Cloud Computing in Business
Autor: Sara17 • January 30, 2018 • 3,154 Words (13 Pages) • 740 Views
...
Many users are finding better ways to utilize their communication devices in a convenient manner. People are investing in different communication networks that ensure the provision of reliability and security during data transmission. There are different options for communication solutions that include wired and wireless forms of communication. These two options have a market share in the utility market applications, but there is an increase in the use of wireless technology. This is because wireless communications are less costly as compared to the wired connections (Velte, Velte & Elsenpeter, 2009). Wireless communication is flexible in terms of mobility, where an individual has a connection wherever they are, in addition to advantages such as Bluetooth connections in sharing data and information. Wireless communication devices are easy to install as compared to the wired devices such as burying cables underground for connectivity. If there is damage to such cables, then it could take some considerable amount of time make replacements. This means that the cables need regular maintenance and monitoring. Such concerns raise the costs of wired connectivity and people are shunning it gradually (Mell, & Grance 2009). On the other hand, wireless connections require minimal maintenance and in case of a major problem, the system provides information for quick correction.
Yes, it is possible to have a 100% wireless network. This is because three quarters of the users of wireless networks say that it is essential. The number of users does not matter, as they have a connection from any geographical location. For instance, most organizations that have installed wireless connections show an increase in productivity and profitability. The growth of the dependence in wireless connections is not surprising. This is because people have a constant connection through mobile phones that enables users to manage their tasks at their convenience (Mell, & Grance 2009). Through embracing wireless connectivity, there is a perception that different users keep up with the trends in the technology sector. In addition, internet providers are investing a considerable amount of resources in the installation of wireless communication systems. This is because of an increase in demand for wireless connections. However, 30% of computer users have had great concerns with their experience on wireless connections. This is because they complain of a poor network quality and claim that it is not reliable. They also feared on data security risks because attackers have the ability to tap data and information in the process of transmission.
There are various requirements for computer communication. Such components include computer hardware. These are the tangible physical components of the computer. For instance, a Modem is one of the hardware devices that have the ability to send signals from one computer to another over telephone signals. This comprises of the computer inputs for communication purposes. The other component is computer software. This controls the computer operations, according to the instructions of the users. The software allows computers to interact with other computers through the management of resources. Some of the utility software contains language translators for easy communication between computers. Another component is the availability of a database (Mell, & Grance 2009). This is the storage of related data in an organized manner. This enables users to retrieve information when they require, for communication purposes. Through the Database Management System (DBMS), users have the ability to create, maintain, and access a database (Stanoevska-Slabeva, Wozniak & Ristol, 2009). The other component is the availability of a network. Computers have the ability to converge telephone networks, in addition to other networks of communication that use both data and voice for computer communication. Computers communicate through, small networks to large networks, such as the internet, where users converge.
Telecommunication has various networks. One the networks include the transmission network. This carries different types of traffic that include voice, data, and video. It consists of optical fibre that has hundreds of multiplexers and travels for thousands of kilometres. There also exists switching networks that enables switching of data to the intended destination. The intelligent network contains a set of servers that consist of logic and data services. The access network enables the attachment of user equipment to the transmission network (Stanoevska-Slabeva, Wozniak & Ristol, 2009). Almost 80% of the compute users have embraced certain communication devices such as the Wireless Communication Interface Card. It enables a computer or other wired devices to have the access to a wireless network.
Challenges to Cloud Computing
Every opportunity that presents itself is always accompanied by challenges. This is the case with Cloud computing technology; in its great efficiency and effectiveness, there are challenges that still affect the technology. It is difficult to validate Cloud computing since they are stored in subsets obtained from correlated sets (Buyya, Yeo & Venugopal, 2008). The ownership of Cloud computing is also unknown, and this makes it difficult for organizations to process Cloud computing in real time, in situations where the source of the data is unverifiable. Subsequently, managing Cloud computing requires huge investments, and this poses challenge for small organizations that lack the capacity to extract important data from huge volumes of data. Breach in information is the greatest challenge that presents in the technology. The information that has been stored in the system might be breached by unauthorized persons, which might lead to the loose or access of personal information such as pins, names, credit card information among other details (Buyya, Yeo & Venugopal, 2008). Any breach of information has great impact on a company as they might lose clients or even sued by their clients, which will at the long run affect the performance of the insurance companies.
There is a considerable impact that the malicious insider has on a company or business; this always depends on level of access gained and the attacker’s capability to infiltrate a company’s assets. The effects of a malicious insider are very many like financial impact, whereby financial information of an organization can be leaked to other cooperation thereby affecting the organizations negatively. The other effect is brand damage; the attack may crimple the brand image in the market and productivity loss as the attacker may programme a mishap to derail the company’s production; all these can affect an organization’s operation.
IBM
...