Cloud computing is the process of utilizing computer servers serving as a digital network which can store data for anyone to access at any point in time.
The "cloud" is becoming extremely popular nowadays as people want to be able to access important data and information on the go. It serves as a way for people to not have to carry physical storage devices to access information. It is possible to have your entire home computer on the cloud and accessible from a different computer now. Cloud computing is becoming popular because it gives businesses an easier way to implement business processes and serve customers.
There are numerous softwares and hardware components that go in to making this possible. 1) The hardware needed for the cloud to be online is a collection servers or a dense concentration of blade servers (Cisco Systems) which allow faster application performance with less lag. 2) The second thing you need for the server end user is the application itself. Software developers must make sure the application will work as expected. 3) Usually an online application is just something simple that can be launched in different servers but when the application is considered with cloud computing, it requires massive physical data centers that ensure the processes are done properly. There also needs to be a backup plan just in case some of the servers fail. Data centers are considered the backbone of cloud computing architecture and are composed of different servers with optimal storage capacity and processing speed (2). In terms of who this is beneficial for – all effects are geared toward productivity and the improvement of the customer experience. Businesses also have the opportunity to increase the number of customers with more efficient service. 4) A tablet device/Ipad/smartphone is something that a end user can use to access the cloud for a business and have all data and information at their fingertips when they are on the go. Lastly for any business security is a major concern, especially with the new age cyber terrorists on the rise. The fact that the cloud applications are launched through the internet make it a very high security risk. 5) Two examples of cloud security are restrictive user access and certifications. Restrictive access is the use of a username/password along with complicated “captcha” log in forms. Certifications are important as they ensure that the applications have been fully tested against different types of attacks. It is also important to make sure that the location of the data centers are kept secret to avoid further security threats. Although cloud computing is a relatively new concept – the future and adaptability of businesses to this new technology is very important. If a business does not venture in to this type of mobile productivity and efficiency they will surely lose out on customers (3).
1. http://en.wikipedia.org/wiki/Cloud_computing
2. http://www.itpro.co.uk/634966/ciscos-one-stop-shop-for-cloud-computing-equipment
3. http://www.exforsys.com/tutorials/cloud-computing/the-future-of-cloud-computing.html
No comments:
Post a Comment