SlideShare a Scribd company logo
1 of 12
Cloud Computing: 19
Computing on Demand
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Evolution phases of e-Business adoption
5
Enterprises did not stop at static information sharing;
instead, they tried to explore the Internet as a new business
medium to conduct business activities. Soon afterwards,
online transactions emerged, such as online shopping, online
auction, and online payment.
Evolution phases of e-Business adoption
e-Business started as a common technical innovation
aiming at supporting simple Internet browsing and
interaction utilizing Hyper Text Transfer Protocol (HTTP). In
order to enable global access, companies publish static
information (e.g., business name, address, contact
information, company history) on their Hypertext Markup
Language (HTML) homepages on the Internet.
6
Evolution phases of e-Business adoption
Enterprises did not stop at static information sharing;
instead, they tried to explore the Internet as a new business
medium to conduct business activities. Soon afterwards,
online transactions emerged, such as online shopping,
online auction, and online payment. These transaction-
based catalog management and shopping carts applications
are commonly referred to as Electronic Commerce (e-
Commerce).
7
Evolution phases of e-Business adoption
“e-Business” was coined to represent enterprise-level
business transformation. In this information revolution,
enterprise-internal information transformation has great
importance in facilitating resource utilization and
management effectively and efficiently.
8
Evolution phases of e-Business adoption
Enterprise Conformity is an e business level that have
mutual interdependencies of different modern enterprise.
Inter-enterprise communications and interactions are
inevitable. A modern enterprise can no longer stand alone;
instead, it has to constantly interact with and rely on its
interrelated enterprises, its suppliers, and its clients, thus
establishing a functioning enterprise-level service chain.
9
Evolution phases of e-Business adoption
After these enterprises are synergistically integrated with
each other, their become tremendous. To ensure that this
sophisticated enterprise service chain adapts itself with
stochastic adjustments, when the market fluctuates,
remains a big challenge. As a matter of fact, this “self-
adaptable e-Business” or “on-demand business”
represents the highest level of e-Business.
10
An e-Business Snapshot
11
Evolution phases of e-Business adoption
1. A user discovers an interesting merchandise from an online
search engine, then clicks the associated link to connect to the
corresponding supplier.
2. After filling a purchase order with payment information (e.g.,
credit card number, name shown on the card, and expiration
date), the user sends the request to the supplier.
3. The supplier then dynamically connects to the corresponding
payment service provider (e.g., the credit card company) to
perform a real-time transaction and acknowledges the
customer.
4. After the payment is conducted, the supplier interacts with
available shipping service providers to arrange a timely
shipment to the user.
12
Evolution phases of e-Business adoption
“An On-Demand Business is an unprecedented enterprise
whose business processes— integrated end-to-end across
the company and with key partners, suppliers and
customers— can respond with flexibility and speed to
customer demand, market opportunity or external threat.
IBM
13
Evolution phases of e-Business adoption
• Samuel J. Palmisano, the CEO of IBM, delivered a
message to the Business Week:
“On-Demand Business is our way of describing a
fundamental shift in computing architecture and how it is
applied to business— a shift toward integrated solutions
and quantifiable business value, not just technology
features and functions.”
14
Assignment
• Explain the phases of E business adoption and
computing on demand

More Related Content

What's hot

E commerce , e-banking & e-shopping
E commerce , e-banking & e-shoppingE commerce , e-banking & e-shopping
E commerce , e-banking & e-shopping
Numan Syed
 
Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003
Oi Kwok Yang
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation Issues
Nurul Izzah
 

What's hot (20)

The Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C CarriersThe Blockchain Imperative: The Next Challenge for P&C Carriers
The Blockchain Imperative: The Next Challenge for P&C Carriers
 
E commerce , e-banking & e-shopping
E commerce , e-banking & e-shoppingE commerce , e-banking & e-shopping
E commerce , e-banking & e-shopping
 
Framework for e business-v2
Framework for e business-v2Framework for e business-v2
Framework for e business-v2
 
E-commerce System Technologies, Repository and Networking Technology
E-commerce System Technologies, Repository and Networking TechnologyE-commerce System Technologies, Repository and Networking Technology
E-commerce System Technologies, Repository and Networking Technology
 
Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003
 
Governance framework for e commerce
Governance framework for e commerceGovernance framework for e commerce
Governance framework for e commerce
 
E business--ebizn1
E business--ebizn1E business--ebizn1
E business--ebizn1
 
E business--ebizn1
E business--ebizn1E business--ebizn1
E business--ebizn1
 
E business
E businessE business
E business
 
E-com, E-payment & EDI
E-com, E-payment & EDIE-com, E-payment & EDI
E-com, E-payment & EDI
 
Introduction to types of ecommerce
Introduction to types of ecommerceIntroduction to types of ecommerce
Introduction to types of ecommerce
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
تطوير وبرمجه موقع التجارة الإلكترونية باستخدام الاوبن كارت OpenCart
تطوير وبرمجه موقع التجارة الإلكترونية باستخدام الاوبن كارت OpenCartتطوير وبرمجه موقع التجارة الإلكترونية باستخدام الاوبن كارت OpenCart
تطوير وبرمجه موقع التجارة الإلكترونية باستخدام الاوبن كارت OpenCart
 
E-Business Applications
E-Business ApplicationsE-Business Applications
E-Business Applications
 
E Commerce Basics
E Commerce BasicsE Commerce Basics
E Commerce Basics
 
E commerce unit 1
E  commerce unit 1E  commerce unit 1
E commerce unit 1
 
E - BUSINESS / E - COMMERCE
E - BUSINESS / E - COMMERCEE - BUSINESS / E - COMMERCE
E - BUSINESS / E - COMMERCE
 
E commerce unit 3
E commerce unit 3E commerce unit 3
E commerce unit 3
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation Issues
 
E commerce unit 2
E commerce unit 2E commerce unit 2
E commerce unit 2
 

Similar to Cloud computing 19 computing on demand

Dmtm --final
Dmtm --finalDmtm --final
Dmtm --final
Rima Dave
 
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docxChapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
keturahhazelhurst
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
IMRAN KHAN
 
Lecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khanLecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khan
Khalid Khan
 

Similar to Cloud computing 19 computing on demand (20)

E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
E commerce4
E commerce4E commerce4
E commerce4
 
e-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifite-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifit
 
Final year project Electronic zone e-marketing
Final year project Electronic zone e-marketingFinal year project Electronic zone e-marketing
Final year project Electronic zone e-marketing
 
Dmtm --final
Dmtm --finalDmtm --final
Dmtm --final
 
Procurement_notes.docx
Procurement_notes.docxProcurement_notes.docx
Procurement_notes.docx
 
E commerce introduction, process and legal aspects
E commerce introduction, process and legal aspectsE commerce introduction, process and legal aspects
E commerce introduction, process and legal aspects
 
Ppt on e commerce (1)
Ppt on e commerce (1)Ppt on e commerce (1)
Ppt on e commerce (1)
 
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docxChapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
 
Lecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khanLecture 01-e-commerce-khalid khan
Lecture 01-e-commerce-khalid khan
 
Unit – 3 Internet and Extranet.pptx
Unit – 3 Internet and Extranet.pptxUnit – 3 Internet and Extranet.pptx
Unit – 3 Internet and Extranet.pptx
 
How open banking and instant payments are changing financial services
How open banking and instant payments are changing financial servicesHow open banking and instant payments are changing financial services
How open banking and instant payments are changing financial services
 
E commerce
E commerceE commerce
E commerce
 
H4 neelavathy
H4 neelavathyH4 neelavathy
H4 neelavathy
 
Web technology and commerce unit 3
Web technology and commerce unit 3Web technology and commerce unit 3
Web technology and commerce unit 3
 
Introduction to E - Commerce
Introduction to E - CommerceIntroduction to E - Commerce
Introduction to E - Commerce
 
Contemporary technology
Contemporary technologyContemporary technology
Contemporary technology
 
History of trade
History of trade History of trade
History of trade
 

More from Vaibhav Khanna

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Recently uploaded (20)

%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 

Cloud computing 19 computing on demand

  • 1. Cloud Computing: 19 Computing on Demand Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Evolution phases of e-Business adoption 5 Enterprises did not stop at static information sharing; instead, they tried to explore the Internet as a new business medium to conduct business activities. Soon afterwards, online transactions emerged, such as online shopping, online auction, and online payment.
  • 3. Evolution phases of e-Business adoption e-Business started as a common technical innovation aiming at supporting simple Internet browsing and interaction utilizing Hyper Text Transfer Protocol (HTTP). In order to enable global access, companies publish static information (e.g., business name, address, contact information, company history) on their Hypertext Markup Language (HTML) homepages on the Internet. 6
  • 4. Evolution phases of e-Business adoption Enterprises did not stop at static information sharing; instead, they tried to explore the Internet as a new business medium to conduct business activities. Soon afterwards, online transactions emerged, such as online shopping, online auction, and online payment. These transaction- based catalog management and shopping carts applications are commonly referred to as Electronic Commerce (e- Commerce). 7
  • 5. Evolution phases of e-Business adoption “e-Business” was coined to represent enterprise-level business transformation. In this information revolution, enterprise-internal information transformation has great importance in facilitating resource utilization and management effectively and efficiently. 8
  • 6. Evolution phases of e-Business adoption Enterprise Conformity is an e business level that have mutual interdependencies of different modern enterprise. Inter-enterprise communications and interactions are inevitable. A modern enterprise can no longer stand alone; instead, it has to constantly interact with and rely on its interrelated enterprises, its suppliers, and its clients, thus establishing a functioning enterprise-level service chain. 9
  • 7. Evolution phases of e-Business adoption After these enterprises are synergistically integrated with each other, their become tremendous. To ensure that this sophisticated enterprise service chain adapts itself with stochastic adjustments, when the market fluctuates, remains a big challenge. As a matter of fact, this “self- adaptable e-Business” or “on-demand business” represents the highest level of e-Business. 10
  • 9. Evolution phases of e-Business adoption 1. A user discovers an interesting merchandise from an online search engine, then clicks the associated link to connect to the corresponding supplier. 2. After filling a purchase order with payment information (e.g., credit card number, name shown on the card, and expiration date), the user sends the request to the supplier. 3. The supplier then dynamically connects to the corresponding payment service provider (e.g., the credit card company) to perform a real-time transaction and acknowledges the customer. 4. After the payment is conducted, the supplier interacts with available shipping service providers to arrange a timely shipment to the user. 12
  • 10. Evolution phases of e-Business adoption “An On-Demand Business is an unprecedented enterprise whose business processes— integrated end-to-end across the company and with key partners, suppliers and customers— can respond with flexibility and speed to customer demand, market opportunity or external threat. IBM 13
  • 11. Evolution phases of e-Business adoption • Samuel J. Palmisano, the CEO of IBM, delivered a message to the Business Week: “On-Demand Business is our way of describing a fundamental shift in computing architecture and how it is applied to business— a shift toward integrated solutions and quantifiable business value, not just technology features and functions.” 14
  • 12. Assignment • Explain the phases of E business adoption and computing on demand