Mathematical Modelling of Wireless Sensor Network

 

Security Risk Management in Healthcare on Cloud

Quick presentation made in 1 hour


Security Risk Management in Healthcare on Cloud using NIST guidelines

Wireless Sensor Network Security Analytics – presentation

find link of my presentation by searching on google itself
google : ” Wireless Sensor Network Security Analytics ”

TopSearchWirelessSensorSecurityAnalytics2

 

Link below
https://sandyclassic.wordpress.com/2014/03/07/wireless-security-analytics-approach/

2 New Routing algorithm for ad-hoc routing wireless sensor network, mathematical modelling for wireless sensor network 4 models for over all system and 2 models for energy measurement of wireless sensor network
Project Goal:

  • 1. 10 PROJECT GOALS 1. Routing algorithm: SPIN,CTP. 2. measure energy consumed 3. Validate PPECEM Model 4. Improve in existing model for efficiency, reliability, availability.
  • 2. 10 PROJECT GOALS 5. New Model: ERAECEM Efficiency Reliability Availability Energy consumption Estimation Model. 6. ERAQP BASED on ERAECEM Model for WSN a new energy aware routing algorithm (ERAQP)
  • 3. 10 PROJECT GOALS 7. Configurable Routing Algorithm Approach Proposed on WSN motes utilizing user defined QoS parameters 8. Model for WSN: Leader-Follower Model, Directed Diffusion Model
  • 4. 10 PROJECT GOALS 9. Fuzzy routing Algorithm 10. Fuzzy Information Neural Network representation of Wireless Sensor Network.
  • 5. MOTIVATION
  • 6. 1.1 SPIN
  • 7. 1.2 CTP  Collection tree protocol
  • 8. 2 ENERGY MEASUREMENT  Agilent 33522B Waveform Generator was used to measure the Current and voltage graph .  The Graph measurement were then converted to numerical power Power= Voltage X current = V X I. The Power consumed during motes routing on SPIN and CTP then taken into is added up to give power consumption and values are applied to PPECEM.
  • 9. 1.3 WSN SECURITY
  • 10. 3.1COST OF SECURITY  Cost of security In WSN can only be estimated by looking at extra burden of secure algorithm and security of Energy Consumption as the Energy is key driver or critical resource in design of WSN. As design is completely dominated by size of battery supplying power to mote.
  • 11. 3.2 PPECEM  QCPU = PCPU * TCPU = PCPU * (BEnc * TBEnc + BDec * TBDec +BMac * TBMac + TRadioActive) Eq.2)
  • 12. 4 ERA  Efficiency = Ptr X Prc X Pcry … (Eq.2)  Reliability = Rnode1 = FtrX FrcX Fcy  Availability= TFNode1 = Ftr+ Frc+Fcry
  • 13. 5. IMPROVE EXISTING  . ERA = fed  Efficiency of Energy Model: QEff=QCPU X Eff (improvement #1 in Zang model)
  • 14. ERAECEM  Etotal = Average(Eff + R +A)= (E+R+A)/3  Efficiency of Energy Model: QEff=QCPU X Etotal (improvement #1 in Zang model)
  • 15. 6 ERAQP  Efficiency ,Reliability, Availability QoS prioritized routing Algorithm  ERA ranked and routing based Ranking Cost on Dijesktra to find most suitable path
  • 16. 7.CONFIG. ROUTING  q1, q2, q3 as QoS parameter algorithm rank Motes/nodes based on combined score of these parameters. Based on this we rank we apply Dijesktra algorithm to arrive at least path or elect Cluster head to node. Thus q1, q2, q3 can be added, deleted.
  • 17. 8 MATHEMATICAL MODEL  Leader Follower EACH node share defined diffusion rate given by slider control on UI which tells quantity it is diffusing with its neighbors.Since it’s a directed graph so Node B gives data towards Node A while traffic from A towards B may be non-existent  Directed Diffusion Mathematical model represent diffusion of quantity towards a directed network. Helps to understand topology, density and stability of network and a starting point for designing complex , realistic Network Model.
  • 18. 9 FUZZY ROUTING  Fuzzy set A {MoteA, p(A))  Where, p(A) is probability Of Data Usage Or Percentage Load in Fraction Compared With Global Load
  • 19. 10 FUZZY TOPOLOGY  Based on this Utilization p(A) nodes can be ranked in ascending order to find most data dwarfed node at the top. Then We can apply Dijkstra’s algorithm on the network to find best route based on weight on each node represented by Rank.
    2. WSN and BPEL and Internet Of Things (IoT)
    https://sandyclassic.wordpress.com/2013/10/06/bpm-bpel-and-internet-of-things/3. Internet Of Things (IoT) and effects on other device ecosystem.
    The Changing Landscape:
    https://sandyclassic.wordpress.com/2013/10/01/internet-of-things/

