Monday, March 25, 2019
Cloud Computing Essay -- Information Technology, Data, Security
intromissionCloud computing has boost a large-scale amount of invade in the IT industry. The market research and analysis firm IDC suggests that the market for pervert computing services was $16bn in 2008 and will rise to $42bn/year by 2012 (Chhabra, Verma & Taneja, 2010) .The era of cloud computing introduces a refreshed dimension for Enterprises. The academe and research worlds have developed a keen interest into challenges and issues introduced by this relatively new concept (Sriram & Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing engineering, the issues can be outlined as security, privacy, selective information migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those be using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a involve to endlessly managed and protect the data to ensure its value and authenticity (Yale & Chow, 2011). Enterprises now claim increasingly more information about their products, customers and partners- whether its stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be forever and a day protected before conducting business with a company. Within lay the need for complete data governance to manage and protect crucial data, which has expire a key issue for the cloud (Yale, 2011).The literature review aims to contend the borrowing of cloud computing within enterprises those are using KBE systems and how this adoption of cloud will affect their data governan... ... this process, and it can take some(prenominal) months between the decision to procure hardware and the hardware being delivered, frame-up and ready to use. The use of cloud computing ca n greatly abase this time period, but the more significant change relates to the empowerment of users and the scattering of the IT departments authority as pointed out by Yanosky 20. For example, a companys cultivation coordinator who requires a few servers to run a week-long web-based training course can bypass their IT department and run the training course in the cloud. They could pay their cloud usage-bill using their personal reference work card and charge back the amount as expenses to their employee. A like scenario was recently reported by BP, where a group bypassed the companys procurement, IT department and security processes by using AWS to host a new customer facing website 10.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment