Verified Document

Public Personal Clouds Essay

Public, Personal Clouds Amazon Web Services is an anthology of remote computing services, which make up a cloud-computing platform provided by Amazon. Nevertheless, Amazon is a renowned company in the Web business, but other companies such as Apple have a big market share. Some of the services offered by Amazon include Amazon EC2, and Amazon S3, the latter is a storage service where people can store their things, such as documents photos, or music (Amazon, 2013). The is the popular Amazon Cloud Drive, which the company established as a business strategy to raise its market share in an attempt to bridge the competitive gap from Apple.

The drive is external, and works in a similar manner as the common computer hard disk because its main purpose is storage; however, it is online-based. Most importantly, one can access the Cloud Drive from any browser, and the company offers its consumers a limited space an amount ranging from 5 to 10 GB. This amount of space is free; however, if a consumer finds the space as not enough, the company can provide additional space, at a fee of $1 annually. On the other hand, other giant Web-based companies including the popular Apple and Microsoft provide the same storage service, but a little bit differently when compared to Amazon.

Notably, Amazon started this service as a business strategy, but the other firms copied to bridge the competitive gap. In the case of Apple, the storage service known as iCloud is inbuilt on products manufactured by the company. Apple's storage service is unlimited and entirely free. In comparison to Amazon, Apple does not charge anything for the service. The objective was to increase its competitive advantage by encouraging consumers to purchase Apple's variety of products (Apple, 2013). Microsoft, the dominant manufacturer of Microsoft Office, and Windows Operating System, offers a personal cloud service for its consumers. The storage is up to 25 GB, which is free similarly to iCloud.

Question 2

Although the Web-based organizations suggest that they have in place security in the cloud, by utilizing third parties, people still have concerns, especially because of their personal documents, pictures and other relevant information. Nevertheless, there is lack of a common model to cloud computing security, which further raises the privacy and security concerns. The companies implement their own proprietary standards and security technologies, hence using different security approaches, which require evaluation (San, 2010). In addition, the personal information calls for organizations to meet security policies by gathering provider risk evaluations, due diligence, and assurance activities as an attempt to meet ensure their cloud security is in place.

The risk of insiders accessing consumer's private information is very high, meaning that after all, the information is not confidential. This gain of entry makes it vulnerable and people may end up losing, or finding their information corrupted. This is rather inconvenient, and calls for more in this field. The threat from external attackers poses high risk, especially because it is possible to manipulate and access private information through the internet. In addition, people with wrong intentions can access cloud providers with large data stores holding private credit card details, sensitive government, or intellectual property (San, 2010).

In my opinion, the cloud is appropriate when storing music, pictures, homework, or informal communication. However, when it comes to personal data such as credit card details, formal communication, business information, government sensitive data, and other personal information, the concern is very high. The fact that the providers know where the personal data is whereas the users do not have a hint, the security issue is of major concern. When providers store personal information through cloud computing, it is impossible for a consumer to know who compromised their information (Dill, 2013). In simple terms, I do not feel that the storage via cloud computing is safe, especially in the case of personal information.

Question 3

There have been concerns, especially because of the storage via cloud computing, and people are wondering whether computers will require storage space. Actually, it is hard for a computer to work without storage...

In addition, people are becoming skeptical in relation to the security in place for storage via cloud computing. While it is okay to store pictures and music using the cloud approach, it is not safe for personal information. Therefore, a good percentage of people will find it okay for computers to constitute of their storage spaces (Goodenough, 2013).
Moreover, in cloud computing, in order to access the stored data or information, one will require a working internet connection. Owing to this, it is entirely impossible for every person to have or access the internet, especially when the information they require is urgent. This only shows the importance of a computer's traditional storage. Notably, this is a positive move in the computer technology, but curiosity of the human nature is capable of continuous progress. This means that advancement will remain an active process, which no one can control (San, 2010). In addition, cloud computing will not be the last outrageous innovations, with the trend in technological progress; it is possible that much awaits the world.

It is possible that storage via cloud computing has brought competition in the computer industry, but owing to some speculations in relation to the security of personal information. In this context, some of the computer manufacturers such as HP, IBM, iPad, Apple, Compaq, and the rest have found it a challenge. Nevertheless, the most hit in this line of business, are the manufacturers of hard disks. Companies such Toshiba, Phillips, Seiko Epson, Sony and Siemens who are among the major hard disk manufacturers, admit that cloud computing has offered them substantial competition, especially in the sense that one can access their information any time, and any place at their convenient times.

Question 4

Data backup is very important, especially when using the cloud computing approach. It applies in the same case as traditional backup offered in personal computers. In addition, it is important to backup important personal information (Dill, 2013). Risks in this approach are many and when they happen, they can amount to adverse effects. Personally, I would not disregard my personal computer, in relation to storage. However, I would still use cloud computing storage, but not entirely. My computer's hard disk would have all the contents stored on the cloud. I would use this one strategy to backup my important information.

Nevertheless, I recognize that a hard disk can be defective; therefore, my flash drive would be another backup device. People perceive backup as a tedious process and overlook it without considering the positive side of this practice. However, the process in easy, and owing to the amount of data to backup, it may take several minutes or hours. Nevertheless, it is an important strategy in relation to relevant information. The frequency at which I backup my information depends on the degree of importance attached to the information. For instance, I always backup business files, including proposals, and important business ventures.

Notably, backing up of data using the cloud computing approach is important. Computers may become defective, or someone might misplace, but most importantly, the most dominant way to lose important information is after a hard drive crash. The experience of trying to recover relevant information is frustrating, especially when it is apparent that the process is not always a success. Therefore, regular backups will help to protect such misfortunes; however, it is important to use flash drives and other external storage devices. Nevertheless, using the two approaches is safer, than depending on one approach (Dill, 2013).

