remains to be seen. A crop failure, an unexpected health expense or the marriage of a daughter are perilous to the livelihood of these farmers. Suicide has spread like an epidemic among the distraught farmers. Many farmers have committed suicide by drinking the very pesticides that no longer work on their crops.

6. Fluctuating market rates: The fluctuating market rates means that often the farmers don’t get sufficient price for their crops. Often they have to sell it to vendors within their village, who buy the crops at throwaway prices, leading to financial losses for the farmers.

7. Difficult bureaucratic procedure for procurement: The procurement process is also not flexible and there is hardly any initiative from the Government to bring about changes .The age old system of doing things remains unchanged over years and there is hardly any noticeable progress in the Indian Agricultural sector.

Q2: What is the role of IT in Indian Agriculture?

Answer: Information Technology has a widespread role in Indian Agriculture.

Some of the applications are mentioned below:

• Remote Sensing Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In modern usage, the term generally refers to the use of aerial sensor technologies to detect and classify objects on Earth (both on the surface, and in the atmosphere and oceans) by means of propagated signals (e.g. electromagnetic radiation emitted from aircraft or satellites).

There are two main types of remote sensing: passive remote sensing and active remote sensing.[3] Passive sensors detect natural radiation that is emitted or reflected by the object or surrounding areas. Reflected sunlight is the most common source of radiation measured by passive sensors. Examples of passive remote sensors include film photography, infrared, charge-coupled devices, and radiometers. Active collection, on the other hand, emits energy in order to scan objects and areas whereupon a sensor then detects and measures the radiation that is reflected or backscattered from the target. RADAR and LiDAR are examples of active remote sensing where the time delay between emission and return is measured, establishing the location, speed and direction of an object.

• Geographical Information Systems

A geographic information system (GIS) is a system designed to capture, store, manipulate, analyze, manage, and present all types of geographical data. The acronym GIS is sometimes used for geographical information science or geospatial information studies to refer to the academic discipline or career of working with geographic information systems and is a large domain within the broader academic discipline of Geoinformatics. In the simplest terms, GIS is the merging of cartography, statistical analysis, and computer science technology.

A GIS can be thought of as a system—it digitally makes and "manipulates" spatial areas that may be jurisdictional, purpose, or application-oriented. Generally, a GIS is custom-designed for an organization. Hence, a GIS developed for an application, jurisdiction, enterprise, or purpose may not be necessarily interoperable or compatible with a GIS that has been developed for some other application, jurisdiction, enterprise, or purpose. What goes beyond a GIS is a spatial data infrastructure, a concept that has no such restrictive boundaries.

• Soil Science

Soil science is the study of soil as a natural resource on the surface of the earth including soil formation, classification and mapping; physical, chemical, biological, and fertility properties of soils; and these properties in relation to the use and management of soils.

Sometimes terms which refer to branches of soil science, such as pedology (formation, chemistry, morphology and classification of soil) andedaphology (influence of soil on organisms, especially plants), are used as if synonymous with soil science. The diversity of names associated with this discipline is related to the various associations concerned. Indeed, engineers, agronomists, chemists, geologists, physical geographers, ecologists, biologists, microbiologists, sylviculturists, sanitarians, archaeologists, and specialists in regional planning, all contribute to further knowledge of soils and the advancement of the soil sciences. Soil scientists have raised concerns about how to preserve soil and arable land in a world with a growing population, possible future water crisis, increasing per capita food consumption, and land degradation.

pH

Hydraulic Nutrients Conductivity Soil Sciences

Moisture Bulk Density level

• Agronomy

Agronomy is the science and technology of producing and using plants for food, fuel, fiber, and reclamation. Agronomy encompasses work in the areas of plant genetics, plant physiology, meteorology, and soil science. Agronomy is the application of a combination of sciences like biology, chemistry, economics, ecology, earth science, and genetics. Agronomists today are involved with many issues including producing food, creating healthier food, managing environmental impact of agriculture, and creating energy from plants.[1] Agronomists often specialize in areas such as crop rotation, irrigation and drainage, plant breeding, plant physiology, soil classification, soil fertility, weed control, insect and pest control.

• In horticulture, sericulture and floriculture as well.

A range of innovative technologies are adapted to improve profitability of horticulture production .Reducing post-harvest losses with the implementation of coolbot (Cold and dry storage) .Overcoming the challenge of poor seed quality implementing drying beads Minimizing the insect pest damage with the help of pest-exclusion nets.

In floriculture, Technologies used are a Nursery, Landscaping and Greenhouse technology, worldwide events information and a complete production capsule to farmers for large scale cultivation

Other roles pertain to:

• Seeds Development

• Real time monitoring of temperature variation in storage facilities. • Collection of data for crop growth stages via GPS and providing pest information.

• Weather forecasting.

Q3) what are the major constraints in use of IT in Agriculture?

Some of the major constraints delaying the spread of e-revolution to rural India are listed below : 1. Haphazard development: It is observed that some initiatives have already been made to provide IT based services to rural community. However, duplication of efforts are witnessed as most of the services revolve around limited subjects. Keeping in view the giant task involved, it is necessary to form a coordination mechanism to strive for a concerted effort to support farming community in the country. Such a coordination agency may only have advisory powers such as user interface, broad design, delivery mechanism of the content, standards for setting up kiosks.

2. User friendliness: The success of this strategy depends on the ease with which rural population can use the content. This will require intuitive graphics based presentation. Touch screen kiosks are required to be set up to encourage greater participation

3. Local languages : Regional language fonts and mechanisms for synchronisation of the content provides a challenge that needs to be met with careful planning.

4. Restrictions : Information content based on remote sensing and geographical information systems can provide timely alerts to the farmers and also improve the efficiency of administration. These applications can have a major impact on the farmers and help them to appreciate the potential of information technology. However, government’s map restriction policies often threaten to stifle the optimal utilisation of these tools.

5. Power Supply : In most of the rural India, power supply is not available for long hours. This will reduce the usefulness of the intended services. Since almost entire country receives sunshine for most part of the year, it is useful to explore solar power packs for UPS as well as for supply of power. The Ministry of Non-conventional Energy Sources may pay special attention in this area which can be a major contributor to the growth of IT in villages.

6. Connectivity : Despite the phenomenal progress made in the recent years, the connectivity to rural areas still requires to be improved . Reliable connectivity is a prerequisite for a successful penetration of IT into rural areas. Many private ISPs are setting up large networks connecting many major towns and cities. Since some of these networks pass through rural areas, it is possible to provide connectivity to a large number of villages. Several technologies exist that can be utilised for connecting rural areas. Cable network is a possible medium for providing the last mile connectivity to villages.

7. Bandwidth : Even in areas where telephone and other communication services exist, the available bandwidth is a major constraint. Since internet based rural services require substantial use of graphics, low bandwidth is one of the major limitations in providing effective e-services to farmers. As already stated, networks with high bandwidth are being set up by several companies passing through rural segments which can be utilised. Until this materialises, a two pronged strategy of storing static information at the kiosks and providing dynamic information from remote locations can be examined. The graphic oriented content which does not change frequently, such as, demonstration clips for farmers, can be stored on the local drives at the kiosks and arrange for periodic updation of this information over the network during non-peak hours. The dynamic information which changes more frequently can be accessed from remote locations to obtain the latest status.

8. Dissemination Points : Mass deployment of information kiosks is critical for effective use of the Internet based content and services. In order to ensure that the information kiosks are economically feasible, it is necessary to make the proposition sustainable and viable. This requires a major focus on a viable revenue model for such kiosks. In the new information era, the kiosks should be designed to become electronic super markets that can, in addition to being information sources, handle other services of use to the people living in rural areas. The revenue available through such sources can make a kiosk attractive for prospective investors. The Government can provide finance facilities to unemployed rural agricultural graduates who can be expected to have greater commitment and at the same time act as an efficient interface for less educated rural visitors. The objective should be to transform rural information kiosks into ‘clicks and mortar’ gateway to rural India for ‘Bricks and mortar’ industry. Some of the sources that can generate revenue for rural kiosks are : a) Distance education - A large number of people travel substantial distances to attend educational courses. It is possible to set up virtual class rooms right in their villages b) Training - People living in rural areas require training and a means for upgrading their skills in their area of work. It is possible to provide quality education right at their door steps with facilities for online interaction with experts. For example, a village teacher or a paramedical staff can keep abreast latest developments without disturbing his/her routine. Similarly, training can be imparted on various aspects of agriculture such as correct practices, irrigation practices, efficient utilisation of tools used in farming such as tractors. c) Insurance : The advent of private players into insurance has brought about advanced IT systems that can render services over networks. The kiosks can be insurance agents for insurance firms which, in turn, can compensate the kiosk operators for online transactions for new business as well as maintaining the old. d) Local Agent : Many companies have difficulty in working out logistics for their supplies to rural outlets. A rural kiosk can act as conduit for such ‘bricks and mortar’ companies. This has the potential of transforming a rural kiosk into a profitable venture. e) Rural Post Office : The kiosks can facilitate sending and receiving emails, facilitate ‘chats’ with experts. Several successful rural kiosks are already available in many states which run essentially on this model. f) e-Governance : Rural kiosks are the stepping stones for effective implementation of e-governance. Details related to central / state / local governments, formats and procedures, status verification such as case listings in courts, filing of applications in electronic format where admissible, etc. are some of the areas where kiosks can be of major use. g) Online examinations : Online certification examinations are ‘in things’ with many organisations and certification agencies. Many people are forced to stay at metros to take the examinations. Eventually it should be possible to conduct these examinations through the rural kiosks.

9. Who should take up the task ? : At present, several initiatives have been taken in the form of websites / portals targeting rural India. These are at best sketchy information sources catering to pockets of rural India. It is to be noted that strong interlinkages exist within entire rural India and concerted and coordinated effort is required for carrying the benefits of IT to rural India. The magnitude of the task is such that no single institution or organisation can accomplish it. It is necessary for stake holders in rural India, such as fertiliser industry, to come together to provide adequate thrust to the effort initially. The fertiliser industry distributes more than 15 million tonnes of nutrients per annum in the country involving complex production, logistics and storage operations. A small savings made possible through better management of information upto the point of delivery to farmers can mean significant savings. The success of e-powering Indian agriculture is high if fertiliser industry makes a concerted and coordinated effort to set up Business to Business (B-B) market place with dealer / cooperative networks. The consumer industry also benefits from efficient operations in rural India. The corporate India may be willing to participate in a joint effort that proves beneficial to them as well as the rural India. The Government of India may, as outlined above, initiate a coordinating agency where various stake holders can join hands to spread e-culture to rural India and at the same time benefit from efficient operations.

1) Discuss in detail the impact of IT on society along with its merits and demerits.

The positive impacts of IT on society

Impact on Education

Computerisation of library

Following are the changes brought with the use of IT in library

1. Online access to library catalogue, databases, internet

The entire books in the library can be searched from a single desktop with internet connectivity.

2. Online/ Offline sources to digital resources

Many books are even available in digital format. Nowadays with the advent of smartphones these digital versions are gaining more and more importance

3. Database searching

Any book can be searched within seconds with its title or authors name. Even the prologue, epilogue or the information regarding the author can be read from the desktop itself without moving to the shelf where the books are kept.

The use of barcodes has helped in easy tracking of books. The details of book are directly feeded into the computer by clicking the button of barcoder.

Ebooks An electronic book is a book-length publication in digital form, consisting of text, images, or both, readable on computers or other electronic devices. Although sometimes defined as "an electronic version of a printed book", many e-books exist without any printed equivalent. Commercially produced and sold e-books are usually intended to be read on dedicated e-book readers, however, almost any sophisticated electronic device that features a controllable viewing screen, including computers, many mobile phones, and all smart phones can also be used to read e-books. There was a revolution when Gutenberg invented press which result knowledge made available to everybody. A similar revolution has been brought about with eBook which has resulted in knowledge explosion. Most of the eBooks are in .pdf format. Research papers are mostly published in digital format nowadays. Also magazines like The Economists publish in their digital formats. The following graph shows the usage of eBooks from 2002 to 2010.

Open Online Educational Courses

Massive open online course (MOOC) is the new trend in the open online educational courses. A massive open online course (MOOC) is an online course aimed at unlimited participation and open access via the web. In addition to traditional course materials such as videos, readings and problem sets, MOOCs provide interactive user forums that help build a community for the students, professors, and teaching assistants (TAs).

The advantages of MOOC’s are as follows:

1. Appropriate for any setting that has connectivity (Web or Wi-Fi)

2. Any language or multiple languages

3. Any online tools

4. Escape time zones and physical boundaries

5. Produce and deliver in short timeframe (e.g. for relief aid)

6. Contextualized content can be shared by all

7. Informal setting

8. Peer-to-peer contact can trigger serendipitous learning

9. Easier to cross disciplines and institutional barriers

10. Lower barriers to student entry

11. Enhance personal learning environment and/or network by participating

12. Improve lifelong learning skills

Impact on Government

Governments can become closer to its people through the use of information technology and communications, thereby increasing efficiency and helping to make their lives better. Further, governments in poorer countries can bridge the gap between the global environment, the government employees, and their citizens. Having access to information allows these governments to lay foundations for policies and make commitments to improve conditions. There are many areas where there have been significant changes. Some of them are discussed in detail below:

Electronic Voting System

Electronic Voting Machines ("EVM") are being used in Indian General and State Elections from 1999 elections and in total since 2004 elections. The EVMs reduce the time in both casting a vote and declaring the results compared to the old paper ballot system. Indian voting machines use a two-piece system with a balloting unit presenting the voter with a button (momentary switch) for each choice connected by a cable to an electronic ballot box.

The main benefits of EVM are as follows:

1. The cost per EVM (One Control Unit, one Balloting Unit and one battery) was Rs.5,500/- at the time the machines were purchased in 1989–90. Even though the initial investment was somewhat heavy, it was more than neutralised by the savings in the matter of production and printing of ballot papers in lakhs, their transportation, storage etc., and the substantial reduction in the counting staff and the remuneration paid to them.

2. It will be easier to transport the EVMs compared to ballot boxes as EVMs are lighter, portable and come with polypropylene carrying cases.

3. The vote-counting is very fast and the result can be declared within 2 to 3 hours as compared to 30–40 hours, on an average, under the ballot-paper system.

4.In countries like India, where illiteracy is still a factor, illiterate people find EVMs easier than ballot paper system, where one has to put the voting stamp on the symbol of the candidate of his/her choice, fold it first vertically and then horizontally, and put it into the ballot box. In EVMs, the voter has to simply press the blue button against the candidate and symbol of his choice and the vote is recorded.

5. Bogus voting can be greatly reduced by the use of EVMs. In case of ballot paper system, a bogus voter can stuff thousands of bogus ballot papers inside the ballot box. But, an EVM is programmed to record only five votes in a minute. This will frustrate the bogus voters. Further, the maximum number of votes that can be cast in a single EVM is 3840.

6. Invalid votes can be reduced by use of EVMs. With EVMs, there are much less incidences of invalid votes, i. e. less than 0.02%. When ballot system was used in India, the number of invalid votes was allegedly more than the winning margin between the candidates in every general election.

Computerisation/ e-governance of Government departments

E-Governance in India has steadily evolved from computerization of Government Departments to initiatives that encapsulate the finer points of Governance, such as citizen centricity, service orientation and transparency. Lessons from previous e-Governance initiatives have played an important role in shaping the progressive e- Governance strategy of the country. Due cognizance has been taken of the notion that to speed up e-Governance implementation across the various arms of Government at National, State, and Local levels, a programme approach needs to be adopted, guided by common vision and strategy. This approach has the potential of enabling huge savings in costs through sharing of core and support infrastructure, enabling interoperability through standards, and of presenting a seamless view of Government to citizens. Due to computerisation a large amount of files have been converted into digital form, thus saving a lot of time and energy of the employees. Processing delay has drastically reduced due to the easy availability of data.

Impact of IT on News/Media

Over the years, there had been many fluctuations in the newspaper industry in terms of circulation among readers that simultaneously affected the overall business relations in the industry. Previously, newspapers had been used for the purpose of communication between the writer, reporters, readers and rest of the societies. With the advancement of technology, multiple media were used for the purpose of transference of information. Journalism, in particular, was associated with limited functions and resources (Meyer, 2009). Different technologies were also introduced in the newspaper industry, one of them being the web 2.0 phenomenon, which was welcomed by the people. Such an inclusion worked against the circulation and readership of newspapers

Quick Information

 Television, radio and the Internet increase an overall awareness of the masses.

 Enhance the general knowledge by providing us with information from all over the world.

 The speed that technology has achieved is helpful in times of crisis when media is to be used for reporting news needing immediate attention.

Impact of IT on social networking

Technology runs in the veins of society. It is the fuel that drives our lives. It is an integral part of daily life. It has definitely benefited society. It has brought luxury in the life of every common man. Automation brought about by technology has saved human effort and time to a large extent. It has brought distant places closer and simplified information access. It has made the world a smaller place to live in.

Social Life

 Maintain and strengthen familial relationships.

 Helps to communicate more effectively with others and become more socially adept.

 Reducing communication barriers.

 Free calling and messaging applications.

 Free video calls at any place.

Easy Shopping

 The way we shop has been greatly influenced by the web

 With Sites like flipkart, ebay & amazon it makes bargain shopping very easy and convenient.

 With a few clicks anyone can find whatever it is that are looking for.

 Great deals and offers on shopping.

Negative effects of IT on society

Social isolation

Social isolation is characterized by a lack of contact with other people in normal daily living—in the workplace, with friends, and in social activities. Technology has a large impact on social interaction. Because of technology such as, cell phones, internet, and gaming systems, people are less likely to interact with people face to face. The younger generation who spend every spare minute on a game system or online, are losing the ability to socially interact with others outside in the real world. “Data shows that those who use the Internet frequently spend over 100 minutes less time with friends and family than non-Internet users”. Technology is a negative influence on us because it separates individuals from reality. The iPod is one example; by putting in your earbuds and immersing yourself in music while in public, you are disconnecting yourself from the real world.

Dependency Issues

Teaching kids how to use technology at such a young age can lead to dependency issues. It would be considered big challenge for people to try to get by one day without technology such as a cell phone. An example of how we are very dependent on technology is if you were to ask teens now a simple math question a majority of them would have to refer to a calculator to answer the question simply because they have always relied on technology. Many kids depend on spell check to correct their mistake . This doesn’t have the same learning affect that getting a dictionary and looking up the word would have on the person.

Aggression

If children are exposed to violence on Tv and in video games, they pick up on those actions, and are likely to act more aggressively towards others. Watching violence on TV makes people think that it is okay and normal to be violent towards others. “Younger children are still developing their cognitive capacity to differentiate between fantasy and reality. Therefore, preschool and school-age children are more sensitive to the effects of media violence than adolescents, according to the Media Awareness Network.”(Donner, 2011) .This is why children are more likely to have violent behaviour because they are unaware that the behaviour is not acceptable in our society. Teenagers are “are more likely to view media violence as fictional action meant to entertain.” (Donner, 2011)

Lack of Exercise: Children are also becoming more obese because they aren’t getting the daily exercise they need. Studies have also shown that “Daily overuse of media and technology has a negative effect on the health of all children, preteens and teenagers by making them more prone to anxiety, depression, and other psychological disorders, as well as by making them more susceptible to future health problems.” (DR. Rosen, August 6, 2011). When it comes to children who play video games, these children “are likely to increase their snacking and food intake, and are also more prone to make unhealthy food choices.” (Live Strong, 2012). With unhealthy food choices and the lack of exercise children are gaining more weight. Lack of physical activity found to be the most significant factor in contributing to childhood obesity.

Harming Communication Skills:

We have become a society that is completely dependent on our technology to communicate. It is almost impossible for us to maintain our work life and social life without using some sort of modern-day technology to communicate ideas.

Of course this use of technology can be good — it provides us with faster and more efficient ways to communicate with others, but it is also harming our ability to communicate with people face-to-face, and sometimes, it impacts our ability to write properly. First and foremost, technological communication may be affecting our ability to express our ideas clearly. When you are constantly using abbreviations and slang in texts and online chats, it is hard to remember to use proper grammar when writing formal emails, letters or papers. Technology can also harm our communication skills at work and in school. It may be degrading our ability to speak publicly and write formally. Think of how many professors or bosses have probably received a "cuz," "l8ter" or "cya" in an email. Technology can also harm our ability to deal with conflict. These days, when you have a problem with someone, you can just send them an email or Facebook message, rather than confront them face-to-face and tell them what's wrong. Many people in society are beginning to take the easy way out when it comes to conflict. Finally, technology can damage our personal relationships. When we spend so much time on our computers and phones, we lose real connection with others. According to atechnologysociety.com, "we make calls on our mobiles and together send literally billions of text messages every year. We take the availability of others – and ourselves – for granted." Instead of having a pleasant conversation with our family, friends or significant others, we are gluing our eyes to our computer screens. Sure technology has its benefits, but we need to take a step back and realize what it is doing to our skills and relationships. Internet users spend an average of 17 hours a week online. Technology can also harm our communication skills at work and in school. “It may be degrading our ability to speak publicly and write formally. ”Technology can also harm our ability to deal with conflict. These days, when you have a problem with someone, you can just send them an email or Facebook message, rather than confront them face- to-face and tell them what's wrong. Many people in society are beginning to take the easy way out when it comes to conflict. Finally, technology can damage our personal relationships. When we spend so much time on our computers and phones, we lose real connection with others (northern-iowan, 2010)

Unemployment:

Most of us assume that at some point the economy is going to kick into gear. That unemployment will eventually drop below 6 percent, and that job creation will return to its previous clip of 200,000 a month. But what if we're stuck at a new normal of high unemployment and low job growth? It's possible because technology might just have gotten the best of us. It used to be that new technologies generated lots of new jobs for those displaced from old ones. After farms were mechanized, Americans moved to factories. After manufacturing declined -- in part due to technologies that dramatically cut the cost of shipping goods -- we moved into services. But new technologies have been eating away at services, too. Gas station attendants are long gone and telephone operators and bank tellers aren't far behind. Endangered too are office clerks and secretaries, publishing jobs, and people providing any expertise or information that can now be digitized into a computer. We still have plenty of jobs in retail sales, education, and health care -- but these are also among the least efficient parts of our economy and pressure is building to cut costs. Here again, technology is leading the way. In the next decade, it seems likely that many retail sales workers will be being replaced by online sales. We're about to see a wave of online courses and classrooms -- supplanting some teachers. Health care has to become more efficient. So patients will carry their own medical files on memory sticks. We'll also have personal health apps, allowing us to self-diagnose -- even measuring our own blood pressure and other vital signs. All this is good for us as consumers -- but as workers we're putting ourselves out of business. At this rate, 50 years from now, a tiny machine may satisfy all our needs. Call it the "iEverything." The only problem: none of us will be able to afford it because we'll all be unemployed. With the coming of IT a lot of lower and middle level jobs h done away. Manual business functions have been automated with. For example in photography industry previously there was a lot of dependency on several parties. Now with the use of information technology, one can do all of above jobs.

Privacy:

In an interview with TechCrunch last year, Facebook CEO Mark Zuckerberg said sharing private information online with the faceless masses had become a "social norm."

Interpretation: Privacy is a has-been luxury, a relic of a bygone, unwired era. Today, oversharing has become typical of online social networking, with people publicizing real-time information of where they are (Foursquare, Gowalla) and what they're doing (Twitter, Facebook). "It may be that social norms just haven't completely developed yet, but we end up revealing so much more than we likely would have without the Internet, and we reveal it to a much wider range of people," Lorrie Cranor, director of the CyLab Usable Privacy and Security Laboratory at Carnegie Mellon University. Whether we're constantly updating our Facebooks and flickrs or not, we still leave behind a virtual breadcrumb trail anytime we hop online, thanks to data tracking software, cookies and web bugs that log what we search for, where we land and what we do once we get there. "In a commercial setting, it used to be that if you go into a store, the store knows what you bought, and if you buy with credit cards they can tie it to your name, and if you pay cash they may not even know who you are," Cranor said. "But they didn't know all the things you took off the shelf, manipulated, put back on the shelf, thought about. On the Internet, they all have that." Information technology may have made communication quicker, easier it has also brought along privacy issues. People are now worried about their once private information becoming public. Instances of blackmailing other people by interfering in their personnel space have also increased.

Lack Of Job Security:

Robots, automation, and software can replace people might seem obvious to anyone who’s worked in automotive manufacturing or as a travel agent. But Brynjolfsson and McAfee’s claim is more troubling and controversial. They believe that rapid technological change has been destroying jobs faster than it is creating them, contributing to the stagnation of median income and the growth of inequality in the United States. And, they suspect, something similar is happening in other technologically advanced countries.

Perhaps the most damning piece of evidence, according to Brynjolfsson, is a chart that only an economist could love. In economics, productivity—the amount of economic value created for a given unit of input, such as an hour of labor—is a crucial indicator of growth and wealth creation. It is a measure of progress. On the chart Brynjolfsson likes to show, separate lines represent productivity and total employment in the United States. For years after World War II, the two lines closely tracked each other, with increases in jobs corresponding to increases in productivity. The pattern is clear: as businesses generated more value from their workers, the country as a whole became richer, which fueled more economic activity and created even more jobs. Then, beginning in 2000, the lines diverge; productivity continues to rise robustly, but employment suddenly wilts. By 2011, a significant gap appears between the two lines, showing economic growth with no parallel increase in job creation. Brynjolfsson and McAfee call it the “great decoupling.” And Brynjolfsson says he is confident that technology is behind both the healthy growth in productivity and the weak growth in jobs.

It’s a startling assertion because it threatens the faith that many economists place in technological progress. Brynjolfsson and McAfee still believe that technology boosts productivity and makes societies wealthier, but they think that it can also have a dark side: technological progress is eliminating the need for many types of jobs and leaving the typical worker worse off than before. Brynjolfsson can point to a second chart indicating that median income is failing to rise even as the gross domestic product soars. “It’s the great paradox of our era,” he says. “Productivity is at record levels, innovation has never been faster, and yet at the same time, we have a falling median income and we have fewer jobs. People are falling behind because technology is advancing so fast and our skills and organizations aren’t keeping up.”

Since the technology is changing one has to keep learning or updating his/her knowledge or else the job he/she is doing will be not secure. For example: For the sake of development in the technology of oracle many software engineers have lost their jobs in some parts of the world

Health Effects:

Radioactive waves from IT equipment are damaging the health conditions of people. Different types of unhealthy conditions are begetting from various advanced technical equipment. For example regular and continuous viewing of computers badly affects eyes, brain and other parts of the body.

Addiction:

The Internet has become a basic tool for trading, entertainment, communication, as well as education in the contemporary world. Nevertheless, despite the high speed of information flow and potential educational value of the Internet, there are several attributes of the Internet which may foster addictive behaviour. These attributes include easy and flexible access 24 hours a day; anonymity; provision of free, diversified, and unlimited number of social networks without geographical boundaries; greater control over one's self-presentation; and provision of numerous opportunities to fulfil the need for belongingness as well as to escape from emotional difficulties, problematic situations, and personal hardships.

Internet addiction commonly refers to an individual's inability to control his or her use of the Internet (including any online-related, compulsive behaviour) which eventually causes one's marked distress and functional impairment in daily life. Research findings have shown that excessive use of Internet or Internet addiction adversely affects one's physical health, family life, and academic performance. Concerning the negative consequences of Internet addiction on one's physical health, persistence of sleep deprivation may harm one's immune system, thus increasing one's vulnerability to assorted diseases. The lack of exercise due to excessive use of computer by maintaining a sitting posture may also risk suffering from carpal tunnel syndrome, back pain, and eyestrain. Concerning family problems caused by Internet addiction, family relationships are seriously disrupted by Internet addicts due to the decrease in time spending with family, reluctance of performing family duties such as doing household chores, and increase of conflicts with family in the negotiation for time spent on the Internet. Academic problems caused by Internet addiction include decline in study habits, significant drop in grades, missing classes, increased risk of being placed on academic probation, and poor integration in extracurricular activities. Besides, adolescent Internet addicts often suffer from severe psychological distress, such as depression; anxiety; compulsivity; feeling of self-effacement; fear that life without Internet would be boring, empty, and joyless; as well as feeling of loneliness and social isolation. In addition, people addicted to the Internet games may excessively imitate the behaviours and values of the characters in online games.

In view of the possible negative influence of Internet addiction on human development, there is a need to have a thorough understanding of the nature of Internet addiction. There are several sections in this chapter. First, a historical review of Internet addiction is presented. Second, the conceptualization and assessment of Internet addiction are discussed. Third, prevalence data of Internet addiction are described. Fourth, major theoretical accounts of Internet addiction are presented. Fifth, risk factors and protective factors related to Internet addiction are discussed. Sixth, intervention models of Internet addiction are outlined. Finally, the future research directions are examined.

User withdraws from friends and family as he spends more and more time on the computer. Relationships begin to wither as the user stops attending social gatherings, skips meetings with friends and avoids family members to get more computer time. User gradually withdraws into an artificial world.

2) Discuss in detail the impact of IT on environment along with its merits and demerits.

The positive impacts of IT on environment

1) Remote Sensing

• Remote sensing is defined as the technique of obtaining information about objects through the analysis of data collected by special instruments that are not in physical contact with the objects of investigation.

• Collection of information about an object without coming into physical contact.

• The information needs a physical carrier to travel from the objects/events to the sensors through an intervening medium.

• The electromagnetic radiation is normally used as an information carrier in remote sensing.

• The output of a remote sensing system is usually an image representing the scene being observed.

. Active Remote Sensors

These provide their own energy source for illumination. The sensor emits radiation which is directed toward the target to be investigated. The radiation reflected from that target is detected and measured by the sensor. Examples:

LIDAR (Light Detection And Ranging)

RADAR (Radio Detection And Ranging)

. Passive Remote Sensors

Remote sensing systems which measure energy that is naturally available are called passive sensors.

Examples:

Passive microwave radiometer that detects naturally emitted microwave energy.

Radiometers that measure reflected (or backscattered) sun light from the atmosphere and ocean.

PLATFORMS USED FOR REMOTE SENSING

. Ground-based platforms: ground, vehicles and/or towers up to 50 m

. Airborne platforms: airplanes, helicopters, high-altitude aircrafts, balloons up to 50 km

. Space borne: rockets, satellites, shuttle => from about 100 km to 36000 km

 Space shuttle: 250-300 km

 Space station: 300-400 km

 Low-level satellites: 700-1500 km

 High-level satellites: about 36000 km

APPLICATIONS OF REMOTE SENSING

. Meteorology

 Profiling of atmospheric temp. and water vapor

 Measuring wind velocity

. Oceanography

 Measurements of sea surface temperature

 Mapping ocean currents

. Glaciology

 Mapping motion of sea ice and ice sheets  Determining the navigability of the sea

. Geology

 Identification of rock types

 Location of geological faults and anomalies

. Agriculture

 Monitoring the extend and type of vegetation

 Mapping soil types

. Hydrology

 Assessing water resources

 Forecasting melt water run-off from snow

. Disaster control

 Warning of sand and dust storms, flooding

 Monitoring of pollution

2) Google Earth

 Google Earth is a virtual globe, map and geographical information program that was originally called EarthViewer 3D, and was created by Keyhole, Inc, a company acquired by Google in 2004. It maps the Earth by the superimposition of images obtained from satellite imagery, aerial photography and GIS 3D globe.

 Google Earth is an online mapping and geographic research program that uses satellite images and aerial photography.

 In India, Google Earth has been used for flood relief in Gujarat.

 It helps visualise the impacts of climate change on a 3D map of the world.

 Google Earth as a demographic tool. It can be used to identify and describe the demographics in any particular region.

 It can be used to study the natural habitat or vegetation in an area and identify regions of deforestation or areas with minimal green cover where action needs to be taken.

3) ENVIS

In order to develop the databases on environment and its related parameters and to make it online to the Ministry for to and fro information flow, a web enabled software, namely, Indian State Level Basic Environmental Information Database (ISBEID) was developed by ENVIS in collaboration with National Informatics Centre (NIC). The objective for development of this software is to cover the gap in environmental data dissemination with regard to vast parameters such as air pollution, water pollution, forestry, land resources, flora and fauna, etc. In total there are 17 modules. Initially, the database consisting of 23 modules in various environmental fields was tested on pilot basis by Eight States with 12 modules in two phases. During the two phase of the programme, it was observed that there were some practical problems in collecting the data and filling the database software. After deliberations, it was decided that the existing 23 modules will be revisited and revised in consultation with all the States / UTs ENVIS Centres and to extend the ISBEID project for all the States / UTs.

