You are on page 1of 15

Green Data Centre Good for Business: Case Study

QUESTION 1: What business and social problems does data center power consumption cause?

The business of data center cause is such as video on demand, maintaining web sites, analyzing large
pools of transactions or social media data that require more and more power-hungry machines
businesses. Besides that, the social problem that the data center power consumption cause is high
corporate operating costs.

QUESTION 2: What solutions are available for these problems? Are they people,
organizational, or technology solutions? Explain your answer.

People, for example Acorda.


• A $210 million-per-year maker of drugs to treat nervous disorders such as multiple sclerosis.
• Installed motion sensors and invested in intelligent cooling system to boost energy efficiency at the
new facility.
• Preparing to test virtualized desktops.

Organizational, for example Facebook


• Publicly posted the specifications for the design of its data centers.
• Facebook’s engineers modified the programming in the servers.

Technology, for example cloud computing system


• Optimized for virtualization and for supporting as many different subscribing companies as possible.
• Produce major savings when doing the computing for large numbers of companies.

QUESTION 3: What are the business benefits and costs of these solutions?

- Reduce the human resources in data center


- Virtualization in data center helps to reduce the number of servers and storage resources in a firm's
IT infrastructure.
-Make firm more energy- efficient
- Installed motion sensors will shut off light after five minutes if no movement is detected. This enable
firm greatly reduce the power required to run workstation.
- Reduce corporate operating costs
- Intelligent cooling system will automatically changes setting of computer as the conditions change.
Intelligent cooling system helps the firm to save the electric supply and thus, reduce the operating
costs.
QUESTION 4: Should all firms move toward green computing? Why or Why not?

-Yes.
-It is very efficient to reduce their power requirements
-Reduce costs
-Reducing impacts on environmental and human health
-Helps to minimize the energy consumption by educating consumers on efficient ways to keep
power usage low.
Stuxnet and the Changing Face of Cyberwarfare: Case Study

QUESTION 1: Is cyberwarfare a serious problem? Why or why not?

Network warfare is a serious problem that should be solved. With the use of technology to control
missiles and wars worldwide, the threat of a network is not as serious as a threat to physical threats.
Network warfare can also play the role of catalyst, inducing the full blow of terror to other
countries.

QUESTION 2: Assess the management, organization, and technology factors that have
created this problem.

From a management point of view, there has been no increase in the focus until recently to ensure
that the policy is in place to prevent network warfare attacks in the organization. More emphasis
must be placed on the need to prevent this. The organization has been injured by the vulnerable
and potential body to the users and employees to be organized to solve a social problem.
Technology and easy access to public progress make cyber wars more likely to happen.
Technology makes the problem more relevant, only to make the situation worse based on the
technology that is leading us.

QUESTION 3: What makes Stuxnet different from other cyberwarfare attacks? How
serious a threat is this technology?

Most cyber warfare attacks attempt to steal information and espionage. Stuxnet virus is able to
infect the industry best practices and make it almost impossible, even though defending ensures
good computer system. The task of the Stuxnet worm is to activate the monitoring and data
acquisition computer only. Part of it was designed to sleep for a long time, and then let them spin
out of control to speed up the nuclear centrifuge in Iran. Another secretly recorded the normal
operation of nuclear power plants, etc., and then played these recordings back to factory operators,
so it would appear in centrifuges when working normally, they actually tear themselves apart. For
this type of cyber war attack, the whole country may be eliminated, not recognized, from inside to
outside.
QUESTION 4: What solutions have been proposed for this problem? Do you think they will
be effective? Why or why not?

