Sunday, April 7, 2019

Cloud Computing Essay Example for Free

deprave Computing EssayHow did Ericsson benefit from Amazon blade Services (AWS)?According to Amazons Web Service sack upsite, it gives users the option to run just about everything using their service applications. By incorporating cloud computing, users atomic number 18 able to data track variable costs to a to a greater extent attractive scale for the business by eliminating costly administrative and hardware fees. Due to remote portal, Ericsson was able to immediately take advantage of AWSs benefits since the infrastructure was already up and running. Demands change chop-chop and its primal for a friendship to be able to adjust accordingly. By using the cloud system, Ericsson was able to employ software updates and new applications quickly and more effectively. AWS work hundreds of thousands of customers in more than 190 countries, making their global infrastructure far more expansive than competitors this allowed Ericsson to have data centers in various parts of t he world. According to instruction provided in the grammatical case study, Ericsson chose AWS because they felt it was the most integrated public cloud provider in the Rightscale Cloud Management broadcast (Rightscale).Amazon EC2, Amazon S3, and RightScaleAmazon EC2The AWS website describes Amazon Elastic Compute Cloud (Amazon EC2) as a web service that provides resizable compute electrical condenser in the cloud, making web-scale computing easier for developers. It also allows you to quickly scale subject up and down if and when your computing requirements change. Because this system works on a pay-as-you-go method acting, you only pay for the capacity you use which is a great option from an economic stand point.Amazon S3Amazon S3 is described quite an simply on the AWS websitestorage for the Internet. It makes a developers job easier by providing for more convenient Web-scale computing. It gives them access to the same high quality infrastructure that Amazon uses to run its global network. With Amazon S3, one ass store any amount data, anywhere, and have total access to it at any time via the web. The main(prenominal) purpose of this service is to maximize benefits of scale and pass them on to developers (AWS Website, 2012).RightScaleRightScale is your bridge between applications and your cloud infrastructure. It allows for flaccid deployment and management of apps across not only public clouds, but private and hybrid ones as well. RightScale configures expeditiously and also provides brass instruments with better overall command of the cloud computing infrastructure and applications. Server management is an important aspect of using the cloud, and with this service, the company female genitals scale and monitor more effectively, enhancing require. Organizations view the portability of RightScale as a huge incentive because it provides for greater flexibility and less restriction in a sense of provider options.Security Concerns How to Cope With ThemNaturally, with any cloud-based service, there are lots of security concerns, including but not curb to, recovery issues, who has access to sensitive information, and data location. Recovery IssuesIn the event that the organization loses information or experiences a tragic situation, the seller who is sponsoring the cloud-based service should have a detailed and easily executable contrive in place to resolve the issue and make the process of recovery as painless as possible. Its also important that both parties agree to the terms beforehand to avoid any spare disagreements and issues.User AccessWhen an organization opts to use cloud-based computing, they release a level of control, to a certain degree. The vendor controls the cloud and their employees may have access to the clients information. Its vital that the client organization seek clarity on exactly who has that access and their credentialslevel of expertise, exact job surname and company responsibility, etc.Data Loca tionThe client organization wants to make sure they at to the lowest degree know what country the cloud system they are using is located in. There are just about cases where the organization has no clue where the cloud they are utilizing is based and that could potentially be a problem. one way to ease concern would be for the client to suggest specific locations and ensure that company hiding will not be breached. One suggestion to cope with the afore mentioned security concerns would be a method called the layered approach. The good thing about this option is it not only offers protection for not only the organization, but the vendor as well. The multi-level technique makes for a layered defense model that keeps the company from totally relying on one option. take aim onephysical securitywould focus on observe the actual facility that houses servers and other sensitive equipment.Level twonetwork securitywould ensure around-the-clock monitoring of the network by well trained personnel. Level threeintrusion detectionwould control the traffic that enters and leaves the network, making sure that any possible intrusion would be detected immediately and handled accordingly. Level fourfirewall managementthese should be custom fitted for the organization. These are commonly used with organizations and provide that added cushion in the level of security. And finally, Level fivedata encryptionshould be maintained inside and outside the cloud. Because the information that is transmitted over the cloud is so sensitive, maintain a high level of security is super important. This is mainly the vendors responsibility however, the client organization can absolutely make suggestions and requirements that personally cater to their needs.Scalability, Reliability, and Cost Issues Associated with Cloud Computing Organizations can easily capitalize on economies of scale and majorly cut costs because virtualization is the main vehicle for cloud-based computing. The need to purchase and maintain hardware and spend funds on administrative costs is basically eliminated. The mobility of the cloud network allows for total access of large amounts of data anywhere, anytime and companies obtain that to be a very attractive incentive.The only issue that may arise is network reliablenessyes, the problem with data storage is limited and inexpensive however, the probability of outages is unavoidable with this option. Cloud computing can become very expensive to install and get running however, the fact that companies only pay for services they use is great Eliminating the need to maintain subscriptions and licenses saves the company tons of money and makes running the infrastructure considerably more convenient. It is clear that the benefits outweigh the possible issues that may arise.BibliographyEricsson Case Study. 2011. http//aws.amazon.com/solutions/case-studies/ericsson/Security Techniques for Protecting Data in Cloud Computing. 2012. http//www.kaspersky.c om/images/european_cup_2012_march5_Venkata%20Sravan%20Kumar%20Maddineni-10-141650.pdfUnderstanding Layered Security and Defense in Depth. 2008. http//www.techrepublic.com/blog/security/understanding-layered-security-and-defense-in-depth/703

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.