Wednesday, May 6, 2020
Two Computing Stories
Question: Explain Two Computing Stories? Answer: Introduction: Nowadays almost every activity across the world is computing based. As technologies based on computing continue to grow rapidly since last two decades, the knowledge economy has become an important part of the world economy. In addition to this, computing-based technologies have contributed a lot to many aspects of society. As todays world is becoming more connectivity based, knowledge-based and is an important not only for economic growth but it also provides the general public infrastructure. Countries around the world are making lots of effort to invest on the computing based operation to enhance the networking based infrastructure, for example, nowadays almost every company is increasing their revenue based on the automated infrastructure and real-time monitoring of their overall processes across the organization. There are number of organization are there are who use their networking infrastructure to integrate different level of tasks and represent their respective organization as whole, for example use of client-server system give the ultimate opportunity to integrate different department with the server and let the different users share a system resource among them. Hence, it is required to have abstraction to hide the a specific layers of tasks from other layers of business process and transpar ency of each work to measure the performance. To cover the all the needs of the increasing population across the word there are different methodologies and tools are getting included in the plan of almost every organization. The cloud infrastructure is used to share resources over the network. This scenario helps to manage resource and the organization to invest less in their respective infrastructure. Due to this option general user, who is less skilled in the terms of technology, they dont have to worry to handle the devices, i.e. an application and strong network connection make a general user able to handle devices keep in a remote location. Even devices with less processing power and less instruction are in use using RISC chips. All of these can be seen as an assemblage of contemporary computing which has raise the proper utilization of time and space. Two Computing stories: Cloud computing as a disruptive technology Cloud computing is an innovative way that can serve less wealthy and less skilled person to achieve the same utility as the way a more skilled person was available to do. In this way, cloud computing has gained grip in the marketplace by allowing flexible and scalable solution via the internet to share things easily over the internet. Today cloud computing is replacing most of the rigid software and improving technological capabilities to welcome the changes in the marketplace (Aclweb.org, 2015). Today cloud computing technology is getting an image of disruptive technology that is playing the game-changing factor by traditional software licensing companies and by on-premises, private data centers. At a first glance, cloud computing may be seen as the bad thing as a disruptive technology. But the actual scenario is not that. Disruptive technology is only the threat to the current customers and businesses, as the activities of the intruders are increasing day by day hence a shared platform may allow those intruders to steal data from the easily from the shared platform. Hence, the current finance and RD organization are facing lots of problems (Bartz, 2015). On the other hand disruptive technology flies under the radar, opening new market and cloud computing will provide better scalability, ubiquity among application and user, i.e. users can share files and application can be handled online used shared resources, utility-based pricing, potentiality among cloud vendors (Cox, 201 3). The Characteristics of disruptive technology has been shown in the below. The market demand has been shown in terms of technology-based performance, indicated as a time to function. In this below-mentioned figure the ability of the market to take up a given service or technology shown by the shaded region bounded by the low-end and high-end market demand. Nowadays every current technology has its way to perform. Once the performance of their (current technology) own way exceeds the market demand of high-end, it does better than the markets ability to take up the technologies, as per the figure1. In this scenario, incumbent/current technology becomes open to the security risks to the disruptive technologies based on the markets ability to absorb the technologies and market exceeding scenario of their own to perform (Papavassiliou and Ruehrup, 2013). The disruptive technology appears at a low point while performance is concerned with an apparently low cost, but it is equipped with its curve of performance capable to serve the market at several tires. At the end, the disruptive technology will exceed the ability of a market to take the disruptive technology. Then, the circle continues with a new disruptive technology (Sinha, 2015). As a contemporary computing it has enabled the proper resource utilization along with the smart use of Internet today. RISC processing power (Green technology stimulates new business prospects) In recent years, computing-based services and products using RISC, such as smartphones and consumer tablet PCs making their debut in the technology driven market. Nowadays advanced gadgets are so popular nowadays that everyone is facilitating their work based on new methodologies and techniques. There are numbers of companies, who are dealing with RISC-based computing solution. Due the evaluation of the wireless data transmission, that includes Wi-Fi, WiMAX, GPRS, 3G, 