You are on page 1of 44

Christ University

Unit 4 and 5 Disrupting Technologies

• IOT
• Virtualization
• Cloud
• Artificial Intelligence
• Machine Learning
• AI & ML - Implications for Managers
• Block chain

Text: 17.1, 17.2, 17.4, 17.5

Text: 10.1, 10.2, 9.5.1

Tapscott

Prof. Shreekant Deshpande


October 2022

Excellence and Service


Christ University

IoT

Excellence and Service


Christ University

Internet-of-Things

IoT is a network of number of sensors and actuators that are connected via Sensors
the internet to a set of machines for capturing stimulus events and respond
to them by effecting pre-determined actions/events and control of A sensor is a electronic/mechanical device
actions/events.
Also referred to as IoE (Internet of everything), IIoT (Industrial IoT), that detects change or events or
Internet 4.0 movements in/around its physical
space/environment and provides an
electronic output/signal for onward
transmission.

Actuators

Actuators are devices or tools or


mechanisms that can initiate change in
their own state(moving or stationery) or
the state of other devices and machines
connected to them.

Security alarm. When an intruder/movement is sensed by sensors in the home. Actuators send email/warning to the owner. Number of
signals sent by sensors in a plane to Rolls Royce, the engine manufacturer, who decides on service requirements.
Wearable, SmartCity, etc…

Excellence and Service


Christ University

Examples of IoT Types


• Logistics Management with IoT : RFID Sensors: Flow, Pressure, Temperature, Level,
Chips for inventory management,
Image, Noise, Proximity, Speed, Moisture
,etc..
Warehouse management in Amazon (watch Actuators: Electrical, Mechanical, Hydraulic
Video), Machine vibrations and and Pneumatic
maintenance
• Healthcare with IoT : Wrist bands for
monitoring health parameters/vitals and
relay to the Doctor. Robot-Nurse in Sweden,
CHALLENGES OF IoT
to keep tarck of patients in home and • Security : Sabotage or malfunctioning
provide required assistance through • Privacy: Personal movements can be
tracked along with machine data
connecting to doctors/Nurses • Internet access : Access to internet, the
essential part of IoT, in rural areas.
Managing IoT Systems
• Massive data flows : Lacs of sensors
• Massive volume of data : Huge volume
• Variety in data : Types of data

Excellence and Service


Christ University

IoT Architecture
Home Security management-
Alarm on detection of
Intruder/movement
( Functional logic/algorithm
layer)

Analyze the
design/arran
Manages the functioning of all
components of IoT ( IT layer) gement of
sensors and
actuators in
a TOLL
Consists of Routers, Switches, management
gateways to receive and manage
network traffic of data coming system
from sensors

Consists of Sensors, Actuators,


and things being monitored

Airjaldi
JustDial

Excellence and Service


Christ University

Cloud Computing

Excellence and Service


Christ University

Cloud Computing
Cloud
Disruptive Technology/innovation: Creates a new – Servers, Databases, software available on
market and disrupts an existing product, service lease, which are connected over an
and market. internet.
Can impact one or more industries (ex: Mobile – Can be procured for a short period of
phone, Internet, etc… time to meet peak demand and released,
at a Fee.
– Lead time is minimized

Reasons to adopt Cloud


– To meet volatile demand
– Used for Low business risk and commodity
applications
– Big Data storage and analysis
– Capital available for infrastructure is low
– Low CAPEX (Capital expenditure)
– CAPEX  OPEX
– Latest Versions can be accessed
– Threat of obsolescence is reduced

Excellence and Service


Christ University

Cloud Computing

Advantages of Cloud Computing Cloud- Fees/Revenue Model


 Cost reduction due to shared resource
 Available on demand- lead time reduced  Transaction based
 Easily scalable – upgrade or degrade  User License based
 High level safety and security  Usage based (Memory and computing power)
 Problem of Underutilization of  Time window of usage (24*7 vs 9 to 5)
hardware/software resources avoided  Requirement of backup facility
 Efficiency improvement  Usage metering
 Peak demand at lower cost (Festival time e-
business)
 Latest Technology accessible – Obsolescence Challenges:
addressed
 Scalability Complexity of security increases with number of users
 Elasticity spread over wide area and number of devices
 Measured Use
 Usage-Based Pricing Questions about sensitive data on cloud storage
 Managed Services
 Service Levels
Governmental regulations about cross border data
 Ubiquitous Access
storage
 Heterogeneity
 Reduced Setup Time
 Resource Pooling

Excellence and Service


Christ University
Types of Cloud Computing
Cloud Computing Services
Types based on Ownership
• Infrastructure-as-a-Service (IaaS): IaaS
 Public cloud – Operated by a third party provides data centre/Servers facilities
provider. Ex: Microsoft Azure
 Private cloud – Maintained by a company for • PaaS : provides a software platform
Sensitive data development facility (Java, Python,etc)
 Hybrid cloud - combination
• SaaS provides applications over the internet.
• Software-as-a-Service (SaaS)- SAP, Taley,
 Factors influencing choice of cloud CRM, etc..

 Cost
 Sensitive nature of data
 Lead time
 Variation in peak load

Cloud used as a metaphor


Utilization – Basis for the business model
Brick& Mortar, Click & Mortar business model

Excellence and Service


Christ University

Cloud Technologies

ERP, CRM, Analytics

Cloud Technology (SDN) :


Software Defined Networking

In SDN architecture, Control panel interfaces with


business applications and decides the route to be
taken by data packets to reach destination.
The Data plane actually moves the packets.

Excellence and Service


Christ University

Economic Rationale for Cloud Computing

Investment in
installments/stages Vs
Gradual
CAPEX-> OPEX

Excellence and Service


Christ University

Artificial Intelligence
AI

Excellence and Service


Christ University

Artificial Intelligence (AI)

AI Refers to replicating human thought process in computers. Major thrust of


AI is simulation of computer functions like Human intelligence, Reasoning,
Learning, Problem solving. (Cognition process)

Create ability in computers to think, see, hear, walk, talk and feel. (SMELL is a
challenge).

AI when embedded in KM systems, are called Expert systems (expertise in a


limited area), where a huge amount of data/experience is captured and AI
methods are used to analyze the data and give expert opinions to mimic expert
thinking process of human beings (Doctors, Loan approvals, Surgery, etc…).

Tree planting Drone: https://www.youtube.com/watch?v=4dAq7e4EyJs

Excellence and Service


Christ University

AI Applications
Advances in cloud and sensor technology has fueled the growth of AI.

AI is increasingly used in IOT, Robotic automation, drones to pick up and drop


packages, autonomous cars, factory assembly robots, robots at restaurants that can
even cook and serve food.

Applications –

• Manufacturing and Handling of hazardous material like Nuclear waste through


robotics (CAM)
• Quality Inspection of products- visual inspection by cameras
• Training, User support, Testing (GRE)
• Resource allocation in airlines, logistics
• Data mining for marketing trend analysis, financial forecasting
• Natural Language processing- Speech recognition,
• Natural language understanding and generation (Siri, Skype-Translator)
• NL technology to retrieve any type of information from online sources like text,
pictures, videos, maps, audio clips
• Drones, Self-driven cars, playing chess, etc…
• Games- Playing chess

Excellence and Service


Christ University

Machine Learning
(ML)

Excellence and Service


Christ University

Machine Learning

It is a type of Artificial Intelligence that allows Applications:


software applications to learn from the data and
become more accurate in predicting outcomes • Chat Bots
without human intervention.
• Face recognition
In other words, it allows software apps to learn of its
own by following a set of instructions. • Sentiment analysis, SPAM filtration

• Fraud detection, Algorithmic trading


The basic Idea behind Machine Learning is to mimic
the way as our brain works. • Drug discovery

Ex: Book recommendation. ML in Amazon.com • Customer product support, Recommendation


understands the books purchased together and
develops a model itself and uses it to recommend a
book next time, when another customer buys a book
from that bundle.

