StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Implementing Cloud Computing Programs - Research Paper Example

Cite this document
Summary
This research paper “Implementing Cloud Computing Programs” aims to provide insight on some of the strategies of implementing cloud computing, as well as some of the risks that come with implementing such programs. Cloud computing refers to the use of isolated servers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Implementing Cloud Computing Programs
Read Text Preview

Extract of sample "Implementing Cloud Computing Programs"

Implementing Cloud Computing Programs Introduction The advancements pursued in the field of science and technology has brought about significant adjustments across various sectors of the economy. One of the main innovations in computer science and information technology, for example, is cloud computing. Cloud computing refers to the use of isolated servers accommodated in the internet to store, manage, and at the same time process information. Stakeholders in the field of IT share the ideology that it is advantageous, as it enables interested entities use relevant resources as a utility, without having to put up and consequently maintain servers within a given locality. This research paper aims to provide insight on some of the strategies of implementing cloud computing, as well as some of the risks that come with implementing such programs. Strategies for Implementing Cloud Computing Programs The process of implementing cloud computing programs is detailed particularly because of the several steps that the interested parties need to go through in the course of undertaking the project. As such, all entities should consider employing strategies that are in line with their ventures. The next section highlights some of the strategies that are far-reaching in ensuring a successful implementation of cloud computing programs. Planning Planning is particularly imperative because it provides the interested parties with the opportunity to analyze and re-evaluate their ability to handle the key steps of the implementation process contentedly. This includes forecasting on the entire process and the parties who will be involved in procuring all the needed hardware and software as well as the mechanism of going about the installation process. Similarly planning entails forecasting on how the installed software, hardware, and the backup systems will be tested (Gulla, 2013). Also, planning is far-reaching given that it enables the interested parties understand the alternatives at its disposal, the scope of technology and the business model. Ensuring the Availability of Personnel Given the number of cloud installation programs that are currently going on as well as the planned ones, it is important to take note of the fact that there may be lack of enough expertise and talent to handle all of them. In that regard, it is imperative for organizations to ensure that they have key cloud computing experts at their disposal. Interested entities should, therefore, consider not only recruiting, but also training and retaining available staff. This should include engineers, architects and developers (Babcock, 2010). This routinely provides an upper hand and goes a long way in ensuring that the installation and management process is well under control, particularly because of the sensitivity of work involved in cloud programming. Security of Data As highlighted in the introduction, cloud computing involves the process of using servers in an isolated location instead of installations within a given locality. The process of transitioning into the remote servers may be quite challenging, particularly because the process of installing cloud-computing programs is gradual (Babcock, 2010). As such, it is of great significance for the entity involved to ensure that the process of transitioning to the remote servers is free of hitches. This includes establishing a framework for evaluating thereby eliminating the risks and liabilities that may be associated with the transitioning process. In that regard, it is important to ensure that security is managed properly in the course of the transition. This comes in handy in ensuring that only the right people can access the information contained within the cloud program. Risks behind Implementing Cloud Computing Strategies Cloud computing programs have routinely been celebrated as the savior of IT, predominantly because it makes it easy for several organizations to manage bulky data without any difficulty. Nonetheless, recent events have pointed towards the fact that cloud computing may not be as perfect as it was earlier expected. This section aims to shed more light on some of the risks that have often been associated with the installation of cloud computing programs. Shared Access Multitenancy, which refers to the aspect of unrelated clients sharing the same storage and memory facilities is one of the most disturbing concerns associated with cloud computing. This is particularly because a client’s private data may leak to a different user, an event that amounts to an invasion of privacy. In like manner, this concern is worrying because in some situations the clients who acquire information that is not theirs may be tempted to take up a different identity that is not theirs. The aspect of shared access has in the recent past also resulted in multitenant exploitation, which is the aspect of a user exhausting resources that belong to a different client. Cyber-attacks Another troubling concern that comes with cloud computing programs is cyber-attacks. It is often known that the storage of data within the internet puts the users at a huge risk of cyber-attacks. In fact, cloud computing worsens the situation, for a large amount of data is often stored within its storage space, hence making many people vulnerable (McDonald, 2010). It is presumed that just as security measures and other technological aspects become refined, do cyber-attacks. This is proved by the fact that in as much as cloud companies often get security concerns right; the hackers often become more creative and even hack personal accounts. Government Intrusion Government intrusion is one of the most recent concerns that cloud users have to put up with. This is particularly because quite often governments are forced to invade the privacy of their citizens and other organizations for national security reasons. Lack of Cloud Standardization Another major concern associated with cloud programming is the lack of standardization. This is particularly because there are no set guiding principles that govern the cloud programming, a fact that makes it possible for other cloud providers to have superior cloud systems (McDonald, 2010). Additionally, the fact that different sectors of the economy deal in various fields and have diverse expectations makes it challenging for a cloud provider to know the extent of the safety of their cloud program. Conclusion Cloud computing is unquestionably one of the revolutionary advancements in the world of technology. The fact that cloud computing makes it easy to store, manage and process data is an added advantage given that most of the organizations always have to deal with bulky data. Any organization that is intent on implementing cloud computing should therefore consider going about a comprehensive planning process, for that ensures that all aspects of the implementation process are taken into consideration. Over and above, organizations should ascertain that they put all the necessary systems in place, for that guarantees that some of the concerns highlighted above, such as invasion of privacy are averted. References Babcock, C. (2010). Management strategies for the cloud revolution: How cloud computing is transforming business and why you cannot afford to be left behind. New York: McGraw-Hill. Gulla, J. (2013). IBM Systems: Implementing Cloud Computing Takes a Complete Strategy. Accessible at: http://www.ibmsystemsmag.com/mainframe/trends/Cloud-Computing/cloud_project_management/ McDonald, K. T. (2010). Above the clouds: Managing risk in the world of cloud computing. Ely: IT Governance Pub. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Implementing Cloud Computing Programs Research Paper”, n.d.)
Implementing Cloud Computing Programs Research Paper. Retrieved from https://studentshare.org/information-technology/1700621-what-are-some-of-the-major-strategies-and-risks-behind-implementing-cloud-computing-programs-in-todays-technology-filled-world
(Implementing Cloud Computing Programs Research Paper)
Implementing Cloud Computing Programs Research Paper. https://studentshare.org/information-technology/1700621-what-are-some-of-the-major-strategies-and-risks-behind-implementing-cloud-computing-programs-in-todays-technology-filled-world.
“Implementing Cloud Computing Programs Research Paper”, n.d. https://studentshare.org/information-technology/1700621-what-are-some-of-the-major-strategies-and-risks-behind-implementing-cloud-computing-programs-in-todays-technology-filled-world.
  • Cited: 0 times

CHECK THESE SAMPLES OF Implementing Cloud Computing Programs

Big Data, IT, Cloud Computing, Analytics and Healthcare

Technology advances in cloud computing, IT big data and analytics are examples of sectors in technology that have revolutionized the health care system. Big… ata is a compilation of data sets that is very big that it is very difficult to handle and process using traditional database and data processing tools.... For example, there are very many patient records that it might become too hard to access some of these files unless one is on cloud computing is the use of computer software and hardware over a network normally as a service....
10 Pages (2500 words) Essay

How Will Astronomy Archives Survive the Data Tsunami

It has been researched that the best way to handle the large data sets is to form communities that form partnerships with the national cyber infrastructure programs.... These communities set up programs in which they analyze that which technologies... However, if this model is continuously used in astronomy, the data access and computing model will break down....
3 Pages (750 words) Essay

Water Use Technology in the Smart Cities

The smart water meter takes water measurements after every 15 minutes in each household, and then sends information to the IBM cloud; cloud computing involves internet computing where resources, software or information is given to computer devices on demand (Deakin, 2007).... cloud computing enables the most rapid decision making, in the water conservation measures; in the cloud the water data will be studied to check problems in the water system like leaks....
4 Pages (1000 words) Essay

White Paper on Cloud Storage

Cloud storage and cloud computing refer to the act of saving As opposed to storing information to the hard drive of a personal computer, or some other localised device, it is stored in a remote database, with the internet acting as the link/ connection between the said database and the computer/ device.... More individuals, groups and organizations increasingly own computing devices in the form of smart-phones, tablets and laptops and the thought of storing data in a traditional desktop PC often seems antiquated....
5 Pages (1250 words) Essay

Virtualizing Staffordshire Universities IT Services

cloud computing is a term used to mean the practice of storing data and programs and accessing them over the internet instead of using the computer hard drive.... For it to be considered cloud computing, data is accessed from or synchronized to the internet. In a cloud computing system, the workload shifts so the local computers no longer have to do all the work that comes with running applications rather, the work is done by the network computers that make up the cloud....
10 Pages (2500 words) Assignment

Network Security

This paper ''Network Security'' tells that The primary purpose of implementing a computer network is to allow several staff members to enter and update data simultaneously.... This paper presents an analysis of network security for the Athlete's Shack, which runs its business through a chain of sporting goods stores....
5 Pages (1250 words) Essay

Security Protocols

hellip; cloud computing seems like a more feasible option.... Not only would cloud computing help the company improve its security, but would also provide it with better services and features.... However, a more thorough analysis of the cost, requirements and benefits of cloud computing is needed before any decision regarding the future of the company is made....
13 Pages (3250 words) Coursework

Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms

From the paper "Business and Technical Challenges for Transitioning cloud computing in Blah-Blah Telecoms" it is clear that cloud technology can provide great promise for Blah-Blah Telecoms.... Overall, in Blah-Blah Telecoms cloud computing can help to drive innovation and enhance the effectiveness of providing communication services.... Thus, the report will provide information regarding various challenges that require to be considered while embracing cloud infrastructure and also offer recommendations for transitioning cloud computing strategy in the business....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us