Hardware and Software Trends

Hardware Trends
1.     The emerging mobile digital platform 
Cell phone, Smartphone • Netbooks and Tablet Computers • E-book Reader   
an alternative to digital computers.

2.     Nanotechnology 
Creating computer chips and other devices thousands of times smaller through manipulating individual atoms and molecules.
Example of Nanotubes:
Nanotubes are tiny tubes about 10,000 times thinner than a human hair. They consist of rolled up sheets of carbon hexagons, have potential uses as minuscule wires or in ultra small electronic devices, and are very powerful conductors of electrical current.

3.     Cloud Computing •
A model of computing in which firms and individuals obtain computing resources over the internet. •
In cloud computing, hardware and software capabilities are provided as services over the Internet. Businesses and employees have access to applications and IT infrastructure anywhere at any time using an Internet-connected device.

4.     Autonomic computing •
Development of systems that can configure themselves, heal themselves; • E.g. Self-updating antivirus software.

5.     Virtualization •
Process of presenting a set of computing resources so they can be accessed in ways that are unrestricted by physical configuration or geographical location. •

6.     Server Virtualization:
 Running more than one operating system at the same time on single machine.

7.     High performance and power-saving processor •

8.     Multi-core Processors • Integrated circuit with two or more processors. • Enhanced performance, reduced power consumption and more efficient simultaneous processing of multiple tasks

 Power-efficient processors • Low Power consumption essential in mobile computing.

9.     Edge Computing
Edge computing is the practice of processing data near the edge of your network, where the data is being generated, instead of in a centralised data-processing warehouse.Edge computing is a distributed, open IT architecture that features decentralised processing power, enabling mobile computing and Internet of Things (IoT) technologies. In edge computing, data is processed by the device itself or by a local computer or server, rather than being transmitted to a data centre.

10. Quantum Computer 



       
SOftware Trends

Open-source software
Open source software is software with source code that anyone can inspect, modify, and enhance.
"Source code" is the part of software that most computer users don't ever see; it's the code computer programmers can manipulate to change how a piece of software—a "program" or "application"—works. Programmers who have access to a computer program's source code can improve that program by adding features to it or fixing parts that don't always work correctly
New software development is a game of balance, particularly when trying to determine if an idea has legs in the marketplace. Innovators need to weigh the cost of developing proprietary technology against the value of quickly validating a product feature using an open source tool. Using APIs to accomplish certain tasks, rather than creating custom, proprietary tools allows product managers to determine what works in a product and then set a path toward developing a custom tool down the road.
Cloud Computing
Cloud computing is the the use of various services, such as software development platforms, servers, storage and software, over the internet, often referred to as the "cloud."
In general, there are three cloud computing characteristics that are common among all cloud-computing vendors:
The back-end of the application (especially hardware) is completely managed by a cloud vendor.
A user only pays for services used (memory, processing time and bandwidth, etc.).
Services are scalable
Many cloud computing advancements are closely related to virtualization. The ability to pay on demand and scale quickly is largely a result of cloud computing vendors being able to pool resources that may be divided among multiple clients.
It is common to categorize cloud computing services as

  •  infrastructure as a service (IaaS)......>host
  •  platform as a service (PaaS)...... built
    •  example Google app engine
  • software as a service (SaaS)....... consume 
  •  In SaaS Don't need to install software on your PC. Example Gmail, google drive etc




mash-up
The term mash-up refers to a new breed of Web-based applications created by hackers  and programmers (typically on a volunteer basis) to mix at least two different services from disparate, and even competing, Web sites. A mash-up, for example, could overlay traffic data from one source on the Internet over maps from Yahoo, Microsoft, Google or any content provider. The term mash-up comes from the hip-hop music practice of mixing two or more songs.
This capability to mix and match data and applications from multiple sources into one dynamic entity is considered by many to represent the promise of the Web servicestandard (also referred to as on-demand computing).

Widget 
Widget is a broad term that can refer to either any GUI (graphical user interface) element or a tiny application that can display information and/or interact with the user. A widget can be as rudimentary as a button, scroll bar, label, dialog box or check box; or it can be something slightly more sophisticated like a search box, tiny map, clock, visitor counter or unit converter.

