SlideShare a Scribd company logo
1 of 11
Information Technology
Group member information:
Name ID Section
Kamran Hasan Akash 193-15-13468 C
Apurbo Roy 193-15-13467 C
Sadman Sadik 193-15-13419 C
Table of Content
• Introduction.
• Literature review.
• Methodology.
• Analysis of the paper.
• Conclusion.
• Summary.
• References.
Introduction:
Simply put, cloud computing is the delivery of computing services—
including servers, storage, databases, networking, software, analytics,
and intelligence—over the Internet (“the cloud”) to offer faster
innovation, flexible resources, and economies of scale.
Information technology (IT) is part of the value chain and corporate
strategy of companies (PORTER, 1998). This area has been highlighted
by its rapid development being responsible for several technological
innovations, which affect the strategic positioning of companies. In the
1970s the computing model based on both proprietary technology and
high cost large computers, known as mainframes, contributed to the
formation of oligopolies in companies providing IT services which
provided data processing to consumer companies.
Literature review:
The information technology sector has presented a fast
technological evolution in the past five decades. At the
same time, business models have evolved among IT
provider and consumer companies. The first decade of
this century saw the rise of significant advances in
several areas of information technology. The processing
power breakthrough at low costs, foreseen in the
Moore's Law, known due to Gordon Moore's assertion
(1965), founder of Intel, according to which "the number
of transistors embedded in a chip will double
approximately every 24 months", has been
demonstrated in the doubling of computing power every
two years.
At the same time, advances in the power of
communication networks, foreseen in the Metcalfe's
Law, known due to the Robert Metcalfe's statement
(1995), inventor of the Ethernet networking technology,
according to which "the value (or importance) of a
telecommunications network is proportional to the
square of the number of communications devices
connected", has been demonstrated through the growth
of the Internet, accelerated by new connectivity
technologies such as fiber optics and wireless networks
of the third and fourth generations, resulting in a
scenario described as hyper connectivity.
Frame work:
Methodology
This research is descriptive, since it aims to identify threats, opportunities and influences the
type of the cloud computing model, from the perspective of executives responsible for IT areas
of companies . According to Medeiros (2009, p. 30), the descriptive research is composed of
"facts study, analysis, reporting and interpretation of the physical world without any
interference from the researcher, e.g.: market and opinion surveys". For Gil (2010, p. 28), the
researches that "aim to raise opinions, attitudes and beliefs of a population", are included in the
descriptive research group.
This research method will be the field survey and the survey instrument will be a structured
questionnaire. According to Gil (2010, p. 35), the surveys "are characterized by direct
questioning people whose behavior is wished to know. Basically, it proceeds in order to request
information from a significant group of people around the problem studied and then, through a
quantitative analysis, obtain the conclusions regarding the collected data".
The main advantages of the questionnaire are: direct knowledge of reality, economy, agility and
quantification (Gil, 2010). For Gil (2010, p. 103), "the questionnaire is the quickest and cheapest
way to obtain information, in addition to not requiring staff training also ensuring anonymity."
According to Kilter and Keller (2006, p. 103), "questionnaires should be developed, tested and
enhanced very carefully before being applied in large scale." For Gil (2010, p. 99), the survey
phases are, sequentially: Goal specifications; Concepts and variables operationalization; Data
collection instrument preparation; Instrument pre-test; Sample selection; Data collection and
verification; Data analysis and interpretation; Report Essay.
Analysis of the paper:
Cloud computing represents a new technical and business paradigm, with the potential to
enable the utility computing model and transform relations between IT consumer and
provider companies.
The findings of this study aim to contribute for the strategic preparation and positioning of
IT consumer companies before this new paradigm. As for the goal of identifying barriers
and opportunities to adopt the model, the survey showed that concerns about security,
availability, performance, standardization, adaptation of applications and governance are
barriers for the cloud computing adoption.
So there are clear opportunities for improvement and differentiation of provider
