Cari Blog Ini

Senin, 12 Mei 2014

Quantum Computing

What is quantum computing?
Quantum computing is essentially harnessing and exploiting the amazing laws of quantum mechanics to process information. A traditional computer uses long strings of “bits,” which encode either a zero or a one. A quantum computer, on the other hand, uses quantum bits, or qubits. What’s the difference? Well a qubit is a quantum system that encodes the zero and the one into two distinguishable quantum states. But, because qubits behave quantumly, we can capitalize on the phenomena of “superposition” and “entanglement.”

Entanglement

Entanglement is a term used in quantum theory to describe the way that particles of energy/matter can become correlated to predictably interact with each other regardless of how far apart they are.
Particles, such as photons, electrons, or qubits that have interacted with each other retain a type of connection and can be entangled with each other in pairs, in the process known as correlation. Knowing the spin state of one entangled particle – whether the direction of the spin is up or down – allows one to know that the spin of its mate is in the opposite direction. Even more amazing is the knowledge that, due to the phenomenon of superposition, the measured particle has no single spin direction before being measured, but is simultaneously in both a spin-up and spin-down state. The spin state of the particle being measured is decided at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction to that of the measured particle. Quantum entanglement allows qubits that are separated by incredible distances to interact with each other immediately, in a communication that is not limited to the speed of light. No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.
Entanglement is a real phenomenon (Einstein called it “spooky action at a distance”), which has been demonstrated repeatedly through experimentation. The mechanism behind it cannot, as yet, be fully explained by any theory. One proposed theory suggests that all particles on earth were once compacted tightly together and, as a consequence, maintain a connectedness. Much current research is focusing on how to harness the potential of entanglement in developing systems for quantum cryptography and quantum computing.
In 1997, Nicholas Gisin and colleagues at the University of Geneva used entangled photons to enable simple – but instantaneous – communication over a distance of seven miles.

Qubit


A qubit is a quantum bit , the counterpart in quantum computing to the binary digit or bit of classical computing. Just as a bit is the basic unit of information in a classical computer, a qubit is the basic unit of information in a quantum computer .
In a quantum computer, a number of elemental particles such as electrons or photons can be used (in practice, success has also been achieved with ions), with either their charge or polarization acting as a representation of 0 and/or 1. Each of these particles is known as a qubit; the nature and behavior of these particles (as expressed in quantum theory ) form the basis of quantum computing. The two most relevant aspects of quantum physics are the principles of superposition and entanglement .


Quantum gates


We need to figure out which part goes in evolutions and operations and which goes into computation (eg, the universal section)
quantum gate or quantum logic gate is a rudimentary quantum circuit operating on a small number of qubits. They are the analogues for quantum computers to classical logic gates for conventional digital computers. Quantum logic gates are reversible, unlike many classical logic gates. Some universal classical logic gates, such as the Toffoli gate, provide reversibility and can be directly mapped onto quantum logic gates. Quantum logic gates are represented by unitary matrices.
The most common quantum gates operate on spaces of one or two qubits. This means that as matrices, quantum gates can be described by 2 x 2 or 4 x 4 matrices with orthonormal rows.
Remark. The investigation of quantum logic gates is unrelated to quantum logic, which is a foundational formalism for quantum mechanics based on a modification of some of the rules of propositional logic.

Shor’s algorithm

Shor’s algorithm, named after mathematician Peter Shor, is a quantum algorithm (an algorithm which runs on a quantum computer) for integer factorization discovered in 1994. Informally it solves the following problem: Given an integer N, find its prime factors.
On a quantum computer, to factor an integer N, Shor’s algorithm runs in polynomial time (the time taken is polynomial in log N, which is the size of the input). Specifically it takes time O((log N)3), demonstrating that the integer factorization problem can be efficiently solved on a quantum computer and is thus in the complexity class BQP. This is exponentially faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time — about O(e(log N)1/3 (log log N)2/3). The efficiency lies in the efficiency of the quantum Fourier transform, and modular exponentiation by squarings.
Given a quantum computer with a sufficient number of qubits, Shor’s algorithm can be used to break the widely used public-key cryptography scheme known as RSA. RSA is based on the assumption that factoring large numbers is computationally infeasible. So far as is known, this assumption is valid for classical (non-quantum) computers; no classical algorithm is known that can factor in polynomial time. However, Shor’s algorithm shows that factoring is efficient on a quantum computer, so an appropriately large quantum computer can break RSA. It was also a powerful motivator for the design and construction of quantum computers and for the study of new quantum computer algorithms. It has also facilitated research on new cryptosystems that are secure from quantum computers, collectively called post-quantum cryptograph

Jumat, 25 April 2014

CLOUD COMPUTING

1.   In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet, similar toutility computing. In science, cloud computing is a synonym for distributed computing over a network, and means the ability to run a program or application on many connected computers at the same time. In common usage, the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon, IBM, Oracle Cloud, Rackspace, Salesforce, Zoho and Microsoft Azure are some well-known cloud vendors. Network-based services, which appear to be provided by real server hardware and are in fact served up by virtual hardware simulated by software running on one or more real machines, are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object.
2.     From the above explanation of cloud computing , there are many benefits that we can take from cloud computing , namely :\ Scalability , with cloud computing we can increase our storage capacity without having to purchase additional equipment , such as hard drives , etc. . We simply add the capacity provided by the cloud computing service providers .
-      Accessibility , we can access data whenever and wherever we are , as long as we are connected to the Internet , making it easier for us to access the data when important .
-      Security , we can be assured ydata its security by cloud computing service providers , so for IT based company , the data can be stored securely in the cloud computing provider . It also reduces the cost required to secure corporate data .
-      Creator , the user can do / develop their creations or projects without having to submit their projects directly to the company , but the user can send it through the cloud computing service providers .
-      Anxiety , when a natural disaster strikes our proprietary data stored safely in the cloud even though we damaged hard drive or gadget
    3.     Here is how the data storage and replication of data on the use of cloud computing technology . With Cloud Computing   is no longer a local computer should run the heavy computational work required to run the application , no need to install a software package for every computer , we only perform the installation of the operating system on application  . Computer networks that make up the cloud ( Internet ) handles them instead . This server will be running all applications ranging from e - mail , word processing , to complex data analysis programs . When users access the cloud ( internet ) for a popular website , many things can happen . Users of Internet Protocol ( IP ) for example can be used to determine where the user is located ( geolocation ) . Domain Name System ( DNS ) services can then redirect the user to a server cluster that is close to the users so that the site can be accessed quickly and in their local language . The user is not logged into the server , but they login to their services using a session id or cookie that has been obtained is stored in their browser . What users see in the browser usually comes from a web server . Webservers run the software and interface presents the user with the means used to collect orders or instructions from the user ( click , type, upload , etc. ) These commands are then interpreted by webservers or processed by the application server . Information is then stored in or retrieved from a database server or file server and the user is then presented with a page that has been updated . The data is synchronized across multiple servers around the world for global access quickly and also to prevent loss of data . Web service has provided a general mechanism for the delivery of services , it            makes the service-oriented architecture ( SOA ) is ideal to be applied . The goal of SOA is to address the requirements of loosely coupled , standards-based , and protocol - independent distributed computing . In SOA , software resources are packaged as a " service , " a well-defined , self-contained modules that provide standard business functionality and context of other services . Maturity web service has enabled the creation of robust services that can be accessed on demand , in a uniform way .

 4.  Cloud computing exhibits the following key     characteristics:
·       Agility improves with users' ability to re-provision technological infrastructure resources.
·       Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers. Cloud computing systems typically use Representational State Transfer (REST)-based APIs.
·       Cost: cloud providers claim that computing costs reduce. A public-cloud delivery model converts capital expenditure to operational expenditure. This purportedly lowersbarriers to entry, as infrastructure is typically provided by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house). The e-FISCAL project's state-of-the-art repository contains several articles looking into cost aspects in more detail, most of them concluding that costs savings depend on the type of activities supported and the type of infrastructure available in-house.
·       Device and location independence enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
·       Virtualization technology allows sharing of servers and storage devices and increased utilization. Applications can be easily migrated from one physical server to another.
·       Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:
·       centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
·       peak-load capacity increases (users need not engineer for highest possible load-levels)
·       utilisation and efficiency improvements for systems that are often only 10–20% utilised.
·       Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
·       Scalability and elasticity via dynamic ("on-demand") provisioning of resources on a fine-grained, self-service basis in near real-time(Note, the VM startup time varies by VM type, location, os and cloud providers), without users having to engineer for peak loads.
·       Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.
·       Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle. However, the complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.
·       Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.

5.     Security in cloud computing
After exposure to the concept , technical , and architectural services builders in cloud computing , the next concern is in terms of network security information. Cloud Computing is one of the new technology remains to be seen what level of network security information. Based on the model of services in cloud computing can be seen , whether the information network security loopholes are in the service model of Software as a Service , and Platform as a Service , or , and nor does the Infrastructure as a Service .
Furthermore, the security of cloud computing can also be seen from its location on the protocols that govern data communication in the network . Protocol which is used as a reference in this paper is TCP / IP ( Transmission Control Protocol / Internet Protocol ) . 
There are many security issues surrounding cloud computing . With the technology that allows consumers to be able to access cloud services through a web browser or web services , there are three examples of security issues , namely : XML Signature Element Wrapping , Browser Security , Cloud Malware Injection Attack and Flooding Attacks.
From a research document issued by the Cloud Security Alliance 's titled Top Threats to Cloud Computing , the two security threats in cloud computing ie loss or data leakage and hijacking the account or service . Two of these threats is crucial because it affects the reputation , trust partners , employees , and customers also affecting business . Piracy accounts can also be bad if Attackers accessing a very important part of the cloud computing services , facilitate Attackers then to do things that can affect aspects of confidentiality, integrity , and availability of servicing existing service . To avoid the above types of security threats , identity management and access control are the main requirements for SaaS Cloud computing Company .
Identity Management in the cloud computing are also associated with the focus of discussion in this paper , the security of the cloud computing service model of Software as a Service it . With a detailed explanation of the components before forming a SaaS Cloud Computing is using Service Oriented Architecture ( SOA ) with Web Services standards ( XML language ) .

Identity management and access control in cloud computing Service Oriented Architecture

As defined earlier , the SOA has features that make loosely-coupled SOA is very open to security risks that can occur . Therefore, SOA must meet several key requirements to meet data security standards , among other things: service discovery , service authentication , user authentication , access control , confidentiality, integrity , availability , and privacy ( 17 ) . To ensure security in SOA development environment , which creates a community of open standards to build a web services security standard for Web services , which is known implementations of web services is the most widely used SOA . At the same time the identity management and access control in cloud computing has also arranged with the standard . 
As shown in the image above , for controlling access rights has been the adoption by the Security assertion markup language ( SAML ) and the eXtensible Access Control Markup Language ( XACML ) , meaning that when a user requests a service , the user must follow the security policies related to access control established .

SAML and Single Sign On
SAML is an XML standard for exchanging authentication and authorization of data between security domains. SAML features platform independent , and is mainly applied to the Single Sign -On ( SSO ) . Single Sign-On is one of the methods used in data security aspects of authentication and authorization on the application or cloud service . Technology Single - sign-on ( SSO ) is a technology that allows users to easily access network resources in a network using only one user account only. This technology is in high demand , especially in very large networks and heterogeneous ( in current operating systems and applications used by computers is derived from many vendors , and users are asked to fill in the information itself into each of the different platforms to be accessed by users ) . By using SSO , a user just simply attempt to authenticate only once to obtain permits access to all the services contained within the network .

SaaS Cloud Computing Security with Single Sign On in a layer Internet Protocol 

TCP / IP
From the description of the overall architecture of SaaS Cloud Computing can be mapped position SaaS Cloud Computing Security with Single Sign On in layer Internet protocol TCP / IP , so it is more clear understanding of network security information as part of a network of information science itself. Mapping architecture can be seen in the image below:

6.     Cloud Computing is the result of evolution and adoption of existing technologies and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without the need for deep knowledge about or expertise with each one of them. The cloud aims to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles.
The main enabling technology for cloud computing is virtualization. Virtualization generalizes the physical infrastructure, which is the most rigid component, and makes it available as a soft component that is easy to use and manage. By doing so, virtualization provides the agility required to speed up IT operations, and reduces cost by increasing infrastructure utilization. On the other hand, autonomic computing automates the process through which the user can provision resources on-demand. By minimizing user involvement, automation speeds up the process and reduces the possibility of human errors.
Users face difficult business problems every day. Cloud computing adopts concepts from Service-oriented Architecture (SOA) that can help the user break these problems intoservices that can be integrated to provide a solution. Cloud computing provides all of its resources as services, and makes use of the well-established standards and best practices gained in the domain of SOA to allow global and easy access to cloud services in a standardized way.
Cloud computing also leverages concepts from utility computing in order to provide metrics for the services used. Such metrics are at the core of the public cloud pay-per-use models. In addition, measured services are an essential part of the feedback loop in autonomic computing, allowing services to scale on-demand and to perform automatic failure recovery.
Cloud computing is a kind of grid computing; it has evolved by addressing the QoS (quality of service) and reliability problems. Cloud computing provides the tools and technologies to build data/compute intensive parallel applications with much more affordable prices compared to traditional parallel computing techniques.[35]
Cloud computing shares characteristics with:
·       Client–server model — Client–server computing refers broadly to any distributed application that distinguishes between service providers (servers) and service requestors (clients).[36]
·       Grid computing — "A form of distributed and parallel computing, whereby a 'super and virtual computer' is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks."
·       Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as: census; industry and consumer statistics; police and secret intelligence services; enterprise resource planning; and financial transaction processing.[37]
·       Utility computing — The "packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity."[38][39]
·       Peer-to-peer — A distributed architecture without the need for central coordination. Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model).
·       Cloud gaming — Also known as on-demand gaming, is a way of delivering games to computers. Gaming data is stored in the provider's server, so that gaming is independent of client computers used to play the game. One such current example, would be a service by OnLive which allows users a certain space to save game data, and load games within the OnLive server.





Referensi :
http://en.wikipedia.org/wiki/Cloud_computing

Minggu, 13 April 2014

Contoh Sistem Terdistribusi

Contoh – contoh sistem terdistribusi :

Internet, merupakan suatu bentuk jaringan global yang menghubungkan komputer denga satu sama lainnya, yang dapat berkomunikasi dengan media IP sebagai protokol.
sistem terdistribusi
internet contoh sistem terdistribusi
Intranet
  • Jaringan yang teradministrasi secara lokal
  • Biasanya proprietary
  • Terhubung ke internet (melalui firewall)
  • Menyediakan layanan internal dan eksternal
sisdis1
Sistem terdistribusi multimedia
Biasanya digunakan pada infrastruktur internet.
Karakteristik
- Sumber data yang heterogen dan memerlukan sinkronisasi secara real time.
Video, audio, text Multicast
Contoh:
  •  Teleteaching tools (mbone-based, etc.)
  •  Video-conferencing
  • Video and audio on demand
Mobile dan sistem komputasi ubiquitous
  • Sistem telepon Cellular (e.g., GSM)
Resources dishare : frekuensi radio, waktu transmisi dalam satu frekuensi, bergerak.
  • Sistem Terdistribusi
  •  Komputer laptop, ubiquitous computing
  • Handheld devices, PDA, etc
sisdis1
World wide web
  •  Arsitektur client/server tebuka yang diterapkan di atas infrastruktur internet
  •  Shared resources (melalui URL)
sisdis1
Contoh distribusi yang lainnya seperti :
  • Sistem telepon seperti ISDN, PSTN
  • Manajemen jaringan seperti Administrasi sesumber jaringan
  • Network File System (NFS) seperti Arsitektur untuk mengakses sistem file melalui jaringan
Sumber :

Selasa, 25 Maret 2014

Analysis Of The Influence Of Mobile Computing to Business Development

Definition of Mobile Computing
Technology is the ability to deal with displacement / movement of people in the use of computers in practice. From this definition we can conclude that the Mobile Computing today is much needed, given the needs of today's computer usage is very high, so that the use of Mobile Computing to facilitate computer users in performing their activities by using a computer.

Type Mobile Computing
Mobile Computing that there are currently several types, such as:
·         Laptops 
·         Wearable Computer 
·         PDA (Personal Digital Assistants) 
·         SmartPhone 

Tools For Mobile Computing
Below are some tools Mobile Computing and usefulness.
·         Java ME, popular for gaming
·         Symbian, general purpose, supported Nokia
·         Android is a Linux-based
·         iPhone, only on Mac OS X
·         Lazarus, Object Pascal ported beneficial to
·         Palm OS, Strong in U.S.
·         etc.
.
Mobile Computing Research
Wireless Communications
·         Quality of connectivity 
·         Bandwidth limitations
Mobility
·         Location transparency 
·         Location dependency
Portability
·         Power limitations 
·         Display, processing, storage limitations


How Would A Mobile Computing Affects Life Of A Businessman And Ordinary People?

Whenever there's something new on the market, people would categorize if that is intended for businessmen or for ordinary people. A lot of technologies and machines are introduced and launched in the market including mobile computing devices. The advantages of this mobile computing device are both applicable for businessmen and ordinary people. So everybody can use these devices to make life easier, have a convenient way of living, safety purposes, and easy access.
The purpose why these mobile computing devices were developed is to bring a maximum advantage that our lives may possibly have. Almost everybody wants to be updated and don't want to be behind the updates. Well, this is just a single advantage of this discovery. It wanted us to be updated real time. If we maximize this gadgets and electronics, there's no way for us to be left alone from anybody else. All parts of the globe are reachable and things are possible. Even if your family is across the globe, you can still feel their presence by maximizing the benefit of these devices anywhere and wherever.
For businesses, this could only be the easiest and the fastest way to approved businesses anywhere in the globe. You don't really need to be in person just to approve any transactions. This way could save money, effort, time, and no delays. Everything could be a click away and transactions easily approved in just a second. Just imagine a business with out this help. For sure a businessman would have to fly for hours or travel for even days just to be on their businesses. It would only be an expense of money. Getting tired even before you do your job, and real hassle that will cause delay and even loses. Or even worst, a business will be at stake and total risk.
Not to mention that everybody has a choice to use these computers for convenient life. It would make our life easy in any means possible. Like if we are on the way driving to home, we can call a family member to prepare for a meal since you may be very hungry. Even in just simple aspects of a simple person, these mobiles will surely help us. Its safety purpose can even save someone's life and could be a way to avoid any danger. It is hassle free to use and to maximize this machine. All of these features are made easy for us to be updated real time, do businesses and transactions right then and there, convenient and hassle free. You can protect your properties and even your families with the use of these techniques.
There are a lot of other minor advantages brought by this computing device. Its main purpose of existence is for us to improve and make life easier than we ever thought. If used potentially to its maximum, effects will surely be advancement in ones life.

TYPES OF TECHNOLOGY TRENDS THAT WILL IMPACT BUSINESS STRATEGIES IN 2014

1. Mobile devices will keep you in contact at all times

Cumbersome desktop computers might work well at home, but you can expect to do most of your business from a mobile device. Laptops will likely remain popular since they have built-in keyboards that people already know how to use. Tablet PCs, however, will become important companion pieces.

2. Cross-device software will help you save time and money

Since you will use several devices in 2014, software providers will respond by letting you download programs to many devices at once without forcing you to pay more. Many developers have already recognized the importance of cross-device software. When you download apps, they often have the opportunity to install the small programs on six or more devices.
This will make it easier for you to learn how to use the software that’s important to your industry. Instead of spending a lot of time trying to figure out how to use several programs, you’ll just adapt to different types of screens.
Of course, it doesn’t hurt that multi-device software helps you save money. Imagine buying separate programs for your desktop, laptop, tablet, and smartphone. That would get expensive fast!

3. Marketing data will come from multiple sources

In 2014, it will become increasingly important for you to learn how to market your products and concepts to precise audiences.
Social media has made marketing more targeted and effective. Of course, many companies have already tapped into this potential. The difference is that more businesses will start integrating information from multiple sources. You might get information from Facebook, your own website, Google, and other data sources.

4. Scalable data plans will become more important

An increased reliance on mobile devices will mean that more people and businesses have to invest in wireless data plans. A tablet can only do so much without accessing the Internet.
Unfortunately, those data plans can cost quite a bit of dosh, especially when you stream video content (we’ll keep mum about whether you’re just watching a movie or trying to convince a client that she needs your services). To combat growing prices, many companies will start to look at scalable data plans.
Scalable data plans differ from those that you probably have for your smartphone. With a scalable plan, you get to exceed your monthly limit without paying ridiculous fees. Many Internet Service Providers will also let customers jump from low-cost packages to higher-cost ones when they go over their allotted data. That’s a great alternative to paying extra fees.

5. Cloud data storage options will become increasingly important

Despite the concerns that many industries have about cloud storage ability and willingness to keep information secure, people will have little choice but to keep more information on these systems as opposed to their hard drives.
While it does raise some concerns, it also offers many advantages to businesses that work in a global marketplace. As many companies have already found, cloud systems make it possible for employees to access information from all over the world. If you have a meeting in China, you can always download a presentation from your cloud system instead of begging someone back at the office to take it off your PC and send it to you. The convenience, in other words, will likely outweigh the concerns. As more industries get involved, cloud service providers will probably find that they have to improve their security measures. That could make it safer for everyone to use.

6. Companies will make more of their own apps

In 2013, people get most of their apps through online stores. This next year will reveal a shift towards proprietary apps owned by employers.
Instead of relying on apps made by outside developers, more companies will start creating apps they can distribute among employees.
A company that builds its own app can include specific features designed to boost productivity and meet client demands. You don’t get that kind of flexibility from many third-party apps.
Many employers will also decide to regulate third-party apps. By assigning a manager to review available apps, the company can make sure that it spends money wisely while giving employees the tools they need to succeed.

7. More employers will ask you to Bring Your Own Device

There is good news for people who hate their workplace computers. Research shows that over two-thirds of companies already let employers bring their own devices to work. BYOD, as it’s called, boosts productivity by keeping employees in constant contact and making it easier for them to work outside of the office.
There’s even research showing that 43 percent of executives encourage BYOD because they want employees to get more work done away from the office. Given the advantages, you can expect this trend to continue in 2014.

8. You will receive BYOD training

As more employers encourage workers to BYOD, they will also need to create training programs that teach workers how to become more productive without compromising network security. Like many technological changes, there are some potential downsides.
Luckily, companies find that a comprehensive BYOD program makes the average employee about $3,150 more valuable every year compared to employees who do not BYOD. Companies that only offer basic BYOD training, see a $400 increase in value.
That means you might as well prepare for training that will turn you into a more valuable employee.
Rederence :
http://tweakyourbiz.com/technology/2013/08/15/8-technology-trends-that-will-impact-business-strategies-in-2014/

http://mobile-computing.bafree.net/how-would-a-mobile-computing-affects-life-of-a-businessman-and-ordinary-people.php

http://ariwiyanto83.blogspot.com/

http://asikgaasik.wordpress.com/2010/05/01/mengenai-mobile-computing/