Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cloud computing
The dark side of Cloud Computing
The inception of Cloud Computing could be traced back to 1950s when large scale mainframe computers were being utilised for only communication purposes with no processing capacities. Within a short span of time, the proliferation of technology has taken Cloud Computing into a new era where no one has ever thought or imagined before. It seems to be limitless, some even says addictive. It is like taking steroid to enhance your personnel well-being, corporate performance, productivity and growth depending on which perspective that you are coming from.
Tech Giant firms like Google, Microsoft, Amazon, Apple, Samsung and IBM have invested billions of resources ($) to provide their client IT services that are hosted on the internet, the common ones being Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service and Storages as a Service (STaaS). These are often marketed as efficient and cheap solution which will help one to reduce their overhead cost. This paradigm shift, has raised concerns in the loss of control over data as well as privacy and security. The idea of handing over important data to another client, worries many.
With Cloud Computing continue to gain popularity, client and user are showing sign of over reliance to it. Hence, it is important to know these concerns and the inherent risks associated with it. The underlying risks exist in the area of security and privacy are loss of control over data and dependency on the service providers. These can lead to many legal and security concerns related to access/account control, integrity control, risk management, infrastructures, standardisation, code of conduct, sustainability and service provider insolvencie...
... middle of paper ...
...e handful tech giant collaborate and take cyberspace private. Client or user will be left to no choice but to continue to use their services due to their over reliance on Cloud Computing.
The future of Cloud Computing is unpredictable as it is still evolving. If those concerns mentioned earlier are not managed early and it may manifest to something that may adverse impact to mankind. All is not bleak as long as responsible service provider are willing to offer data protection and privacy legislation to its clients.
It may seems that we are sailing into uncharted water and a tropical storm awaits for us. Therefore, as a responsible services providers and users, an independent body has to be formed to look at the penitent issues and sieve out the potential risks and institute the right measures to reduce the risk so that we users can continue to benefit from it.
The cloud computing is still under development but if it can manage to maintain information privacy and confidentiality than it will become revolutionary in healthcare field. And we never know, in future science and technology might introduce more advanced level of apps and service with enhanced level of privacy and security measures.
The stories that leave an impact on a person’s life normally make the reader or listener feel the strongest emotions. Whether that be a feeling of joy, admiration or intrigued all depends on the purpose of the story. A story that inspires or pushes the reader to think is entertaining to a point, without the ability to keep the reader engaged they would not have payed attention long enough to be inspired. The difference between a story that inspires and teaches and one that merely entertains is nothing.
...Implementation of cloud systems can be implemented in stages with costs that coincide with usage. The ROI outweighs the issues or problems that could occur. Cloud computing gives a competitive advantage of being able to keep up with changes in technology without having the cost involved. Amazons cloud computing allowed companies like Ericsson to remain competitive and thrive.
...ds are still provided by certain kinds of cloud providers. Only a few have financial ability to build one’s own cloud. Even so, a cloud could hardly prevent being attacked by cyber criminals.
Virtualization technologies provide isolation of operating systems from hardware. This separation enables hardware resource sharing. With virtualization, a system pretends to be two or more of the same system [23]. Most modern operating systems contain a simplified system of virtualization. Each running process is able to act as if it is the only thing running. The CPUs and memory are virtualized. If a process tries to consume all of the CPU, a modern operating system will pre-empt it and allow others their fair share. Similarly, a running process typically has its own virtual address space that the operating system maps to physical memory to give the process the illusion that it is the only user of RAM.
It would be very difficult to ignore the potential benefits of cloud computing, but it also brings a number of new and worrying risks. Following are typical control requirements or opportunities that businesses may need to consider when considering a move to the cloud
The origins of cloud computing dates back to the 1960s around the time computers were introduced. It was unknown specifically what cloud computing was until 1997 where Ramnath Chellappa, information systems professor, used the term “cloud computing” and placed a definition behind it (Cantu, 2011). After the introduction of what cloud computing does companies began switching to using these services to benefit their own company. Statistically, “in 2009, revenue for cloud services was just over 58.6 billion” (Cantu, 2011). The growth of cloud services is capturing more of the market where in 2011 cloud computing accounting is opening up on the global market at 2.3% with plenty of room to grow (Cantu, 2011).
For example services such as, Google Docs, Flickr, YouTube or Yahoo Mail, actually already using cloud computing. These allow you to store t...
Cloud computing is able to increase the speed of business. Cloud computing offers the speed to make computing resources on an instance basis, not just need to first survey time and skilled resources in design and implement infrastructure and applications to deploy and test it. Cloud computing can engance revenue, share bigger market, or other advantages.
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
43% of cyber attacks target small businesses, and 49% of them are web-based attacks. More companies are using cloud networks to store their data. It's cheaper and easier to manage than a personal network. But it also makes companies more susceptible to cyber attacks. A trustworthy disaster recovery service implements private cloud hosting.
Cloud computing technology is a very known and popular paradigm in the field of Information technology. It is an incipient computing model which emanates from grid computing which is resulting into an emerging paramount concept in Information Technology. Vast number of operating systems and virtual servers are mutually dependent through the internet and allow sharable resources with each other. This generates expeditious and efficient computing speed. The concept of cloud computing is predicated on the time sharing of expensive resources and benefits of the providence of scale. The word Cloud originates from the well-known cloud shape which is expressed as a network in architectural system diagrams. Cloud computing applies traditional supercomputing to provide tremendous throughput computing power. Cloud computing allows user to execute simulated applications on a virtual server. In this report, we discuss about cloud computing technologies for example “Distributed File System (DFS), Map-Reduce, and Big tab”. [3] This cloud computing architecture is designed for, geographic information Services which contains functional utilization, perceptions, benefits, computing reserving data and infrastructure layers. We also discuss about software backdrops called as “D cloud”. D-Cloud provides a condition for analysis on the cloud elements using a particular structural configuration and implements large number of evaluations automatically as per the scenario. We also discuss about combining Peer to peer systems and technologies related cloud computing in order to construct a blueprint of the architecture and establish PC2, an open and free cloud computing platform. [4]
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place that people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.
Peter Mell and Time Grance’s piece, "The NIST Definition of Cloud Computing,” explains that with the Cloud has come a more efficient way for us to store and share data; however, it has also lead us to a lot of security breaches. To put it in laypeople terms, the cloud is the connection of all of the functions of our applications, connected to each of our multiple devices. It can be very easy to get scammed or taken advantage of through cloud computing, because if someone gets a hold of one of our devices (say, an iPhone, for example) they can literally destroy us by tapping in to every single application we store data