StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Importance of iCloud Computing System - Admission/Application Essay Example

Cite this document
Summary
This essay "The Importance of iCloud Computing System" examines the virtual storage medium that requires internet access to access and secures users of restricted access to the data besides the reassurance of the availability of their data even in case of destruction of their physical gadgets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
The Importance of iCloud Computing System
Read Text Preview

Extract of sample "The Importance of iCloud Computing System"

English portfolio Welcome The writing assessment provides learners with perfect scenarios to exercise their literaryand comprehension skills. In this assessment, therefore I strive to decipher the importance of icloud computing system. As such, I maintain the use of technical terms in order to enhance the effective communication. In the four outcomes below, I present my findings from the review of the technical article. The technology uses the virtual space to act as an additional storage medium for those using different types of digital media. The virtual storage medium requires internet access to access thus securing users of restricted access to the data besides the reassurance of the increased longevity and availability of their data even in case of either damage or destruction of their physical gadgets. Apparently, in cases of either thefts or such disasters as fires and accidents, the damage that occurs in the hard drives often damage the data stored in the drives. This makes users susceptible to unprecedented loss of valuable data. Icloud computing thus strives to salvage such loses by providing users with a virtual storage space that enables them to access their data even in case of such damages. Apple introduced icloud computing in its numerous products such as iPhone, iPod Touch, iPad, Mac, and Apple TV among others. The technology provides users of the brands with additional space besides the internal hard drives. The virtual space guarantees the safety of the data stored in the devices thus assuring the user of the integrity of their data even in case of either damage or theft. The use of icloud computing spread rapidly globally as other manufactures of similar products appreciated the technology thus expanding the capacity and safety of data stored in the virtual spaces. The success of the invention resulted in a safer computing world, one in which users enjoy a guarantee of the safety and integrity of their data. Outcome 1 Among the significant features of the system are backups, icloud drive, find my IPhone, photo stream among others. Each of the above features relies on the safety of the icloud system by using the media to store data. Backup just as the name suggests refers to the use of the media to store secondary copies of the data stored in the hard drives thus availing them in case of either a destruction of the physical media or theft. Icloud drive on the other hand enables users to use the system as their actual hard drives. This implies that the access their files in real time thus using their in the applications on their devices. Find my I phone on the other hand is a unique security aplication that relies on the icloud system to track the smart phones. This portrays the extensive security features of the technology thus validating the use of icloud in implementing the different types of panoptic surveillance (Macey 112). Panoptic surveillance is a unique security feature that monitors the actions of people by recording their actions. The icloud computing system offers users an efficient way of monitoring their operations both online in offline by tracking changes. Each mobile device has and international mobile equipment identity while computers have an internet protocol number. Such are unique identities for each equipment (Ellmann 22). Cloud system provides each equipment adequate virtual space by recording their unique identities. This way, it thus becomes possible for a user to monitor the operations of those using his equipment besides tracking it in case of a theft. Most of the gadgets are expensive; this implies that people invest in acquiring high quality products that will guarantee the quality of the services (Bentham 21). As such, investing in the security of such devices is paramount in order to safeguard the lifetime of the equipment thus their value. Outcome 2 Psychology analysts explain that the fear of apprehension is likely to curb criminal activities. The fear of catching a thief in the act of steal is a major deterrent to such criminal activities. Investing is an expensive mobile equipment coupled with the icloud technology is likely to curb the prevalence of such criminal activities as theft since the thieves fear apprehension. Mobile information processing equipment such as smart phones and computers present two types of fears to the users of such equipment, the two include the ear of losing the data stored in the equipment and the loss of the equipment. Information is always important depending on the occupation of an individual and the user of the particular information processing equipment (Evans 44). Such information is always a target for thieves who hack into people’s equipment through the internet with the view of either corrupting the information or stealing them. Outcome 3 The icloud technology coupled with the panoptic surveillance technology provides effective remedies to both of the two fears. Among the security features that protect the data from unwarranted access by foreigners is the use of passwords. An individual enters these unique codes before accessing a database. This way, it becomes impossible for foreigners to aces the database since they lack the combination of digits that comprise the password (Semple 55). Besides passwords, icloud technology provides users with numerous firewalls that monitor the movement in the database. Firewalls are programs that prevent both the introduction and removal of files from a database with approval of the owner of the database. The program monitors the action within and around the database thus notifying the owner of the database of any attempted access into the database by unwarranted individuals. The owner can therefore follow up the links to discover the intruder. As explained earlier, the psychology of thieves prove that they fear apprehension especially during the act. Icloud technology enables this a feature that guarantees the safety of the technology. Another equally important feature of icloud technology is the corruption of data. The fact that the database exists on the internet makes them precarious to viruses, malicious programs that corrupt the files thus rendering the useless. The technology offers effective remedy to such ears thus guaranteeing the safety and fidelity of the databases. The use of antiviruses, programs that neutralize the antiviruses, ensure that the database are safe from corruption of the files either accidentally or by malice since some of the viruses are creations of malicious hackers whose sole intentions are to damage target databases (Bentham 11). This portrays the technology’s consideration of the numerous security concerns by the users. As explained, the security of the database is of paramount importance to the users. An effective database should therefore protect such from any form of corruption. The manufacturers of the technology understood the related security concerns thus developed equally effective remedies to safeguard the databases from any associated threats. Outcome 4 While icloud system secures the damage or theft of the databases even in case of the theft of the equipment, the security of the equipment is equally important and always a fundamental consideration to the users of such technologies, as explained earlier, the equipment are costly. This implies that the users require guarantee for the equipment. additionally, besides theft any other form of damage such as immersion of the devices in water, dropping them in hard surfaces accidentally or even burning up in fires during calamities are examples of ways in which the users of such devices risk losing their equipment (Snell 66). The manufacturers of the equipment consider particular features of the devices thus developing strong devices that can withstand some of the common accidents. However, they also caution the users to exercise precaution while using the devices thus preventing unnecessary risks. While destruction through the numerous ways is always minimal, the values of the devices make them prime targets for thieves. The icloud system therefore provides adequate infrastructure that enable the owners of the equipment to track their equipment thus getting them back in cases of theft. As discussed earlier, the devices have unique identities that enable the tracking of the gadgets. Thieves steal the gadgets for resale to other people who in turn use them. The existence of effective tracking technologies makes reusing stolen devices suicidal. Through such tracking technologies, owners track their devices to the end users. Tracking such devices with the police and the network service providers, results in the arrest of the thieves through their customers who purchase the devices (Slivka 87). Final reflection In retrospect, security in the contemporary society is a fundamental feature. This validates the extensive security that people employ in their databases. This validates the rise in the need for panoptic surveillance. The icloud technology system provides people with effective techniques of protecting buildings by providing both the surveillance databases and the surveillance gadgets used. The use of recording equipment such as concealed cameras is the surest way of safeguarding buildings. However, the placement of the recording media is often a challenge since in case of such heinous attacks as terrorism, the recording media is always damaged thus resulting in the loss of valuable data. Icloud technology therefore presents a solution to such challenges thereby making it possible for investigators to obtain evidence even in cases where the perpetrators strive to destroy both the recording equipment and the recording media. By storing the data in the cloud, an ideal virtual database, the technology ensures that the databases are not always damaged even in such cases as terrorist attacks (Allen 43). This validates the claim that the technology system provides effective ways of revamping panoptic surveillance. References Allen, Michael T. The Business of Genocide: the SS, slave labor, and the concentration camps. Chapel Hill, N.C.: University of North Carolina Press, 2002. Print. Bentham, Jeremy. Božovič, Miran, ed. The Panopticon Writings. London: Verso, 1995. Print. Chartier, David. "Apple updates MobileMe, releases Find My iPhone app". Macworld, 2010. Print. Ellmann, Lucy (18 May 2012). "The Panopticon by Jenni Fagan – review". London: The Guardian, 2012. Print. Evans, Robin. The Fabrication of Virtue: English prison architecture, 1750–1840. Cambridge: Cambridge University Press, 1982. Print. Foucault, Michel. Discipline and Punish: The Birth of the Prison. New York: Vintage Books, 1995. Print. Macey, David. Michel Foucault (Critical Lives ed.). Reaktion Books, 2004. Print. Semple, Janet. Benthams Prison: a Study of the Panopticon Penitentiary. Oxford: Clarendon Press, 1993. Print. Slivka, Eric. "iPhone OS 3.0 Launching June 17th - MMS, Tethering in Some Countries". New York: MacRumors, 2010. Print. Snell, Jason. "Apple makes Find My iPhone free for some iOS 4.2 users". New York: Macworld, 2010. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“English portfolio Admission/Application Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/english/1649482-english-portfolio
(English Portfolio Admission/Application Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/english/1649482-english-portfolio.
“English Portfolio Admission/Application Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/english/1649482-english-portfolio.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Importance of iCloud Computing System

Cloud Computing as a Value Driven Technology

This report ''Cloud computing as a Value Driven Technology'' discusses that the cloud computing is considered to be a value driven technology, as it saves cost along with advanced Virtualization of business functions that is globally accessible.... cloud computing vendors.... n a nutshell, cloud computing delivers major advantages along with negative consequences as well.... Likewise, before making any strategy for transferring critical applications to the cloud, it is important to analyze deployment and service models of cloud computing....
14 Pages (3500 words) Report

Cloud Computing

Cloud computing Abstract Technology has integrated deeply in the lives of humans.... Cloud computing services address these issues and provide a source for using computing resources without purchasing them.... The computing resources can be attained dynamically as per the needs of the company.... The computing resources can be released when the need for greater IT infrastructure ceases to exist, therefore the resources do not have to be actually bought....
20 Pages (5000 words) Research Paper

The Ontology-based Software Co-Evolution of Cloud and Mobile Computing

These are the computing resources, the operating system & grid middleware, the cloud middleware and the application layers.... Above this layer is the layer of grid middleware & operating system.... This review ''The Ontology-based Software Co-Evolution of Cloud and Mobile computing'' discusses that in order to develop enterprise level mobile cloud applications, cloud computing has to be made highly adaptable and presents a detailed cloud computing taxonomy which can be utilised in an ontological approach....
6 Pages (1500 words) Literature review

Historical Development of Cloud Computing

This essay "Cloud computing" aims to discuss the main characteristics of cloud computing as a recent phenomenon, trace its historical development, analyze its effectiveness, advantages and concerns.... Cloud computing has been recognized as one of the most progressive and intriguing phenomena in the Information Technology industry.... Cloud computing has a number of distinguishing characteristics.... (2009), the term cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services....
7 Pages (1750 words) Essay

Cloud Computing Services

The cloud computing is a newly emerged and most attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly making use of the Virtualization technologies.... Considering the many advantages of cloud computing, a large number.... In addition, the advancement of cloud computing has also created a wide variety of new opportunities and facilities to existing This paper presents an analysis of cloud computing services and its value propositions in the context of a cloud computing vendor....
10 Pages (2500 words) Research Paper

Importance of Information Systems in Transforming Businesses. Cloud Computing

Cloud computing is a new development in the networking of computers to facilitate communication and resource sharing.... Information systems have been improved and have a major function when it comes to aiding the accessibility and usability of cloud computing.... Information systems play a major role to facilitate cloud computing.... The concept of cloud computing involves data and information not being stored at a static place, according to (Tarrant, 2014)....
10 Pages (2500 words) Essay

The Future of Cloud Computing

These are user interaction interface, system resource management having a service catalog, and resource provisioning module (Krishnani, 2009).... he system resource management module manages a huge network of servers running in the panel.... This coursework "The Future of Cloud computing" describes key aspects and future aspects of cloud computing.... In this context, the author pointed out that cloud computing will become more dominant than the desktop in the near future....
6 Pages (1500 words) Coursework

Invention of iCloud Information Technology

Computer scientists envisioned that all computing devices such as mobile phones, personal computers, home entertainment systems would access information and work together in an integrated system.... In the current modern-day world, computing is no longer confined to the desktop, with the internetworked universe, networked computing has been ubiquitous and affected every aspect of our lives.... Other technologies such as mobile computing and internet technology are becoming pervasive in our life....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us