Excellence and Service


Christ University

Machine Learning Flow

Training Data Learn Algorithm Build Model Perform

Feed Back

Types of ML:
1. Supervised Learning : where we know input variable(X) and output variable(Y) and we can develop a
relationship/an algorithm to learn the mapping function from the input to the output. (Y=ax+b). Disease
recognition, seasonal patterns, etc..
2. Unsupervised Learning : Unsupervised learning is commonly used for finding meaningful patterns and
groupings inherent in data, extracting generative features, and exploratory purpose. It is the training/developing
of a model using information that is neither classified not labeled in which there is no explanation of the data.
Similar to "Clustering Analysis“. Example -Unlabeled picture or audio downloaded from internet and trying to
classify it. Customer Segmentation, Genetics-clustering DNA patterns to analyze evolutionary biology.
3. Reinforcement Learning: It is an area of machine learning where an RL agent learns from the consequences of
its actions, rather than being taught explicitly. It selects the actions on the basis of its past
experiences(exploitation) and also by new choices (exploration). Here machine takes the decision on its own.
Reward /Punishment- Consequences. Self driving cars, trading, etc..

Excellence and Service


Christ University

Machine Learning Model development

At any point of X, value of Y can be a relationship (assume simple equation) like Y=aX+b ….Model developed by computer looking at the
historical data.
When we predict a new value of Y for a given X, we observe a GAP/ERROR between the actual value and predicted value of Y. Through ML,
computer learns about this gap and tries to reduce the gap for future computations by recalculating the values of A and B.

Excellence and Service


Christ University

Implications/Challenges for Managers

• Managers will have to decide on using ML for division of work in every organization.
• Tasks, requiring judgment and decision making, have to be performed by humans, while routine
activities with some variation can be given to machines.
• Managers will also have to look for new opportunities/ challenges where ML can be employed
• Managers have to balance job loss , reskilling with adoption of new technologies for being competitive
in the market
• Getting reliable huge data from market is a challenge as ML requires volume of data for developing
models
• Getting people with required skill set and keeping them motivated is not an easy job
• Short supply of experts

Tree planting Drone: https://www.youtube.com/watch?v=4dAq7e4EyJs


How does an AI and ML enabled program will work if the drone faces a soil with hard rock
pieces , which was not included in earlier data

Excellence and Service


Christ University

Virtualization

Excellence and Service


Christ University

Virtualization

VM
Use of virtualization allows many CPUs to be function as a single
unit on which many Operating systems and applications can be
run simultaneously. This is used to increase capacity and improve
services. Virtualization software allows you to run two or more
operating systems using only one PC. So it's like two (or more)
computers in one. One is physical, and the others are virtual. ...
Virtualization software, also called a hypervisor, is what allows
one computer or server to host multiple operating systems.

Virtual Computers
A virtual computer system is known as a “virtual machine” (VM): a tightly isolated software container with an
operating system and application inside. Each self-contained VM is completely independent. Putting multiple
VMs on a single computer enables several operating systems and applications to run on just one physical
server, or “host.”

A thin layer of software called a HYPERVISOR separates the virtual machines from the host and
dynamically allocates computing resources to each Virtual Computer on need basis.

Excellence and Service


Christ University

Virtualization

Virtualization is the process of creating a Benefits


software-based, or virtual, representation
of something, such as virtual applications, Virtualization can increase IT flexibility and scalability while
servers, storage and networks. It is the creating significant cost savings.
single most effective way to reduce IT
expenses while boosting efficiency and Greater workload mobility, increased performance
agility for all size businesses. and availability of resources, automated operations – they‟re
all benefits of virtualization that make IT simpler to manage
and less costly to own and operate.
Additional benefits include:

Reduced capital and operating costs.

Minimized or eliminated downtime.