The solutions have been proposed for this problem stated below:
(1) Congress is employing legislation that would require all critical infrastructure companies to meet
newer, tougher cybersecurity standards. As cyberwarfare technologies develop and become more
advanced, the standards imposed by this legislation will likely be insufficient to defend against
attacks.
(2) Several security agencies believe that US cyber security is not well-organized. Several different
agencies, including the Pentagon and the National Security Agency (NSA), have their sights on
being the leading agency in the on-going efforts to combat cyberwarfare. The first Headquarters
designed to coordinate government cyber security efforts, called Cybercom, was activated in May
2010 in the hope of resolving this organizational tangle. It will coordinate the operation and
protection of military and Pentagon computer networks. It will coordinate efforts to restrict access
to government computers. And protect systems that run the stock exchanges, clear global banking
transactions, and manage the air traffic control system. Its ultimate goal will be to prevent
catastrophic cyber-attacks against the US Some insiders suggest that it might not be able to
effectively organize the governmental Agencies without direct access to the President, which it
last lacks
How Secure Is your Smartphone? Case Study

QUESTION 1: It has been said that a smartphone is a computer in your hand. Discuss the
security implications of this statement.
When to keep a system secure, we have to consider how keep system secure, and answer of this
question is what kinds of threats can harm the system. In principle, the security of mobile devices
deals with the same issues conventional computer security deals with confidentiality, integrity
and availability.

Confidentiality - Confidentiality determines who is allowed to access what.


Integrity - Integrity identifies who is allowed to modify or use a certain resources.
Availability - Availability describes the requirement that a resource be usable by its legitimate
owner.
Security Implications or vulnerability can be divided into two types:
1. External Vulnerabilities
2. Internal Vulnerabilities
1. External Vulnerabilities
Vulnerabilities of Wireless Network:
Corrupting, blocking or modifying information on the wireless network by sniffing, spoofing or
eavesdropping.
Vulnerabilities of External Objects:
External objects of smartphone environment like web server, AP, base station or PC can risk
smartphone security by its potential vulnerabilities, insecure management, or so on forth.

2. Internal Vulnerabilities
Implementation error
Malfunction caused by implementation error malicious attacker can take advantages using
implementation error (e.g. type safety, arbitrary code execution)
Incompatibility
Disabling application caused by incompatibility between applications. Disabling application
caused by incompatibility between application and platform
User unawareness
Unawareness of a device owner to risks of installing applications from un-trusted sources.
Unawareness of the device owner to the risk of connecting to un-trusted Wi-Fi networks and
web-sites (e.g. Rogue AP, Phishing Site). Unawareness of the device owner to the risks posed by
improper configuration (e.g., Bluetooth settings, browser settings). Unawareness of the owner to
social engineering attacks. User can lose his/her smartphone.

QUESTION 2: What people, organizational, and technology issues must be addressed by


smartphone security?

With smartphone security, many issues have to be addressed.


People:
Text messaging and other mobile messaging technologies are being used to deliver all kinds of
scam campaigns, such as adult content, phishing and banking scams. People need install an
antivirus software on your phone.
Organizational:
From a management standpoint smartphone security has to be managed in order for
organizational information to be kept private. Organizations have to create policies to ensure that
smartphones utilizing organizational networks or content do not cause their network to be
vulnerable.
Technology:
The technology needed to keep an organization’s network secure from threats caused by
smartphone security weakness has to be implemented. Stronger encryptions and Virtual Private
networks have to be used in order to keep a secure connection between the network and
smartphone users.

QUESTION 3: What problems do smartphone security weaknesses cause for businesses?


Currently there are weaknesses in the smartphone password data leakage and the phone is
controlled by hackers.
1. Smartphone access to unauthorized wireless networks
Because the risk of smartphones to the business is more than the traditional PC devices, mainly
because some employees cannot resist the use of personal devices in the office. The danger is
that smart phones belong to the three device: Bluetooth, Wi-Fi and GSM networks can be
connected, employees in the office using personal devices will introduce a potential attack point.
This will cause the business's information disclosure.
2. Social network spoofing
Facebook and Twitter users may be deceived and leaked sensitive information. This will reveal
some employees personal information.
3. SMS fraud and malware infections
SMS on smartphones is another potential attack point. Hackers send text messages to target
employees, to lure them to disclose sensitive information such as login credentials. In addition,
they can also use the smartphone operating system vulnerabilities, through SMS directly on the
phone to install malicious software. Hackers can get some trade secrets in this way.

QUESTION 4: What steps can individuals and businesses take to make their smartphones more
secure?

Individuals:
Individuals can use lock screen that requires a password to continue, don’t put easy password
like 1234. This can protect if someone try to use your phone without your promotion.
Only use install trusted Apps. Bad apps are loaded with malware that can infect your gadget with
viruses and steal your information. Good apps like tracking apps can tell you exactly where your
phone is. These apps also let you wipe sensitive information remotely.
Stay safe on public Wi-Fi networks. Don’t use public Wi-Fi to online shopping, your card
information may lost.
Business:
Backup your business data. Thieves and malicious software will threats to your business data.
There are plenty of secure ways to keep your data backed up to the cloud. And for more security
reason, you can set data encryption, two-step verification and password-protected file sharing.
Install an antivirus app. This is the base step you should do on your business smartphone.
Like individual, business smartphone also should set password on phone.
Allow the company to lock the business smartphone and SIM card remotely, wipe important
information from the smartphone and activate the internal GPS to locate the lost or stolen
smartphone.

Suggestions for further study on the topic


The methods to improve people's’ awareness of Smartphone Security
The Technology to ensure Smartphone Security without involving Privacy violation
Big Data, Big Reward: Case Study

QUESTION 1: Describe the kinds of big data collected by the organizations described in this
case.

There are mainly three kinds of big data collected by the organizations described in this case.
1. British Library
 IBM Bigsheets help the British Library to handle with huge quantities of data and extract the useful
knowledge.
 British Library responsible for preserving British Web sites that no longer exist but need to be
preserved for historical purpose.
 Example, Web sites for past politicians.
 IBM BigSheets helps the British Library to process large amounts of data quickly and efficiently.

2. New York City Police Department (NYPD)


 City Crime and Criminal Data
 State and federal law enforcement agencies are analyzing big data to discover hidden patterns in
criminal activity. The Real Time Crime Center data warehouse contains millions of data points on
city crime and criminals
 IBM and New York City Police Department (NYPD) work together to create the warehouse, which
contains data on over 120 million criminal complaints, 31 million criminal crime records and 33
billion public records.

3. Vestas
 Turbine Location and wind data for organizations to go green.
 Vesta’s wind library currently stores data on perspective turbine location and global weather
system.
 Vestas implemented a solution consisting of IBM InfoSphere BigInsights software running on a
high-performance IBM System x iDataPlex server.

4. Hertz
 Data of consumer sentiment
 A car rental Hetrz using big data solution to analyze consumer sentiment from Web surveys,
emails, text message, Web site traffic patterns and data generated at all of Hertz’s 8300 locations
in 146 countries.
 Hertz was able to reducing time spent processing data and improving company response time to
customer feedback and changes in sentiment.
QUESTION 2: List and describe the business intelligence technologies described in this case.

1. IBM BigSheets
 IBM BigSheets is a cloud application used to perform ad hoc analytical at web scale on
unstructured and structured content.
 IBM Bigsheets is an insight engine that helps extract, annotate, and visually analyze vast amounts
of unstructured Web data, delivering the results via a Web browser. For example, users can see
search results in a pie chart.
 State and federal law enforcement agencies are analyzing big data to discover hidden patterns in
criminal activity such as correlations between time, opportunity, and organizations, or non-obvious
relationships between individuals and criminal organizations that would be difficult to uncover in
smaller data sets.
 IBM BigSheets built atop the Hadoop framework, so it can process large amounts of data quickly
and efficiency.

2. Real Time Crime Center (RTTC)


 The Real Time Crime Center (RTCC) is a centralized technology center for the New York (NYPD)
and Houston Police Departments.
 RTCC data warehouse contains millions of data points on city crime and criminals and billion of
public records.
 The systems search capabilities allow the NYPD to quickly obtain data from any of these data
sources.
 Information on criminals. Such as suspect’s photo with details of past offences or addresses with
maps, can be visualized in seconds on a video wall or install relayed to officers at a crime scene.

