Cloud Computing

 

 “There is no longer any doubt that, as a critical set of enabling technologies, cloud can significantly impact how any organization conducts its business. As cloud begins to become more mainstream within the business environment, we are seeing organizations move from the ‘when and why’ of the cloud adoption process to instead focus on the how”

Bryan Cruickshank EMEA Region Cloud Leader, KPMG in the UK”

This is a very interesting topic that we (see picture above) discussed in the lecture. From the discussion, i was able to gather information about the good and bad side of Cloud computing.

Cloud computing has fundamentally brought changes to the way information or data is storage, processed and handled. According to Stephen Fry (See video below) he explained in detailed how cloud computing was historically generated and the fascinating way in which cloud computing brought changes to computer thinking.

It has brought a new way of distributing and processing of digital data i.e. it totally changed the format in which Information Systems is created, developed, measured, maintained, sustained and funded. The use of cloud computing involve the use of software services and hardware resources which is the used by organisation to virtualized the entire platform across various host computers of the software providers which are connected via internet or an organisation internal network. Some of the organisations which are successfully using cloud services are amazon web services, google, and Microsoft. Taylor 2010. The development of cloud service model has enhance business supporting technology more efficiently than ever before. Bryan Cruickshank the Cloud Leader in the UK says:

“IN SOME WAYS, SUCCESS REALLY COMES DOWN TO THE TONE AT THE TOP OF HOW CRITICALLY THEY VIEW CLOD AS AN ENABLER AND POTENTIAL DIFFERENTIATOR FOR THE BUSINESS. THOSE WITH A HIGHLY DEVELOPED SENSE OF ENTERPRISE WILL GAIN THE MOST FROM THE CLOUD”

Meanwhile we can see that almost every social network organisation and mobile service providers now use Cloud Computing Services to offer better service to their customer in terms of data storage backup and essay access to data.

Having said that, there are some other downside of cloud computing. The National Institute of Education forum in Singapore talks about the security issues and vulnerability of cloud computing. See the video below:

Based on that talk, we can see that some service users are very cautious with their  data being stored in a remote location mainly because of security issues such as malicious insiders, service denial attack (hacking), insecure interfaces and APIs, threat of service or account traffic hijacking, data loss and sheared technology vulnerability. All these threat need to addressed in order to gain customer or service users confident in using cloud computing services.

Reference

Cloud Security Alliance (2013): The notorious Nine cloud computing threats in 2013. Source: http://blackboard.salford.ac.uk/bbcswebdav/pid-1557024-dt-content-rid-3430574_1/courses/BN-CTM-Y1S2-IS-15/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013%281%29%20copy.pdf. Assesed: 04/03/2015

Cloud Computing Conference in singapore, CLOUDSEC congress 2013-Security Strategy for visualization and Cloud Computing. Source: https://www.youtube.com/watch?v=LGt-WZ0la2M. Accessed: 04/03/2015.

Cloud Computing Image. Feb 2014. source: http://www.coolheadtech.com/blog/cloud-computing-pros-and-cons.

KPMG UK. The Cloud takes Shape: Global Cloud Survery and the implementation challenge. Source: http://blackboard.salford.ac.uk/bbcswebdav/pid-1557024-dt-content-rid-3430573_1/courses/BN-CTM-Y1S2-IS-15/the-cloud-takes-shape2014.pdf. Accessed: 02/03/2015.

Stephen Fry explain how cloud computing has brought changes to computer thinking. Video Source: https://www.youtube.com/watch?v=J9LK6EtxzgM. Accessed: 02/03/2015

Taylor. M, Haggerty J, Grest/. D. (2010) Digital evidence in cloud computing systems. Retrieved: Jhttp://www.beknowledge.com/wp-content/uploads/2010/10/d3d94Digitalevidence-in-cloud-computing-systems_2010_Computer-Law-and-Security-Report.pdf. Pub. ELSEVIER Pg. 304-308 Accessed: 05/02/2015

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s