 Realising the importance of Environmental Information, the Government of India, in December, 1982, established an Environmental Information System (ENVIS) as a plan programme. The focus of ENVIS since inception has been on providing environmental information to decision makers, policy planners, scientists and engineers, research workers, etc. all over the country. Since environment is a broad-ranging, multi- disciplinary subject, a comprehensive information system on environment would necessarily involve effective participation of concerned institutions/ organisations in the country that are actively engaged in work relating to different subject areas of environment. ENVIS has, therefore, developed itself with a network of such participating institutions/organisations for the programme to be meaningful. A large number of nodes, known as ENVIS Centres, have been established in the network to cover the broad subject areas of environment with a Focal Point in the Ministry of Environment & Forests. Both the Focal Point as well as the ENVIS Centres have been assigned various responsibilities to achieve the Long-term & Short-term objectives. For this purpose, various services has been introduced by the Focal Point. ENVIS due to its comprehensive network has been designed as the National Focal Point (NFP) for INFOTERRA, a global environmental information network of the United Nations Environment Programme (UNEP). In order to strengthen the information activities of the NFP, ENVIS was designated as the Regional Service Centre (RSC) of INFOTERRA of UNEP in 1985 for the South Asia Sub-Region countries. It stands for Environmental Information System.

 It assists the Decision/Policy Makers to take decisions based on the inputs received from the ENVIS databases with respect to any region.

4) IT Decreases Consumption

 In just over three years (the 37 months from July 4, 2006 to August 4, 2009) more than 200 million free ebooks were downloaded. Had these 200 million books been made of paper, how many trees would have been saved? Let’s do some math. In the USA in one year, 2 billion books are produced. To get the paper for these books requires consuming 32 million trees. We can estimate that one tree yields enough paper for 62.5 books.

 It helps eliminate the entire Manufacturing Process of physical books

 Emails have helped Reduces mailing process and manual efforts.

5) IT Decreases Transportation

 Automation of work enables people to work from home. This eliminates the need to travel to work and reduced pollution via transportation.  Online Classrooms and distance learning are another aspect of reducing transportation and pollution emanating from it.

 Reduction in CO2 Levels

6) Health Information Technology

An analysis found that use of health IT:

 Avoided the use of 1,044 tons of paper for medical charts annually

 Eliminated up to 92,000 tons of carbon dioxide emissions by replacing face-to-face patient visits (and the associated travel) with virtual visits

 Avoided 7,000 tons of carbon dioxide emissions by filling prescriptions online

 Reduced the use of toxic chemicals, such as silver nitrate and hydroquinone, by 33.3 tons by digitizing and archiving X-ray images and other scans

 Resulted in a positive net effect on the environment despite increased energy use and additional waste from the use of personal computers

The health care industry is burdened by high energy use, high water use and a unique toxic profile. Health care- related activities account for 8 percent of total U.S. greenhouse gases and 7 percent of total carbon dioxide emissions

HIT Benefits

 Medical Charts

 Virtual Visits

 Online Prescriptions

 Digitizing X-Ray Images

Negative effects of IT on environment

 Phantom power : The use of energy to keep electronic devices such as PCs, servers, network printers, and photocopiers operating in standby mode.

 Myth : If you shut off your computer, it uses more energy every time you start it up. The fact is and a lot of them consume the same amount of energy' as they do in fully operational mode.

 Information technology’s Best Friend : Air conditioning unit. $56 billion was spent globally onservers for data centres 2007, S29 billion was spent on power to operate and cool this facilities. A dozen computers will need 1T of air conditioning just to remove the heat they generate. The information technology equipment can tolerate a considerable range of temperature and humidity.

If the air conditioning system fails or malfunctions, the computer will be able to operate until it reaches its specified limits.

Environmental criteria Computer room limits Office space air conditioned Office space not air conditioned

Temperature 16 to 32 degrees C (60.8 to 16 to 32 degrees C (60.8 to 10.0 to 40.6 degrees C (50 to 89.6 degrees F) 89.6degrees F) 105.08 degrees F)

Relative humidity 20 to 80 percent 8 to 80 percent 8 to 80 percent

All computers, office IT equipment, servers, mobile and fixed telephony etc, the report suggests that the combined contribution is 2% of global CO2 emissions – about the same as the airline industry.

Some practical measures detailed within the article to help reduce this include:

 Become aware of and start measuring power consumption of your IT devices

 To use fewer servers and printers by increasing utilization – virtualizing servers

 To stop over-provisioning – plan capacity requirements more efficiently

 Improve the efficiency of cooling – wasting energy with servers overheating, then wasting this energy by cooling with expensive and high energy air conditioning

 To use the power management features on devices, and to turn power off when devices are not in use

 Extend the life of hardware assets by re-using within the business, or to pass on to be used outside of the business after use

 Ensure and validate the correct disposition of all electrical equipment ensuring no energy is being wasted un-necessarily

 Become aware of and analyze all waste

Calculation of CO2 footprint of JBIMS student individually & as a Batch(120 students)

1 Laptop when used for 24hrs consumes 700 watt , 1 Desktop when used for 24hrs consumes 2800 watt

1kwh = .9 co2 kg

No of hrs /day usage of Electricity Energy Co2 footprint in a year laptop Consumed in a year

Individual 6 200 KWH 177 kg of CO2 released

Batch 2015 (120 students) 6 23652 KWH 21286 kg of CO2 released

E waste

There is no generally accepted definition of e-waste. Most favoured today’s devices can become obsolete tomorrow. Unwanted, obsolete or unusable electronic products such as computers, computer peripherals, televisions, VCRs, DVD Players, stereo equipment, hand cell phones are commonly referred to as ‘electronic waste’. Management and disposal of e-waste has become a serious problem among states nationwide. It is mainly because the problem of electronic waste (e-waste) is growing at an unsustainable rate. E-waste is now the fastest growing, and most toxic component of municipal garbage. Local governments are facing huge costs to handle e- waste, and even greater costs if they do not capture this toxic stream and handle it in an appropriate manner. A study by the USA showed that 1-2% of municipal waste is made up of e-waste. A further research estimates the growing of e-waste at 3 times the rate of other waste streams. It is also estimated that between 2012 and 2017, 500 million computers and devices would become obsolete.