Blockchain












A Blockchain is a method of storing data. Data is stored in blocks which are linked to the previous block.



But what does a “Block” look like?
Each “block” contains











  1. Data of transactions
  2. A unique fingerprint for all the data in the block called a hash
  3. hash of the previous block’s data

What do each of these items mean?
Data in the block usually consists of transactions. A block can contain hundreds of transactions. Alice sending Bob $100 is an example of a transaction in a block
hash is a unique combination of letters and numbers. It is like a fingerprint for the data in a block and it is always unique to every block in the Blockchain. When the data in a block changes, the hash will also change.
Hence in a transaction, if the amount being sent Alice to Bob changes from $50 to $100, the hash of the block will completely change.
A block also contains the hash of the previous block. Hence forming a chain structure. Combining the above three together, this is what a Blockchain will look like

Now if a transaction in any block changes, the hash of the block will change. When the hash of the block changes, the next block will show a mismatch with the previous hash that was recorded by it.
This gives Blockchain the property of being tamper-resistance as it becomes very easy to identify when data in a Block has changed.
Hashes can be seen in action here. Try entering “Orange”, and then “orange”. See how a simple change in one alphabet completely changes the hash. Additionally, this link can be used to see how hashes secure the entire Blockchain.










Blockchain has one more property which makes them secure. A Blockchain is not stored on one person’s computer. Instead, it is stored in a large network of computers called a peer-to-peer network. A computer on this network is called a node, and every node will have a copy of the Blockchain.
Every a time a new block of transactions has to be added to this network, all members (nodes) of the network must check and verify if all transactions in the block are valid. If all nodes in the network are in agreement that the transactions in a block are correct, then the new block will get added to every node’s Blockchain. This process is called consensus.
Hence any attacker who tries to tamper with the data on a Blockchain must tamper with the data in the majority of the computers in the peer-to-peer network. This is how Blockchains proves to be a secure method of storing data.
Now, what if I wish to create a transaction in a Blockchain. How will I go about doing it?
Every computer software that uses a Blockchain, will give its users a public key and a private key. These are again just like hashes; they are a random sequence of alphabets and numbers that are generated by the software itself. Every user has to keep their private key securely and not reveal it to anyone. The public key, on the other hand, can be revealed to everyone.
Consider the example of a mailbox. The public key is like your mailbox which everyone knows about, and can drop you messages. The private key, on the other hand, is like the key to that mailbox. Only you own it, and only you can read the messages inside.
Both public and private keys have a unique property. The private key can be used to sign any message to create a digital signature. A digital signature is yet another sequence of characters and numbers. But there’s a catch!
All digital signatures can be verified using the corresponding public key. This means anyone who has a digital signature can verify whether a person truly signed the message, using the signer’s public key.
Both these keys, combined with message signing to create digital signatures can be called the cryptography in Blockchains.

Too complex?
Let’s break it down step-by-step with an example.
Alice wishes to record the message that she sent $100 to Bob on a Blockchain.
1. She writes the message and signs it using her private key to create a digital signature. Her message combined with the signature is a transaction.
2. The software Alice uses broadcast her transaction to everyone in the peer-to-peer network
3. Everyone in the P2P network first verifies her transaction signature, to see if Alice is the one who really signed that message. They do so using Alice’s public key which everyone knows.
4. Once verified, the P2P network includes Alice’s transaction on a block in a Blockchain.
5. When the P2P network reaches consensus, after verifying all transactions, the block with Alice’s transaction gets included in the Blockchain!
Once included, Alice’s transaction cannot be changed by anyone so easily!

And there you have it. That is a near complete explanation of how data is stored on a Blockchain

Dapps etc.

To summarize,

1. A Blockchain is a method of storing data in blocks which are linked together in the form of a chain.
2. It relies on hashes and cryptography to secure the data inside a block.
3. This chain of blocks resides on all computers in a peer-to-peer network.
4. This network of computers use consensus methods to verify transactions in a block and include a block on the Blockchain.
_________________________________________________________

Comments

Popular posts from this blog

WHAT ETHICAL, SOCIAL, AND POLITICAL ISSUES ARE RAISED BY INFORMATION SYSTEMS?

Porter’s Value Chain Analysis

General Register organization & Components of CPU and their functions: