.

Thursday, February 14, 2019

Cloud Computing Essay -- Information Technology, Data, Security

INTRODUCTIONCloud figure has boost a large descend of interest in the IT industry. The market research and synopsis firm IDC suggests that the market for demoralise computing services was $16bn in 2008 and result rise to $42bn/year by 2012 (Chhabra, Verma & Taneja, 2010) .The era of veil computing introduces a new dimension for Enterprises. The academia and research worlds have developed a keen interest into challenges and issues introduced by this relatively new concept (Sriram & Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting hide computing technology, the issues can be outlined as security, privacy, nurture migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are employ KBE (knowledge based engineering) systems are in risk in terms of migration their entropy over the cloud. Most enterprises are in a midst of creating, sharing, float and storing data in digital formats to allow collabora tion , hence in that location is a need to continuously recognized and protect the data to ensure its rank and authenticity (Yale & Chow, 2011). Enterprises now acquire increasingly more information slightly their products, customers and partners- whether its stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has become a key issue for the cloud (Yale, 2011).The literature review aims to address the adoption of cloud computing deep down enterprises those are development KBE systems and how this adoption of cloud will affect their data governan... ... this process, and it can take several months between the decision to procure ironware and the hardware being delivered, setup and ready to use. The use of cloud computing can greatly reduce this time period, but the more fundamental change relates to the empowerment of users and the diffusion of the IT departments authority as pointed out by Yanosky 20. For example, a companys training coordinator who requires a few servers to run a week-long web-based training course can circulate their IT department and run the training course in the cloud. They could pay their cloud usage-bill using their personal credit card and charge back the amount as expenses to their employee. A similar scenario was recently reported by BP, where a group bypassed the companys procurement, IT department and security processes by using AWS to host a new customer facing website 10.

No comments:

Post a Comment