companies in these aspects. Moreover, regulators and standardization institutions should
focus on the rapid evolution of standards, rules and regulations related to cloud computing.
And finally, regarding the identification of the model influence on the IT professional role in
organizations, it was noticed that in the new utility computing paradigm, the IT area in the
consumer companies starts focusing on management of the cloud computing providers
hired services in order to optimize business processes. In this scenario, there is an emphasis
of the IT department in services, supply chain and performance management. As a result,
the professionals should have an integrated profile of IT business analyst. There are
therefore opportunities to adapt the training programs of these professionals, which
should emphasize on business management, services and contracts knowledge and skill,
besides the knowledge in technology.
Conclusion:
Information technology has been evolutionary progressing and leading to the concept
of cloud technology. This identified as one of the major computing models, in which
the interest of several educational and industrial organizations in the research on the
successful paradigm increased. However, there is also an interesting question about
security threats and problems that depend on cloud computing's attraction. Because
the cloud architecture is based on a distributed framework, inheriting those threats
and vulnerabilities that are relevant to distributed concepts would then be usual.
Moreover, almost all of those risks over the cloud concept have strengthened. Future
research in cloud computing governance on these and other attributes can inform
research and practice on the impact of cloud computing. Cloud Computing and its role
in the Information Technology addressed in this article. Although there was
considerable discussion of the factors of interoperable, an open standardized
framework was suggested in each of the influential usage examples. This paper
focused mainly on major cloud paradigm security threats, one of those threats related
to service disruption that can result from attacks such as a denial of service attacks,
service hijacking, and VM-level attacks, etc.
In addition, if we get a chance to address the limitations, we will try to address the
limitations mentioned above and also try to address the issue of cloud paradigm
security threats in information technology.
Summary:
 Cloud computing represents a new paradigm that enables the utility computing
model in which computing resources are offered and consumed as a service on
demand, pay as you go, in a model similar to that of electricity.
 The objective of this work is to identify threats and opportunities of the cloud
computing model and its influence on the strategy of companies that consume
Information Technology.
 We noticed the influence of cloud computing in migrating the focus of the
corporate IT departments to the management of services and contracts, resulting
into the demand for professionals with IT analyst integrated and business profiles.
References:
• RMBRUST, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2009). Above the Clouds: A Berkeley View
of Cloud Computing. University of California, Berkeley. [Accessed September,4 2010]
• CARR, N. (2008). The Big Switch: Rewiring the World, from Edison to Google (1st Kindle ed.). Norton & Company, New
York. Cloud Standards. (2010, 24-8).
• CLOUD STANDARDS. [Accessed September 19, 2010]
• EXAME: revista quinzenal de negócios. Ed. Abril. Maiores e Melhores 2009. [Accessed October 12, 2010]
• GIL, A. C. (2010). Como elaborar projetos de pesquisa. Atlas, São Paulo.
• HITT, M. A., Ireland, R. D., & Hoskisson. (2008). Administração Estratégica: competitividade e globalização (2 ed.).
Cengage Learning, São Paulo.
• IT4CIO. [Accessed September 11, 2010]
• LEE, K. K. (2005). Building Resilient IP Networks. Cisco Press, Indianapolis.
• MEDEIROS, J. B. (2009). Redação Científica. Atlas, São Paulo.
• MELL, P., Grance, T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology. [Accessed
September 14, 2010]
• PETRI, G. (2010). Shedding Light on Cloud Computing. CA Technologies IT Management Software and Solutions.
[Accessed October 23, 2010]
• PORTER, M. E. (1998). Competitive Advantage: creating and sustaining superior performance: with a new Introduction
(1st Kindle ed.). Free Press, New York.
• ROTHON, J. (2009) Cloud Computing Explained: Implementation Handbook for Enterprises (2 Kindle ed.). Recursive
Press, London.
• SIMON, P. (2010). The next wave of technologies: opportunities from chaos. (1st Kindle ed.). John Wiley & Sons, New
Jersey.
• TSERONIS, P., Lewin, K., Garbas, K., & Mell, P. (2010). Federal Risk and Authorization Management Program (FedRAMP).
National Institute of Standards and Technology. [Accessed September 4, 2010]
• Selected February 11, 2013.
Thank You Mam