Lead is a toxic substance which may cause lead poisoning and can be especially harmful young children. A typical 17-inch computer monitor contains approximately 2.2 pounds of lead. The 500 million computers that will become obsolete between 2012 and 2017 will contain nearly 1.6 billion pounds of lead.

It is important that we create a national framework for the environmentally sound management of e-waste including wide public awareness and education. Companies should conduct detailed inventories of e-waste. Companies manufacturing electronic products should initiate pilot schemes on collection and sorting of e-wastes, including take back schemes and schemes for repair refurbishment and recycling.

What is e-waste? What are its harmful effects? What are the ways to curb it?

Definition: "Electronic waste" may be defined as discarded computers, office electronic equipment, entertainment device electronics, mobile phones, television sets and refrigerators. This definition includes use electronic which are destined for reuse, resale, salvage, recycling, or disposal. Others define the re-usables (working and repairable electronics) and secondary scrap (copper, steel, plastic, etc.) to be "commodities", and reserve the term "waste" for residue or material which is dumped by the buyer rather than recycled, including residue from reuse and recycling operations. Because loads of surplus electronics are frequently commingled (good, recyclable, and non- recyclable), several public policy advocates apply the term "e-waste" broadly to all surplus electronics. Cathode ray tubes (CRTs) are considered one of the hardest types to recycle.

Display units (CRT, LCD, LED monitors), Processors (CPU, GPU, or APU chips), memory (DRAM or SRAM), and audio components have different useful lives. Processors are most frequently out-dated (by software no longer being optimized) and are more likely to become "e-waste", while display units are most often replaced while working without repair attempts, due to changes in wealthy nation appetites for new display technology.

Debate continues over the distinction between "commodity" and "waste" electronics definitions. Some exporters are accused of deliberately leaving difficult-to-recycle, obsolete, or non-repairable equipment mixed in loads of working equipment (though this may also come through ignorance, or to avoid more costly treatment processes). Protectionists may broaden the definition of "waste" electronics in order to protect domestic markets from working secondary equipment.

Harmful Effects

1.Environmental Impact of Electronic Waste The processes of dismantling and disposing of electronic waste in the third world lead to a number of environmental impacts as illustrated in the graphic. Liquid and atmospheric releases end up in bodies of water, groundwater, soil and air and therefore in land and sea animals – both domesticated and wild, in crops eaten by both animals and human, and in drinking water.

One study of environmental effects in Guiya, China found the following:

Airborne dioxins – one type found at 100 times levels previously measured Levels of carcinogens in duck ponds and rice paddies exceeded international standards for agricultural areas and cadmium, copper, nickel, and lead levels in rice paddies were above international standards Heavy metals found in road dust – lead over 300 times that of a control village’s road dust and copper over 100 times People are beginning to discuss the serious aspects of this pollution in terms of bioaccumulation and biomagnification. Bioaccumulation occurs when people, plants and animals build up levels of toxic substances in their bodies faster than they can get rid of them. Biomagnification occurs when toxin levels accumulate within the food chain. For example, plankton might absorb low levels of mercury. Then fish that eat large amounts of plankton ingest an even larger, unhealthier dose. The problem continues as birds or humans eat the mercury- tainted fish. Researchers in the Dartmouth Toxic Metals Research Program have compiled a list of the effects that some of these toxins take on the human body. Keep in mind this is not an exhaustive list of all the suspected health effects of these metals. Also, this list mentions only some of the chemicals and compounds used in household products. Arsenic may disrupt cell communication and interfere with the triggers that cause cells to grow, possibly contributing to cardiovascular disease, cancer and diabetes if someone is exposed in chronic, low doses. Cadmium affects your body's ability to metabolize calcium, leading to bone pain and severely weakened, fragile bones. Chromium can cause skin irritation and rashes and is potentially carcinogenic. Copper can irritate the throat and lungs and affect the liver, kidneys and other body systems. Lead poisoning can cause a whole slew of health problems including the impairment of cognitive and verbal activity. Eventually, lead exposure can cause paralysis, coma and death. Nickel is carcinogenic in large doses. Silver probably won't hurt you, but handle it too frequently and you might come down with a case of argyria -- a condition that permanently stains your skin a blue-gray shade.

2. Information security

E-waste presents a potential security threat to individuals and exporting countries. Hard drives that are not properly erased before the computer is disposed of can be reopened, exposing sensitive information. Credit card numbers, private financial data, account information and records of online transactions can be accessed by most willing individuals. Organized criminals in Ghana commonly search the drives for information to use in local scams.

Government contracts have been discovered on hard drives found in Agbogbloshie. Multi-million dollar agreements from United States security institutions such as the Defense Intelligence Agency (DIA), the Transportation Security Administration and Homeland Security have all resurfaced in Agbogbloshie. ways to curb The mantra of " Reduce, Reuse, Recycle " applies here. Reduce your generation of e-waste through smart procurement and good maintenance. Reuse still functioning electronic equipment by donating or selling it to someone who can still use it. Recycle those products that cannot be repaired. there is a need to find an organization that will manage your electronics for recycling, processing of e-waste

In many developed countries, electronic waste processing usually first involves dismantling the equipment into various parts (metal frames, power supplies, circuit boards, plastics), often by hand, but increasingly by automated shredding equipment. A typical example is the NADIN electronic waste processing plant in Novi Iskar, Bulgaria— the largest facility of its kind in Eastern Europe.[53][54] The advantages of this process are the human's ability to recognize and save working and repairable parts, including chips, transistors, RAM, etc. The disadvantage is that the labour is cheapest in countries with the lowest health and safety standards.