Question 5

A Service Legal Agreement is an official document, which outlines a service assurance provided by an IT source to one or more consumers. According to prior studies, the SLA's mission statement is to plan, coordinate, negotiate, report, and manage the quality of the IT services at an acceptable cost. Nevertheless, the studies suggest that SLAs should include an advancement aspect that a consumer should manage through a Continual Service Improvement Program (Luis Diaz, 2013). Most importantly, SLAs are central to the legal contracts that set the framework for IT service and permit more operational flexibility between the provider and the consumer.

This makes it possible to update the SLAs or change them to suit the conditions of a business. The IT service providers, Amazon (Amazon, 2013), Apple (Apple, 2013) and Microsoft, in this case study all have an SLA. Most importantly, the giant companies recognize that SLAs will help their organizations to deliver what they have promised their consumers. Most importantly, consumers want to have associations with organizations that provide legitimate services. Nevertheless, SLAs serve as basis for developing a shared understanding concerning the service relationship. Moreover, SLAs have proved to provide a win-win situation for both the provider and the consumer.

Some of the information found on the SLAs includes consent for location-based services, backup, and storage updates. The consumer is required to provide their consent, which the given provider needs in order to offer such services. However, a consumer can…

Sources used in this document:
References

Amazon. (2013). Service legal agreement EC2. Amazon Web Services. Retrieved 22 December

2013 from http://aws.amazon.com/ec2-sla/

Amazon. (2013). About AWS. Amazon Web Services. Retrieved 23 December 2013 from http://aws.amazon.com/about-aws/

Apple. (2013). iCloud terms and conditions. Apple. Retrieved 22 December 2013 from https://www.apple.com/legal/internet-services/iCloud/en/terms.html
Apple. (2013). iCloud: Managing your iCloud storage. Apple. Retrieved 22 December 2013 from http://support.apple.com/kb/ht4847
Dill, E. (2013). Disaster recovery in the cloud. Royal Gazette. Retrieved 23 December 2013 from http://www.royalgazette.com/article/20131009/Business07/131009706
Retrieved 23 December 2013 from http://www.forbes.com/sites/centurylink/2013/04/09/does-cloud-computing-mean-the-end-of-traditional-storage-networks/
December 2013 from http://www.wired.com/insights/2011/12/service-level-agreements-in-the-cloud-who-cares /
San, J. (2010). Security and privacy issues in cloud computing. Retrieved from http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf
Educasereview. Retrieved from http://www.educause.edu/ero/article/if-its-cloud-get-it-paper-cloud-computing-contract-issues
Cite this Document:
Copy Bibliography Citation

Related Documents

Personal and Professional Change Over
Words: 4318 Length: 15 Document Type: Reaction Paper

These authors add that with respect to this exemplary leadership quality, "Although a significant difference existed by gender, both men and women rated challenging the process as their least developed leadership skill" (p. 259). This also means that people must be willing to take personal and professional risks, including speaking up for what they believe in the workplace, but the cost-benefit analyses that are routinely used by winners can

Colonialism in Higher Education Indigenous
Words: 1562 Length: 5 Document Type: Essay

Public Intellectual Essay The introduction of critical race theory and other anti-colonial approaches to academic discourse has obscured the fact that higher education itself remains embedded in colonial institutions and structures. Higher education is a vestige of colonial means of psychological and social control. The political implications of colonialism in higher education include the perpetuation of hegemony, the suppression and subordination of alternative epistemologies, the ongoing political dominion over what constitutes

Socrates Both Comedy and Tragedy Are Related
Words: 1171 Length: 4 Document Type: Term Paper

Socrates Both comedy and tragedy are "related to emotional needs and religious longings that became crystallized and structured in ritualistic celebrations and festivals," (34). Both can be framed as "catalysts" that force "some sort of conversion" in the individual (34). Moreover, both comedy and tragedy reflect the "eternal spectacle of human nature and its weaknesses," (35). Both art forms use imitation or mimicry of a political figure or idea. However, there are

Air Pollution, Climate Change, Ozone Depletion Should
Words: 1241 Length: 4 Document Type: Essay

Air Pollution, Climate Change, Ozone Depletion Should 3 papers. First 2 due 27 Mar 2012. Last 1 due 3 April 2012. This essay set parts: Prewriting Research, Rough Draft Workshop, Final Draft Presentation. Air pollution is presently one of the most divisive issues, considering that it continues to occur in spite of the fact that numerous environmental scientists have tried to raise public awareness concerning the concept. Smog clouds are

Emergency Management at the Pentagon
Words: 5386 Length: 16 Document Type: Essay

The Federal Emergency Management Agency institutionalized Emergency Management in 1979 (Lindsay, 2012). Since then, various local and state organizations have included emergency management in their practices. It shifted from specialized preparedness to narrowly defined or single categories of hazard to an all-hazard approach including potential threats to property and life through technological and environmental dangers and local and foreign risks. The whole idea of emergency management does not include a

Ancient Comedy Fragments
Words: 4211 Length: 12 Document Type: Research Paper

Aristophanes Acharnians, Knights, and Clouds are three of the most revered works by Aristophanes. These works are of particular interest to this discourse because they have clear political and social nuances which affected the manner in which they were received in Ancient Athens. The discussion posits that Aristophanes had concrete political concerns and he utilized his craft as a dramatist to expose these matters with the purpose of affecting change in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now