Вы находитесь на странице: 1из 7

Integrated Professional Skills in the

Digital Age

UNIVERSITY OF SUFFOLK

BABSFY 2018/2019

STUDENT ID: S200530

STUDENT NAME:

PAULA-ANDUTA BANU

I declare that this assignment is all my own work and that I have acknowledged all

materials used from the published or unpublished works of other people. All

references have been duly cited.


1

Cloud Computing and Business

Cloud computing is popularly described as “dumb” terminals. Cloud computing is an

internet-based utility computing that uses shared resources such as hardware and software as well

as other information that can be accessed by the end users on their virtual servers (Hashem et al.,

96). In simpler terms cloud computing is a way of renting computer hardware, storage and network

on an hourly basis from firms that are able to afford such assets and resources in their data centers.

In fact, the majority of the definitions term anything that is beyond a given firm or user’s personal

firewall to be their cloud computing system. Some of the most popular companies such as Amazon

Inc. utilize these models of cloud. Cloud computing functions the same ways as electricity; after

turning on the electricity that you are subscribed to the meter starts charging the user. When you

switch off the electricity you do not get charged (Hashem et al., 100). Firms offering cloud

computing charge a user the same as the utility companies; paying for the software, information,

storage space or the applications that you utilize. In a nutshell, cloud computing allows firms to

use many different programs from different servers.

It is notable that personal computing, as well as business computing, has evolved in three

phases. The first phase is where the data and the applications are all stored in one’s local desktop

or the firm serve. The second phase involves applications residing in a local server or software on

the desktop powered by the internet to provide critical data for the company. The third phase is

where the majority of the data and software reside online. This is the phase that cloud computing

falls in. as much as 80% of the computational data across the planet is predicted to move to the

cloud within the next decade, there are still some unanswered questions with regard to business
2

development as it pertains to this online storage of information. Some examples of cloud

computing include iTunes, Calendars among other forms of backups (Yum et al., 750).

Cloud storage refers to the saving of information to offsite storage systems created for data

storage and security. The systems are maintained by third parties. Instead of storing information

on a firms storage unit or computer hard drives, the data is saved n remote databases which can be

accessed through the firm’s computers and internet (Yum et al., 750). This provides security of

data considering that issues such as natural disasters cannot disrupt or destroy the information

stored within these systems. Cloud storage is linked to numerous benefits and advantages

compared to the traditional physical storage systems and devices. This includes situations where

the data is stored in cloud storage systems, the firm has the ability to access the data as well as add

onto the database from any location that has internet access. It is however notable that the users or

people accessing this information must be authenticated and authorized to change or store the data.

Such systems eliminate the need to walk around carrying a portable or phycial storage or mass

device considering that it is online. It is also notable that the same computer that was utilized in

saving a file is not needed while retrieving the file (Kasemsap, 29).

Different Types of Cloud

The first type of cloud systems is Infrastructure as a service (IaaS). This is defined as the

lowest level of these systems and solutions. This system is comprised of computing infrastructure

which is outsourced as a service. The IaaS providers tend to deliver or offer pre-installed and pre-

configured hardware as well as software. This is delivered in virtual interfaces. The clients can do

what they want with the services provided. A good example of such a system includes the managed

hosting and development systems or environments (Hashem et al., 108). In terms of business, this
3

service reduces the costs of purchasing or ownership of the assets hence reducing the capital

expenditures. Secondly, a firm only selects the service that they want and pay for it. This reduces

the operational costs for the organization. it is also possible for the organization to scale based on

their requirements at any given time. this flexibility can be aligned with an organization's strategic

objectives.

The second type is the platform as services abbreviated as PaaS. This refers to a

solution that is similar to the IaaS but it is more advanced and revamped. With this system apart

from the basic infrastructure provided, the providing firm also offers an avenue or platform as well

as a solution especially when it comes to services for storage and accessibility of data. this

integrates aspects such as the IT infrastructure as well as graphically designed or tailored user

interfaces. Others integrate programming languages as well as an operating system while others

run-time system libraries. The PaaS systems and services are mainly deployed by firms that need

to develop examine and test or deploy cloud solutions for specific software or applications. The

hosting is however done by the provider who in this case is the third party examples include the

Microsoft Azure (Kasemsap, 40). In terms of a business organization, the PaaS provides an

opportune environment for many people to be involved hence it is easy to create supportive teams

and communities. the organization is also not required to conduct system updates of the

infrastructure considering that this is done by the provider and most importantly it is low costs

and with a simple deployment plan (Hashem et al., 111).

Thirdly there is software as a service (SaaS). The service provider, in this case, provides

an entirely functional web-based application to the client. The applications include enterprise

resource planning, email and time management among others. Such systems are rapidly scalable,
4

easy access from any location with internet, eliminates the need for organizational IT infrastructure

and comprises of a bundle maintenance and support system (Kasemsap, 30).

Lastly, there is recovery as a service type of cloud system (RaaS). This system helps

companies to “replace their backups through archiving, disaster recovery and continuity solutions

or packages on a single platform” (Kasemsap, 27). These providers can ensure that a firm covers

an entire data center including the operating systems and configurations as well as data and files

in databases. This is a critical security platform that ensures the organization can be restored

without the risk of data loss. This systems prevent permanent or temporary information loss,

provides an effective recovery approach, and eliminates the risk of permanent loss of physical

infrastructure (Kasemsap, 27).

Privacy and Security

Privacy is etched on the idea that an individual or entity has enough rights to control the

flow of their personal information and how it is used. This is most common in privacy policies that

come with the apps we download on a daily basis and install on the phones. Security, on the other

hand, refers to how personal information is protected (Chang et al., 30). For example how your

passwords and account information in an email account is protected. Security relates to data and

how it is safeguarded from leaking. As much as many people will regard security and privacy as

the same thing, security does not integrate the notion of individual rights (Chang et al., 26). It

focuses on the rights of an individual in relation to a third party or software that is expected to

maintain and secure their private data. a good example to differentiate the two is a virtual private

network also known as VPN which functions like a tunnel that allows only your information
5

passwords and other data on the internet to stay private. In this case, as it relates to privacy, a VPN

will block websites, browsers, cable firms as well as internet providers from the acts of tracking

and investigating personal user data. in fact they cannot even know your location. In terms of

security, the VPN will protect another individual or entity from accessing your information.

The same concept applies to cloud systems. Security is etched on the idea of preventing

another individual or entity from accessing your information while privacy is etched on the rights

to control who has the right to see your information by blocking unauthorized people. The third

parties are responsible for the majority of the activities involving security and privacy. To ensure

security an organization can utilize firewalls (Truong et al., 68). This is an effective method of

deterring external parties with malicious intent from accessing data and using it in a manner that

is not desired. Secondly, firms can limit what they share in these cloud services, destroy critical

but unnecessary information as well as install and invest in offsite databases to ensure that natural

calamities do not rob the firm of its data. Privacy, on the other hand, can be achieved through data

encryption. This ensures that unauthorized people cannot use the information or even access it. In

the same context, the use of passwords and identification mechanisms such as retina detection,

fingerprints, and numerical passwords helps improve privacy. This is because the user or business

only allows authorized personnel to utilize or even come close to their data (Truong et al., 68).

Works Cited
6

Chang, Victor, Yen-Hung Kuo, and Muthu Ramachandran. "Cloud computing adoption

framework: A security framework for business clouds." Future Generation Computer

Systems57 (2016): 24-41.

Hashem, Ibrahim Abaker Targio, et al. "The rise of “big data” on cloud computing: Review and

open research issues." Information systems 47 (2015): 98-115.

Kasemsap, Kijpokin. "The role of cloud computing adoption in global business." Delivery and

adoption of cloud computing services in contemporary organizations. IGI Global, 2015.

26-55.

Truong, Hong-Linh, and Schahram Dustdar. "Principles for engineering IoT cloud systems." IEEE

Cloud Computing 2.2 (2015): 68-76.

Yum, Takkin G., Matthew J. Threefoot, and Cheul Shim. "Cloud service brokering systems and

methods." U.S. Patent Application No. 14/015,750.

Вам также может понравиться