Increased IT productivity, efficiency, agility and


Refer to this site: responsiveness.
https://www.vmware.co Faster provisioning of applications and resources.
m/in/solutions/virtualiza
Better business continuity and disaster recovery.
tion.html

Excellence and Service


Christ University

Block Chain

• What
• Why
• When
• Who/Whom
• How

Excellence and Service


Christ University
Block Chain

Background:
Information/IT Revolution:
• Computing/Memory The challenge felt and expressed is the lack of trust, due to
• Internet which we need a middle person to broker any
• e-mail deal/transaction.
• the World Wide Web
• dot-coms A third party like a bank or a government is required to
• E-Retail, entertainment, e-cash prove our identity. Ex: Buyer has to pay the seller. Buyer has
• social media to go through a bank to make the payment, which verifies
• mobile Web his identity and arranges payment. Bank charges
• big data, AI and analytics commission.
• cloud computing,
• IoT, etc… These intermediaries/banks collect our data and invade our
• Pervasive technology privacy for commercial gain.

Another challenge is information security: spammers,


identity thieves, phishers, spies, hackers, cyber bullies, and
datanappers - criminals who unleash ransom ware to hold
data hostage

Excellence and Service


Christ University
Block Chain

The block chain is a public ledger which works like a log by keeping a record of all transactions in a
chronological order, secured by an appropriate consensus mechanism and providing an immutable
record. Its exceptional characteristics include immutability, irreversibility, decentralization,
persistence, encryption and anonymity.

With these advantages, it has found applications in almost all fields requiring data sharing among
multiple parties but with secure authentication, anonymity and permanence. Some of the
applications are finance, real-estate and IoT.

Chain of number of blocks (transactions) after validation

Excellence and Service


Christ University

Trust protocol

Nick Szabo - paper entitled “The God Protocol” It may not be the Almighty, but a trustworthy global platform
for our transactions is something very big. We’re calling it the
Similar to “the God particle”. Trust Protocol – Block chain Technology.

In his paper, Szabo discussed about the creation of a be-all This protocol is the foundation of a growing number of global
end-all technology protocol. distributed ledgers called blockchains—of which the bitcoin
blockchain is the largest.
Protocol: set of rules/procedures to exchange data and
perform operations in digital world. While the technology is complicated and the word blockchain
isn’t exactly resonant, the main idea is simple. Blockchains
In 2008, a pseudonymous person or persons named Satoshi enable us to send money directly and safely from me to you,
Nakamoto outlined a new protocol for a peer-to-peer without going through a bank, a credit card company, or
(P2P)electronic cash system using a cryptocurrency (digital PhonePe/GooglePe.
currencies ) called bitcoin.
Rather than the Internet of Information, it’s the Internet of
This protocol established a set of rules—in the form of Value or of Money. It’s also a platform for everyone to know
distributed computations—that ensured the integrity what is true—at least with regard to structured recorded
(valid and accurate) of the data exchanged among these information.
billions of devices without going through a trusted third
party.
This feature captured the imagination of the computing
world and has spread to businesses, governments, privacy
advocates, social development activists, media theorists,
and journalists, to name a few, everywhere.

Excellence and Service


Christ University
HOW THIS WORLDWIDE LEDGER WORKS
Big banks and some governments are implementing
Bit Coin :
blockchains as distributed ledgers to revolutionize the way
information is stored and transactions occur.
And the blockchain is encrypted (cryptography): it uses heavy-duty
encryption involving public and private keys (rather like the two-key system
Their goals are laudable—speed, lower cost, security, fewer
to access a safety deposit box) to maintain virtual security.
errors, and the elimination of central points of attack and
failure.
You needn’t worry about the weak firewalls of Target or Home Depot or a
thieving staffer of Morgan Stanley or the U.S. federal government.
These models don’t necessarily involve a cryptocurrency
for payments.
Every few (say ten) minutes, like the heartbeat of the bitcoin network, all
the transactions conducted are verified, cleared, and stored in a block which
Bitcoin or other digital currency isn’t saved in a file
is linked to the preceding block, thereby creating a chain.
somewhere; it’s represented by transactions recorded in a
blockchain—kind of like a global spreadsheet or ledger,
Each block must refer to the preceding block to be valid. This structure
which leverages the resources of a large peer-to-peer
permanently time-stamps and stores exchanges of value, preventing anyone
bitcoin network to verify and approve each bitcoin
from altering the ledger.
transaction.
If you wanted to steal a bitcoin, you’d have to rewrite the coin’s entire
Each blockchain, like the one that uses bitcoin, is
history on the blockchain in broad daylight. That’s practically impossible.
distributed: it runs on computers provided by volunteers
around the world; there is no central database to hack.
So the blockchain is a distributed ledger representing a network consensus of
every transaction that has ever occurred. Like the World Wide Web of
The blockchain is public: anyone can view it at any time
information, it’s the World Wide Ledger of value—a distributed ledger that
because it resides on the network, not within a single
everyone can download and run on their personal computer.
institution charged with auditing transactions and keeping
records.
It can be programmed to record virtually everything of value and importance
to humankind: birth and death certificates, marriage licenses, deeds and
titles of ownership, educational degrees, financial accounts, medical
procedures, insurance claims, votes, provenance of food, and anything else
that can be expressed in code

Excellence and Service


Christ University

Learn Block Chain

Excellence and Service


Christ University

P2P : Peer to peer Network

Crypto Currency is not a MUST for Block chain to work.

Excellence and Service


Christ University

Learn Block Chain

P2P : Peer to peer Network

Crypto Currency is not a MUST for Block chain to work.

Excellence and Service


Christ University

Block Chain Process – 2 Step Validation process

Two Levels of Validation : Transaction validation and Block validation


Ex: Public key and Private key cryptography – Transaction validation
Proof-of-Work – Block Validation

Excellence and Service


Christ University

Types of Block Chain Characteristics

• Immutability

• Irreversibility

• Decentralization

• Persistence

• encryption
• anonymity. How does blockchain achieve anonymity?
Transactions on permissionless ledgers are pseudo-
anonymous by design– transactions are linked to addresses
that correspond to public keys derived by user-held private
Types of Block Chain keys, not by username or password.
Transactions are encrypted and stored on multiple devices,
Public: Open to all/Permission less
or nodes around the globe.
Private: Organizational
level/Invited/Permissioned Challenges
Consortium: Accessible to predetermined
entities

Excellence and Service


Christ University

Applications of Block Chain

Blockchain technology is being taken R3, Barclays, HSBC, and Co.


seriously by the financial sector as it may Fintech firm R3 has announced that it and 22 of the world’s
prove to be a great disrupter to the biggest banks have created an international payments
traditional banking industry. system based on the blockchain. A prototype of the solution
The tamper-proof, decentralized, is expected to be out soon. The banks involved include
immutable nature of the blockchain make Barclays, BBVA, CIBC, Commerzbank, DNB, HSBC, Intesa,
it ideal for reducing costs and streamlining KBC, KB Kookmin Bank, KEB Hana Bank, Natixis, Shinhan
everything from payments, asset trading, Bank, TD Bank, US Bank, and Woori Bank. According to the
securities issuance, retail banking, and R3 release, the aim is to deliver a safe and secure way to
clearing and settlements. It becomes speed international payments and improve cross-border
obvious that blockchain technology is business.
much more than Bitcoin or
cryptocurrencies. While those
implementations as payments and money
systems are indeed disruptive, the greater
disruption may come from alternative uses
of this unique and powerful characteristics.

Excellence and Service


Christ University

Crypto Currency

Bitcoin mining is the process by which bitcoins are released into circulation. Generally, mining
requires the solving of computationally difficult puzzles in order to discover a new block, which is
added to the blockchain. In contributing to the blockchain, mining adds and verifies transaction
records across the network. For adding blocks to the blockchain, miners receive a reward in the form
of a few bitcoins.

Bitcoin is a type of cryptocurrency. Balances of Bitcoin tokens are kept using public and private
"keys," which are long strings of numbers and letters linked through the mathematical encryption
algorithm that was used to create them.

The public key (comparable to a bank account number) serves as the address which is published to
the world and to which others may send bitcoins. The private key (comparable to an ATM PIN) is
meant to be a guarded secret and only used to authorize Bitcoin transmissions.

Excellence and Service


Christ University

Informative Videos
https://www.youtube.com/watch?v=SSo_EIwHSd4
https://www.youtube.com/watch?v=3xGLc-zz9cA

Industries that block chain will disrupt


https://www.youtube.com/watch?v=G3psxs3gyf8

Excellence and Service


Christ University
bAirbnb and DApp

Decentralized applications (dApps) are digital applications or programs that exist and run on a blockchain or P2P network of
computers instead of a single computer, and are outside the purview and control of a single authority

Founded in 2008 , Airbnb is a popular platform in room renting business.


International payments are processed through Western Union, which takes $10 of every transaction and Settlements take a long
time.
Airbnb stores and monetizes all the data. Both renters and customers alike have concerns about privacy.

A new business model is being designed using block chain - bAirbnb.


It would look more like a member-owned cooperative. All revenues, except for overhead, would go to its members, who would
control the platform and make decisions.

bAirbnb is a distributed application (DApp), a set of smart contracts that stores data on a home-listings blockchain. Similar Filters
will be available for location selection.
User experience is identical to that in Airbnb, except that you communicate peer to peer on the network, through encrypted and
cryptographically signed messages.

You and the room owner are the only two people who can read these messages. On bAirbnb you and the owner could communicate
off-chain and complete the transaction entirely off-chain, but you are better off completing the transaction on-chain for a few
reasons.

Excellence and Service


Christ University

Ethereum

Blockchain developer Gavin Wood makes this point describing the Ethereum blockchain as a platform for processing.
“There is only one Ethereum computer in the world,” he said. “It’s also multiuser—anyone who ever uses it is automatically
signed in.” Because Ethereum is distributed and built to the highest standards of cryptosecurity.
Ethereum is a blockchain-based software platform that can be used for sending and receiving value globally via its native
cryptocurrency.

BitTorrent the peer-to-peer file-sharing app, demonstrates the power of DApps Lovers of music, film, and other media
share their files for free, with no central server for authorities to shut down.

Autonomous agents— software that makes decisions and acts on them without human intervention.
Each autonomous agent is responsible for instantiating key processes, such as user authentication and authorization, smart
contracts, and knowledge graph generation through data integration among the participating stakeholders in the network.

Ex: A cloud computing service rents processing power from various sources, growing to Amazon’s size by making rental
deals with other computers that have excess capacity.
A driverless car owned by a community, company, individual, or perhaps itself moves around the city picking up and
dropping off passengers and charging them appropriate fees, without a middle man like Uber, Ola..

These are computer agents that can do transactions, acquire resources, make payments, or otherwise produce value on
behalf of their creator. How about middle man fees/Commission?.

Excellence and Service


Christ University

WeatherNodes

In can be a distributed network of sensors connected on Block Chain.

Distributed environmental sensors (weatherNodes) on utility poles, in people’s clothes, on roofs of


buildings, traveling in cars, and linked to satellites are all connected in a global mesh network

The blockchain handles a few functions. First, it settles payments.

As an incentive, each weatherNode receives a micropayment every thirty seconds for providing accurate
weather telemetry (temperature, humidity, wind, etc.) at a particular location in the world.

“WeatherDataMarketplace DApp”

The blockchain allows any entity to become a weather provider or weather data consumer, with very low
barriers to entry. Just buy a weatherNode, put it on your roof, and connect it to the
GlobalWeatherDataMarketplace DApp LP (for linked peers) and you’ll start earning income right away.

