Free Essay

Enterprise Cloud Computing

In: Computers and Technology

Submitted By justinw3053
Words 2967
Pages 12
Enterprise Cloud Computing:
The future of enterprise networking
Justin Winter
American Military University

The term “cloud computing” is one of many new buzzwords in the technology world. Unfortunately as buzzwords go they tend to become obsequious and as a result of this obsequiousness, the term “cloud computing” is so broad that it can encompass anything from online storage products like Dropbox to entire online enterprise solutions provided by Amazon Web Services. While the term cloud computing may be obsequious, there is a reason IBM recently invested $3 billion to further research and development to benefit cloud computing and big data. ("IT Digest") Enterprise cloud networking is a relatively new technology, yet it is already available in multiple favors. For instance Amazon Web Services offers complete cloud solutions for anything from personal website and database solutions to full corporate solutions that range from simple storage solutions to user defined security groups. On the other hand, components provided by Cisco's Meraki division, offer complete network management as an easily accessible web based tool.
The National Institute of Standards and Technology (NIST), which is a part of the U.S. Department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” (Mell & Grance, 2011) The NIST also lays out five essential characteristics, three service models, and four deployment models. The five essential characteristics of cloud computing that the NIST has described are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. What these five characteristics mean to the consumer is that; with on-demand service, the consumer can utilize server time and network storage without human intervention from a service provider. The broad network access characteristic requires such services be accessible to devices from smart phones to full blown corporate workstations. Resource pooling simply means that processing power, storage, and memory may all be scaled dynamically to the consumer’s requirements. The rapid elasticity characteristic is very important, especially where IP addresses are concerned, rapid elasticity allows the consumer to provision as few or as many IP addresses as required for any contingency. Finally, the measured service characteristic is a function that allows providers to scale their product to fit consumers needs; for example a provider is not required to deliver the same processing power or storage to a consumer operating a web store as they would to a consumer running an entire corporate office. The three different service models that the NIST describes are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). These services are all different ways that cloud computing allows buisinesses to bring their business or services to fruition in the digital world. SaaS allows consumers access to a providers software and hardware such as using Dropbox or Apple iCloud to utilize cloud storage. PaaS on the other hand is where a provider offers hardware only and the consumer must provide any software that is required for the consumers business. IaaS would be best described by what Amazon Web Services offers to consumers, Amazon makes servers, storage, and networking options to their consumers at all different proce point depending on the consumers needs. To conclude the NIST definition of cloud computing, the deployment models must be covered. The four deployment models listed by the NIST are private cloud, community cloud, public cloud, and the hybrid cloud. The private cloud would be best described by envisioning a company’s private intranet, where all the data may be accessed on or off location. The community cloud would be a conglomeration of data that would be used by, for example the Federal Government where data could be stored and accessed on or off site and any government agency would have access. A public cloud is where the data stored on it is open source such as www.imgur.com or www.youtube.com and can be accessed by anyone. Users may upload or download any information that is stored on a public cloud, as long as the data being downloaded is open source and not protected. Finally, the hybrid cloud can be a combination of any of the previously discussed cloud networks.