    4. How application development changes with IoT, Bigdata, parallel computing, HPC High performance computing.
    https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

    5. Landslide detection and mpact reduction using wireless sensor network.
    https://sandyclassic.wordpress.com/2013/06/23/landslide-detection-impact-reduction-using-wireless-sensor-network

    6. Mathematical modelling Energy Wireless sensor Network.
    https://sandyclassic.wordpress.com/2014/02/04/mathematical-modelling-energy-security-of-wireless-sensor-network/

    Topic Topics Wireless sensor network Security Analytic, Wireless Security Analytics,Security QA metrics

Interview presentation is topmost search on slideshare and google

Top Search On Google:

TopSearchAdvanced metering infrastructure Architecture Analytics

Top Search on SlideShare.com just search (Advanced meter architecture analytics).

Top Search on SlideShare.com Advanced meter architecture analytics

And you reach
https://sandyclassic.wordpress.com/2014/04/03/advanced-metering-infrastructure-architecture/

Wireless Security Analytics- Approach

How To model wireless security mathematically. (its topmost search in Google Type(Wireless Sensor network Security Analytics) Result:
TopMostSearchWirelessSensorNetworkSecurityAnalyticsRead:

1. Go through the Slides about Modelling the Wireless sensor Network and Internet of Things

  • 10 PROJECT GOALS 1. Routing algorithm: SPIN,CTP. 2. measure energy consumed 3. Validate PPECEM Model 4. Improve in existing model for efficiency, reliability, availability.
  • 2. 10 PROJECT GOALS 5. New Model: ERAECEM Efficiency Reliability Availability Energy consumption Estimation Model. 6. ERAQP BASED on ERAECEM Model for WSN a new energy aware routing algorithm (ERAQP)
  • 3. 10 PROJECT GOALS 7. Configurable Routing Algorithm Approach Proposed on WSN motes utilizing user defined QoS parameters 8. Model for WSN: Leader-Follower Model, Directed Diffusion Model
  • 4. 10 PROJECT GOALS 9. Fuzzy routing Algorithm 10. Fuzzy Information Neural Network representation of Wireless Sensor Network.
  • 5. MOTIVATION
  • 6. 1.1 SPIN
  • 7. 1.2 CTP  Collection tree protocol
  • 8. 2 ENERGY MEASUREMENT  Agilent 33522B Waveform Generator was used to measure the Current and voltage graph .  The Graph measurement were then converted to numerical power Power= Voltage X current = V X I. The Power consumed during motes routing on SPIN and CTP then taken into is added up to give power consumption and values are applied to PPECEM.
  • 9. 1.3 WSN SECURITY
  • 10. 3.1COST OF SECURITY  Cost of security In WSN can only be estimated by looking at extra burden of secure algorithm and security of Energy Consumption as the Energy is key driver or critical resource in design of WSN. As design is completely dominated by size of battery supplying power to mote.
  • 11. 3.2 PPECEM  QCPU = PCPU * TCPU = PCPU * (BEnc * TBEnc + BDec * TBDec +BMac * TBMac + TRadioActive) Eq.2)
  • 12. 4 ERA  Efficiency = Ptr X Prc X Pcry … (Eq.2)  Reliability = Rnode1 = FtrX FrcX Fcy  Availability= TFNode1 = Ftr+ Frc+Fcry
  • 13. 5. IMPROVE EXISTING  . ERA = fed  Efficiency of Energy Model: QEff=QCPU X Eff (improvement #1 in Zang model)
  • 14. ERAECEM  Etotal = Average(Eff + R +A)= (E+R+A)/3  Efficiency of Energy Model: QEff=QCPU X Etotal (improvement #1 in Zang model)
  • 15. 6 ERAQP  Efficiency ,Reliability, Availability QoS prioritized routing Algorithm  ERA ranked and routing based Ranking Cost on Dijesktra to find most suitable path
  • 16. 7.CONFIG. ROUTING  q1, q2, q3 as QoS parameter algorithm rank Motes/nodes based on combined score of these parameters. Based on this we rank we apply Dijesktra algorithm to arrive at least path or elect Cluster head to node. Thus q1, q2, q3 can be added, deleted.
  • 17. 8 MATHEMATICAL MODEL  Leader Follower EACH node share defined diffusion rate given by slider control on UI which tells quantity it is diffusing with its neighbors.Since it’s a directed graph so Node B gives data towards Node A while traffic from A towards B may be non-existent  Directed Diffusion Mathematical model represent diffusion of quantity towards a directed network. Helps to understand topology, density and stability of network and a starting point for designing complex , realistic Network Model.
  • 18. 9 FUZZY ROUTING  Fuzzy set A {MoteA, p(A))  Where, p(A) is probability Of Data Usage Or Percentage Load in Fraction Compared With Global Load
  • 19. 10 FUZZY TOPOLOGY  Based on this Utilization p(A) nodes can be ranked in ascending order to find most data dwarfed node at the top. Then We can apply Dijkstra’s algorithm on the network to find best route based on weight on each node represented by Rank.

2. WSN and BPEL and Internet Of Things (IoT)
https://sandyclassic.wordpress.com/2013/10/06/bpm-bpel-and-internet-of-things/

3. Internet Of Things (IoT) and effects on other device ecosystem.
The Changing Landscape:
https://sandyclassic.wordpress.com/2013/10/01/internet-of-things/

4. How application development changes with IoT, Bigdata, parallel computing, HPC High performance computing.
https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

5. Landslide detection and mpact reduction using wireless sensor network.
https://sandyclassic.wordpress.com/2013/06/23/landslide-detection-impact-reduction-using-wireless-sensor-network

6. Mathematical modelling Energy Wireless sensor Network.
https://sandyclassic.wordpress.com/2014/02/04/mathematical-modelling-energy-security-of-wireless-sensor-network/

Mathematical Modelling Energy Security Wireless sensor network- part 2

1. Go through the Slides about Modelling the Wireless sensor Network and Internet of Things

  • 10 PROJECT GOALS 1. Routing algorithm: SPIN,CTP. 2. measure energy consumed 3. Validate PPECEM Model 4. Improve in existing model for efficiency, reliability, availability.
  • 2. 10 PROJECT GOALS 5. New Model: ERAECEM Efficiency Reliability Availability Energy consumption Estimation Model. 6. ERAQP BASED on ERAECEM Model for WSN a new energy aware routing algorithm (ERAQP)
  • 3. 10 PROJECT GOALS 7. Configurable Routing Algorithm Approach Proposed on WSN motes utilizing user defined QoS parameters 8. Model for WSN: Leader-Follower Model, Directed Diffusion Model
  • 4. 10 PROJECT GOALS 9. Fuzzy routing Algorithm 10. Fuzzy Information Neural Network representation of Wireless Sensor Network.
  • 5. MOTIVATION
  • 6. 1.1 SPIN
  • 7. 1.2 CTP  Collection tree protocol
  • 8. 2 ENERGY MEASUREMENT  Agilent 33522B Waveform Generator was used to measure the Current and voltage graph .  The Graph measurement were then converted to numerical power Power= Voltage X current = V X I. The Power consumed during motes routing on SPIN and CTP then taken into is added up to give power consumption and values are applied to PPECEM.
  • 9. 1.3 WSN SECURITY
  • 10. 3.1COST OF SECURITY  Cost of security In WSN can only be estimated by looking at extra burden of secure algorithm and security of Energy Consumption as the Energy is key driver or critical resource in design of WSN. As design is completely dominated by size of battery supplying power to mote.
  • 11. 3.2 PPECEM  QCPU = PCPU * TCPU = PCPU * (BEnc * TBEnc + BDec * TBDec +BMac * TBMac + TRadioActive) Eq.2)
  • 12. 4 ERA  Efficiency = Ptr X Prc X Pcry … (Eq.2)  Reliability = Rnode1 = FtrX FrcX Fcy  Availability= TFNode1 = Ftr+ Frc+Fcry
  • 13. 5. IMPROVE EXISTING  . ERA = fed  Efficiency of Energy Model: QEff=QCPU X Eff (improvement #1 in Zang model)
  • 14. ERAECEM  Etotal = Average(Eff + R +A)= (E+R+A)/3  Efficiency of Energy Model: QEff=QCPU X Etotal (improvement #1 in Zang model)
  • 15. 6 ERAQP  Efficiency ,Reliability, Availability QoS prioritized routing Algorithm  ERA ranked and routing based Ranking Cost on Dijesktra to find most suitable path
  • 16. 7.CONFIG. ROUTING  q1, q2, q3 as QoS parameter algorithm rank Motes/nodes based on combined score of these parameters. Based on this we rank we apply Dijesktra algorithm to arrive at least path or elect Cluster head to node. Thus q1, q2, q3 can be added, deleted.
  • 17. 8 MATHEMATICAL MODEL  Leader Follower EACH node share defined diffusion rate given by slider control on UI which tells quantity it is diffusing with its neighbors.Since it’s a directed graph so Node B gives data towards Node A while traffic from A towards B may be non-existent  Directed Diffusion Mathematical model represent diffusion of quantity towards a directed network. Helps to understand topology, density and stability of network and a starting point for designing complex , realistic Network Model.
  • 18. 9 FUZZY ROUTING  Fuzzy set A {MoteA, p(A))  Where, p(A) is probability Of Data Usage Or Percentage Load in Fraction Compared With Global Load
  • 19. 10 FUZZY TOPOLOGY  Based on this Utilization p(A) nodes can be ranked in ascending order to find most data dwarfed node at the top. Then We can apply Dijkstra’s algorithm on the network to find best route based on weight on each node represented by Rank.