More Related Content

What's hot

Webinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesWebinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesCreative Industries KTN
 
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...Amos Wachanga
 
Murray2017 article the_circulareconomyaninterdisci
Murray2017 article the_circulareconomyaninterdisciMurray2017 article the_circulareconomyaninterdisci
Murray2017 article the_circulareconomyaninterdisciedisnajda
 
Impact of semantic technologies on scholarly publishing
Impact of semantic technologies on scholarly publishingImpact of semantic technologies on scholarly publishing
Impact of semantic technologies on scholarly publishingMills Davis
 
2. cloud computing and implications for public policy
2. cloud computing and implications for public policy2. cloud computing and implications for public policy
2. cloud computing and implications for public policyPrachyanun Nilsook
 
Cidades brasileiras inteligentes com iot
Cidades brasileiras inteligentes com iotCidades brasileiras inteligentes com iot
Cidades brasileiras inteligentes com iotFernando Palma
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionDWP Information Architects Inc.
 
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud MigrationFramework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migrationijccsa
 
Simon Kinneen Dissertation
Simon Kinneen DissertationSimon Kinneen Dissertation
Simon Kinneen DissertationSimon Kinneen
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of thingsRahul Tathod
 
20160331 ind01 art-ict-art-v1.0
20160331 ind01 art-ict-art-v1.020160331 ind01 art-ict-art-v1.0
20160331 ind01 art-ict-art-v1.0Claudio Laferla
 
J. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internetJ. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internetFIA2010
 
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENT
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENTCONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENT
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENTDarko Petrusic
 
2nd International Conference on Data Mining & Machine Learning (DMML 2021)
2nd International Conference on Data Mining & Machine Learning (DMML 2021)2nd International Conference on Data Mining & Machine Learning (DMML 2021)
2nd International Conference on Data Mining & Machine Learning (DMML 2021)IJDKP
 
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...On the Diversity of the Accountability Problem. Machine Learning and Knowing ...
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...Bernhard Rieder
 

What's hot (20)

Webinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory StudiesWebinar slides - Internet of Things Convergence: Preparatory Studies
Webinar slides - Internet of Things Convergence: Preparatory Studies
 
Document Engineering
Document EngineeringDocument Engineering
Document Engineering
 
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
 
Murray2017 article the_circulareconomyaninterdisci
Murray2017 article the_circulareconomyaninterdisciMurray2017 article the_circulareconomyaninterdisci
Murray2017 article the_circulareconomyaninterdisci
 
My Research Interests
My Research InterestsMy Research Interests
My Research Interests
 
An empirical investigation on the relationship between co-patent network, str...
An empirical investigation on the relationship between co-patent network, str...An empirical investigation on the relationship between co-patent network, str...
An empirical investigation on the relationship between co-patent network, str...
 
Impact of semantic technologies on scholarly publishing
Impact of semantic technologies on scholarly publishingImpact of semantic technologies on scholarly publishing
Impact of semantic technologies on scholarly publishing
 
2. cloud computing and implications for public policy
2. cloud computing and implications for public policy2. cloud computing and implications for public policy
2. cloud computing and implications for public policy
 
Cidades brasileiras inteligentes com iot
Cidades brasileiras inteligentes com iotCidades brasileiras inteligentes com iot
Cidades brasileiras inteligentes com iot
 
Microsoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for ConstructionMicrosoft Whitepaper: Cloud Computing Guide for Construction
Microsoft Whitepaper: Cloud Computing Guide for Construction
 
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud MigrationFramework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
Framework for Cloud Computing Adoption: A Roadmap for Smes to Cloud Migration
 
