Wednesday, May 6, 2020
Advantages And Disadvantages Of Cloud Competing - Samples
Question: Discuss about the Advantages And Disadvantages Of Cloud Competing. Answer: Introduction The concept of cloud computing is becoming an important topic for businesses these days. The report will discuss in detail about different advantages and disadvantages of cloud competing. This is why, during the process of discovering the power of this concept, it is also crucial to have more understanding related to streamlining the procedure of IT that make this process more helpful (Oliveira et al, 2014). Literature Review Following are the list of advantages of cloud computing: - Cost effective: the concept of cloud computing is actually considered as one of the most cost effective methods that helps in maintain and also upgrading the system to next level. The conventional form of software based costs is huge in term of money. In addition the licensing fees for different number of users can further prove to be very costly for the organization (Kumar et al, 2015). Unlimited storage: the storage of data in this system provides an unlimited amount of storage ability and this is why, it is important to understand that people do not worry about the storage space or rise in the present storage space presence (Rittinghouse et al., 2016). Software integration: the concept of cloud computing along with software integration is normally related to something that happens automatically. This further means that one does not require taking some additional efforts to change as well as integrate the application as per the preference of the people (Fernndez et al, 2014). Rapid deployment: in the end, the concept of cloud computing provides number of advantages of rapid deployment. Here it is crucial to actually opt for the method of operations for the complete system and can be completely functional in sometime (Sultan, 2014). Disadvantages Following is detailed discussion: - Issues related to technicalities: it is important to understand here that information on the concept of cloud computing can also be accessed at any point of time and from any place at all (Almorsy et al., 2016). There are also multiple times when the current system can have some serious problems. The company must always be preparing of technical issues that can come up at any point of time (Nkhoma et al, 2013). Attacks: confidential information can actually create vulnerability in the companys existence to any kind of hack and threats. It is important to be well prepared and aware of the fact that there is nothing online which is secure and there is always a change of stealth of any kind of sensitive data (Hameed, et al 2016) Research Questions and Hypothesis Research Questions Primary research question What are the advantages and disadvantages of cloud computing in business? Secondary research question What are some of the best measures that have been taken to improve the security of the system? Why do business use cloud computing? How does cloud computing reduces the risk for the business? Hypothesis Cloud computing is becoming an integral part of organization in todays time and the concept comes with advantages and disadvantages which are equally important to understand. The scope of the report goes from different organizations and using the cloud computing model (Liu et al, 2014). The concept of cloud computing actually means internet based computing of the information. This is why it is important for the organizations to never have data put up on this system if they are not very sure or comfortable about the sensitivity of data (Subramanian et al, 2014). Recovery and backup: all the information is actually stored in the cloud and this is why back up along with restoring that is actually much simpler than storing it as a physical machine. In addition many cloud based functions are normally very competent to deal with the recovery of data (Garrison et al, 2015). Security: the other important problem while present in the cloud is various security based challenges (Hwang et al., 2016). Right before selecting the base for technology, one must also understand that the company can surrender all the sensitive and confidential data to a third party. This is actually a huge amount of risk for the company (Chang et al, 2014). Operational Definitions Setting the concept of cloud computing, their vendors have gone to an extra mile to promote the concept in organizations (Yadav et al., 2016). There are definitely some security issues and security of data is prime concerns but the credibility here has also suffered a lot. There are so many kinds of elements in the research that can be categorized as dependent as well as independent elements like the cloud computing, security, vulnerability, threats, SaaS etc. Research Methodologies: Data Collection Analysis Sampling Techniques The case will have different organizations that are using cloud computing in their system. This further will be done to make sure that the opinion of social media and companies will be covered through all small to larger organizations. The study will be based on a simple random based sampling method that will help in conducting interviews as well as answering the research question and also evaluate the stated hypothesis. Method of Analysis There are two sides of the arguments and the concept means different for different people this is why the debate on using qualitative or quantitative methods for study concludes that both the methods must be adopted and there should be mix usage (Mezgr Rauschecker, 2014). Qualitative research The qualitative aspect of collecting data will further make it possible to gain clarity on the complicated nature of the features that has to be studied here and therefore there will be more clarity on the topic (Gupta et al, 2013). The qualitative research will be used to form questionnaires which have some open as well as close ended doubts. Quantitative research For the sake of quantitative methods, there are number of properly structure interviews that must be conducted to similar number of respondents on phone along direct meeting. This further will make sure that every interview will have similar set of queries (He Da Xu, 2014). Data Collection While selecting the sample for the study, it is important to have informed consent and must be sent to the study candidates participating in electrical as well as hand based delivery (Sajid Raza, 2013). The main motive of the study will be further explained to the candidates and there are responses that will promise to be sensitive by nature and also compile at one place with an opinion of other candidates to make normal conclusion. Research Processes The number of responses achieved from the questionnaires will be assessed by entering it into an excel file and later it will also be edited in the right manner. The information will later will be send into SPS based version of seventeen data analysis software and also evaluate the data shown in using the statistics as a means along with model based percentages and scales and standard amount of deviations (Sadiku et al, 2014). Work Start Date End Date Project Objective 30th July 3rd August Scope of the project 4th August 15th August Literature Review 15th August 25th August Research Questions 25th August 30th August Research Design Methodology 30th August 3rd Sept Limitations 3rd Sept 8th Sept Expected Outcomes It is without question that organization these days are getting a lot of advantages from cloud computing. But with number of advantages, there are some disadvantages also. It is important to understand these aspects of cloud computing before taking it up so that maximum benefit from it can be gained (Hsu, Li-Hsieh, 2014). Reliability and validity The overall usage of mixed techniques of research can be related with number of threats for the validity as well as level of trust of the outcomes that are obtained here. For the sake of primary base of data, primary information tests the data for the sake of reliability and validity and also based on finding out the same outcome (Hsu, Li-Hsieh, 2014). Conclusion The kind of limitations using discussed methods in research will also be related to long amount of time as well as efforts needed here. In addition, the research also requires more amounts of resources to collect important data to also answer the discussed research questions. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Chang, V., Walters, R. J., Wills, G. (2014). Review of Cloud Computing and existing Frameworks for Cloud adoption. Fernndez, A., del Ro, S., Lpez, V., Bawakid, A., del Jesus, M. J., Bentez, J. M., Herrera, F. (2014). Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,4(5), 380-409. Garrison, G., Wakefield, R. L., Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations.International Journal of Information Management,35(4), 377-393. Gupta, P., Seetharaman, A., Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses.International Journal of Information Management,33(5), 861-874. Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P. P., Kolodziej, J., Balaji, P., ... Khan, S. U. (2016). A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems.Computing,98(7), 751-774. He, W., Da Xu, L. (2014). Integration of distributed enterprise applications: A survey.IEEE Transactions on Industrial Informatics,10(1), 35-42. Hsu, P. F., Ray, S., Li-Hsieh, Y. Y. (2014). Examining cloud computing adoption intention, pricing mechanism, and deployment model.International Journal of Information Management,34(4), 474-488. Hwang, K. (2017).Cloud and Cognitive Computing: Principles, Architecture, Programming. MIT Press. Kumar, N. S., Lakshmi, G. R., Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing.Procedia Computer Science,46, 689-696. Liu, C. Y., Zou, C. M., Wu, P. (2014, November). A task scheduling algorithm based on genetic algorithm and ant colony optimization in cloud computing. InDistributed Computing and Applications to Business, Engineering and Science (DCABES), 2014 13th International Symposium on(pp. 68-72). IEEE. Mezgr, I., Rauschecker, U. (2014). The challenge of networked enterprises for cloud computing interoperability.Computers in Industry,65(4), 657-674. Nkhoma, M. Z., Dang, D. P., De Souza-Daw, A. (2013, May). Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach. InProceedings of the European Conference on Information Management Evaluation(pp. 180-189). Oliveira, T., Thomas, M., Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information Management,51(5), 497-510. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sadiku, M. N., Musa, S. M., Momoh, O. D. (2014). Cloud computing: opportunities and challenges.IEEE potentials,33(1), 34-36. Sajid, M., Raza, Z. (2013, November). Cloud computing: Issues challenges. InInternational Conference on Cloud, Big Data and Trust(Vol. 20, No. 13, pp. 13-15). Subramanian, N., Abdulrahman, M. D., Zhou, X. (2014). Integration of logistics and cloud computing service providers: Cost and green benefits in the Chinese context.Transportation Research Part E: Logistics and Transportation Review,70, 86-98. Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges.International Journal of Information Management,34(2), 177-184. Yadav, D. S., Doke, K. (2016). Mobile Cloud Computing Issues and Solution Framework.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.