Posted: February 9th, 2015

Technology

Technology

Question:
Describe the relationship among the five trends we discussed in this module: Cloud Computing, Open Source, social networks, mobile computing, and Big Data. How do each of these trends blend together? Where do they overlap? Taken together, what opportunities do they provide? What are the challenges?
Answer:
Most of us understand that Cloud Computing, Open Source, social networks, mobile computing, and Big Data are somehow related, and benefit from each other, we discuss here exactly what those relationships and benefits are.  Indeed, each emerging market segment is dependent upon other emerging segments of the market, and it’s helpful to break those apart to understand them better.
Cloud computing and open-source software have been intertwined since the early days of the cloud. Open source provides an essential foundation for cloud computing. While the market is dominated by proprietary cloud service vendors, open source technologies seem to be driving innovation in cloud computing technologies. After years of catching up with proprietary software in commoditized enterprise computing segments, open source is now creating value in areas such as virtualization, big data, infrastructure, cloud management, etc. Cloud computing is being shaped by antagonistic forces between the open source approach to push the boundaries of technology through collaborative innovation and proprietary strategies aimed at to developing market positions and competitive advantages.
On the other hand, Big Data need large on-demand compute power and distributed storage to crunch the 3V data problem and Cloud seamlessly provides this elastic on-demand compute required for the same. With the “Apache Hadoop”, the big data processing has been more batch oriented in the current state. The burst workload nature of the Big Data Computing Infrastructure makes it a true case for the Cloud. Amazon “Elastic Map Reduce” shows how Big Data processing can be done leveraging the power of Cloud Elastic Computes.
Development of mobile applications including social applications for mobile have grown at a rapid pace, leading to growth of social mobile communities and encouraging ubiquitous sharing and collaboration. While mobile has emerged as the primary platform for social, cloud infrastructures and cloud services have become critical for the seamless delivery of cost effective and scalable mobile and social solutions. It is common for mobile applications to offload storage and processing to the cloud thus removing the limitations of mobile devices with respect to storage and computing capabilities, and even security.   Recent example of the effective convergent use of these technologies was witnessed at the recent Boston marathon bombing. One of the reasons the FBI was able to capture the suspects within 4 days was because of the analysis of mountains of cell phone tower call logs, text messages, social media data, tweets, photographs and video surveillance footage to quickly pinpoint the suspects. Leveraging cloud infrastructure was critical in analyzing the data, which had immense variety. Specifically to analyze social data, the FBI used a cloud tool that had indexed the social web. Furthermore, Boston residents themselves took to a cloud-based file storage system, and created a list of thousands of names, addressed and phone numbers of those offering aid and shelter to those impacted by the bombings.
The combination of these technologies will unlock new opportunities for businesses; it will also change the way we live and work. Embracing cloud, open source, social, mobile, and big data has been transforming businesses and organizations by improving their levels of customer engagement, helping build new partnerships, and offering a competitive edge. While they have proven benefits when used alone, converging these streams can maximize the business benefits in more ways than one.
With the new opportunities, they will be facing new challenges too. We have already been facing the security challenges. These technologies together face the new challenges, such as controlling access to sensitive or personal information, stopping misuse of cyberspace for terrorist purposes, producing skilled human power, licensing and funding issues, speed and quality and data protection.

Instructions:
1.    Please limit the answer with in 500 words without changing core concept, that’s why I have provided question too.
2.    Please remove any passive voice sentences.
3.    Make sure answer is grammar error free, well organized sentence and paragraph structure.
4.    Please rewrite the sentences if they are long and does not give simple and clear meaning.
5.    I am expecting more than just checking grammar, please accept this work only if you are ok to edit the work per question’s requirement.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp