Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cloud computing
The dark side of Cloud Computing
The inception of Cloud Computing could be traced back to 1950s when large scale mainframe computers were being utilised for only communication purposes with no processing capacities. Within a short span of time, the proliferation of technology has taken Cloud Computing into a new era where no one has ever thought or imagined before. It seems to be limitless, some even says addictive. It is like taking steroid to enhance your personnel well-being, corporate performance, productivity and growth depending on which perspective that you are coming from.
Tech Giant firms like Google, Microsoft, Amazon, Apple, Samsung and IBM have invested billions of resources ($) to provide their client IT services that are hosted on the internet, the common ones being Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service and Storages as a Service (STaaS). These are often marketed as efficient and cheap solution which will help one to reduce their overhead cost. This paradigm shift, has raised concerns in the loss of control over data as well as privacy and security. The idea of handing over important data to another client, worries many.
With Cloud Computing continue to gain popularity, client and user are showing sign of over reliance to it. Hence, it is important to know these concerns and the inherent risks associated with it. The underlying risks exist in the area of security and privacy are loss of control over data and dependency on the service providers. These can lead to many legal and security concerns related to access/account control, integrity control, risk management, infrastructures, standardisation, code of conduct, sustainability and service provider insolvencie...
... middle of paper ...
...e handful tech giant collaborate and take cyberspace private. Client or user will be left to no choice but to continue to use their services due to their over reliance on Cloud Computing.
The future of Cloud Computing is unpredictable as it is still evolving. If those concerns mentioned earlier are not managed early and it may manifest to something that may adverse impact to mankind. All is not bleak as long as responsible service provider are willing to offer data protection and privacy legislation to its clients.
It may seems that we are sailing into uncharted water and a tropical storm awaits for us. Therefore, as a responsible services providers and users, an independent body has to be formed to look at the penitent issues and sieve out the potential risks and institute the right measures to reduce the risk so that we users can continue to benefit from it.
Research has shown that cloud computing is not only good for companies but also for the environment. By moving e-mail, patient records and applications into the cloud, it will not only save the company money but also move into the future. Healthcare Professional Office, Insurance companies and Laboratories would all be able to access patient records without the patient having to fill out multiples of the same forms over and over again.
It would be very difficult to ignore the potential benefits of cloud computing, but it also brings a number of new and worrying risks. Following are typical control requirements or opportunities that businesses may need to consider when considering a move to the cloud
To sum up, cloud computing may not be cost-effective, especially under some circumstances. For those enterprises which already have certain scales, upfront investment of moving up to cloud could be substantial due to the magnificent data foundation. Once an organization involved in cloud, that means it is going to rely on cloud to some degree. The efficiency of the organization might suffer from delayed technical support. Even some practical cases (MemSQL, Zynga and Uber) show cloud is not suitable for long-term business operation. Besides, a company may suffer a great loss due to cloud’s security issue. Thus cautious consideration should be taken by before the final decision.
Symantec’s recent State of the Information survey – conducted over 38 countries worldwide – found that subject matter experts expected their data storage needs to increase by 178% over the next year (Kilpatrick, 11). This is a truly astounding number that has already been realized. Data storage needs continue to expand yearly at similar levels. How will small business keep up financially with a burgeoning infrastructure? What about paying the cost required to ensure security, both in terms of specialized equipment and qualified personnel to operate it? Can small business successfully identify, mitigate, and accept risk associated with their stored data? According to Shailja Tripathi, a research scholar at the Facility of Operations and Systems, IFHE University, in Hyderabad, India, public cloud computing may be the answer to these questions for small businesses. Public cloud computing can access infrastructure, network storage, operating systems, and applications online from a centralized, third-party facility that specializes in those services. This view is also shared by Renee and Darren Conner, President and Director of Product Development respectively, at PensionPro Software in Harrisburg, Pennsylvania. If an internet connection is available, this resource is available for use. One only needs to look as far as Google Apps to see this in action. Expanding the use of public cloud computing will drastically improve future cybersecurity postures in small business.
Cloud computing is able to increase the speed of business. Cloud computing offers the speed to make computing resources on an instance basis, not just need to first survey time and skilled resources in design and implement infrastructure and applications to deploy and test it. Cloud computing can engance revenue, share bigger market, or other advantages.
...Implementation of cloud systems can be implemented in stages with costs that coincide with usage. The ROI outweighs the issues or problems that could occur. Cloud computing gives a competitive advantage of being able to keep up with changes in technology without having the cost involved. Amazons cloud computing allowed companies like Ericsson to remain competitive and thrive.
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
The world today is becoming more technologically advanced. Internet use is becoming a more integral part of businesses today. A new way that businesses have started to utilize the internet as a business tool is through cloud computing. “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” (NIST, 2011). This network provides a business with the ability to have a common remote third party connection which they can perform all necessary accounting work. All accounting work that is processed and completed on the cloud is referred to as cloud accounting. The reason businesses use the cloud is to store and organize information that a company obtains to place in a common location. It can be related to a file cabinet that can be accessed from anywhere connected to the internet.
A good private cloud service makes data protection its utmost priority. It does so by building security within its system based on a company's individual needs. Cyber attacks are only going to become more commonplace. Business owners work too hard to be victims of cybercrime.
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
Cloud computing technology is a very known and popular paradigm in the field of Information technology. It is an incipient computing model which emanates from grid computing which is resulting into an emerging paramount concept in Information Technology. Vast number of operating systems and virtual servers are mutually dependent through the internet and allow sharable resources with each other. This generates expeditious and efficient computing speed. The concept of cloud computing is predicated on the time sharing of expensive resources and benefits of the providence of scale. The word Cloud originates from the well-known cloud shape which is expressed as a network in architectural system diagrams. Cloud computing applies traditional supercomputing to provide tremendous throughput computing power. Cloud computing allows user to execute simulated applications on a virtual server. In this report, we discuss about cloud computing technologies for example “Distributed File System (DFS), Map-Reduce, and Big tab”. [3] This cloud computing architecture is designed for, geographic information Services which contains functional utilization, perceptions, benefits, computing reserving data and infrastructure layers. We also discuss about software backdrops called as “D cloud”. D-Cloud provides a condition for analysis on the cloud elements using a particular structural configuration and implements large number of evaluations automatically as per the scenario. We also discuss about combining Peer to peer systems and technologies related cloud computing in order to construct a blueprint of the architecture and establish PC2, an open and free cloud computing platform. [4]
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place that people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their
For example services such as, Google Docs, Flickr, YouTube or Yahoo Mail, actually already using cloud computing. These allow you to store t...
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.