StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cloud computing - Research Paper Example

Comments (0) Cite this document
Summary
Cloud Computing Name of the Author Name of the University Date Abstract The advent of computers has created new opportunities for businesses as they can offer their products and services on the web. The traditional form of computing proves to be inefficient since its limited scale cannot cater the increasing demands of the customers…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Cloud computing
Read TextPreview

Extract of sample "Cloud computing"

Download file to see previous pages Cloud computing facilitates the dynamic attainment of computing units that can be released when the need ceases to exist. Such services prove to cut IT expenses for organizations and facilitate the business of individuals who do not have huge funds. 1. Introduction Computers have caused revolutionary changes in almost every field of life; education benefits from the concept of e-learning, businesses benefit from the invention of data centers and information management systems. All of these platforms require an effective and elaborate infrastructure to provide their clients with an uninterrupted service. This requires the individual programmers or organizations to heavily invest in the purchase, maintenance and thus administration of their infrastructure. The innovative concept of cloud computing saves such costs and provides an effective approach to manage the computing needs. Cloud computing is a new and evolving domain of the field of computers that has gained much acceptance in a very short span of time. Reference [1] defined cloud computing as a platform as well as a type of an application. This innovative concept offers the dynamic availability of servers, virtual CPUs, networks, software applications etc. There are broadly three types of cloud computing services; Platform as a Service (PaaS): Reference [2] stated that the platforms are used by developers to run applications or develop new ones. It dynamically offers all the components like (operating systems, server hardware) that would be needed for such execution or development. Infrastructure as a Service (IaaS): This service offers the availability of servers, networks, virtual CPUs, storage to fulfill the computing needs of the client. Software as a Service (SaaS): Reference [3]; the traditional use of software required the installation on a system but the innovative techniques of cloud computing do not possess any such prerequisite. The users can attain the operation rights to the software without any prior installation since the software runs on the data centers of the cloud computing service providers. All of these services are providing the levels of convenience and ease that have never been offered before. Reference [4] explained that organizations do not have to spend hefty amounts on the establishment of the infrastructure since all the computing needs are only a few clicks away. Reference [5] stated that the computing power that is acquired, with respect to some need, can be released when the need ceases to exist. The paper discusses the main characteristics of cloud computing that have gained fame for the respective technology. Section 2 discusses the traditional form of computing; alongside its limitations and constraints that make it inefficient to cater the growing needs of the modern times. Section 3 discusses the level of its success and predicted revenues for the future. It also discusses the main characteristics of cloud computing services that have overcome the limitations of the traditional form of computing. Section 4 involves a brief analysis of the merits and demerits of the technology. Section 5 discusses the top vendors in the industry that provide these web services. Section 6 concludes the report with an accumulation of the research findings. 2. Traditional data centers The traditional form of computing involved minimal level of scalability, due to which, investments had to be made to increase the volume ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cloud computing Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1409237-cloud-computing
(Cloud Computing Research Paper Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/family-consumer-science/1409237-cloud-computing.
“Cloud Computing Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/family-consumer-science/1409237-cloud-computing.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cloud computing

Foundations of Business Computing: Project Income Statement of Maxs Grocery Mart

...Max’s Grocery Mart- Projected Income ment (Enter (Enter Number) (Enter (Enter Faculty Declaration: I, ……………( Student Name), certify that this assignment is my own work, based on my personal study and / or research, and that I have acknowledged all material and sources used in the preparation of this assignment whether they be books, articles, reports, lecture notes, and any other kind of document, electronic or personal communication. I also certify that the assignment has not previously been submitted for assessment in any other course or at any other time in this course, unless by negotiation, and that I have not copied in part or whole or otherwise plagiarized the work of other students and / or persons. I have read the CQU... Grocery...
8 Pages(2000 words)Assignment

The Role of Command-Line Interfaces in Modern Computing

...The Role of CLI in Modern Computing Table of Contents Introduction 3 2. History of CLI 3 3. CLI Shells and Scripting 3 3 Shells 3 3.2 Shell Scripts 5 4. Usage of CLI 6 4.1 Usage in Operating Systems 6 4.2 Usage in Search Engines 9 4.3 Usage in networking 9 5. GUI versus CLI 10 Merits of CLI 10 Demerits of CLI 11 Merits of GUI 11 Demerits of GUI 11 Conclusion 12 References 12 [1] Gina Trapani. Geek to Live: The command line comeback. 2007. http://lifehacker.com/226223/geek-to-live--the-command-line-comeback 13 [2] Wikimedia Foundation, Inc. Command-line interface. 13 [3] Wikimedia Foundation, Inc. Command-line interpreter. 13 [4] Wikimedia Foundation, Inc. Shell script. 13 [5] Don Norman. UI Breakthrough-Command Line...
9 Pages(2250 words)Term Paper

Palm Computing Inc

...Palm Computing Inc. Part I- Background 1. The legal name of Palm Inc is Palm Computing Inc. 2. The SIC code of the company is 3575. 3. The company is located at 950 West Maude Avenue Sunnyvale, California 94085. 4. The company is incorporated in California, USA. 5. The fiscal year for the company ends on May 31. Part II- Filings 1. The different kinds of reports filed by the company in the last twelve months are Current Report, Quarterly report, Annual Report. 2. The company filed these reports a number of times with the SEC. The total number of reports is thirty-one. 3. The Current Reports were filed the most number of times during the year. 4. These reports contain information about the financial operations of the company. It is filed...
6 Pages(1500 words)Case Study

Quantitative Methods for Computing

The results of a certain sample can be generalized based on the method of collection and whether the right methodology was followed.
Quantitative data is data that can be counted or which can be expressed numerically. Quantitative data is collected using experiments and is in turn collated, cleaned, entered into a computer, manipulated and analyzed statistically for meaningful results. Quantitative data is normally presented in the form of graphs, charts, and tables since the three forms a bird’s eye view of the data and are easy to comprehend even by non-statisticians. Quantitative data is mostly used since it is specific, can be replicated over-and-over and it is easier to generalize quantitative findings than qualit...
6 Pages(1500 words)Case Study

The Impact of the Ash Cloud Resulting the Eruption of an Icelandic Volcano In 2010

...The Impact of the Ash Cloud Resulting the Eruption of an Icelandic Volcano In 2010 Formation of Ash cloud: Volcanic ash is made of tiny rock particles, which get easily carried through the air. It also has a variety of gases and acids like sulphur di-oxide, carbon di-oxide, hydrochloric acid, ammonia etc. Other elements found in lower concentration include zinc, cadmium and lead. It has been seen that finer ash cloud can travel larger distance and because of larger surface area can carry more water-soluble particles. Also they can stay in the air for longer periods. The eruption in Iceland occurred beneath a glacier and thus melted a large portion of the glacier. The cold caused the lava to cool suddenly and form miniscule particles...
7 Pages(1750 words)Essay

Summaries of the Articles about the Computing Enviroment

... of computing, who offer products like anti-viruses etc. A comprehensive article was published by them in 2010; it provides useful facts about the intensity of the problem in UK and how people lose large amounts of money due to this crime. This article also revealed surprising facts about the identity theft of children, as young as six years old. Mcafee Inc., 2010, What you need to know to avoid identity theft, viewed 12th October 2010, During the research study of the respective topic, an article was found that stated an instance of laptop theft from University of Kentucky, in August this year (Herald, 22 August 2010). The laptop had detailed data about the patients...
7 Pages(1750 words)Term Paper

Legal Advice for Macrobox Computing

... create havoc to the institutions which may lead to financial disaster by interfering with the use or transmission of data and more importantly, introducing or targeting computer servers where data or information are stored (Kapaella, 2003). In instances when attack is attempted or launched against a computer system which caused the breakdown or slowdown of its services, who shall be held liable? It is the task of this paper to examine culpability, if any, of the perpetrators, including the service provider which is parallel to the problem presented by Macrobox, a software supplier, where one of its clients is Staffordshire Pets Inc. (SP) which is engaged in animal testing. In summary, Macrobox alleged that it not only suffered actual...
8 Pages(2000 words)Assignment

Conceptual Analysis of Computing and Information System

...Conceptual Analysis Introduction Conceptual analysis is human cognitive activities that identify concepts behind words. A concept is a mental generalization, image of a given feature and aspects that constitute an item. Conceptualization has limits that determine a proper or improper use of conceptual analysis. Some pictorial messages have universal meaning while others are convened to use in a given society. The Limits of Conceptualization In the last chapter of Sowa’s book Conceptual Structure, Limits of Conceptualization has been discussed. The chapter surveys continuous aspect of the world that is difficult to express adequately in conceptual relations and discrete concepts. Conceptual analysis ishuman cognitive activity... Analysis...
6 Pages(1500 words)Term Paper

The Romanticism of I Wandered Lonely as a Cloud by William Wordsworth

...I Wandered Lonely as a Cloud by William Wordsworth Introduction Romanticism was a literary culture in the 18th century that favored natural, personal and emotional themes in poetry among other forms of literature. The type of poetry favored intuition at the expense of reason. Proponents of the culture vouched for the avid description of feelings often adopting personal relations with the plots. This way, the poets construct the themes systematically by striving to develop emotional appeal. Through the vivid descriptions, the poets enhanced the consumption of the literary works by developing avid mental pictures vital in the consumption of the literary works. The poets present their thoughts through personal, natural and emotional themes...
6 Pages(1500 words)Assignment

Disaster Recovery for System Architecture Using Cloud Computing

... of the plan. The main goal for testing the plan is to determine the feasibility of the process applied to recover. It is also used to simulate the condition of actual business recovery situation. It is also used to test the completeness of the recovery data stored at the alternative location. Another main goal is to train members. ( Pokharel et al 2010) References Olshansky, R. B., Hopkins, L. D., & Johnson, L. A. (2012). Disaster and recovery: Processes compressed in time. Natural Hazards Review. Pokharel, M., Lee, S., & Park, J. S. (2010, July). Disaster recovery for system architecture using cloud computing. In Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium....
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cloud computing for FREE!

Contact Us