The following report is based on cloud computing technique which is a modern Information Technology paradigm that helps to store and process the variety of information with the least manual effort over the internet. The business units can either access data from their privately owned cloud or a third party based cloud service that is present in some other location. The research has aimed to find out the different advantages as well as the disadvantages of the cloud technology when it is implemented and integrated in the business environment. The research will unfold all the different processes that will explain the process on how the cloud computing forms an integral part of the modern day business units.
The researcher has identified some of the objectives of the research in detail. The objectives have been determined by the researcher to outcome the different advantages and disadvantages of the mentioned technology. Some of the objectives are as follows;
The report prepared by the researcher has a huge scope as it has highlighted exclusively on the advantages and disadvantages of the cloud computing system software. The researcher has provided a detailed analysis of the different types of cloud computing servers including the applications of the software (Dinh et al. 2013). Different companies operating in the market have different types of strategies in the market thus it is quite common for the companies to have a difference in their necessities. The difference in the requirements is thus important to determine their choices for the cloud based software. The vast level of discussion regarding the various elements of the cloud technology makes the scope of the research much bigger and wide in size.
In this section of the report the researcher has in detail reviewed the use and the pros and cons of cloud computing software in the business environment. Cloud computing has a variety of advantages that helps it to be one of the most sought after solutions in the modern business enterprises. The researcher has also discussed about the cons of cloud computing that is believed to be a major hurdle in the business environment. To make the research more reliable and accurate the researcher has also added the safety measures that are needed to be followed while using the cloud based computing systems. The major reasons for the addition of such different types of elements and factors related to the cloud computing services makes the research more effective and flawless.
Figure 1- Cloud Computing Framework
Source- (Hashem et al. 2015)
According to Leyman, cloud computing refers to the use of a network that is based on some remote servers hosted over the internet. The software is used for storage of the information in different places that are accessible by the users. The places include hard drives, laptops, desktops and other computing devices used by the service users (Rittinghouse and Ransome 2016). The main use of the cloud computing devices lies on its feature to both store and process the information in the internet itself. Maintaining a cloud based software system in the company helps the management of the company to keep a proper database of the company for using it in different ways.
The following technology was first used in as early as the 1990’s when a handful of technical experts and some of the technical executives of Compaq Computers hatched the idea of the cloud computing (Fernando et al. 2013). Compaq developed the cloud computing system which was just capable of storing the information and did not have the provision for processing it further. The passage of time increased the use of cloud computing and gradually the technology became an integral part of the total system. The additional features of cloud computing was developed as cloud computing was slowly integrated into using the applications, management of the information of the organization, providing a secured process of data storage and many more as such (Arora et al. 2013). The advancements in the technological process slowly forced the other leading information technology companies to adopt the new system software for their use. The main advantage of using the cloud computing devices as well as software is to retain the information within the organization. This helps the organization to access the important information at any point of time.
Some of the main uses of cloud technology are;
The research questions were formulated by the researcher for the questionnaires to answer. They were;
Qualitative Research
Qualitative Research involves the use of unstructured and unreliable data sources and information collecting methods that includes observations, research interviews, surveys, documents and many more as similar to such things (Chang et al. 2013). Qualitative research is a theoretical form of research and thus includes a detailed research procedure. It provides the details of what, where and when. The steps involved in such a research include;
Sampling is the collection of the information from the participants that are selected for interviewing during the conduction of the research.
The researcher considered a sample size of 50 persons to conduct the research. The sample size was considered on the basis of the research.
Quantitative Research
Quantitative Research methods refer to the objective calculations and the different mathematical, statistical and numerical analysis of the information collected through the polls or the research questionnaire and survey (Garrison et al. 2015). The methods that are followed during the quantitative methods are;
The research has been organized in a proper and efficient manner. All the necessary specifications, factors and elements have been discussed properly by the researcher. However the research lacks some important elements which should and must have been considered by the researcher before the completition of the research. The researcher has taken a limited number of references and has omitted some of the main journals and earlier researches which could have made the research more compact in nature. The absence of some important statistics including the proper estimation of the cloud computing frameworks used in the companies and their period of use has hampered the cause of the research. The research conducted by the researcher has overall fulfilled the aims and objectives but has lots of area for improvement.
Figure 2- Timeline
Source- (As Created by the Author)
Conclusion
The researcher has been able to fulfill all the aims and objectives of the research. The research has provided all the necessary details regarding the cloud computing technology. The advantages and disadvantages of the project will be further discussed in the actual project. Analyzing the whole project it can be concluded that the research is specific and has been able to meet all the necessary specifications. After reading this particular project the readers will get a clear idea about cloud computing and can apply them in their researches in the future.
References
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), pp.1922-1926.
Bitam, S., Mellouk, A. and Zeadally, S., 2015. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wireless Communications, 22(1), pp.96-102.
Chang, V., 2015. A proposed cloud computing business framework. Nova Science Publisher.
Chang, V., Walters, R.J. and Wills, G., 2013. The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3), pp.524-538.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.
Fernando, N., Loke, S.W. and Rahayu, W., 2013. Mobile cloud computing: A survey. Future generation computer systems, 29(1), pp.84-106.
Garrison, G., Wakefield, R.L. and Kim, S., 2015. The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), pp.377-393.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), pp.131-143.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download