Cloud Networking Enterprise cloud networking is becoming a real and viable option for businesses that are trying to cut cost while at the same time trying to stay relevant and current. There are many options where cloud networking is concerned, this paper will attempt to discuss only two of the many options available. The first option is where a third-party entity manages all of a businesses networking hardware, the second option is for a company to utilize cloud managed hardware based on a Wi-Fi corporate network. As previously mentioned, these are but two of the many options available to businesses. The first enterprise cloud computing option could be accomplished by utilizing Amazon Web Services (AWS) products. There are many ways that AWS is able to distinguish itself from its competitors. For example, AWS is able to only charge consumers or businesses for the services they use. (Varia & Mathew, 2014) This is such an advantage for AWS because consumers only pay for what they use, with no up-front costs or long-term commitments. Another key point in AWS’s business strategy is to allow their customers to scale up or down their respective requirements; this again ties into only charging customers for what they use. The ability to allow customers to instantly scale up or down their processing power, storage capability, add or remove a server is something that would be unheard of in a standard networking configuration. Requiring an IT department to instantly scale up the their storage capacity ten-fold, or expanding the amount of redundant servers due to a “hot” selling item, or even expanding the department to bring on an entire new satellite site would be impossible and cost prohibitive. AWS is able to do this in more, mostly because the equipment is already available and waiting. This goes back to AWS’s ability to scale the products so well, when a company has a “hot’ selling product they will need to scale up, but when the sales on said item fall off, the same company will scale back down. Since this is an example of short-term requirements that AWS knows will not be required full time; AWS is able to offer this service with the expectation while in the short-term the hardware is unavailable, in the long-term it will be turned over and it will be available for use to another consumer. On the other end of this spectrum Cisco (a traditional networking giant) acquired a cloud infrastructure start-up by the name of Meraki for $1.2 billion in 2012. (Constine, 2012) Cisco was able to integrate the Meraki technology into its routers, access points and switches. What this means for companies or IT departments that are interested in integrating cloud networking into their workplace, is that they now have the ability to manage their entire network from anywhere in the world while keeping all of their devices integrated and without having to train staff on new hardware. Cisco was able to integrate the Meraki software into their own proprietary software, which means that IT professionals will not face a steep learning curve when the time comes to integrate the new hardware into their datacenters. Unfortunately this ease of installation or adoption does not come cheap; with the rollout of Meraki devices, new hardware must be purchased to fully enable their cloud networking data centers capabilities. While spending the required capitol to retrofit an entire datacenter or multiple datacenters may not sound appealing, the cost may be offset in a couple major ways; with the cloud management capabilities of Meraki, a cloud managed network operation center will not require as many IT professionals as a traditional network operations center. This is reason enough to see why Cisco would leverage so much by acquiring Meraki. Another important feature of the Cisco Meraki system is that it is predominately Wi-Fi based, meaning that companies can easily implement a “Bring your own device” BYOD policy that would alleviate the cost of providing tablets or smartphones to employees. The key to this offset is with the Meraki System Manager, the system manager allows for the reduction of IT staff while simultaneously allowing for better overall management of all devices on the corporate network. The system manager can be utilized from any device; it is platform and form factor independent. What this means for the IT manager, is that they can manage the entire network from their office, from their smartphone at the airport, or even on a beach using their tablet. This does not spell disaster for the IT professional either; while there will be reductions within existing networking operation centers, this will allow for new positions elsewhere dealing specifically cloud based networking.

