Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Cloud Computing - Essay Example

Comments (1) Cite this document
Cloud computing is an interaction between a computer user and a cloud computing service provider that ensure that the user of the computer can “safely and securely, manage an entire office, or organization, from any computer or laptop anywhere” …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Cloud Computing
Read TextPreview

Extract of sample "Cloud Computing"

Dear normally, I would make my s read through a draft of the work I prepare for them before uploading the final file but you can bare me out that your time was very limited. However, I have written the assignment exactly according to your specifications. You are however free to contact me through the message board if you have any concerns about the assignment and I shall respond to you accordingly. Thank you – Isaac. # 72032 What is Cloud Computing? Cloud computing is an interaction between a computer user and a cloud computing service provider that ensure that the user of the computer can “safely and securely, manage an entire office, or organization, from any computer or laptop anywhere” (Hoffman, 2011). This should of course an easy version of the real meaning of cloud computing because the phenomenon entails so much. The real technicality behind cloud computing is “practically a virtual desktop operating in conjunction with a virtual server anyway” (IBM, 2010). With the server, tasks are assigned to a combination of software and services over a network. This network of servers is the cloud (Canonical, 2009). Methodology for Adopting Cloud Computing Switching to cloud computing comes with a lot of responsibilities. These responsibilities are embedded in the methodology for adopting cloud computing. The methodological procedure for adopting cloud computing for a global company would come in three major sections. First, is to identify the type of cloud computing system that would best suit the company. This decision is informed by what the company does and what it wants to achieve. Basically, there are three major areas or types of the system to choose from. These Software as a Service (SaaS), utility computing and web services computing. The decision to which type of cloud computing if not well taken would result in a situation whereby the company would not get value for money because it would be giving its customers something they do not need. So what goes into choosing a cloud computing type? Just know what each type represents and relate it to what you do then you can best make an informed choice. Software as a service (SaaS) “means delivering business applications, including collaboration software and line-of-business applications, to companies that require them to run their business” (Parallels, 2011). It is the commonest type of cloud computing used because it meets the needs of many companies it presents customers the opportunity to assess useful software that they would not have installed on their computers directly. Utility Computing is “a business model for computing in which resources (CPU power, storage space, etc.) are made available to the user on an as-needed basis” (Oracle, 2010). Utility computing ensures minimized user cost because it eventually maximizes the prudent use of computing resources in that users choose only the resource they need. With web service computing, there are “modular applications that perform a specific business task and conform to a particular technical format. The technical format ensures each of these self-contained business services is an application that will easily integrate with other services to create a complete business process” (Zhang, 2002). After identifying the best choice of cloud computing to adapt, the company would then seek the services of a specialist service provider to set up the cloud computing for the company. These are experts who would channel all necessary software applications from a common server unto the virtual desktop of the user or in this case, the customer. There are many of these experts in town including canonical, Infosys, IBM and many others. What these serve providers would do involve three major phases. The first of these phases is networking, whereby it connects the company to its existing network of users spanning through a wide area of intranet. Next, the provider would do installation. At this phase, most serve providers like when a company chooses to use the Eucalyptus open cloud platform would “manually download the packages required and host it on a local Apache server and make the installation point to our server instead of the internet” (Infosys, 2011). Finally, it would do a configuration. The configuration involves technical processes of adding nodes and giving the company’s system the authority to belong to the service provider’s existing blogs. The best thing to do after a set up is not just to allow the service provider to go to his office and call him whenever a little technical challenge arises. It is prudent to engage the service provider to train personnel within the company to understand and even become experts in managing the cloud computing system. This action, though may be costly at the initial stage would save the company a lot of money in the nearest future. This is because the company shall have its own experts, whom the company would not have to pay every time they attend to a fault because they will be on regularly salary. As part of the duty of the personal to be trained, they must take an oversight responsibility of ensuring the functioning of the cloud computing system. They must monitor the system closely to be sure that the company is having the best out of it. Taking the bold step to switch to cloud computing is guaranteed way to improve the services of any global company and to ensure that the net worth of the company increases eventually. This is reflected in statement by IBM Cloud Computing saying “The cloud equation adds in the flexibility to scale bandwidth up or down at will and the affordability of pay-as-you-go service, and subtracts energy-devouring hardware from your local environment” (IBM, 2010). Kumar (2011), also argues that with cloud computing, consumers pay only for the resources they use. REFERENCE LIST Cononical, 2009 Cloud Computing, accessed on 13th February, 2011 from Hoffman M. 2011, What's Cloud Computing and What Does it Have to Do With Me? Accesed on 13th February, 2011 from IBM, 2010 Cloud Computing Overview, accessed on 13th February, 2011 from Infosys, 2011, Hands On: Building a Private Cloud using Open Source Solutions Part 1: Setting up Cloud Infrastructure using Eucalyptus Open Cloud Platform. Accessed on 14th February, 2011 from Kumar A. 2011, What are the Advantages of Cloud Computing? Accessed on 13th February, 2011 from Oracle, 2010. Sun Utility Computing accessed on 14th February from Parallels, 2011. SaaS Definition, Ecosystem and Business Model accessed on 14th February, 2011 from Zhang L.J. 2002, A Special Session at The 3rd International Conference on Internet Computing (IC 2002). Accessed on 14th February, 2011 from Read More
Cite this document
  • APA
  • MLA
(“Cloud Computing Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(Cloud Computing Essay Example | Topics and Well Written Essays - 500 Words)
“Cloud Computing Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
ed48 added comment 1 year ago
Student rated this paper as
Helpful paper! Used it to finish an assignment for a other course. It was easy as ABC, for the first time in my life.


