Premium Essay

Clound Computing

In: Computers and Technology

Submitted By vbmnair
Words 3819
Pages 16
EBM510 - Information Processing and the Web Cloud Computing Research Paper

Mahesh BahuleyanNair 000-14-6974

This research paper is to recommend or suggest cloud computing as an alternative to the obsolete and highly expensive traditional computing mechanisms. Cloud computing is a new general purpose Internet-based technology through which information is stored in servers and provided as a service and on-demand to clients. Cloud computing services including Infrastructure as a Service promise potential cost savings for businesses by offering remote, scalable computing resources. However attractive these services are, they pose significant security risks to customer applications and data beyond what is expected using traditional on-premises architecture. This paper identifies three basic types of threats related to the IaaS layer and eight kinds of attacks. These are aligned within the CIA model as a way to determine security risk. Cloud computing is a generalized term for anything that involves delivering hosted services over the Internet. These services are broadly divided into threesome categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The study darken computing was inspired by the darken symbol that's often utilized to equal the Internet in flowcharts and diagrams. A darken assist has threesome crisp characteristics that evolve it from tralatitious hosting. It is sold on demand, typically by the time or the hour; it is elastic -- a user can have as such or as little of a assist as they poverty at some presented time; and the assist is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Significant innovations in virtualization and...

Similar Documents

Premium Essay

Reaction Paper

...The topic of the video which is about the history of computer was kind of interesting since it high lightened our mind about where the computer had really came from. Not only have that, it also made us understand how the computers of today became very wonderful and powerful. Before, computers only existed in the imagination of humans and were believed that creating such monstrous device was impossible. It was a huge leap in the field of computer during the 19th century when Charles Babbage developed the 1st modern computer called the difference machine. The most advantageous feature of this machine is that it reflected Babbage’s attitude of being a perfectionist. Although his work was not finished, the detailed text that was written by Ada was significant in modifying his versions and for documentary purposes of his work. The rapid increase of the American population, on the other hand, triggered the development of a machine that will help the census tabulate such population very fast. Hermin Horrith’s occupation was very helpful to the development of this machine since he used business to gain money to revise his machine which had later evolved into the international business machine. Although war causes devastation to the environment as well as the people involved, it also had contributed to the development of computers, which is the birth of ENIAC, the first large-scale, general purpose, digital computer that is used to calculate the paths of artillery shells. It was a......

Words: 320 - Pages: 2

Free Essay

C++ Case Statements

...CMIS102 Homework Assignment 2 (Worth 13% of your grade) Student Name: Ariel Cintron Class/Section: CMIS102 / 6383 Professor Name: Ronald Mcfarland Assignment due date: Feb 01 2012 Problem definition: Calculate the total price to purchase all the components required to build a state-of-the-art gaming computer from components available on the internet. A. Problem Analysis – Following the directions in the assignment, clearly write up your problem analysis in this section. The input consists of computer base price (CompPrice), the CPU choice (CPU_choice), the RAM choice (RAM_choice), and the Graphics Card choice (VideoCard_choice). Once the customer has entered a choice of an option, the program will determine the corresponding cost of that option: CPU_cost, RAM_cost, VideoCard_cost. The only item output is the computer selling price (ComputerPrice). To determine the ComputerPrice, the following computation is: ComputerPrice = CompPrice + CPU_cost + RAM_cost + VideoCard_cost. B. Program Design – Following the directions in the assignment, clearly write up your problem design in this section and comment your pseudocode. Things the program must do: 1. Input the computer base price 2. Process the various options to compute the additional costs 3. Total all the costs 4. Display the final selling price The main Module will contain the following submodules: Compute_CPU_Cost Compute_RAM_Cost ...

Words: 908 - Pages: 4

Free Essay

Phd Candiate

...Profile: I'm a researcher in the faculty of graduate studies, Albalqa’ Applied University, Jordan. Also I'm working as Systems Operator in Computer Department and administrate over 22 branches of the company at Jordanian Electric Power Company (JEPCO). I hold B.Sc Degree in Management Information Systems (MIS), Also Master Degree in Business Administration (MBA) from Albalqa' Applied University (BAU). My research interest in the areas of e-Government, eServices, web analytics and business management. I have authored and co-authored several journal papers joint with professionals™ researchers in Ballarat, and Deakin University. Australia. |Personal Data |: |Name |: | | | |Nationality |: | | | |Birth Date |: | | | |Marital Status |: | | | |Gender |: | | | |Address |: | ...