Enterprise Cloud Networking Security A constant concern of any networking IT professional is security; the threat of data breeches or malicious code injection is ever present. A data breach for a major Internet brand seems to be in the news every few weeks. For example in 2014, by compromising just a few eBay employees login information, hackers were able to compromise approximately 145 Million people’s personally identifiable information. (Peterson, 2014) Another headline making data breach occurred the day after Thanksgiving 2013, the discount retailer Target was the victim of a data breach where hackers were able to steal credit card information from approximately 40 million shoppers. ("Target: 40 Million Credit Cards Compromised," 2013) Finally, one of the worst data breeches to date occurred in 2006; the credit card information collected between 2003 and 2006 of 45.7 million people was stolen from the retailer TJMaxx. ("45.7 Million Credit Cards Stolen in Tjmaxx Breaches," 2007) To discuss security options available to companies interested in enterprise cloud networking, this paper will again focus on two options from the many that are available, Amazon Web Services and Cisco Meraki. Both Amazom web services and Cisco Meraki offer extensive whitepapers that cover security best practices when using their respective services, be it fully integrated cloud networking or cloud-based network management. Amazon operates on what is called “The shared responsibility model” where Amazon is responsible for the facilities where the hardware is stored, the physical security of the hardware, the network infrastructure, and the virtualization infrastructure. The user or customer is responsible for the security of the Amazon Machine Images, operating systems, applications, data in transit, data at rest, data stores, data credentials, and policies and configuration. (Todorov & Ozkan, 2013, pg. 5) Amazon utilizes a tool called Identity and Access Management (IAM) as a way for customers to centrally manage users, security credentials such as passwords, access keys, and permissions policies that control what services and resources users can access.(Todorov & Ozkan, 2013, pg. 6) This means you as the administrator can create users in the system with specific roles and responsibilities. For example, this means that an administrator could create users based on job function and only admit permissions based on role, where a sales account would not have access to say, accounting information, and accounting roles would not have access to management information that is only available to those users assigned management roles and accounts. When discussing security, Cisco Meraki covers multiple security measures that are ill-advised such as RF propagation as an attempt to contain wireless signals, SSID cloaking as a way of stopping SSID’s from appearing in a wireless network search, MAC address filtering, and WEP security. All of these security measures, while valid, are incredibly unsecure to anyone with access to malicious intents and access to Google. ("Wireless LAN Security," 2009, pg. 5) There are three options that Cisco Meraki recommends for securing their networks. The first step is what is called “open with VPN”, this approach assumes that all wireless data is insecure. This type of access allows an employee access to the Internet, but not the internal network. For access to the internal network, the employee would be required to login via VPN. This setup is advantageous because it treats all wireless traffic as unsecure and will not allow anyone on the internal network with out logging in, the biggest draw back to this is that some employees may find logging in via VPN inconvenient. ("Wireless LAN Security," 2009, pg. 6) The second option is to use a shared key WPA2-PSK, the key would be provided or installed on all employees devices/machines that require access to the internal network. The biggest drawback to this approach is administering the shared keys, if for example an employee leaves the company; the shared key is potentially unsecure and would need to changed, now all keys within the company would have to be changed. ("Wireless LAN Security," 2009, pg. 7) The third approach Cisco Meraki proposes is to utilize user authentication WPA2-Enterprise. Instead of using a shared key as WPA2-PSK does, employees are assigned a unique username and password. When accessing the network, the employee’s username and password are checked against an active directory or server to allow access. The advantages of this setup are primarily that it is extremely secure and employees are not required to VPN into the network for access. ("Wireless LAN Security," 2009, pg. 7) While network security is of the utmost importance in online commerce, there is only so much a network security professional can do. As data breeches become more common, it appears that the emphasis for the business is moving away from thwarting cyber criminals to ensuring a data breech is responded to in an appropriate and timely fashion with an in-depth crisis response program. Businesses are becoming aware of that fact that data breeches are a part of online commerce, the key to good online business practices is to have a solid crisis response plan on file before a breech occurs. An example of why this is so important would be the previously referenced data breech of eBay. The eBay data breech could be called “A case study in how not to respond to a data breech”, customers should hear about the possibility that their information may have been compromised should come from the affected retailer, not from a media outlet as was the case with the eBay data breech. EBay’s failure to inform customers via mass-email in a timely manner, and also by placing an alert at the top of the eBay home page with a “Learn More” link that led to a blank page has led to numerous instance of bad press regarding the company’s response and the disservice to their customers. (Sun, 2014)

Enterprise cloud networking versus traditional networking Enterprise cloud networking is not going away; with the proliferation of wireless devices and networks, todays smartphone or tablet is more powerful than the computers of only a few years ago. Taking into account the availability of cloud storage, internet enabled devices are able to do more in a business sense while more mobile and versatile than ever before. The implementation of cloud networking will be expensive and time consuming which is why this technology will not replace traditional networking overnight. Both technologies discussed in this paper have the distinct advantage of the ability to be integrated into existing workplaces on a piecemeal basis. Amazon Web Services can be utilized for new satellite offices or new web stores, while Cisco Meraki can be gradually implemented to offset corporate device cost and implement a BYOD program. The cost-savings of both platforms over the long term will ensure that this technology takes hold while traditional networking technologies are progressively phased out of tomorrow’s data centers.

References
45.7 million credit cards stolen in tjmaxx breaches. (2007, March 29). Retrieved July 20, 2014, from http%3A%2F%2Fconsumerist.com%2F2007%2F03%2F29%2F457-million-credit-cards-stolen-in-tjmaxx-breaches%2F
Constine, J. (2012, November 18). Cisco Acquires Enterprise Wi-Fi Startup Meraki For $1.2 Billion In Cash | TechCrunch. Retrieved July 15, 2014, from http://techcrunch.com/2012/11/18/cisco-acquires-enterprise-wi-fi-startup-meraki-for-1-2-billion-in-cash/
IT Digest. (2014, July 13). Retrieved July 15, 2014, from http://www.washingtonpost.com/business/economy/it-digest-ibm-to-invest-3-billion-in-cloud-computing-big-data-research/2014/07/11/593a5436-0088-11e4-8fd0-3a663dfa68ac_story.html
M. (2009, March). Wireless LAN security [Scholarly project]. In Meraki White Paper. Retrieved July 20, 2014.
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing (Special Publication 800-145) (USA, U.S. Department of Commerce, National Institute of Standards and Technology).
Peterson, A. (2014, May 21). EBay asks 145 million users to change passwords after data breach. Retrieved July 20, 2014, from http://www.washingtonpost.com/blogs/the-switch/wp/2014/05/21/ebay-asks-145-million-users-to-change-passwords-after-data-breach/
Sun, L. (2014, May 27). EBay Data Breach Response Teaches Everyone How Not to Handle a Crisis. Retrieved July 20, 2014, from http://www.fool.com/investing/general/2014/05/27/ebay-data-breach-response-teaches-everyone-how-not.aspx
Target: 40 million credit cards compromised. (2013, December 18). Retrieved July 20, 2014, from http://money.cnn.com/2013/12/18/news/companies/target-credit-card/
Todorov, D., & Ozkan, Y. (2013, November). AWS security best practices [Scholarly project]. Retrieved July 20, 2014.
Varia, J., & Mathew, S. (2014, January). Overview of Amazon Web Services [Scholarly project]. In Whitepapers. Retrieved July 15, 2014, from http://aws.amazon.com/whitepapers/

Similar Documents

Premium Essay

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

...Concept of cloud computing was started in 2000s. Once this was introduced it has created a new business model and platform for many online business and technologies. To store any kind of data local servers will be used. But in today’s world with internet, the practice of using servers and networks on internet for storing, processing and managing any kind of data online is the concept of cloud computing (Margaret Rouse, 2015). Through this, both its platform and type of applications can be described, cloud computing provides its services in several layers to its users. By using this technology and internet applications can be run based on large data centers and servers. Cloud computing has gone through number of several phases including grid and utility computing (Margaret Rouse, 2015). Many enterprises have already started to implement cloud computing by knowing the potential of this technology. In 2012 according to IDG reports, (IDG ENTERPRISE MARKETING, 2016) the usage of cloud computing was 12% and by 2014 the number increased to 69% with the humongous change. The main reasons for many of enterprises to adopt to this technology was its cost and the flexibility to run any application faster than by the traditional method. Few features in could computing and its business functions like data analytics, data and storage management content management, conferencing solutions and collaborations. By 2015, 24% of enterprises used cloud computing for standardizing their IT......

Words: 1234 - Pages: 5

Premium Essay

Cloud Computing

...overview advantage and challenges Overview Silver Lining or storm ahead The future of cloud computing Effective use of cloud computing in education institutions Cloud Computing for beginner Cloud computing Challenges and future directions http://www.businesswire.com/news/home/20110622006602/en/Future-Cloud-Computing-Survey-Reveals-Drivers-Cloud Cloud Computing GAP Task Force http://inews.berkeley.edu/articles/Spring2009/cloud-computing Table of contents 2 0 Relevant Resources 4 0 Relevant Resources 4 1 General guidelines of community design 6 2 Attracting new members 7 2.1 Methods of persuasion of a potential user 7 2.2 Encouraging users to invite friends 8 2.3 Entry barrier 9 2.4 Guidance for new members 9 3 Structure of the community 12 3.1 Member profiles 12 3.2 Member connections 13 3.3 Adding connections 15 3.4 Member reputation 16 3.5 Paid membership 18 3.6 Fake members 18 3.7 Lurkers 18 4 Encouraging user participation 20 4.1 Using uniqueness 20 4.2 Using controversy 20 4.3 Using individual recognition 21 4.4 By discouraging low quality contributions (moderation) 21 4.5 Using goal setting 23 4.6 Using E-Mail notifications 24 4.7 By showing the activity of community 24 5 Stimulating Social Interactions 26 5.1 By common Interests 26 5.3 By common current life transitions 27 5.4 By shared experience 28 5.5 By shared education 29 5.6 By showing the distance 29 5.7 By service: Photo Albums 30 5.8 By service: Profile watching......

