Office automation in recent times can be considered as one of the vital aspect, which could be implemented which would be helping to acheive greater standard of working in the office. Two of the approach, which can be used in order to achieve the aspect of home automation, are the single point database access of the database and individual log in for the different employees.
Single point database access: The concept of the single database access can be considered as one of the important aspect whose implementation can be very much beneficial for any office. It can be considered as a single point were all the information and the critical data of the organization are stored and can be accessed when needed. The employee in this context do not need to look for the data at different locations, as it would be available to them at a single point or place. The concept would be directly reducing the amount of work and the work would be less hectic.
Portal approach: This can be considered as one of the latest approach where every employee would be given a password by which they can access the organization’s data. Without the password, the data would not be available to the employee. This concept can be very much beneficial in a way that any unauthorized person trying to access the data would not be allowed to do so and get the information from other systems. The security aspect can be very much included into the working of the office by means of implementing the portal approach.
Single point database access
Benefit
The main benefit, which can be achieved from the concept, is that the time, which would be involved, in the processing of the data would be reduced and the work would be very much easy. The security aspect can also be increased in this aspect due to the factor that there would not be any other security measures than a centralized security system, which would be safeguarding the database.
Issue
The main issue, which can be seen in this if there is any sort of security, breach that the overall system would be shut down and the overall working of the office would be at a halt. There are no other option but to provide the best security measure, which directly secures the system and if any breach occur, it could be minimized.
Portal approach
Benefit
The approach can be beneficial in a way that each of the employee would be given a separate password, which would be known to them only. This aspect would be securing the individual information of the user, as only authorized user would be given the permission to access the data. The portal approach can also be beneficial in a way that it would lessen the burden relating to other office work such as attendance of the employee, the hours of working in the office and the amount of work a particular individual is involved.
Issue
The main issue with the portal approach is that the without the username and the password the portal cannot be accessed and there is no other secondary option available in this context. It can be considered as a single entry point of every user. It should be always be taken into consideration that the employee should keep the password in their own possession due to the factor that if any working or misuse is done through their portal they would be convicted and asked questions about the reason of doing such type of activity.
Taking into consideration the Approaches, which are stated above the most beneficial, would be the use of the single point centralized database system. This type of approach is recommended due to the factor that it would not alter the predefined structure of the working of the organization and would implement the new system over the concept of the older system. The approach would be making the older system more advanced with advanced features involved into the concept.
The infrastructure as a service can be considered as a model, which uses the concept of virtual machine rather than the traditional aspect of physical server, which takes tons of energy and space. The concept of infrastructure as a service is a server, which is owned by someone else, but it allows other users to use them for which the user have to pay. Most of the organization move towards the concept of infrastructure as a service and use the service of a public cloud or can use private section of the cloud for which they have to pay more than the amount of the shared cloud domain (Oliveira, Thomas & Espadanal, 2014).
The Platform as a service can be referred to as a platform, which can be used by the organization. The platform can be used for developing software. In this context, it can be stated that the Platform as a service model does not require any time of download of software and has everything pre-installed into its aspect. The model is beneficial in the concept of the developers due to the factor that it does not only allow the development of the software but also allows the concept of testing, iterate their own software and build the application.
The main difference between the IaaS and PaaS can be explained with the help of the following diagram.
The infrastructure as a Service model can be implemented by an organization when the underlying hardware or the software is needed to be customized or have a specific need regarding the security of the private cloud or the isolated database. An individual can find all the points in this context ranging from the private cloud concept to public cloud even within the modules, which support the blur line between the IaaS and the PaaS.
The Platform as a Service model can be used by organization when the need relating to time and resources to build an application but the organization do not want to involve themselves into the aspect of building servers, database, networking and managing them altogether. The concept of the platform as a service would be directly storing the information along the side of the user. The features of the encryption and containerization would be keeping the data separated and secured.
The choice relating to the decision of the organization into which model to be used should be taken into consideration by plotting down the resources which are internal and the environment of deployment which is regulatory. The organization trying adopting the SaaS model are those, which need more focus on the concept of development, but they actually lack the resources to implement them. Most of the organization implements software according to the environment of their working. In recent times the overall working of the organization and the basic need behind the need of the organization are taken into consideration before actual decision is taken into which model would be directly beneficial for the organization and would enhances the working of the organization.
The software as a service is a model, which provides to the user highest level of abstraction. It directly provides the facility of using and connecting to the application that are based on the concept of the cloud and available over the concept of the internet. In the concept the Software as a service there are third party applications which can add to the advantage which can be gained from it, for example software deployment and management of tasks (Biswas & Giaffreda, 2014).
The platform as a service operates at much lower level of abstraction as compared to the Software as a service prospective. The platform as a service provides a software development platform where the developers can develop their software has and directly launch them on top of it. The advantage that can be achieved relating to the concept are that ones the software is developed using this platform the features of the cloud like the multi tenancy, scalability and the availability are automatically involved into the software.
The infrastructure as a service model can be considered to be one of the most agile models of cloud computing. The concept directly enables deployment, which is automated relating to the aspect of compute, storage, networking and other services (Kaur & Rai, 2014). The user can easily build a virtual data center with all the different types of resources included into the system. The user in this context can access the data center of other user and is not restricted to their own data center only. The service of the infrastructure as a service mainly include amazon web service (AWS), exoscale, Google cloud.
The model, which is recommended in this context foe the SharedPoint service, is the SaaS (Software as a service) model. The advantage that is obtained after the implementation of the model are as follows:
The main problem, which is seen in the model, is the concept of the security of the data. In most of the cases it is seen that the user are very much unaware of were the data is being actually stored; the level of security which is involved into the concept and the degree of responsiveness the server would be having when the need of the data would be requested. In most of the cases, the user is unaware of the security of the data, which is stored in the concept of the cloud.
The main consideration, which should be taken into consideration the system, should be updated frequently so that there are no fault in the system. In the concept of securing the data encryption algorithm are added into the concept, which makes the data more secured and very easy to deal with (Rosado & Bernardino, 2014).
References
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Biswas, A. R., & Giaffreda, R. (2014, March). IoT and cloud convergence: Opportunities and challenges. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 375-376). IEEE.
Hameed, A., Khoshkbarforoushha, A., Ranjan, R., Jayaraman, P. P., Kolodziej, J., Balaji, P., … & Khan, S. U. (2016). A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7), 751-774.
Kaur, K., & Rai, A. K. (2014). A comparative analysis: Grid, cluster and cloud computing. International Journal of Advanced Research in Computer and Communication Engineering, 3(3), 5730-5734.
Kaur, R., & Kinger, S. (2014). Analysis of job scheduling algorithms in cloud computing. International Journal of Computer Trends and Technology (IJCTT), 9(7), 379-386.
Lo’ai, A. T., Mehmood, R., Benkhlifa, E., & Song, H. (2016). Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access, 4, 6171-6180.
Mezgár, I., & Rauschecker, U. (2014). The challenge of networked enterprises for cloud computing interoperability. Computers in Industry, 65(4), 657-674.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Puthal, D., Sahoo, B. P. S., Mishra, S., & Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Rosado, T., & Bernardino, J. (2014, July). An overview of openstack architecture. In Proceedings of the 18th International Database Engineering & Applications Symposium (pp. 366-367). ACM.
Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE potentials, 33(1), 34-36.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, 308-319.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download