4G, LTE and several wireless networks has strengthen the link between the information and people (EETimes, 2015). The RISC concept has been developed to reduce the size of the instruction set or the removing the less used instruction. As the RISC-based processor takes less design paradigm and requires less effort on application programming effort, hence it offers lower design cost (Obaidat, 2014). Though the instruction set has been reduced, some functions are not supported and the degree of performance has been reduced as well and that is the reason it is not suitable enough to incorporate in a core computing platform. On the other hand as the instruction set has been reduced, it became able to simplify the CPU architecture and less power consumption per chip and high-quality rate in production per wafer. That is why the RISC solution has the more advantage because of power-saving and low-cost (Golze et al., 2014). Currently, RISC has three major markets of IP suppliers, i.e. PowerPC, MIPS, and ARM. Each of the suppliers has its flexibility and quality. As a standard RISC architecture, PowerPC has been developed by the IBM, Apple and Motorola and they known as AIM. At first it has been invented for personal computers, later it has become popular as high-performance and embedded processor (Wolf, n.d.). It is known to everybody that the Appels Power Mac G5 was IBMs PowerPC G5 CPU. In the later period the apples Power Mac G5 was flaunted as the fastest computer ever built. The second is, most common RISC microprocessor is MIPS that is used in mobile consumer electronics, networking, and wired and wireless communication. Last of all, the use of ARM processors make low-power consuming applications. ARM made its market successful in the field of embedded electronics market. ARM is mainly aimed primarily for the laptop market, then desktop, then desktops, and then severs in future (Kaiser, 2010). As a contemporary computing, computing based services using RSIC has given a lot of strength to the modern use of technology. Conclusion: Nowadays, computing based on desktop, PCs, and mobile devices have put a lot of great impact on the society. An organizational performance can be monitored from the remote location and also all the processes and activities that are meant to be conducted within an organization can be conducted setting on the remote location with the use of strong network connectivity. Even organizations nowadays are more tend to make sustainable innovation across the industry. Hence, organizations are searching an innovative way to have sustainable development that can ensure safety and accuracy on the work front and correct measurement of the work performance. For example, the use of RISC for the computing-based services has opened new doors for the great innovation where power consumption and size matters a lot. Though the reduced instruction set in the RISC has already decreased the power consumption level, its level of performance has already been decreased due to the use of fewer numbers of instr uctions. That is why the RISC-based computing services are generally in use for the applications those have fewer process overheads with less computing, such as the use of microcontroller chips in washing machine, music system or AC in a car. Even the use of cloud system has made the use of the system more useful by allowing the system resources shareable among different user. Though the cloud technology is becoming a disruptive in nature, it allows the general or the less sophisticated user to take the taste of internet-based sharing and applications online by paying less with minimum security features. References: Aclweb.org, (2015). [online] Available at: https://www.aclweb.org/anthology/J80-3001 [Accessed 29 Jul. 2015]. Bartz, R. (2015). Mobile Computing Deployment and Management.Wiley. Cloudbook.net, (2015).Cloud Computing as a Disruptive Technology. [online] Available at: https://www.cloudbook.net/resources/stories/cloud-computing-as-a-disruptive-technology [Accessed 29 Jul. 2015]. Cox, L. (2013).Improving risk analysis. New York, NY: Springer New York. EETimes, (2015).New generation RISC processing power - Green technology engenders new business opportunities | EE Times. [online] Available at: https://www.eetimes.com/document.asp?doc_id=1279623 [Accessed 29 Jul. 2015]. Golze, U., Blinzer, P., Cochlovius, E., Schafers, M. and Wachsmann, K. (2014).VLSI Chip Design with the Hardware Description Language VERILOG. Berlin: Springer Berlin. Kaiser, M. (2010).Governing future technologies. Dordrecht: Springer Netherlands. Obaidat, M. (2014).Advanced in Computer Science and Its Applications. Papavassiliou, S. and Ruehrup, S. (2013).Ad-hoc, mobile, and wireless networks. Sinha, B. (2015). Wireless networks and mobile computing. [Place of publication not identified]: Chapman Hall Crc. Wolf, M. (n.d.). High performance embedded computing. Appendices: Today cloud computing is replacing most of the rigid software and improving technological capabilities to welcome the changes in the marketplace. As nowadays using Cloud a single hardware device can be used by several users. Disruptive technology is only the threat to the current customers and businesses, as the activities of the intruders are increasing day by day. Hence, a shared platform may allow those intruders to steal data from the easily from the shared platform. Still, disruptive technology helps the less sophisticated user to share the resources over the internet. The RISC concept has been developed to reduce the size of the instruction set or the removing the less used instruction. The RISC-based processor takes less design paradigm and requires less effort on application programming effort; hence it offers lower design cost.