Foundations of Business Computing: Project Income Statement of Maxs Grocery Mart

...Max’s Grocery Mart- Projected Income ment (Enter (Enter Number) (Enter (Enter Faculty Declaration: I, ……………( Student Name), certify that this assignment is my own work, based on my personal study and / or research, and that I have acknowledged all material and sources used in the preparation of this assignment whether they be books, articles, reports, lecture notes, and any other kind of document, electronic or personal communication. I also certify that the assignment has not previously been submitted for assessment in any other course or at any other time in this course, unless by negotiation, and that I have not copied in part or whole or otherwise plagiarized the work of other students and / or persons. I have read the CQU... Grocery...
8 Pages(2000 words)Assignment

The Role of Command-Line Interfaces in Modern Computing

...The Role of CLI in Modern Computing Table of Contents Introduction 3 2. History of CLI 3 3. CLI Shells and Scripting 3 3 Shells 3 3.2 Shell Scripts 5 4. Usage of CLI 6 4.1 Usage in Operating Systems 6 4.2 Usage in Search Engines 9 4.3 Usage in networking 9 5. GUI versus CLI 10 Merits of CLI 10 Demerits of CLI 11 Merits of GUI 11 Demerits of GUI 11 Conclusion 12 References 12 [1] Gina Trapani. Geek to Live: The command line comeback. 2007. 13 [2] Wikimedia Foundation, Inc. Command-line interface. 13 [3] Wikimedia Foundation, Inc. Command-line interpreter. 13 [4] Wikimedia Foundation, Inc. Shell script. 13 [5] Don Norman. UI Breakthrough-Command Line...
9 Pages(2250 words)Term Paper

Palm Computing Inc

...Palm Computing Inc. Part I- Background 1. The legal name of Palm Inc is Palm Computing Inc. 2. The SIC code of the company is 3575. 3. The company is located at 950 West Maude Avenue Sunnyvale, California 94085. 4. The company is incorporated in California, USA. 5. The fiscal year for the company ends on May 31. Part II- Filings 1. The different kinds of reports filed by the company in the last twelve months are Current Report, Quarterly report, Annual Report. 2. The company filed these reports a number of times with the SEC. The total number of reports is thirty-one. 3. The Current Reports were filed the most number of times during the year. 4. These reports contain information about the financial operations of the company. It is filed...
6 Pages(1500 words)Case Study

Quantitative Methods for Computing

The results of a certain sample can be generalized based on the method of collection and whether the right methodology was followed.
Quantitative data is data that can be counted or which can be expressed numerically. Quantitative data is collected using experiments and is in turn collated, cleaned, entered into a computer, manipulated and analyzed statistically for meaningful results. Quantitative data is normally presented in the form of graphs, charts, and tables since the three forms a bird’s eye view of the data and are easy to comprehend even by non-statisticians. Quantitative data is mostly used since it is specific, can be replicated over-and-over and it is easier to generalize quantitative findings than qualit...
6 Pages(1500 words)Case Study

The Impact of the Ash Cloud Resulting the Eruption of an Icelandic Volcano In 2010

...The Impact of the Ash Cloud Resulting the Eruption of an Icelandic Volcano In 2010 Formation of Ash cloud: Volcanic ash is made of tiny rock particles, which get easily carried through the air. It also has a variety of gases and acids like sulphur di-oxide, carbon di-oxide, hydrochloric acid, ammonia etc. Other elements found in lower concentration include zinc, cadmium and lead. It has been seen that finer ash cloud can travel larger distance and because of larger surface area can carry more water-soluble particles. Also they can stay in the air for longer periods. The eruption in Iceland occurred beneath a glacier and thus melted a large portion of the glacier. The cold caused the lava to cool suddenly and form miniscule particles...
7 Pages(1750 words)Essay

Summaries of the Articles about the Computing Enviroment

... of computing, who offer products like anti-viruses etc. A comprehensive article was published by them in 2010; it provides useful facts about the intensity of the problem in UK and how people lose large amounts of money due to this crime. This article also revealed surprising facts about the identity theft of children, as young as six years old. Mcafee Inc., 2010, What you need to know to avoid identity theft, viewed 12th October 2010, During the research study of the respective topic, an article was found that stated an instance of laptop theft from University of Kentucky, in August this year (Herald, 22 August 2010). The laptop had detailed data about the patients...
7 Pages(1750 words)Term Paper

Legal Advice for Macrobox Computing

... create havoc to the institutions which may lead to financial disaster by interfering with the use or transmission of data and more importantly, introducing or targeting computer servers where data or information are stored (Kapaella, 2003). In instances when attack is attempted or launched against a computer system which caused the breakdown or slowdown of its services, who shall be held liable? It is the task of this paper to examine culpability, if any, of the perpetrators, including the service provider which is parallel to the problem presented by Macrobox, a software supplier, where one of its clients is Staffordshire Pets Inc. (SP) which is engaged in animal testing. In summary, Macrobox alleged that it not only suffered actual...
8 Pages(2000 words)Assignment

Conceptual Analysis of Computing and Information System

...Conceptual Analysis Introduction Conceptual analysis is human cognitive activities that identify concepts behind words. A concept is a mental generalization, image of a given feature and aspects that constitute an item. Conceptualization has limits that determine a proper or improper use of conceptual analysis. Some pictorial messages have universal meaning while others are convened to use in a given society. The Limits of Conceptualization In the last chapter of Sowa’s book Conceptual Structure, Limits of Conceptualization has been discussed. The chapter surveys continuous aspect of the world that is difficult to express adequately in conceptual relations and discrete concepts. Conceptual analysis ishuman cognitive activity... Analysis...
6 Pages(1500 words)Term Paper

The Romanticism of I Wandered Lonely as a Cloud by William Wordsworth

...I Wandered Lonely as a Cloud by William Wordsworth Introduction Romanticism was a literary culture in the 18th century that favored natural, personal and emotional themes in poetry among other forms of literature. The type of poetry favored intuition at the expense of reason. Proponents of the culture vouched for the avid description of feelings often adopting personal relations with the plots. This way, the poets construct the themes systematically by striving to develop emotional appeal. Through the vivid descriptions, the poets enhanced the consumption of the literary works by developing avid mental pictures vital in the consumption of the literary works. The poets present their thoughts through personal, natural and emotional themes...
6 Pages(1500 words)Assignment

Disaster Recovery for System Architecture Using Cloud Computing

... of the plan. The main goal for testing the plan is to determine the feasibility of the process applied to recover. It is also used to simulate the condition of actual business recovery situation. It is also used to test the completeness of the recovery data stored at the alternative location. Another main goal is to train members. ( Pokharel et al 2010) References Olshansky, R. B., Hopkins, L. D., & Johnson, L. A. (2012). Disaster and recovery: Processes compressed in time. Natural Hazards Review. Pokharel, M., Lee, S., & Park, J. S. (2010, July). Disaster recovery for system architecture using cloud computing. In Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium....
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cloud Computing for FREE!

Contact Us