Saturday, July 27, 2019
Cloud Computing Research Paper Example | Topics and Well Written Essays - 750 words - 1
Cloud Computing - Research Paper Example 1-2). Cloud computing is widely acknowledged to have the capacity to revolutionize completely the way organizations and enterprises manage their information technology at the same time utilizing it more beneficially. However, the prevailing paradigm requires an infrastructural change in order to fit in for the enterprise needs. Through the adoption of cloud IT services, business enterprises are able to realize efficiency, agility, elasticity as well as cost reduction. Nevertheless, many studies have revealed hesitation by these organizations to adopt the systems for the reason of insecurity. Moreover, establishing sound relations between the clients as well as the service producer would go a long way in confirming the security threat as is interpreted by the research studies. According to Technical White Paper of July 2011, the design and operation of the cloud-based IT environment, sound systems as interpreted though security is a matter of joint efforts by both parties; the cloud c omputing service provider as well as the clients seeking the services (IBM Global Technology Service, 2011, p.3). The customers are subjected to major threats in hacking system; lose of stored data and the overall cooperation of the IT teams from the cloud computing service providers as well s the internal IT departments of the clients to the business. Many enterprises and organizations have come to appreciate the services of cloud computing especially with the increased use of fast internet services through ââ¬Ëhand heldââ¬â¢ wireless gadgets which makes it possible to access these services conveniently and more easily than was in the past (Ernst and Young, 2011, p.4). Studies have cited the increased use of cloud computing services to be beneficial not only from the consumer point of view but also to the service providers. However, there have been notable hindrances to complete adoption of the services especially within the business sector majorly for the reason of poor infr astructures through which no certainty is offered to consumers for the security of their data and information. However, the concerns that emanate from the pools is that the collection would be the best targets to hackers through whom sensitive information of organizations would leak out. Moreover, in the event of data leakage the cloud computing service providers have no specific provision on controlling the effects that would arise. These fears about security and secrecy of organizational information present the greatest challenge to both service providers and the customers. There is therefore the need for the industry to focus on investing in proper infrastructures through which cloud-computing services would be effectively offered. Clients to the cloud computing service providers are hesitant to adopt the dynamic system of data storage because they feel that the system does not fully guarantee the security to their data. On the other hand the crash of Dot com era, the web develop ment gave rise to a newer version of web-based applications, which would introduce rather interactive web pages than was the case with the previous versions of the web sites. The new web services introduced adopted the name of Web 2.0 and had a distinction from the previous web applications in that it allowed higher levels of interactions
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.