Words: 836 - Pages: 4

Free Essay

Triumph of the Nerds

...REACTION PAPER Prepared to: MS. AILEEN L. RILLON The Triumph of the Nerds is a documentary chronicles of the rise of the personal computer/home computer beginning in the 1970s with the Altair 8800, Apple I and Apple II and VisiCalc. It highlighted the progress and competitiveness of the market between companies like Microsoft, Apple, IBM, Xerox, and Lotus, just to name a few. It continues through the IBM PC and Apple Macintosh revolution through the 1980s and the mid 1990s, ending at the beginning of the Dot-com boom with the release of Windows 95. The Triumph of the Nerds is one of the most important stories in human culture. It is the great story in the history that has affected the daily living of the individuals today…and obviously, for the next years, centuries, and millennium to come. With the human, he has transformed the existence of the people at the speed of an avalanche. It created another new dimension to discover and to explore. It leads our lives in another portal of world. Consider current trends such as today’s youth do not like to talk on the telephone. They should rather communicate via electronic telegrams tapped out with their thumbs. That is very strange. What if those “nerds” did not come up with the idea of creating computer? What would possibly happen to us? In a world characterized by a chaotic lifestyle of the “instant”, it is not uncommon to be caught in the whirlwind of hi-tech era. One very obvious application of computers in our lives is......

Words: 593 - Pages: 3

Free Essay

Information Technology

...EDWIN ADJEI BOATENG C/O MR. WILLIAM OHENE - ADU P. O. BOX 1294 KUMASI MOBILE: 0245009355 / 0268978260 E-MAIL ADDRESS: , CAREER OBJECTIVE A computer science graduate, who is keen to find a position as an IT Manager. I am very reliable, industrious, trustworthy, respectful young man and receptive to new but brilliant ideas. I can work with little or without supervision and also work as part of a team. EDUCATIONAL BACKROUND • 2007 – 2011 Kwame Nkrumah University of Science and Technology • 2002 – 2005 Kumasi Polytechnic • 1999 – 2001 Akwamuman Senior High School • 1995 – 1998 Senchi-Ferry Methodist Junior High School • 1988 – 1994 B. Akoto Experimental QUALIFICATION BSc. (Hons) in Computer Science at KNUST Course content includes: Database Management and Administration, Programming in C++, Java and Visual Basic .NET, System Analysis, Networking, Computer Security and Management Science, Business Management and Economics, Management Information System, Etcetera. HND ELECTRICAL/ELECTRONIC ENGINEERING Course content includes: Network Analysis, Engineering Mathematics, Digital Electronics, Telecommunications, Power Systems, Computer Technology, Computer Literacy, Microcomputer, Computer Applications, Fault Diagnosis, Control Systems, Equipment Maintenance, Power Electronics, Etcetera. CISCO (CCNA Exploration: Network Fundamentals) at College...

Words: 649 - Pages: 3

Free Essay

Relationship Between Extent of Computer Technology Usage and Study Habit of Fourth Year High School Students

...Chapter 1 The Problem and Its Background This chapter is the preface about our problem, the relationship between extent of computer technology usage and study habit of students from Rogationist College and the its background. Introduction Nowadays, technology became an inseparable part of our lives. It now rules the life of an average student and in the field of education in any corner of the world. It has taken over the field of education. Its influence has been taken across the world in every possible way. According to Charlie S. (2012) “Computer has been taking big parts of our lives, in different sectors such as medicine, architecture, communication, research, sports and education. But it greatly affects the sector of education, especially the students”. In this world of competition, the students should have to be educated. Everything is not taught by a teacher or in school. In facing big challenges in life, students take extra learning through technology/computers. These computers can be used for their personal or recreational activities such as listening to music, watching movies or videos, chatting, browsing, playing games and etc. We can also express our feelings through it, through social networking sites. Furthermore, the work of the students became easier in searching information they want to learn. Technology has been part of our lives like language, ritual values, arts and more. It also affects our ways of thinking that can contribute to a more......

Words: 5843 - Pages: 24

Free Essay

Computer Systems

...P4 - Describe the features and functions of information systems Features of information systems Information systems have five main features, which are data, people, hardware, software and telecommunications. Data – The data input to the system has to be as accurate as possible, subject to it's cost and timescales for capture. It should then be stored in the most logical way. This often differs from how the data is input. The data then needs to be summarised to create information in a way that best meets the needs of the system's user, this may not necessarily be the most logical way or the easiest or cheapest for the IT team. People – People are involved both in capturing the data and in exploiting the information. It is important to motivate those who capture the data by highlighting the value that the exploited data brings to the organisation. Hardware – In a small organisation the MIS ( management information system) may run on just the sales or finance director's PC. In larger businesses it usually runs on a server either shared or dedicated with internet or intranet access for those who need it. It is unusual to require specialised hardware. Software – The simplest MIS can be built using standard software. However, most MIS use specialised software, which has the most common features of an MIS already built in. The developer configures this by describing the database and its structure, where the data comes from, how to summarise the data ans what......