2. WSN and BPEL and Internet Of Things (IoT)
https://sandyclassic.wordpress.com/2013/10/06/bpm-bpel-and-internet-of-things/

3. Internet Of Things (IoT) and effects on other device ecosystem.
The Changing Landscape:
https://sandyclassic.wordpress.com/2013/10/01/internet-of-things/

4. How application development changes with IoT, Bigdata, parallel computing, HPC High performance computing.
https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

5. Landslide detection and mpact reduction using wireless sensor network.
https://sandyclassic.wordpress.com/2013/06/23/landslide-detection-impact-reduction-using-wireless-sensor-network

6. Mathematical modelling Energy Wireless sensor Network.
https://sandyclassic.wordpress.com/2014/02/04/mathematical-modelling-energy-security-of-wireless-sensor-network/


On TinyOS if Motelist is not working

first diagnose using.

=========================================================
diagnose using command
$ dmesg -s
you can see messages what is causing problem.

—————————————————————————–

For motelist not working download motelist source code.  

googlecode+ tinyos+motelist
http://tinyos-main.googlecode.com/svn/trunk/tools/platforms/msp430/motelist/motelist-linux.in

Check the mount structure for
As from previous version 8 of last image to Ubuntu 12.4 the directory structure is changed little bit  hence last version directory required should be copied to new directories
check $mount all mount structure
then if there is duplicate unmount using $umount
$sudo mount –bind /dev/bus /proc/bus
dev structure should be copied to /proc

then download Google(motelist code perl)
open editor copy paste code in editor
$nano or gedit (program name ).pl

Execute the perl code $ perl
$ perl (program name).pl

BPM and its influence on Cloud: Infrastructure as service

Cisco, Microsoft and Neapp Jointly produced a system called opalis (Workflow) in 2012.

Data centre System process interactions can be configured depending on user need on Opalis and rules can be set up for those interactions. Read previous blog more about BPM and internet of things:

https://sandyclassic.wordpress.com/2013/10/06/bpm-bpel-and-internet-of-things/
Opalis, Which essentially provide a workflow to dynamically create,monitor,deploy a Machine instance , allocate OS instance, (just like in Nebula, or Eucalyptus ) and User also can request (specific machine with RAM, CPU, storage space).
Microsoft provide all OS /software instance, Neapp provide SAN or and storage required on , Cisco provide Server , Nexus switches boxes.
http://technet.microsoft.com/en-us/systemcenter/hh913943.aspx
I
ts integrated with Microsoft SCMM System centre Manager (used to creating private cloud on Microsoft technologies and a single User Interface to administer whole
Orchestration are discussed in previous blog in case of opalis its architecture llooks like this
opalis_orchestrationRead: http://technet.microsoft.com/en-gb/library/hh420377.aspx
Read: opalis blog
http://blogs.technet.com/b/opalis/

Read: http://contoso.se/blog/?p=1665

If all exist then they can be configured using BPM workflow of opalis for a user.

Internet of things New Paradigm Shift in Computing

Paradigm shift in Computing Industry over period of time:

Mainframe–> Personal Computer, (PC based Application software ) –> Web Computing (Web servers, Internet, web application) –> devices (Mobile/ Mobility )/IP TV , notebook /ipad —>
For next shift there lot of possibility Like surface computing might eliminate Screen requirement or Ipad/laptop requirement, IP TV interacting with human interactions with gesture to camera , and devices projecting screen on any surface. Many devices which are coming in the industry would certainly require Ubiquitous Access. And All devices will have agent to take informed decisions (Like once fridge know milk is empty it could connect to internet and ask your access to credit card or confirmation (workflow software configured) it can order retailer.(So like Internet of Things)
So Internet of things is not only these devices that will interact with other home system, devices but also get data with wired or wireless sensors inside Home.
more about it can be read at : https://sandyclassic.wordpress.com/2013/05/03/classifying-ubiquitious-data-images-into-emotion-for-target-advertisement-campaign/

Read: https://sandyclassic.wordpress.com/2012/10/28/ubiquity-the-most-crucial-challenge-in-business-intelligence/

New age application development :
https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

CMS are integrated with SIP servers for PSTN phone to Digital phone and Softphone conversion. More details:
https://sandyclassic.wordpress.com/2013/09/22/approach-to-best-collaboration-management-system/

All these will increase focus on the development Internet of Things with sensor network generating huge video,audio, image and text data collected from sensor has to move ubiquitous from one system to another. For this to happen internet infrastructure will be utilized using cluster computing of Hadoop, Hive, HBase. for data analysis and storage. When sensor nodes , devices , Home appliances access and interact with this data ubiquitously  at same time interact , under transaction using internet infrastructure Possibility of Internet of things is only conclusion it can derive.
Read more on hadoop: https://sandyclassic.wordpress.com/2011/10/19/hadoop-its-relation-to-new-architecture-enterprise-datawarehouse/

Relation to cloud here 3V have actually now became 5V variability and value new 2V +addition to existing 3V Volume, variety and velocity being old 3V.                                  Read more: https://sandyclassic.wordpress.com/2013/07/02/data-warehousing-business-intelligence-and-cloud-computing/

External links for reference: http://www.sap.com/index.epx
http://www.oracle.comhttp://www.tibco.com/,http://spotfire.tibco.com/,
http://scn.sap.com/thread/1228659
S
AP XI: http://help.sap.com/saphelp_nw04/helpdata/en/9b/821140d72dc442e10000000a1550b0/content.htm

Oracle Web centre: http://www.oracle.com/technetwork/middleware/webcenter/suite/overview/index.html

CMS: http://www.joomla.org/,http://www.liferay.com/http://www-03.ibm.com/software/products/us/en/filecontmana/
Hadoop: http://hadoop.apache.org/

Map reduce: http://hadoop.apache.org/docs/stable/mapred_tutorial.html
f
acebook API: https://developers.facebook.com/docs/reference/apis/
L
inkedin API: http://developer.linkedin.com/apis
T
witter API: https://dev.twitter.com/

PC\Laptop will never be dead although new platform emerge: Analysis of Microsoft Strategy

PC / laptop may be dead or it will become centre piece of interaction of all devices at home.
Now as internet of things evolve or semantic agents start searching  web for you and customize search for you.
There will more than 100 devices like fan , cooler, heater, washing machine , each room sensor etc in your home as Home computing/smart city emerges platform like Zigbee, personal area network become more visible. PC will become like server controlling/configuring/updating/debugging all these devices at home.
This is in response to this news I am writing:
that Microsoft is trying to keep PC as device of choice.
http://www.bloomberg.com/news/2013-09-19/microsoft-ceo-says-working-to-keep-pc-device-of-choice-.html
Some places where low computation and mobilty is required smartphone and tablet may take up market which they already have but still PC/laptop will have its own market as it will become Home server of choice.
At end of day you want to come back home and sink all your devices to server which is Laptop with max processing power to do it fast.

Strategies For Software Services/product Companies next decade

 

 

 

These requirement are going to stay for next decade:Strategy-Small1Where can Software services/product firms lay emphasis for next stage of development. Or the areas which will see maximum amount of work coming in future..

Or What areas of knowledge should software companies develop manpower on:
1. Game development and Gamification:
https://sandyclassic.wordpress.com/2012/06/27/future-of-flex-flash-gamification-of-erp-enterprise-software-augmented-reality-on-mobile-apps-iptv/

read: https://sandyclassic.wordpress.com/2013/09/16/new-age-enterprise-resource-planning-systems/

2-7. Each of the Seven areas in development:
https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

read: https://sandyclassic.wordpress.com/2013/09/20/next-generation-application-developement/

As you read you realize software which can take advantage of multiple processor available on the devices None of sotware present in market today is written to take advantage of this fact. It may be possible an new language may come up to take benefit of this fact of we can still use old java/C++ threads more offen or we can distribute load on server by more specific COM/ DCOM or Distributed Common Request broker Architecture CORBA to processor level at server.. We have virtual switches and VM ware or Zen virtualisation which can exploit maximum benefit from it.
8. More virtualised network stack: this I wrote 2 yrs back still valid to quote here:
https://sandyclassic.wordpress.com/2012/07/16/cloud-innovation-heating-up-network-protocol-stack-and-telecom-stack/

private and public cloud new API will emerge: https://sandyclassic.wordpress.com/2011/10/20/infrastructure-as-service-iaas-offerings-and-tools-in-market-trends/