3. IBM InfoSphere BigInsights


 IBM InfoSphere BigInsights brings the power of Hadoop to the enterprise. Apache Hadoop is the
open source software framework, used to reliably managing large volumes of structured and
unstructured data.
 Vestas increased the size of its wind library and is able manage and analyze location and weather
data with models that are much more powerful and precise.
 It implemented a solution consisting of IBM InfoSphere BigInsights software running on a high-
performance IBM System x iDataPlex server.
QUESTION 3: Why did the companies described in this case need to maintain and analyze?
What business benefits did they obtain?

1. The British Library


The British Library needed to maintain and analyze big data because:
· Traditional data management methods proved inadequate to archive billions of Web pages and
legacy analytics tools couldn’t extract useful knowledge from such quantities of data.
2. New York Police Department (NYPD)
NYPD need to maintain and analyze big data because:
· Allow the NYPD quickly respond on the criminals occurred.
· Help NYPD to obtain sources of the suspects, such as suspect’s photo, past offences or addresses
with maps, can be visualized in seconds on a video wall.
3. Vestas
Vestas need to maintain and analyze big data because:
· Vestas is the world’s largest wind energy company.
· Location data are important to Vestas so that can accurately place its turbines.
· Areas without enough wind will not generate the necessary power.
· Area with too much wind may damage the turbines.
· Therefore, Vesta relies on location-based data to determine the best spots to install their turbines.
· Vesta’s Wind Library currently stores 2.8 petabytes of data.
4. Hertz
Car rental giant Hertz need to maintain and analyze big data because:
· Reducing time spent processing data.
· improving company response time to customer feedback.
· Hertz was able to determine that delays were occurring for returns in Philadelphia during
specific time of the day.
· Enhanced Hertz’s performance and increased customer satisfaction.

What business benefits did they obtain?


The business benefits for maintaining and analyzing big data are as follows:
1. Competitive advantages
2. Performance Enhancement
3. Increase customer satisfaction
4. Attract more customer and generate more revenue
5. Improved decision making (faster & accurate)
6. Excellence operational
7. Reduced cost and time spent
QUESTION 4: Identify three decisions that were improved by using big data.

1. Optimal uses of resources and operational time


By using the big data, the companies can optimal uses of their resources to enhance performance.
Vestas can forecast optimal turbine placement in 15 minutes instead of three weeks, saving a
months of development time for turbine site.
2. Quick and effective decision making
Decision making improves and can be quickly and effective by using big data. Visitor of The
British Library and NYPD can quickly and effective searches data from the British Library Web
sites. NYPD can make a faster decision to gather the suspect’s detail by using The Real Time
Crime Center.
3. Reduce operational cost and other related cost
Company quickly make the right decision and hence will eliminate wrong decision. Example,
Hertz was able quickly adjust staffing levels at its Philadelphia office during those peak times,
ensuring a manager was present to resolve any issues.

QUESTION 5: What kinds of organizations are most likely to need big data management
and analytical tools? Why?

1. Organizations which responsible to store the huge information such as national library,
registration department, income tax and so on because these organizations typically be a sources
for government and the public.
2. Authorities Organization such a police department, custom, immigration because they need to
store a big data about criminals and also public to use for safety of the society.
3. Organization to go green need the big data about the weather and location because the weather
and location data are very useful for the companies to accurately make a decision.
In this case, Vestas needed the data about location and wind to locate their turbines.
CONCLUSION
Big Data it's varied; it's growing; it's moving fast, and it’s very much in need of smart
management. Data, cloud and engagement are energizing organizations across multiple industries
and present an enormous opportunity to make organizations more agile, more efficient and more
competitive. In order to capture that opportunity, organizations require a modern Information
Management architecture.
IBM’s big data platform is helping enterprises across all industries. IBM understands the
business challenges and dynamics of your industry and we can help you make the most of all your
information. When companies can analyze all of their available data, rather than a subset, they
gain a powerful advantage over their competition. IBM has the technology and the expertise to
apply big data solutions in a way that addresses your specific business problems and delivers rapid
return on investment.
Copy protected with Online-PDF-No-Copy.com

You might also like