Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
What benefits do cloud computing services provide
What benefits do cloud computing services provide
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: What benefits do cloud computing services provide
INTRODUCTION AND BACKGROUND
CLOUD COMPUTING deals with storing and accessing data and programs over the Internet without using any of the computer’s hard disk. Cloud computing don’t deal with your hard drive.
Cloud Computing has existed for many years. This was an evolution, which started in 1950’s with mainframe computing. In this multiple users were only capable of accessing a central computer through dumb terminals, whose only function was to provide access to mainframe. As a matter of cost efficiency it was not practical for an organization to buy and maintain one for every employee. So, providing shared access to a single resource was the solution that made economic sense for this sophisticated piece of technology.
Later, in 1970 came in the concept of virtual machines. Using virtualization software VMware, it came possible to execute more than one operating system simultaneously in isolated environment. This Virtual Machine operating system took the 1950’s shared access to the next level, permitting multiple distinct computing environments to reside on one physical environment.
In 1990’s came in the telecommunication which started offering virtualized private network connections. They offered only single dedicated point-to-point data connections. In this telecommunication companies were not able to provide users with shared access to the same physical infrastructure.
Below list explains the evolution of cloud computing:
1. Grid computing: using parallel computing we solve large problems.
2. Utility computing: computer services are offered as a metered service.
3. SaaS: Network based subscriptions to applications.
4. Cloud computing: access to IT resources delivered dynamically at anytime and anywhere as a service.
...
... middle of paper ...
...ser data are concerned about the data possibly harmed by the viruses and malware. There area companies, which take measures providing customizable spam filtering, email encryption among security measures.
2. In Cloud computing privacy is one of the main factors, which might lead unauthorised users to access information in the cloud. To prevent this companies offer with password protection and data encryption technology.
3. Users are controlled by the cloud computing. Which includes paying to the service, where and how do you use the service and other factors. Users are totally dependent on company’s updates and backups. If the servers cease to operate then users have chances to losing all information stored.
4. Internet is not available everywhere around the word yet. If the area your in don’t support Internet there is no use of saving and downloading from cloud.
The idea of accessing, storing, and processing data from online server or virtual server instead of local server is called as Cloud computing. When we store data in our hard disk which is very near to computer that is called as local storage and computing but Cloud computing doesn’t access data from our hard disk.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Virtual machines operate based on the computer architecture and functions of a real or hypothetical computer, and their implementations may involve specialized hardware, software, or a combination of both.
Virtualization is a technology that creates an abstract version of a complete operating environment including a processor, memory, storage, network links, and a display entirely in software. Because the resulting runtime environment is completely software based, the software produces what’s called a virtual computer or a virtual machine (M.O., 2012). To simplify, virtualization is the process of running multiple virtual machines on a single physical machine. The virtual machines share the resources of one physical computer, and each virtual machine is its own environment.
Using server virtualization to concurrently run various operating system environments on one physical server these issues can be resolved, which enables concurrent improvement by performing analysis of multiple environments. In addition to that, when development and test environments can be encapsulated and saved, the process of reconfiguration will become simple.
Cloud computing is defined by experts as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The meaning behind the word cloud is that it is a metaphor for the entire online web and its data as well. A cloud service differs from traditional hosting in three different ways. These three differences are that cloud computing is elastic, it is sold on demand, and the service is managed by the provider of the cloud. The easiest way to explain what cloud computing does is that it stores and gives access to different data and programs over the internet rather than just your computer’s hard drive. For it to be actually considered cloud computing it must include data or programs over the internet. Cloud computing can be done anytime, anywhere with an online connection.
Even though cloud computing is still an emerging technology there are many benefits to our organization by adopting this technology. For instance, the reduction of operational cost, the ability to access data from any network and device, and the ability to upgrade and downgrade with ease whenever needed. Looking at the statistical data from companies that have adopted this technology, I think Partners in Heath should adopt Cloud computing. It think it is the perfect technology to solve our financial problems, as well as adding several benefits mentioned earlier.
Cloud computing is the transfer of computing data or information into Internet. Cloud computing services allows individuals and businesses to
...Implementation of cloud systems can be implemented in stages with costs that coincide with usage. The ROI outweighs the issues or problems that could occur. Cloud computing gives a competitive advantage of being able to keep up with changes in technology without having the cost involved. Amazons cloud computing allowed companies like Ericsson to remain competitive and thrive.
The cloud computing is the practice that enables access to the shared pool of configurable computing resources which can be dynamically provisioned. It refers to both the applications delivered as service as well as hardware and system software in the data centres that provide those services. The attractive features of cloud computing such as on-demand access, high scalability, reliability, cost savings, low maintenance and energy efficiency bring benefits to both cloud service consumers and providers.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
The fundamental idea behind a virtual machine is to remove the hardware of a single computer and make it a self-contained operating environment that behaves as it is a separate computer. Essentially, the virtual machine is software that executes an application and isolates it from the actual operating system and hardware. CPU scheduling and virtual-memory techniques are used so that an operating system can create the illusion that a process has its own processor with its own (virtual) memory. The virtual machine provides the ability to share the same hardware yet run several different operating systems concurrently, as shown in Figure 2-11.
For example services such as, Google Docs, Flickr, YouTube or Yahoo Mail, actually already using cloud computing. These allow you to store t...
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.