Excellence and Service


Christ University

THE BIG SEVEN: OPEN NETWORKED ENTERPRISE BUSINESS MODELS

1. The Peer Producers : like Wikipedia, Reddit discussion platform


2. The Rights Creators : Arts, music, can be degitaized by individuals , “rights monetizer” with the technology
making deals and collecting revenue in real time.
3. Blockchain Cooperatives : Drivers can set up their own Uber and replace Uber with a pure cooperative,
blockchain enables that. Enable and doing are two different things. “There’s a difference between
enabling and moving the world in a new direction.” People still have to want to do it, to take the risk of
doing it.
Ex: blockchain Airbnb, blockchain Uber, blockchain Lyft,

4. The Metering Economy - Wi-Fi hot spots, computing power or storage capacity, the heat generated by our
computers, our extra mobile minutes. And even physical assets like autonomous cars
5. The Platform Builders : Platforms to carry out certain transactions: Zipcar (a service aggregator) as well
as Buzzcar (users can share their cars with others)
6. Block chain Makers
7. The Enterprise Collaborators

Excellence and Service


Christ University

What you think is Block- chain future ??

Why some one will provide service without a benefit/ commission?

Will this model sustain?

Book Sections : Using Block chain for managing Supply Chain


Caselet in Chapter 15.
and
Block chain Technology caselet in chapter 2.

https://www.classicinformatics.com/blog/blockchain-technology-applications - Good source of application. *-


pending verification

Excellence and Service


Christ University

Thank You
How? ( 2 videos below)

Excellence and Service


Christ University
Grid Computing – Fyi…
Grid computing is a form of distributed  Widely distributed and heterogeneous
computing whereby a „virtual supercomputer‟ is computers connected as a cluster of
composed of many networked but loosely computers for Parallel processing
coupled computers acting together to perform very large  High speed broadband network is the
tasks. key for ability to connect the computers
This is managed by a software run by control node to over a wide range economically
manage communication between clients and servers  Combines computational power of all
Advantage is getting computing power of a multiprocessor computers in the cluster
supercomputer at lower cost  Complex logic is used to distribute the
task and assemble the results to get the
final Result
 The server/control node software breaks
the data into smaller packets and
dispatches to grids.
 Software again assembles the results
received from grids/child nodes in
correct sequence to get the final result

GRID Computing -> CLOUD Computing over internet

Excellence and Service


Christ University

ACHIEVING TRUST IN THE DIGITAL AGE


Trust in business is the expectation that the other party will behave according to the four principles of integrity: honesty,
consideration, accountability, and transparency.

Honesty is not just an ethical issue; it has become an economic one. To establish trusting relationships with employees,
partners, customers, shareholders, and the public, organizations must be truthful, accurate, and complete in
communications. No lying through omission, no confusion through complexity.
Consideration in business often means a fair exchange of benefits or detriments that parties will operate in good faith. But
trust requires a genuine respect for the interests, desires, or feelings of others, and that parties can operate with goodwill
toward one another.

Accountability means making clear commitments to stakeholders and abiding by them. Individuals and institutions alike
must demonstrate that they have honored their commitments and owned their broken promises, preferably with the
verification of the stakeholders themselves or independent outside experts. No passing the buck, no playing the blame
game.
Transparency means operating out in the open, in the light of day. “What are they hiding?” is a sign of poor transparency
that leads to distrust. Of course, companies have legitimate rights to trade secrets and other kinds of proprietary
information. But when it comes to pertinent information for customers, shareholders, employees, and other stakeholders,
active openness is central to earning trust. Rather than dressing for success, corporations can undress for success.

Excellence and Service


Christ University

AI - The Turing Test


In 1950, Alan Turing, a British mathematician attempted to answer the question ‘Can Machines Think?’, by
conducting an experiment. A and B are Human beings, while C is a Computer( an interrogator). A and B know
each other. C is cut-off completely (sight and hearing) from A and B (as in figure below). Computer has to find
out the gender of both A and B, by using number of questions (based on tastes, preferences, hobbies, etc…),
while A and B try to confuse computer by twisted answers. B also will be replaced by a computer later to
prove Computers can think.
The Turing test compares the performance of a computer program with that of human in a live interaction
situation.

Excellence and Service

You might also like