Tuesday, June 18, 2019

Cloud Computing Research Paper Example | Topics and Well Written Essays - 750 words - 1

Cloud Computing - Research Paper Example1-2). Cloud computing is widely adjudge to have the capacity to revolutionize completely the way organizations and enterprises manage their information technology at the same time utilizing it more than beneficially. However, the prevailing paradigm requires an infrastructural transmit in order to fit in for the enterprise needs. Through the adoption of dapple IT dish outs, business enterprises are able to realize efficiency, agility, elasticity as easy as cost reduction. Nevertheless, many studies have revealed hesitation by these organizations to adopt the systems for the reason of insecurity. Moreover, establishing sound relations between the clients as well as the service producer would go a long way in confirming the security threat as is interpreted by the research studies. According to technical White Paper of July 2011, the design and operation of the blot out-based IT environment, sound systems as interpreted though security is a matter of joint efforts by both parties the cloud computing service provider as well as the clients seeking the services (IBM Global Technology Service, 2011, p.3). The customers are subjected to major threats in hacking system mislay of stored data and the overall cooperation of the IT teams from the cloud computing service providers as well s the internal IT departments of the clients to the business. Many enterprises and organizations have come to appreciate the services of cloud computing especially with the increased use of fast internet services through hand held wireless gadgets which makes it possible to access these services conveniently and more easily than was in the past (Ernst and Young, 2011, p.4). Studies have cited the increased use of cloud computing services to be beneficial not only from the consumer point of hatful but also to the service providers. However, there have been notable hindrances to complete adoption of the services especially within the busines s sector majorly for the reason of unworthy infrastructures through which no certainty is offered to consumers for the security of their data and information. However, the concerns that emanate from the pools is that the collection would be the best targets to hackers through whom sensitive information of organizations would leak out. Moreover, in the occurrence of data leakage the cloud computing service providers have no specific provision on controlling the effects that would arise. These fears about security and privacy of organizational information present the greatest challenge to both service providers and the customers. There is therefore the need for the industry to focus on investing in proper infrastructures through which cloud-computing services would be effectively offered. Clients to the cloud computing service providers are hesitant to adopt the dynamic system of data fund because they feel that the system does not fully guarantee the security to their data. On th e other hand the crash of Dot com era, the web development gave rise to a newer version of web-based applications, which would introduce rather interactive web pages than was the case with the previous versions of the web sites. The new web services introduced adopted the name of Web 2.0 and had a distinction from the previous web applications in that it allowed higher levels of interactions

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.