StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analysis of Cloud Computing and Virtualisation - Assignment Example

Cite this document
Summary
"Analysis of Cloud Computing and Virtualisation" paper examines non-cloud-based applications, cloud solutions, benefits and risks, cloud storage recommendation. The author states that the information and communication sector has undergone tremendous technological evolution in recent years…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful

Extract of sample "Analysis of Cloud Computing and Virtualisation"

Cloud Computing Name Course Tutor Institution Date 1. Cloud Computing Summary Information and communication sector has undergone tremendous technological evolution in the recent year. New technologies have enabled enhanced applications such as cloud computing to develop. The new technology has proven efficient when used as a communication application within an organization. Cloud computing is one of the developments realized during the digital error where the network is an essential resource. The cloud computing technology allows the reliable on-demand right to use of computing resources such as networks, storage, and application. The computing resources in this definition are a pool shared by many computers. According to Badger et al. [1], five characteristics can be used to explain what cloud computing entail. On-demand, self-service allows a consumer to engage in network provision without physical interaction with the service providers. The second characteristic is the access broad network where networks can only be accessed via a standardized mechanism. The second type allows heterogeneous platforms that are either thick or thin like in mobile phones and laptops. The third characteristic is resource pooling where the service providers are pooled together to provide service to consumers. A multiple tenant model is applicable for the third type with resources strategically allocated depending on the existing demand. Customers may not necessarily need to know the location of the various service providers. The fourth characteristic of cloud computing is rapid elasticity where the provision of services can exhibit rapid elasticity [1]. The changes occur to respond to changes in demand with provisions appearing to be relatively unlimited by responding to quantity when required. The fifth and last characteristic relates to the ability of cloud computing to measure services. Cloud computing provides an automated approach of measuring capabilities like bandwidth and determination of users that are active. 2. Non-cloud based application The presence of cloud computing technologies implies that there are non-cloud computing technologies. Non-cloud computing technologies may not have the internet or a resource pool that is shared among many subscribers (Coyne et al.) [2]. Firms may also have total control over the resource when it comes to control of data. The non-clouded applications include the structured query language application (SQL), Microsoft power point, Microsoft database management system, Microsoft Excel and Microsoft word. These applications are the basic software that an organization like GP clinics can use without relying on the internet for storage and access. The data, in this case, is stored in a computer system and retrieved by authorized personnel. The database management system can help the GP clinics record and store their data in a systematic manner that is easy to retrieve. The application can store both alphanumeric data and tables systematically arranged to ease isolation process. SQL is non-cloud application software that allows GP clinic to store data using a specifically structured language. The structured language used to store the data is also needed when data is to be retrieved. The process of retrieving data stored in the SQL software is often very quick provided the person tasked with retrieving such data is conversant with the language used. Microsoft Excel can be useful to GP clinics when it comes to making of tables especially for data that require a logical relationship. No special retrieval language is required when accessing this type of data from the computer system. Microsoft PowerPoint is an n application that a firm can use in displaying information. Information displayed via PowerPoint is achieved by the use of slides unlike in pages as it in the Microsoft Word application. All these applications make use of the computer processors and memory when it comes to input, storage and retrieval. 3. Cloud solutions Cloud has two important service models known as the delivery model and the second type is deployment and consumption models. The service delivery model can further be broken down to get software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). SaaS include the capabilities that a provider avails to the consumer regarding using a cloud application. The application is often availed at a customer’s disposal upon demand, and multiple users can access the application. Consumers have no role in maintaining and managing the cloud application, as this remains a role of the service provider. PaaS is a framework that provides space for the development of higher services and has layers that allow further development. IaaS relates to the infrastructures used in enabling the cloud technology. The user is responsible for acquiring the hardware and software needed for the cloud. Four types of cloud can be identified that include public cloud, private cloud, community cloud and hybrid cloud (Huth and Cebula) [3]. Public cloud allows any subscriber to access provided there are an internet connection as well as access to the cloud. A private cloud allows specific groups of subscribed users to have access to the cloud. The private cloud has limited access, and only identical firms or groups might have access to such cloud service. A community cloud may involve sharing of cloud service between two firms with resembling cloud requirements. Lastly, the hybrid cloud is a unique type that combines two types of cloud mentioned before. For instance, a hybrid cloud may combine the private, public and community cloud as a process of hybridization. Data protection can be a major issue since cloud computing may contain many data that may be overwhelming for the data controller. Multiple data transfers may magnify the challenge of data management in cloud computing. Insecure and incomplete deletion of data may occur whenever a subscriber requests the cloud provider to delete a cloud resource. Copies may be either present in other files or impossible to isolate from other subscribers’ data. A malicious insider may conduct risky manipulation that may be counted as a risk on the side of subscribers. 4. Benefits and risks One of the major advantages of cloud computing is that the technology promotes self-service provision [2]. The product is easily accessible via the internet, which makes it convenient and reliable as long as the subscriber is connected to the internet. Cloud computing technology has the capacity of availing resources from a specific pool that a subscriber may not necessarily have to know. Another advantage of the cloud computing technology is the degree of elasticity whenever subscribers need a change. The technology enables monitoring of resource through a dashboard. Cloud computing technology also enhances the metering system. Cloud provides important information related services such as storage, database services, email services and storage. Several risks can be realized when an organization uses cloud computing technology. For instance, as a subscriber, as GP Clinics decide to use cloud infrastructure, the control is also transferred to cloud controller. Such changes in control and management may occur in the long run cause an alarm of concern to the firms. Subscribers may find it challenging to shift from one cloud provider to another due to the limited portability of tools, procedures, data and service interfaces. The situation forces a firm only to depend on a specific service provider. Another risk is the risk of isolation failure that may involve failure of mechanisms such as storage and routing. It may be hard to separate the two mentioned aspect of two different subscribers thus resulting in system failure known as guest-hopping attacks. GP clinics also risk engaging in compliance challenges such as attaining certification. The risk may be serious in situations where the cloud provider is unable to produce compliance proof. It may also be serious if a cloud provider denies the cloud customer an opportunity to carry out an audit. In a situation where GP clinics opt to use public clouds, it would be hard to attain a certification under such services. A firm risks compromising its management interface while using cloud computing. Management compromise may arise because of the cloud provider to fail in controlling access to huge information sets. Despite the disadvantages, it is advisable for GP clinic to consider the advantages and adopt cloud computing. The technology is fast when the internet is present, and cloud service provider can store large volumes of data. In addition, the risks may affect more the firms that intend to hide a secret behind particular success or task, which does not apply to GP clinic 5. Cloud storage recommendation It is recommended for the GP clinics to seek assurance that the adequate security measures are in place to mitigate risks on both customers’ and providers’ end (ENISA) [4]. Such risks may include the DDoS attacks. The company can follow some steps to ensure that they do not adopt a cloud computing technology that would generate risks. GP Clinics have to assess the risk of adopting the cloud services to their system and weigh the magnitude of the risks and impacts (Federal Bureau of Investigation) [5]. Then, the company has to study the list of cloud providers and the offers they present on the table. The company should then move ahead and request for assurance from the cloud providers over important issues such as security of users. It is also important for the GP Clinics to cut down the assurance burden bestowed on the cloud providers. Works Cited L. Badger et al. "Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology." 2012. National Institute of Standard and Technology. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-146.pdf. 20 April 2016. L. Coyne et al. "IBM Private, Public, and Hybrid Cloud Storage Solutions." 2016. International Technical Support Organization. http://www.redbooks.ibm.com/redpapers/pdfs/redp4873.pdf. 20 April 2016. ENISA. "Cloud Computing: Benefits, risks and recommendations for information security." 2009. European Network and Information Security Agency. https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment/at_download/fullReport . 20 April 2016. Federal Bureau of Investigation. "Recommendations for Implementation of Cloud Computing Solutions." 2012. Technical Report. https://www.fbi.gov/about-us/cjis/CJIS%20Cloud%20Computing%20Report_20121214.pdf. 20 April 2016. A. Huth and C. James. "The Basic of Cloud Computing." 2011. US-CERT. https://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf. 20 April 2016. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analysis of Cloud Computing and Virtualisation Assignment, n.d.)
Analysis of Cloud Computing and Virtualisation Assignment. https://studentshare.org/information-technology/2054765-sit113-cloud-computing-and-virtualisation-2016
(Analysis of Cloud Computing and Virtualisation Assignment)
Analysis of Cloud Computing and Virtualisation Assignment. https://studentshare.org/information-technology/2054765-sit113-cloud-computing-and-virtualisation-2016.
“Analysis of Cloud Computing and Virtualisation Assignment”. https://studentshare.org/information-technology/2054765-sit113-cloud-computing-and-virtualisation-2016.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analysis of Cloud Computing and Virtualisation