Words: 385 - Pages: 2

Premium Essay

Computer Addiction

...Chapter II History of Computer Addiction Computer addiction was noticed in 1973 in some people.The addiction is a mental illness which causes the excessive use of computers to the extent of it interfering with daily life. Its excessive use may also explain problems in social interaction, personality, mood, work ethic and relationships. Effects of Computer Addiction to Students Computer addiction can have a variety of negative effects on a person. The most immediate are social. The user withdraws from friends and family as he spends more and more time on the computer. Relationships begin to wither as the user stops attending social gatherings, skips meetings with friends and avoids family members to get more computer time. Even when they do interact with their friends, users may become irritable when away from the computer, causing further social harm. Excessive computer use can take an emotional toll. The user gradually withdraws into an artificial world. Constant computer gaming can cause someone to place more emotional value on events within the game than things happening in their real lives. Excessive viewing of Internet pornography can warp a person's ideas about sexuality. Someone whose primary friends are screen names in a chat room may have difficulty with face-to-face interpersonal communication.  It is known that we are living in technological era. The computers become irreplaceable tool in everyday life of almost each person. The adult users generally use......

Words: 981 - Pages: 4

Premium Essay

Management Information Systems - Ups Case Study

...What are the inputs, processing, and outputs of UPS's package tracking system? There are two sides to UPS's package tracking system: the external, customer-oriented side, and the internal company and employee oriented side. The input starts with customer with the creation of a scannable bar-coded “smart” label which can be done from the UPS website or using a special software provided by UPS, both accessible via the internet. These labels will contain data about the sender, the destination, and package arrival times. This data is received by UPS's central computer for processing and the information is then forwarded to one of their distribution centers where logistical planning will occur. UPS drivers are given a handheld Delivery Information Acquisition Device (DIAD) which can immediately record and upload pickup and delivery information and pictures of recipient signature to the UPS network, called UPSnet, for storing and processing. The data being sent from the DIAD is gathered from the scannable label on packages, recipient signatures captured, time card info, satellite feed of traffic patterns and changing schedules. Finally, all this information's outputs will include the UPS intranet available company-wide to distribution centers, customer service centers, etc., and the internet via UPS's website or embedded UPS functions within corporate customer's own websites. What technologies are used by UPS? How are these technologies related to UPS's business strategy? The......

Words: 902 - Pages: 4

Free Essay

Development and Validation of Computer Assisted Instruction

...Review of related literature and studies Literature * Kim (2006) how visual learning can affect the students way of learning. * Smith (2002) visual learners prefer to see how to do things rather than just talking about it. * Lehman, newby, russel, stepic (2005) computer-based tutorials have advantages such as students can interact with embedded questions then easily give feedbacks. * Laird (1985) by stimulating the senses, especially the visual sense, learning can be enhanced. * Computer assisted instruction – is an integrated module for the development and evaluation of the learning scheme of the users on the material provided. * * computer-assisted instruction (CAI), a program of instructional material presented by means of a computer or computer systems. The use of computers in education started in the 1960s. With the advent of convenient microcomputers in the 1970s, computer use in schools has become widespread from primary education through the university level and even in some preschool programs. Instructional computers are basically used in one of two ways: either they provide a straightforward presentation of data or they fill a tutorial role in which the student is tested on comprehension. If the computer has a tutorial program, the student is asked a question by the computer; the student types in an answer and then gets an immediate response to the answer. If the answer is correct, the student is routed to more challenging problems; if......

Words: 394 - Pages: 2

Premium Essay


...1.0 Explain how computers have impacted the community. 2.0 Evaluate the impact of computer technology. 3.0 Explain dilemmas associated with technologies. 4.0 Describe potential computer and system reliability problems. 5.0 Describe system reliability issues and prevention methods. 1.0 Explain how computers have impacted the community Imagine eleven years ago when computers you cost over a thousand bucks back in the early 90’s and it was big and bulky. According to Kelly Weidenfeld back those times we all remember AOL, If you didn’t had aol you didn’t had internet. Now in today’s time we can are using high speed internet and even FIOS as right now. Technology is really having a serious impact on today’s society Computers are being used for everything these days for example banks, fast food, groceries and even at work and hospitals. Comparing the past to the present everyone now has uses some form of a computer they used on a daily basics. 2.0 Evaluate the impact of computer technology Goldberg. S. (1984). He indicates that we are moving from the era of the industrial revolution into a different era called the Technological Revolution. He also emphasize that computer will have a permanent and enduring effect on our country and her people. We can see that in today’s time computers are almost everywhere we go we see them in schools, malls, cars and businesses. Stan goes on to say that computers is a vehicle which can be used to excite the learner...

Words: 756 - Pages: 4

Free Essay

Ping Sweeps and Port Scans

...Ping Sweeps and Port Scans James A. Fort SEC 280 Professor Dau July 15, 2012 Ping Sweeps and Port Scans With computer networks becoming larger hackers are looking more and more for ways to illegally gain access to our networks and procure information about our customers that they can use for their gain. Some tools that hackers are using are called ping sweeps and port scans. Now in the hands of Network Administrators these tools are not something to be afraid of, but in the hands of hackers they are something to be aware of because they have the ability to provide relevant information to a potential attacker. Ping sweeps and port scans will probably be the first steps of the attack because they provide the potential attacker a lot about our network as well as services, and open ports, on a computer system or our network. Ping sweep would be the first tool an attacker would take when he chooses to target our company’s computer systems. It is made up of a series of ICMP echo requests sent to a range of IP addresses to determine which IPs are in use by a host. A ping sweep is a valuable tool that can provide an attacker with a network map of all devices on the network, including hosts, routers, and other networked devices. With this information an attacker can establish an attack plan on network servers and hosts or can be used just to clog up the network. With the appropriate firewall in place protecting the network from pings outside of the LAN, then we can......

Words: 562 - Pages: 3

Premium Essay

Applied Research Project

...10/09/2011 APPLIED RESEARCH PROJECT MISCELLANEOUS: * Computer Ethics * Virtual Reality * Multimedia * Telecommuting * Data Security * International Issues * Computer Based-learning After reviewing several options for my discussion, I decided that exploring a publishing company, Design Space Media Group, LLC would be an excellent and diversified approach to the many miscellaneous aspects present within an organization. Design Space Media Group began publishing 7 years ago as a Chicago based Architectural Publication, and shortly after, expanded to several countries around the world. As the company cultivated its publications into several multimedia developments, Tranzit Magazine, a lifestyles by-product was launched along with several other new ventures. There were certain challenges that came with expanding, and the organization would have to adjust in order to thrive in a rather competitive, yet questionable economy. Computer Ethics According to Kenneth C. Laudon and Jane P. Laudon “Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors”. Computer ethics is set of moral principles that regulate the use of computers. With these simple moral principles, there are some common problems of computer ethics that includes intellectual property rights such as copyrighted electronic content, privacy concerns, child abuse, fraud and how computers......

Words: 2070 - Pages: 9

Premium Essay

Computer Information Brief

...Computer Information Systems Brief Kudler Fine Foods is stocked with high end specialty, imported, and domestic products. The specialty foods include fresh meats, produce, packaged foods, bakery goods, cheese, wine, and specialty dairy products. They have invested in and administered the computer system appropriately for business purposes. The company stands out by offering premier goods to their customers in their three gourmet locations. Though each location is money-making, Kudler requires a renovation of the existing computer system to be viable in their niche gourmet food market. A preliminary evaluation of the computer systems, accounting practices and opportunities will be investigated to enhance the company’s accounting system also. Additionally, dangers that they will face if modifications are not completed to the existing system will be tackled. To consider and propose a valuable computer system, it is essential to appraise and make suggestions based on significant accounting procedures and business needs, record of present systems, clarification of business benefits from technology advancements and ascertaining the strengths and weaknesses with possible technology The existing computer information system that Kudler employs is an integral part in supplying data for the profitability of the business. The present computer system is grasped by all employees, is accessible 24 hours a day, seven days a week, and allows the company to thrive in sales. As the company......

Words: 1356 - Pages: 6

Premium Essay

History and Development of the Digital Computer

...Computer Prior to the advent of digital computing, human clerks who calculated in accordance with effective methods we referred to as “computers.” Human computing has evolved greatly since that time; giving the need for computing and the advancement of technology an entirely new growth opportunity. A digital computer is “a device that processes numerical information; more generally, any device that manipulates symbolic information according to specified computational processes” (Digital Computer). Each computer is programmed with a basic set of instructions that are the identifiers of what capability that system has to perform functions. Computers are devices used to carry out a myriad of logical operations, and most often consist of at least one processing element. A computer most often contains a memory bank for information storage. Though the idea of computing has been around for a long while, it wasn’t until the mid-1900’s that “computers” came alive. The dinosaurs of the mid-1900 were mammoth machines housed in large buildings and warehouses and consumed more energy for one operating system than hundreds of today’s mini machine’s do. Today’s computers are miniscule in size in comparison to that of their ancestors and have the capability of far more computing power. As technology has evolved, the computer has taken the shape of laptops, music players, gaming systems and automobiles; each of these tangible items relies on some sort of computing capability. The first......

Words: 1713 - Pages: 7