Words: 10084 - Pages: 41

Free Essay

Enterprise Architecture

...I believe the one technology that could have the greatest impact on enterprise architecture in U.S. corporations by 2023 is cloud computing. As indicated on the hype cycle for emerging technologies in 2013, it currently is in the trough of disillusionment; however, I believe that cloud computing will bring about the most change to enterprise architecture by 2023. Cloud computing will have the ability to bring enterprise architecture a step forward and redefine the way businesses will support their architecture. As cloud computing evolves, as will enterprise architecture in the way that advanced concepts and practices will eventually be deemed as government requirements. By 2023, I anticipate that most, if not all, companies will be using a cloud platform where it will be used on multiple devices – this brings attention to EA as it will make it more challenging to standardized personal devices. BYOD will become a more relevant option with increased capabilities, like scalability and using software as a service through the cloud, impacting the way EA is integrated in an organization. The shift in enterprise architecture will also stem from the control needed from cloud computing. Currently, when companies move to cloud computing, they are essentially handing control over the design parameters of the enterprise. As a result, the role of the enterprise architect will become obsolete as the responsibilities were to build and maintain a stable model for the business. ......

Words: 382 - Pages: 2

Premium Essay

Operating System

...INTRODUCTION Cloud computing has boost a large amount of interest in the IT industry. The market research and analysis firm IDC suggests that the market for cloud computing services was $16bn in 2008 and will rise to $42bn/year by 2012 (Chhabra, Verma &ump; Taneja, 2010) .The era of cloud computing introduces a new dimension for Enterprises. The academia and research worlds have developed a keen interest into challenges and issues introduced by this relatively new concept (Sriram &ump; Khajeh-Hosseini, 2009). As experienced by large or small companies while adopting cloud computing technology, the issues can be outlined as security, privacy, data migration as (Hosseini, et al., 2010 ). Adoption of cloud technology by enterprises especially those are using KBE (knowledge based engineering) systems are in risk in terms of migration their data over the cloud. Most enterprises are in a midst of creating, sharing, streaming and storing data in digital formats to allow collaboration , hence there is a need to continuously managed and protect the data to ensure its value and authenticity (Yale &ump; Chow, 2011). Enterprises now acquire increasingly more information about their products, customers and partners- whether it’s stored in a cloud environment or not and failure to protect this data can be damaging. Partners and clients anticipate their information will be constantly protected before conducting business with a company. Within lay the need for complete data governance to...

Words: 2090 - Pages: 9

Premium Essay

Review the Process of Implementing Cloud Computing of Smes in Uk - an Exploratory Study

...Review the process of implementing cloud computing of SMEs in UK - an Exploratory Study 1. Introduction Information technology (IT) plays an important role in increasing innovation and competitiveness and performance for small and medium-sized enterprise (SMEs). Cloud computing or on-demand computing is IT infrastructures that empower SMEs with various capabilities to store, share and access information, data and resources in third-party data center. Cloud computing when implemented strategically will help enterprises to improve their performances, processes and efficiency. Despite the importance of cloud-based computing, limited research has done to study about the implementation and usage of cloud-based computing in the SMEs within the UK context (Shiels et al., 2003). The objective of the research reviewed in this proposal is to contribute to the valuable research on cloud solutions by studying the implementation of SMEs. UK was selected for this research as in UK, SMEs accounts for the vast mojarity of all companies and it is home of innovation companies that develop with the development of information and communication technologies. The relevant literature are referred and the theoretical framework is used in this research are discussed in the next part of the paper. 2. Literature Review According to Sultan, N. A. (2011) small- and medium-sized enterprises can take a lot of advantages from embracing cloud solutions. Because no matter of what type of......

Words: 2789 - Pages: 12

Premium Essay

Economics

...economics works with cloud computing. Is economics the way to go with cloud computing? What is the general understanding of economics when it comes to cloud computing? How will businesses benefit from cloud computing? Will cloud computing work within a budget of an organization? Businesses will economically grow and benefit with cloud computing. Cloud computing has significant implications for the way companies, businesses, and governments access and use information technology. It enables users to remotely access scalable, high-powered computing services via broadband networks from a range of devices, all on-demand. Cloud computing has the potential to provide users with increased computing capability, greater efficiency, and lower energy and infrastructure costs. According to Kevin Jackson of Forbes.com he describes cloud computing as a metrics. According to Kevin Jackson the four sets of cloud computing economics are the number of unique customer sets, customer set duty cycles, relative duty cycle displacement and customer set load. These metrics reduce resources and creates more resource demand. According to Mr. Jackson of Forbes.com this “properly balancing these factors across a well characterized user group can lead to approximately 30-percent savings in IT resources, and enables the near real-time modification of the underlying physical infrastructure required for the delivery of the desired “illusion of infinite resources” synonymous with a cloud computing......

Words: 1324 - Pages: 6

Premium Essay

Cloud Computing

...IBM Sales and Distribution Thought Leadership White Paper Banking Cloud computing for banking Driving business model transformation 2 Cloud computing for banking Executive summary The banking industry is facing unprecedented changes. Control is now in the hands of the customer, rather than the bank. Customers are driving new business models. Their use of technology—in addition to changes in social and household dynamics—is driving business transformation. Banks need to react to this new customer-driven environment with innovation in business models, operations and IT. For banks, the value proposition for cloud computing affects the entire business. Cloud technology offers a new model for delivering innovative client experiences, effective collaboration, improved speed to market and increased IT efficiency. Cloud deployments are spreading and the technology is proving to be secure. More businesses are adopting cloud computing. In fact, according to the 2010 IBM CIO study, “Sixty percent of CIOs plan to use Cloud—up from thirty-three percent two years ago.”2 Today, cloud technology is not just a tool being used in IT, but a paradigm shift to an entirely new business model. ●● ●● ●● Changing business models have shifted from productcentric to customer-centric Enhanced regulation increases government oversight and intervention Increasing social and government pressure for financial inclusion To drive growth and innovation in banking, it is......

Words: 5607 - Pages: 23

Premium Essay

1 Vmware Whitepaper - Business Agility and the True Economics of Cloud Computing

...Business Agility and the True Economics of Cloud Computing B u s i n e s s W H iTe PA P e R Business Agility and the True Economics of Cloud Computing Executive Summary New groundbreaking global survey findings demonstrate the true value of cloud computing to the business. While it is understood in the industry that cloud computing provides clear cost benefits, CIOs are having difficulty getting a true fix on the business value that cloud might offer beyond cost reduction. These survey results reveal a direct link between cloud computing and business agility—how business outcomes are associated with agility, the role of IT for agile companies and the importance of cloud computing to business leaders. value to the enterprise. It shows that the hype around cloud computing is maturing into facts about what cloud can really deliver to both IT and the business. Game-changing CIOs think business transformation first, then how technology enables it. They are the ones strategizing with their CEOs and other business leaders to look beyond simple cost calculations to the business agility that cloud computing can enable. Defining Business Agility Business agility is the ability of a business to adapt rapidly and cost-efficiently in response to changes in the business environment. According to McKinsey & Company, the leading global management consulting firm, the benefits of agility include faster revenue growth, greater and more lasting cost reduction, and more effective...

Words: 2949 - Pages: 12

Premium Essay

Student

...2014 Hybrid cloud 2014 Hybrid cloud Introduction A hybrid cloud is a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally. For example, an organization might use a public cloud service, such as Amazon Simple Storage Service (Amazon S3) for archived data but continue to maintain in-house storage for operational customer data.  Market Survey According to Forrester study, hybrid model of implementing IaaS is particularly enticing for US and European enterprises. 28% of hardware decision-makers report using a hybrid cloud strategy for server resources today, and nearly half predict that they will have workloads in both traditional/on-premises and hosted/service provider cloud environments by 2016. This new architecture will bring unfamiliar challenges, as IT works to integrate resources and workloads in their data centers with those at a cloud service provider. Having infrastructure resources at two locations connected via the network creates need for a whole new level of integrated visibility, management, and orchestration. Hybrid cloud architectures let firm’s provision capacity for typical workload needs and use cloud service provider capacity for demand spikes. This saves them from having to purchase mostly idle peak server capacity for peak needs, such as an extra 50% for end of quarter financial closing or 10x capacity for web marketing flash crowds. And firms only pay for the......

Words: 2050 - Pages: 9

Premium Essay

Cloud Computing

...HOW FUTURE IT TRENDS WOULD IMPACT ORGANIZATIONS BUSINESS STRATEGIES TO DRIVE INNOVATIONS, ADD VALUE AND GAIN COMPETITIVE EDGE? Chamika Waidyalankara (ECU ID: 10217155) ACBT – Semester II MBA5709 - Information System Challenges in Management Table of Contents 1.0 Introduction 3 2.0 Future IT Trends 4 Internet of Things 4 Cloud Computing 4 BYOD (Bring Your Own Device) 5 Enterprise Mobility 5 Big Data 6 Enterprise Social Networking 6 3D Printing 7 Wearable Computing 8 3.0 Uses and Impact of future technology on organizations 9 4.0 Published case studies and Observations 15 5.0 Key Findings 16 Changing customer landscape 16 Rise of collaborative models 16 Personalization of products and services 16 6.0 Conclusion 17 7.0 Bibliography and References 18 1.0 Introduction Information technology (IT) is an area in which new developments are taking place more and more rapidly. IT has gone through many evolution cycles and today we are in the era of Web 2.0 and 3rd Platform of IT. Technology we used during last decade has become museum exhibits and what was then showcased in Science fictions has become more reality today. Consumer and business tech are merging, where the two going to be barely separable. The 3rd Platform is changing the way we interact with everything. Speculating on what's going to happen over the next few years is of course entertaining. The future of business has always been driven by developments in technology, and the digital......

Words: 4106 - Pages: 17

Premium Essay

The Benefits of Cloud Computing

...Benefits and Risks of Corporate Cloud Computing To compete in the competitive world of business entrepreneurs, business owners, and investors alike must think outside the box. There is no secret with today’s economy and all the hype surrounding government incentives that a major fact to doing business on a global scale is an efficiency information system. Information systems is define as interrelated components working together to collect, process, store, and disseminate information to support decision-making, coordination, control, analysis, and visualization in an organization. (Laudon G-7) This is one of the largest burdens face by corporate America. How to overcome the costs and obstacles which confronts companies seeking to break ground into new industries with adequate tools to accomplish their business goals can seem insurmountable. The Cloud’s computing utilities enable a nimble start up to compete with the capacity of established competitors’ captive data centers. Cloud programming models promise to democratize the web, enabling end user application development that supports enterprise and even Internet scale applications. (D. Thomas) Therefore, with the ever changing rate of new technology development corporations with small to medium infrastructure requirements have turned to cloud computing. With lower investment, training, planning and hardware requirements businesses have seemingly reap the benefits of cloud computing. However, do the......

Words: 2203 - Pages: 9

Premium Essay

Business

...Small Logo White Paper Introduction to Cloud Computing Introduction to Cloud Computing White Paper Executive Summary A common understanding of “cloud computing” is continuously evolving, and the terminology and concepts used to define it often need clarifying. Press coverage can be vague or may not fully capture the extent of what cloud computing entails or represents, sometimes reporting how companies are making their solutions available in the “cloud” or how “cloud computing” is the way forward, but not examining the characteristics, models, and services involved in understanding what cloud computing is and what it can become. This white paper introduces internet-based cloud computing, exploring the characteristics, service models, and deployment models in use today, as well as the benefits and challenges associated with cloud computing. Also discussed are the communications services in the cloud (including ways to access the cloud, such as web APIs and media control interfaces) and the importance of scalability and flexibility in a cloud-based environment. Also noted for businesses desiring to start using communication services, are the interface choices available, including Web 2.0 APIs, media control interfaces, Java interfaces, and XML based interfaces, catering to a wide range of application and service creation developers. Introduction to Cloud Computing Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 3208 - Pages: 13

Premium Essay

The Impact of Mobile and Cloud

...The Impact of Mobile and Cloud Technology On Business Kristina Taylor The Impact of Mobile and Cloud Technology On Business Cloud computing involves utilizing remote servers in a network. The remote servers are hosted through a network for the purpose of storing, processing, and managing data, instead of using personal computers or local servers. The development of cloud computing in previous recent years is probably among the main progress in the computing history. Nevertheless, for cloud computing to attain its perspective, a clear comprehension regarding a variety of issues involved should be in place. The issues range from the technology consumers to the viewpoint of the providers (Guo, 2012). There should be a requirement for comprehending issues that are business related, regarding cloud computing. There are various threats, weaknesses, and strengths regarding the industry of cloud computing (Galan, 2010). Issues of cloud computing in the retail industry A lot of companies in the retail industry are moving to cloud computing for the purpose of accessing fresh business applications in a faster way. The other reason is to eradicate the load of managing IT infrastructure that is complex, and also give the capability of scaling as volumes of data and use of application grows. One example of companies moving to cloud computing is banks. Nevertheless, the industry is faced with particular issues in the trend, especially in customer service. For......

Words: 650 - Pages: 3

Premium Essay

Inf 103 the Future of Cloud Computing

...The Future of Cloud Computing Wesley Rhoades INF 103 Computer Literacy Anjit Bose, MBA December 2, 2013 Imagine a world where everything is ran by a network of computers centralized in one specific location. Businesses no longer required hardware and software to store their data on. Students didn’t have to sit in a classroom behind a desk listening to a teacher lecture them for an hour at a time. Imagine the money you would save just for the commuting alone. Warehouses that make and ship goods for companies could all be tracked by a bar code and becomes accessible wherever there is an internet connection. This is the future of cloud computing. Cloud computing has become another popular term after Web 2.0. However, there are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. On the other hand, cloud computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established grid computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast cloud computing with grid computing from various angles and give insights into the essential characteristics of both. Cloud computing is something that a great many people have spent a good amount of time pondering. We’re seeing a new trend in software deployment and flexibility goal sets, and as a result, the future...

Words: 1735 - Pages: 7

Premium Essay

Cloud Computing

...loosely coupled web services and service-oriented architectures (SOA). Each of these evolutionary steps has built upon the previous while adding new challenges, dimensions, and opportunities for IT organizations and their business partners. Recently, virtualization has become a prevalent and widely accepted way to reduce operating costs and increase the reliability of enterprise IT. In addition, concepts such as grid computing make possible a whole new class of analytics, data crunching, and business intelligence tasks that were previously cost- and time-prohibitive. Along with these technology changes there have also been fundamental changes in how markets work, with the speed of innovation and product introductions increasing at an unprecedented rate. Taken alongside the wide acceptance of Software as a Service (SaaS) offerings, all of these concepts have inspired the latest turn in the IT infrastructure challenge: cloud computing. Amazon Web Services (AWS) provides a flexible, cost-effective, scalable, and easy to use cloud computing platform for businesses of all sizes. What is “Cloud Computing”? Cloud computing has become one of the most discussed IT paradigms of recent years. It builds on many of the advances in the IT industry over the past decade and presents significant opportunities for businesses to shorten time to market and reduce costs by consuming shared...

Words: 4330 - Pages: 18