9. from SDLC V model to Agile and now to lean Agile ..use of six sigma to control process is just one part of mathematics being used for quality control but there would be new data model which will be tested based to mathematical modelling like probability distributions new model industry specific models would keep emerging.
like how for security project how security user stories are plugged into model
https://sandyclassic.wordpress.com/2013/01/05/agile-project-management-for-security-project/
or read https://sandyclassic.wordpress.com/2012/11/12/do-we-really-need-uml-today/

10.  BI would be Everyware:
https://sandyclassic.wordpress.com/2013/09/20/next-generation-application-developement/
parallelism , map reduce algorithm and cloud
https://sandyclassic.wordpress.com/2011/10/19/hadoop-its-relation-to-new-architecture-enterprise-datawarehouse/

Next generation Application development

The Next generation application development will not only take care of utilizing 50 or 100+ processors which will be available in you laptop or desktop or mobile but by using parallel processing available at clients
https://sandyclassic.wordpress.com/2012/11/11/parallel-programming-take-advantage-of-multi-core-processors-using-parallel-studio/
I covered 7 points last article this is part -2 of
https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/
also Next genration ERP read first: https://sandyclassic.wordpress.com/2013/09/16/new-age-enterprise-resource-planning-systems/
8. More pervasive BI eating App: Business Intelligence application development will go deeper in organisation Hierarchy
Oraganisation Hirearchyfrom more strategic level BI  and Middle management level to more pervasive  transactional processing level , and Office automation System level BI (shown in diagram as knowledge level or operational level.)

How it will affect architecture of Enterprise product Read SAP HANA
https://sandyclassic.wordpress.com/2011/11/04/architecture-and-sap-hana-vs-oracle-exadata-competitive-analysis/
Understanding Management aspect to little contrary view but related.. there will be need for more deeper strategic Information system to make more unstructured decision making.
https://sandyclassic.wordpress.com/2013/01/31/strategic-information-systems-will-be-in-focus-again-next-5-yrs/

pervasive BI bound to eat up Application development market also fulled by in-memory products like cognos TM1, SAP HANA etc..but also changes, cross functional innovation happening at enterprise level.
read :https://sandyclassic.wordpress.com/2013/09/18/new-breed-of-app-development-is-here/

As with these products no need for separate Database for datawarehouse and for operational systems. This unification of Operational data store ODS and data warehouse DW. on reporting level both Business intelligence BI and operational reporting will be accessing same database and that will be using in Memory technology.

9. Bigdata as everyone knows is Hot: more unstructured data than structured data today present for you is like open laboratory to experiment. More of it will find place in strategic management system and Management Information system.
read more details: https://sandyclassic.wordpress.com/2013/06/18/bigdatacloud-business-intelligence-and-analytics/

Read Application in security for metadata analysis : https://sandyclassic.wordpress.com/2013/06/18/how-to-maintain-privacy-with-surveillance/

10. Application security will be important as never before: its already there .
The intensity can be gauged from fact that changes in top 10 OWASP list is happening as never before and positions are changing in terms of top most risk ranking.
https://www.owasp.org/index.php/Top_10_2013-Top_10

list before:

https://www.owasp.org/index.php/Top_10_2010-Main

2010 A2 was Cross site Scripting XSS but 2013 at ranking to of perceived risk is Broken Authentication and session management. Changes do happen but here ranking and no of incident changing fast because momentum is fast.
11. More will continue when I find time next time….

New Breed of App development is here

Here are reasons Why next generation app will be totally different:
1. – In few years we will be seeing ending dominance of physical routers, switches , firewall to virtual soft switches, virtual routers , software defined routers and switches. More open routing technology would be program driven rather than configuration on boxes.
Companies like application firewall maker Palo Alto Networks and virtual programmable router maker nicira have huge role to play.
https://sandyclassic.wordpress.com/2012/07/16/cloud-innovation-heating-up-network-protocol-stack-and-telecom-stack/

its also affected by trends in Network technology
https://sandyclassic.wordpress.com/2012/09/11/trends-in-computer-networking-and-communication-2/
2. – in next year we will see 20+ processors on single machine making parallel processing one of important requirement. Huge software would be re written to meet this requirement.
https://sandyclassic.wordpress.com/2012/11/11/parallel-programming-take-advantage-of-multi-core-processors-using-parallel-studio/

3. The changes in business and systems are occurring very fast as system and getting more understood and cross functional due to intense competition Where only innovation can make you stay ahead of curve: Read more reasons why?
https://sandyclassic.wordpress.com/2013/09/16/new-age-enterprise-resource-planning-systems/

4. Cloud will increase innovation to change way we think about software:
Software As service SAAS, PAAS, IAAS going to make more deeper innovation as defined in above article (https://sandyclassic.wordpress.com/2013/07/02/data-warehousing-business-intelligence-and-cloud-computing/).
How innovation on cloud will be much quicker read :
https://sandyclassic.wordpress.com/2013/07/02/data-warehousing-business-intelligence-and-cloud-computing/

5. Laptop will never go (large screen requirement) but Mobile will be mass platform:
As we can move we can see virtually wearable shirts made of graphene with storage and data streamed on walls .. as when we want we can just grab wall data to graphene shirts..
Read more about Graphene: https://sandyclassic.wordpress.com/2013/01/18/graphene-the-wonder-material-foldable-cell-phones-wearable-computerbionic-devices-soon-reality/
surfaces will keep emerging we would see virtually display in air without any device but what it would be added with augmented reality and virtual reality.
https://sandyclassic.wordpress.com/2012/06/27/future-of-flex-flash-gamification-of-erp-enterprise-software-augmented-reality-on-mobile-apps-iptv/
we can in future just stream data to wall and program on wall outside our house.
6. Internet of things : where Machine to machine transfer of information and data and semantic web will make possible more intelligent feedback to user by all devices based on user need. so when you pick up milk from shelf next time. your fridge will search for you and alert you on latest offer of cheapest milk from various retailer.
And it will be displayed on fridge itself.. not only that it would order for you when its empty if you configure so. it will calculate you calorie consumed by family of fridge item and send updates to doctor monitoring you and display return messages from doctors.
More: https://sandyclassic.wordpress.com/2013/05/03/classifying-ubiquitious-data-images-into-emotion-for-target-advertisement-campaign/
7. Sensors will be everywhere and huge and Ubiquity will rule :
https://sandyclassic.wordpress.com/2012/10/28/ubiquity-the-most-crucial-challenge-in-business-intelligence/

New age Enterprise resource planning systems

Activity based accounting has changed the accounting system where even cost centre inputs to bottom line is also appreciated , calculated and accounted and apportionment is run not only to profit centre but also to cost centre.

This led to renewed influence of new cost centre based new module reporting like Human resource Accounting/Analytic ( Profit centre based system were preferred early and coast centre were neglected )which not only introduced new module in the Enterprise Resource planning ERP also changed the interlinking between modules such as Human resource management system , human resource accounting influence to General ledger and to profit and loss account.

– as each activity is apportioned into management accounting there are changes which are happening in the Analytics as more deeper ,cross functional analytic measure are used last 5 yrs leading to huge changes in business thinking for top line and bottom line growth.
– as BI becomes pervasive and ubiquitous it leads to deeper granular analysis to system thinking by lower level staff leading to bottom up innovation.
https://sandyclassic.wordpress.com/2013/05/03/classifying-ubiquitious-data-images-into-emotion-for-target-advertisement-campaign/
cloud and mobility has introduced pay per use model which influenced more pervasive BI and ERP usage by all staff giving fillip to bottom up thinking. Capital expenditure changed to operating expenditure leading to more acceptability to mid size companies as well large scale companies.
– real time updates using sensor based tracking of supply chain items , stock keeping unit SKU in Retail and in-memory system (SAP HANA, Oracle Exadata, IBM Cognos TM1)  making update faster and possibility of including more compressed data into primary memory for analysis.
https://sandyclassic.wordpress.com/2011/11/04/architecture-and-sap-hana-vs-oracle-exadata-competitive-analysis/

Gamification/AJAXifying of ERP:
https://sandyclassic.wordpress.com/2012/06/27/future-of-flex-flash-gamification-of-erp-enterprise-software-augmented-reality-on-mobile-apps-iptv/
A
dobe forms and increasing replaced SAP forms and even Oracle apps forms in AJAXified ERP systems. Augmented reality on AJAX making possible Gamification of ERP.
Javascript and AJAX dominates the Java on client side. increasing used of Node.js making server side javascript dominance a possibility with less requirement for strictly typed languages like Java and easy callback references.
https://sandyclassic.wordpress.com/2013/05/03/classifying-ubiquitious-data-images-into-emotion-for-target-advertisement-campaign/

How to maintain privacy with surveillance ?

Recent month questions are being raised On topic of surveillance about privacy of individual. Surveillance is very much important for safety of society even if to some extent it takes privacy away as it gives safety.
But there was to give both at same time?