The Security of an Organizations Information System

The potential for data loss is evaluated using business impact analysis.... BCP Plan / Case Study Introduction The security of an organization's information system or network system is critical and hence need to be addressed with a lot of concerns to ensure business continuity.... Having an effective IT disaster recovery plan is crucial to any organization....
4 Pages (1000 words) Essay

Pursuing a PhD Degree in the Information Technology Field

the reporter underlines that a PhD in information technology will allow me to educate at an advanced level.... nbsp; This will allow me the opportunity to be a mentor and have an influence on the lives of others in a most positive way.... hellip; As a teacher and mentor, I will be able to enrich not only my life but the lives of others....
5 Pages (1250 words) Essay

Green Computing Research Project Part 2

The aim of the project is to conduct a research on the green computing so that it can be implemented in the system of We are Big, Inc.... hellip; A comprehensive research report on the green computing will be developed including cost-benefit analysis and recommendations on which technologies will be better to implement along with project request forms.... The project will include the meetings and discussions with all the stakeholders to identify their needs for implementation areas of green technologies Case Study 2: Green computing Research Project – Part 2 The Requirements Traceability Matrix Project Green computing Research ProjectProject Manager: Req....
2 Pages (500 words) Assignment

Global Perspectives on Innovation and Creativity

hellip; This paper illustrates that EMC bids information security, data storage, analytics, virtualization, cloud computing and other services and products that enable businesses to store, manage, protect as well as analyze data.... Through its transformation in cloud computing, EMC has achieved tremendous success in the way it handles information in its IT departments in a simple, secure and the most effective cost-efficient way.... is an American software company that provides virtualization and cloud software and services and in fact, it was the first that fruitfully virtualized x86 architecture....
8 Pages (2000 words) Essay

White Paper on Cloud Storage

Cloud storage and cloud computing refer to the act of saving As opposed to storing information to the hard drive of a personal computer, or some other localised device, it is stored in a remote database, with the internet acting as the link/ connection between the said database and the computer/ device.... Since the inception, the information storage services used by the firm have evolved from local computer hard drives to outsourced services, and these have adequately covered the requirements of the… Recently though, the company has realized the need to enlarge and expand its operations, and this only means that more space shall be required for data storage, a factor that introduces the aspect of cloud storage....
5 Pages (1250 words) Essay

Cloud Service Analysis

The advantage of cloud computing is that,… It, however, does not encompass elements such as information stored on a local drive in the business premise or a local business network.... As far as the definition of cloud computing may be right, they may leave out important aspects that characterize cloud computing (Armbrust et al.... Despite the varying interpretation of cloud computing, they all have the following basic components (Friedman 45-50); Cloud computing is always off-premise....
4 Pages (1000 words) Assignment

Editing scientific report

To… These scans are then registered through alignment into a coordinate system by comparing cloud appears, objects or geometric features between different scans using the functionality of cloud constraints or The paper “Data Manipulation: Light Detection and Ranging” is an excellent example of an essay on information technology.... These scans are then registered through alignment into a coordinate system by comparing cloud appears, objects or geometric features between different scans using the functionality of cloud constraints or targets....
2 Pages (500 words) Essay

The Technical Advantages and Disadvantages of Using a Hypervisor in an Enterprise

The paper "The Technical Advantages and Disadvantages of Using a Hypervisor in an Enterprise" learn the effectiveness of hypervisors from Microsoft (Hyper-V), VMware (ESXi), and Hitachi's (Vintage), the effect of hypervisors on the Total Cost of Ownership in an enterprise, etc.... hellip; The uses of hypervisors can save lots of hardware resources, but in order to find a reliable hypervisor, an organization must have skilled persons, who can decide for the choice....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us