Cloud Computing And Technology Essay

PAGES
2
WORDS
619
Cite

Cloud Computing Governance There are many issues and implications that must be taken seriously when it comes to cloud computing. While the possibilities and capabilities that are newly or more significantly realized by cloud computing are fascinating and voluminous, so too are the security risks and ethical quandaries that can and do come up when it comes to the subject. With that in mind, this report shall cover two main topics that are related to cloud computing. The first is how cloud computing is and should be influenced by corporate governance and the broad impact of cloud computing on mobile computing will be assessed as well. While there are immeasurable benefits and perks to moving to a cloud-based solution, there are security, logistical and ethical concerns that must be address.

Analysis

When it comes to corporate governance, the main thing to keep in mind is that the laws and regulations that must be complied with become much more complicated and numerous when one is operating in a cloud-based environment. One could compare the days of Europe before the European Union and the way it is now, the recent Brexit vote notwithstanding. Indeed, there was a day where one could...

...

This was because each border would check the people and tickets held by the same. Indeed, people were not guaranteed to get to their destination. The cloud computing paradigm of today exists in much the same way and is subject to much the same limitations. To use a cloud computing example, there may be certain countries that a company does not have permission or rights to operate within. As such, that company would need to make sure that the service is not functional from that location whether or not the country in question actively blocks them. This can be done through geo-tagging people's locations and other measures (Speed, 2016).
As for the bridge and linkage between cloud computing and mobile devices, this is something that is intriguing as well. First off, one has to differentiate between the two as they are not the same thing, technically. Conventionally, cloud computing is a technology or service that is transmitted through a distributed network and it is usually maintained by a specific vendor or company. On the other hand, mobile computing would be things like smartphones and tablets and…

Sources Used in Documents:

References

Speed, R. (2016). IT Governance and the Cloud: Principles and Practice for Governing Adoption of Cloud Computing. Isaca.org. Retrieved 15 August 2016, from http://www.isaca.org/Journal/archives/2011/Volume-5/Pages/IT-Governance-and-the-Cloud-Principles-and-Practice-for-Governing-Adoption-of-Cloud-Computing.aspx

Technopedia. (2016). What is the difference between cloud computing and mobile computing?. Techopedia.com. Retrieved 15 August 2016, from https://www.techopedia.com/7/29697/technology-trends/what-is-the-difference-between-cloud-computing-and-mobile-computing


Cite this Document:

"Cloud Computing And Technology" (2016, August 14) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/cloud-computing-and-technology-2161832

"Cloud Computing And Technology" 14 August 2016. Web.27 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-and-technology-2161832>

"Cloud Computing And Technology", 14 August 2016, Accessed.27 April. 2024,
https://www.paperdue.com/essay/cloud-computing-and-technology-2161832

Related Documents

Abstract Cloud computing technologies have emerged in the recent past as a new model/paradigm for hosting and delivering computing resources and services through the Internet. This paper discusses cloud computing technologies as a mechanism for improving business operations through offering computing resources/services via the Internet. This discussion includes an overview of cloud computing technologies, its benefits, and recent trends. This is followed by a discussion of speculations regarding the future of

organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data Data Identity: The individual is at the core of any database, so gaining an insight into how a person

Cloud Computing as an Enterprise Application Service Reordering the economics of software, cloud computing is alleviating many of the capital expenses (CAPEX), inflexibility of previous-generation software platforms, and inability of on-premise applications to be customized on an ongoing basis to evolving customer needs. These are the three top factors of many that are driving the adoption of cloud computing technologies in enterprises today. Implicit in the entire series of critical success

Cloud Computing Today's and tomorrow's technologies and their impact on society has been brought by the development of a new technology which is referred as cloud computing. Cloud computing are techniques and common technologies that are used in Information Technology. It means data which are hosted in a given area (center) then it is dismissed without knowing the design of hosting known as utility computing which tends to permits near real

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

There is a difference in the approach to this challenge considering the two platforms, and the fact that they may be based on different configurations. Therefore, it is essential that proper techniques are instituted counter this. Evidently, insider threats are a menace in the cloud computing environment, just as is the case in a normal organizational set up. Most of the threats posed by such individuals are detrimental to the