What can be done all three forms sound, video, data can be input into cloud on large hadoop clusters..
Now if we are able to tag all inputs or make sound to text conversion then auto tag whole script. Now the data so collected can be analysed using Bigdata analysis technology for certain suspicious keyword patters or network of words created by running social network analysis or market basket or Markov chain algorithm… which can decipher and arrange categorize the actors. Using this analysis we can directly reach to suspected traffic rather than scanning through whole traffic.. there are problems
problem 1: there are many languages in world ?
Solution:but translation software exist for each of those.

problem 2: How to achieve voice traffic tagging?
Solution: lot of speech to text conversion software are available which can do this work more quickly and with speed thus tagged scripts are easy to search through.

Even capability of predictive Analytic can be exploited.

Now this approach no one has direct access to data yet analysis can be possible in better way.. But surely there will be some constraint which where only manual interventions will required and those cannot be discounted.

Information Technology laws provisions against port scanning.

Port scanning is used by mostly network and system administrators.port scan has many legitimate uses including network inventory and the verification of the security of a network. Port scanning can, however, also be used to compromise security. exploits rely upon port scans to find open ports and send specific data patterns in an attempt to trigger a condition known as a buffer overflow.

Country specific provisions in IT laws for open and decentralized architecture of the Internet, lawmakers have struggled since its creation to define legal boundaries that permit effective prosecution of cyber criminal Network scanning: Although network scanning  in legal but since its first step used by hackers boundary is blurred and there are implications for misuse. Also

German penal code :

The simple reason is that it is very difficult to establish the intent, failing which the provision will be available for misuse(by both parties ethical as well unethical person (it’s like whoever puts better legal argument). Just like 498 A of the Indian Penal Code relieves many but if you know of the current scenario, you know how brutally it has been misused in recent times.

Here are laws country wise with some case study how prosecution happened.
we had discussion about whether any law exist to prohibit scanning? here is list.
1. US:
In December 1999, Scott Moulton was arrested by the FBI and accused of attempted computer trespassing under Georgia’s Computer Systems Protection Act and Computer Fraud and Abuse Act of America. At this time, his IT service company had an ongoing contract with Cherokee County of Georgia to maintain and upgrade the 911 center security. He performed several port scans on Cherokee County servers to check their security and eventually port scanned a web server monitored by another IT company, provoking a tiff which ended up in a tribunal. He was acquitted in 2000, the judge ruling there was no damage impairing the integrity and availability of the network
2. In 2006, the UK Parliament
had voted an amendment to the Computer Misuse Act 1990 that proves guilty a person under cirtain conditon..its very blurred so can be misused or helpful prosecuting even when evidence is less.
3. Germany:
German penal code  Strafgesetzbuch § 202 a,b,c has also a similar law
4. EU also has similar law.
5. India has similar law.
At present the IT Act does provide penal provisions for hacking which is a matured and compounded form of port scanning as I have discussed earlier. Section 66 of the IT Act reads out :
66. (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injurious by any means, commits hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both.
Therefore the main elements of hacking is :
A) Intentional act
B) Wrongful loss to other
C) Alter/ delete/ destroy, diminish value of the data or utility.
The simple reason for misuse is that it is very difficult to establish the intent, failing which the provision will be available for misuse. Just like 498 A of the Indian Penal Code relieves many but if you know of the current scenario, you know how brutally it has been misused in recent times. Also there are cases where it use is justified.

Authentication market segment and future

Electronic authentication (e-authentication) is the process of establishing confidence in user identities electronically presented to an information system.

Authentication provider Market size estimated by Gartner estimate stand at 2 billion dollar growing at average 30% year on year with about 150 vendors.

Authentication technologies companies can be segmented to 3 types :

  1. Client-side software or hardware, such as PC middleware, smart cards and biometric capture devices (sensors)
  2. Software, hardware or a service, such as access management or Web fraud detection (WFD), that makes a real-time access decision and may interact with discrete user authentication software, hardware or services (for example, to provide “step up” authentication)
  3. Credential management software, hardware or services, such as password management tools, card management (CM) tools and public-key infrastructure (PKI) certification authority (CA) and registration authority (RA) tools (including OCSP responders)
  4. Software, hardware or services in other markets, such as Web access management (WAM) or VPN, that embed native support for one or many authentication method.

Specialist vendor provide SDK,while commodity vendor provide one-time password (OTP) tokens (hardware or software) and out of band (OOB) authentication methods.

Shift is happening in industry from traditional hardware tokens to phone-based authentication methods or supporting knowledge-based authentication (KBA) methods or X.509 tokens (such as smart cards). NIST defines three types of authentication methods: