This literature survey is about cloud computing that emphasizes its advantages and disadvantages, its security, types of cloud services and strategies on implementing cloud computing.
2.1) Advantages and disadvantages of cloud computing
Cloud computing can be considered as one beneficial tool. However, no matter how perfect every technology is, it always comes with both advantages and disadvantages.
2.1.1) Advantages of cloud computing
These are some advantages of cloud computing:
2.1.1.1) COST
With cloud computing, (Romero, 2012) mentioned that it helps to ieither increase or decrease the hardware or software usage; but importantly, it helps reducing the capital expenses (L.Grossman, 2009). Miller (2009) suggest that instead of investing in
…show more content…
Aljabre (2012) assumed that to use cloud computing, a constant strong and fast speed Internet connection is needed, without it, anything in the cloud could not be accessed. This can be considered as one of the important requirement in adopting cloud computing.
Depending on web-based applications, (Miller, 2009) if the users are unable to continue their work due to no access to the Internet or the Internet speed is low; they will think that using this cloud computing is problematic as they carelessly did not save it in their smart devices. In addition, even if the connection is strong and fast, any web-based applications can sometimes be slower to access depending on the data layout and sizes.
2.1.2.2) FEATURES
Cloud computing web-based has been said more advanced but many web-based applications are not fully featured as the desktop applications, hence, it will restrict the users to use any types, structures, or layout even though the basics are similar (Miller, 2009). Furthermore, it is cited by (Aljabre, 2012) that cloud computing seems to have limited features in application, which can be compared on doing presentation in Google docs and Microsoft Power
…show more content…
Moreover, it is also possible that a conflict between personal protection and legal system data to happen, at any place in the cloud provider (Fortinova, 2013).
2.2) Security of cloud computing
Generally, when the security word comes to be the topic it means, the safety of institutions or organizations against the cyber criminal and in simpler terms, free from any vulnerabilities and risks. It has been said that cloud computing is one recent innovation that opens a lot of opportunities for the people up to their conveniences, nonetheless, it comes with a lot of issues in the computer world; the fundamental question is “how secure is cloud computing?” and the answer can be one incredible discussion (Davenport, 2012).
In any institution and organization, having web-based applications run in the network server, it will always has the potential of being attack. This is the most important for any institution and organization to worry about: the data protection, as storing the data in the cloud will pose some risks of exposing the private and confidential data to the other users or hijackers to be exact. (Jamil & Zaki, 2011). This data protection requires trust to be put into the vendors, to make sure if is safe with the Service Level Agreements (SLAs) (Tout, Sverdlik, & Lawver,
This provides a means of communication that can help different vendors packages to communicate and manages the message transfers from clients to servers. 2.10. Compare and contrast the three cloud computing models. Three cloud computing models • Infrastructure as a Service (IaaS): IaaS contains basic building blocks for cloud infrastructure and provides access to networking features, computers and data storage.
Hi, Todd, how do you do? I hope my message finds you well. Regarding your request, we - GI_SSC_OM_S1 and GI_SSC_MFGPTS_S1 squads - only will be able to answer the Security and Risk questionnaire after we access the environment of our clients, that only will occur when Chris Maurer validates the data we sent to him from application owners and he informs us how we must to procede to start the access procedures without violate the export regulations rules from IBM. As we only receive part of the list that we sent to application owners (AO) yet, we have two situations right now: some data still under verification by AO and others under validation of Chris, as the graph bellow: Our PO and SLL are aware of this situation.
Not only will these innovations improve network strength, but possibly the speeds at which a client can access information from an application server. This has the potential to make cloud computing even more prevalent than it already is today because it would become easier to keep up with mass traffic to the servers. Large server banks would be able to be downsized slightly compared to their current sizes. The computer science techniques used in created Marple show that it is possible to even make an old process useful in modern applications. The hardware of Marple is also programmable making it extremely useful for any network engineers because they will be able to write custom software for Marple-based
2.1 AWS Networking AWS provide a kind of networking services that also provide private network connections to the cloud, scalable DNS and tools to make logistically solitary networks. There are also have prevalent networking services comprise the Amazon Virtual Private Cloud (VPC) and Amazon Direct Connect. Amazon VPC generates a logically solitary set of Amazon EC2 for example which can be connected to current network using VPN connection. Amazon VPC generates a private cloud inside AWS, while deposition built-in security with security groups and network access control lists. When using Amazon EC2, VPC is free.
KELSER – ‘Technology forward’, provides a cloud solution for disaster recovery and targets especially small and medium business (SMB’s) which can provide a speedy recovery with lesser hardware dependency. The main advantage of using Kelser products is that it provides scalability for its DR services and can be purchased on ‘a need’ basis. The biggest drawback is that, it does not address all the business units of an organization and hence the DR process cannot be address at an organizational level which leads to lack of ownership in dealing with disaster recovery (KELSER, 2016).
Every page, folder, template, group and user record has an audit trail that captures every change made, with the date/time and user stamp to indicate who made the change and when. Users with appropriate security access can view this information, and reporting is also available to pinpoint specific types of changes or to narrow down records to specific time frames. 6. How does the system ensure availability, security and privacy of data on shared
Resources are consumed less through the use of intelligent solutions, one of them being cloud storage (Tziritas et al., 2013; Goulart, 2012). 2. The C_Software program which improves live migration in IT is a proof that the roles of IT specialists are bound to change with the adoption of cloud computing (Fejzaj, Tafa & Kajo, 2012; Wenzel, 2011). 3. All companies should follow in the steps of iPayroll Ltd and adapt the models of cloud computing that most SMEs are running for in order to realize the true value of cloud computing programs (Kevany, 2012; Misra & Mondal, 2012).
2.7 Observations from GMPCS Model Based on the above model, several observations can be made as follows. Observation_1: According to an interoperability feature between CSPs, a storage service will be hosted over a pool of resources that are in different geographical locations. Furthermore, different technologies, protocols, and security strategies are applied by each CSP within its datacentres to facilitate managing an environment to protect both resources and data. The technologies and strategies, therefore, might be disparate in terms of efficiency, and the type of storage network or storage system might be varied as well.
David Ward Dr. Powell Principles of Info Systems November 12, 2015 Cloud Project The purpose of this project is to investigate different cloud services that are being offered in today’s marketplace, analyze their different benefits as well as negatives, and pick a company who offers services that suits my business best. Regardless of what website we are looking at, all of the websites are offering the same thing, which is a cloud service. Cloud computing service providers can provide IT services, ranging from storage space all the way to complete applications. This has become a viable service, as these companies have the ability to provide IT services with higher quality and more efficiently than their customers can.
Political, Economic, Sociocultural, Technological, Ecological and Legal Analysis (PESTEL) ULTA Beauty faces various political, economic, sociocultural, technological, ecological, and legal factors in its external environment. These factors can affect corporate strategy and should be considered during strategy development as they provide threats and opportunities afforded to the company. Although the factors mentioned below create risk for the company, ULTA Beauty has turned the political, sociocultural, and ecological factors into an opportunity, while striving to plan for and minimize legal, economic, and technological risk. Political Political factors that have an impact on ULTA Beauty include political disputes between the United States
The GIG economy is defined as the labour market characterised by the prevalence of short-term contracts or freelance work, as opposed to permanent jobs1. According to a recent report by McKinsey Global Institute2, it was reported that 20 to 30% of the working age population in America and EU-15 perform independent work, which constitutes up to 162 million people. Notably, close to half of this population of workers rely on such freelance work for their primary income. This changing nature of employment presents benefits for both workers and businesses. From a company lens, the ability to capitalize on such a workforce provides a lower set of business operating costs.
However, some belive as Dick Lodge, firm’s chief investment officer, said especially swaps were attractive investments which were lowering bank’s
Cloud By using Cloud, Starbucks could set up a cloud-based coffee selling machine. It offers self-service. Customers can make their own coffee by selecting the coffee beans they like, the amount of sugar etc. It creates excellent customer experience to enhance customers’ loyalty. Moreover, this technology could keep track of its customers’ consumption patterns and buying behaviors.
Amazon Web Services (AWS) was upgraded with Microsoft products such as Microsoft Amazon Web Services (AWS) launched Amazon CloudFront, a high performance, self-service, pay-as-you-go method of distributing data over the internet. Amazon Web Services (AWS) introduced Public Data Sets which enabled developers and researchers to cost-effectively create, share and consume sets of data free of charge. Amazon launched Amazon Currency Converter, to pay purchases in the currency of customer’s payment card, instead of US dollars. Amazon launched “Bill Me Later” for its customers to complete purchases instantly online without using a credit card.
REFLECTION PAPER IN INVESTMENTS AND INVESTMENT PORTFOLIO As they say, "Money isn't everything, but happiness alone can't keep out the rain. " It is often said that money is not the most important thing in the world. Despite of this, we still need to understand the true value of money. Money, in and of itself, is not very spectacular.