You are on page 1of 10
Imagine yourself in the year 2025 and chose any particular sector out of the following: 4. What kind of emergent technologies are expected to play a dominating role in the sector Prof. Ravinndra Govindani Name. Date: 04.03.2015 Time: 60 Minutes, Marks ~ 10 + Questions Open Book ; Open Internet a) Retail b) FMCG ¢) Health Care d} Education e) Entertainment f} Avtomabites gh Manufacturing, h) Governance you have selected. Chose three most important technologies and specify the business, challenges related to the sector which will be addressed by the selected technologies (5 _ marks) Highlight the key social and security issues which will need to be tackled when the technologies chosen by you in the given sector become predominant. (5 mar OPEN BOOK EXAM. All Reading Material allowed Mobile Phones, Laptops and Internet NOT ALLOWED make any assumptions which are important and explicitly state those assumptions : ver any one question from Section A and any two questions from Section B. SECTION A, 1. Case of BlazeClan Technologies BlazeClan Technologies was founded by four technocrats in 2010. l 1 computing focused company offering Cloud Consulting, Migration, tomnized application SFevalopment & services for enterprises ofall sizes and had operations in Singapore, India, US & Geada. Customer base included, large enterprise usin? the sectors of Lingincering Banking Finance Servicesdelnsuranes (BESD, If ‘and Healthcare. It was also one of the largest advanced consulting partners for Ama7on Web Services, the leader in cloud computing services. FlaveClan provided industry oriented staicRe cloud roadmap consulting and its financial Faambers stood steady in building up since iS inception BlazeClan was a cloud r -as-you-use service, clients were hesitant to pay for the initial 5 vag promised as aupay-as-younse service, pay initial Since aa . eee biggest dilemma still unanswered for Blaveclan was the long and slow sales custo ndian cloud market. MblazoClan was unable to pinpoint the exact reason why the cycle in te had not shot UP 8S Gxposted, One needed a critical mass of adoption for the whole, cit mate a cal point? BlazeClan participated in com inars, an‘ several customer ou i social media campaigns to educate media the some i wer 20% yet the conversions did not pick up. eee segments. The resumed that the customers lacked the eee TSeourity concems for the customers. Dat i ‘and privacy when it was locked into an on- ed ae ts . ee “ane SlazeClan tried j pi buycin Yas seldom comple. ‘To add to te oe appy with what they were cathe to the woes, luced overheads, ntly having, i Se yet eusornere offered ‘expand its intellectual propgrty base and also set up channels in vanes which had a heavy ‘was worried over their next plans Sensing a dip in to develop more products. The compa North America and Asi Region. ‘They were unsure if it would yield profits. ‘ed serviceswhich in your opinion can be offered: 8) What are various categories of cloud-bas: ; that customers sce value from such services and by Blaveclan to itspotential customers so opt for those services? (10 marks) b) What kind of customers should Blazcclantarget at? (Whethersmall or large enterprises) and which verticals? Give your reasons. (10 marks) oR 2. Case of Dirt Bikes Din Bikes would like to implement new production planning, quality control, and scheduling software for use by 25 members of its manufacturing, sla Managenent i oa ie Siheiher to purchasc‘The software from a commercial vendor afong with any hardware required t0 ‘un the software or to use a hosted software solution from an application scrvice provider (ASP). The hosted software runs on the ASP’s computer. You have been asked to help management with this rent vs. buy decision by calculating the total cost of each option over a three-year ah “The costs of purchasing the software (actually for purchasing a license from the vendor to use its software package) include the initial purchase price of the sofiware (licensing fee of $100,000 paid in the first year), the cost of implementing and customizing the sofiware in the first year TSI;0OD), one new server to run the sofware (a first-year purchase of $4000), one information ‘Ssiems specialist devoting half of his or her tithe to supporting the software ($55,000 in full time annual salary and benefits with a 3% annual salary inerease cach year after the first year), isertraining in The first year ($10,000), and the cost of annual software upgrades ($5,000). ‘The costs of renting hosted software are the rental foes ($2500 annually per_user), implementation and customization costs ($12,000 in the first year), and iraining (610,000 in the first year). DS what approach would you follow in calculating and comparing the total cost of operation — (CO) in both the options namcly renting and purchasing over a three period? (10 marks) actors should Dirt Bikes consider besides cost in determining whether to re and software? (10 marks)? ae ices companics. ‘The results of last quarter of TCS, Infosys, Wipro and ICL are be what the analysts were expecting, , E . "Before the meltdown, many analysts felt the cost advantages and offshore delivery model perfected by Indian companies might not remain an advantage in the long run. Hor one, the eo arbitrage was bound to come down. Importantly, global players like IBM, Accenture, HIP and CapeGemini had started their own India Centres and were aiming for the same type of customers. (9yGiven the above facts, how can the Indian TT services companies leverage the power of social media, mobility, analytics and cloud computing (SMAC) in the next decade? © marks) E ()Y Why is the integration of SMAC stack important for the Indian I’ Services industry 4 derive full benefits from it? (5 marks) Question B2 jon conducts its business through e-commerce. The organization offers cerience to their customers with attractive and responsive web page user 1 customers’ activities on the Internet. ‘An online retail organiza customized shopping exp’ interface. Now the company wants to collect data abou big data/ analytics w.r-t to (1) s fhe company can leverag cial media data wnat data base for the growth of its business. (10 Please explain how t : Q) web logs of customers and (3) transacto marks) QGion B3 mean by “things” in Internet of Things (101) and what are their important I What do you th five concrete examples of ‘things’ from day to day Tife, (5 characteristics? Explain wit marks) gely impacted by “IOI”. Please explain how, | citing eetors. (5 marks) Max Marks: 40 ©. Paper is divi to 2 sections. ‘ © Attempt on¥ question from Section A and one question from Section B. a © Incase of any doubt, write your assumption and proceed. 4 © Write in complete sentences a © Allthe best 9 SECTION A 3 z (Attempt any one question) 3 (a) Give reasons why SMAC technologies ae being adopted in business practices with an accelarated pace in the last two years. Please illustrate with specific examples (10 marks) (b) “There is nothing new about the concept of collaboration technologies, but the recent technological trends have brought in a transformation in the way collaboration technologies are used” Please discuss this statement giving concrete examples. (10 marks) 2, (a) To what extent is the analogy of cloud computing with electricity supply in our houses valid? Please elaborate giving reasons. In which scenarios or situations, itis not desirable to adopt loud-based solutions and why? (10 marks) (b)How would Internet of Things (101) be relevant for business enterprises? Please explain with ~ examples (10 marks) OR (0) Please elaborate the complete life cycle of Green IT for an enterprise using computers and the scope for reducing negative environmental impact of IT at each stage (10 marks) i much as the microscope hac roponents of this new 9S as never before — Cellular level. Big Data, in every Sutational Social sciey you went it to be liquid Ste collection are raising new Ue £0 crucial that it could t Poor ior Pentland is a champion Of the believes the future will be data-driven society. Yet the Ice possibilities of the ‘estno}gy, Fe ackronteages-commr ge, Onell inthe dust. © George attended by executives, The ons, can give individuals Control of their report, while permitting important data assets to flow relatively freely. "Ther pad data, only bad uses of data, says Crai ; f de ig Mundie, a wito worked on the position paper. i own information, according The report contsins echoes of earlier times. The Fair Credit Reporting Ack passed in 1970, was the main response to the mainframe privacy challenge: ie law permitted the collection of personal financial information by the credit = bureaus, but restricted its use mainly to Sola credif,_insurance and eopeyment. ‘The forum report suggests a future in which all collected data would @ tagged with software code that included an individual's preferences for how his. or her data is used. Alt uses of data would have to be registered, and there would be penalties for violators. For example, one violation might be a smartphone application thal stored more data than is necessary fora registered sérvice like a smeriphons game or a restaurant finder. : forum sey they recognise the need to address. = i | data is going to keep flowing. George C. Halvorson, iret executive’ = ulser Permanetta ihe large health care provider, exols the bonetiie ofits grawing database on nine ffilion patients racking trealments aeeeee ot a dorove care, expecially in managing eosly ehvonie afd dabiee Un ay coins, ee er ato mle sag says, promise Ee ca person with a applications, he ‘terns slowed sharply would get a ~({ a ic movement patterns history of depression hoes “cisp of a golden age of medical science and care © etein call Torso says. Bul a privany backiash cou cripple progress very,” MF. z ) — ives and privacy experts agree that the best way forward eT “Sie exeoulves i tecmoloay tools. However some privacy professionals 6 The corporate members of the bn nt puts way foo much faith in the tool 3 Gis recent forum report puts way too pone ay thé approad io he 7 sirong rules, parlcularly in moving away from curbs on and too little emp eed use restrictions, but there is a real problem with data co OF dala ‘collection resticlions,” says David_C. Viadeck, a professor of a sito: 1G Cyotown University. “And that's where they are headed.” law al the argument that all data i innocuous unti it's used improperly,” ‘| don't ees a former director of the Bureau of Consumer Protection at He de Commission. He offers this example: Imagine spending a few jing online for information on deep fat fryers. You could be looking for a i ever, toa data g your click stream, this hunt could be read as a telltale sig y habit — a data-based predictic telltale signal of an Feisge Ot make its way io a.healiy ff re 2. Its data store is an ind of technology w, ivacy risks. j Audit trail 'S Group is algo Collaborating ity of Washington, to develop exc! anging data that insures Privacy team is also working on fiving fon around Trento, mobile ¢: le make up just-so stories abo “Lil it ” Dr. Pentland says, ‘peopl ae ” ee bee vena ania often based on their existing beliefs ‘ ” he says. bias. We're trying to test and learn,” he i ut Maybe Too Many, Now Lohr, S., 2013. Big Data ls Opening Doors b oto : 5/2013/372ahRechnolog Adapted from: i ynytines.com/ 25 March 2013). 23 March, Available at: ion ese nena cael i é Over privacy.himPpagewanted= Deutsche Bank Challenge The Facts + A German global banking and financial services company with its headquarters in the Deutsch Bank Twin Towers in Frankfurt, Germany 5 = Wwhas more than 100,000 employees in over 70 countries, and has a large presence in Europe, the Americas, Asia-Pacific and the emerging markets 4 % = \Roffers financial products and services for corporate and institutional clients along with private = and business clients 3 + Servicesinclude sales, trading, research and origination of debt and equity; mergers and acquisitions (M&A); risk management products, such as derivatives, corporate: finance, We: ‘management, retail banking, fund management, and transaction banking, = Listed on both the Frankfurt (FWB) and New York stock exchanges (NYSE) Background on Challenge Reserve Bank of India (Rel) has mandated all banks to prevent themselves from being used, intentionally oF unintentionally, by criminal elements for money laundering oF terrorist= financing activities = Vide the RBI circular on 4 + Know Your Customer (KYC) norms * + Anti-Money Laundering (AML) standards +. Combating of Financing 6f Terrorism (CFT) + Obligation of banks under PMLA, 2002 + KYCprocedures (forming part of above guideline) enable banks to know/understand their customers and their financial dealings better Non-completion Of required y; dation and review of KYC documentation within the stip time requires account closure

You might also like