Simon Kinneen Dissertation
Simon Kinneen DissertationSimon Kinneen Dissertation
Simon Kinneen Dissertation
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of things
 
20160331 ind01 art-ict-art-v1.0
20160331 ind01 art-ict-art-v1.020160331 ind01 art-ict-art-v1.0
20160331 ind01 art-ict-art-v1.0
 
3 fia activities
3 fia activities3 fia activities
3 fia activities
 
J. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internetJ. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internet
 
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENT
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENTCONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENT
CONCEPTUAL MODEL OF OPEN ARCHITECTURE FOR OPEN GOVERNMENT
 
2nd International Conference on Data Mining & Machine Learning (DMML 2021)
2nd International Conference on Data Mining & Machine Learning (DMML 2021)2nd International Conference on Data Mining & Machine Learning (DMML 2021)
2nd International Conference on Data Mining & Machine Learning (DMML 2021)
 
GovernmentofOntario_CS
GovernmentofOntario_CSGovernmentofOntario_CS
GovernmentofOntario_CS
 
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...On the Diversity of the Accountability Problem. Machine Learning and Knowing ...
On the Diversity of the Accountability Problem. Machine Learning and Knowing ...
 

Similar to Cloud Computing Role in Information technology

An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...Michele Thomas
 
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...James Mitchell
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedThe Economist Media Businesses
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudHitachi Vantara
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalEmily Smith
 
Cloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsCloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsIBM India Smarter Computing
 
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...Khaled gharib
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
 
Global-Technology-Outlook-2013
Global-Technology-Outlook-2013Global-Technology-Outlook-2013
Global-Technology-Outlook-2013IBM Switzerland
 
Ibm global technology outlook 2013
Ibm   global technology outlook 2013Ibm   global technology outlook 2013
Ibm global technology outlook 2013Rick Bouter
 
The Impact of Cloud on IT Consumption Models
The Impact of Cloud on IT Consumption ModelsThe Impact of Cloud on IT Consumption Models
The Impact of Cloud on IT Consumption ModelsJoseph M Bradley
 
COM6905 Research Methods And Professional Issues.docx
COM6905 Research Methods And Professional Issues.docxCOM6905 Research Methods And Professional Issues.docx
COM6905 Research Methods And Professional Issues.docxwrite31
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGijitcs
 
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013IBM Switzerland
 
Big Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 EraBig Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 EraJohnWilson47710
 

Similar to Cloud Computing Role in Information technology (20)

An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
An Advanced Analysis Of Cloud Computing Concepts Based On The Computer Scienc...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...
Cloud Pricing is Broken - by Dr James Mitchell, curated by The Economist Inte...
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
Enabling Digital Business (EDB)
Enabling Digital Business (EDB)Enabling Digital Business (EDB)
Enabling Digital Business (EDB)
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
 
Economist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation CloudEconomist Intelligence Unit: Preparing for Next-Generation Cloud
Economist Intelligence Unit: Preparing for Next-Generation Cloud
 
Adoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In NepalAdoption Of Cloud Computing In Nepal
Adoption Of Cloud Computing In Nepal
 
Cloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projectsCloud computing insights from110 implementation projects
Cloud computing insights from110 implementation projects
 
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
Global-Technology-Outlook-2013
Global-Technology-Outlook-2013Global-Technology-Outlook-2013
Global-Technology-Outlook-2013
 
Ibm global technology outlook 2013
Ibm   global technology outlook 2013Ibm   global technology outlook 2013
Ibm global technology outlook 2013
 
The Impact of Cloud on IT Consumption Models
The Impact of Cloud on IT Consumption ModelsThe Impact of Cloud on IT Consumption Models
The Impact of Cloud on IT Consumption Models
 
COM6905 Research Methods And Professional Issues.docx
COM6905 Research Methods And Professional Issues.docxCOM6905 Research Methods And Professional Issues.docx
COM6905 Research Methods And Professional Issues.docx
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTINGADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
ADMINISTRATION SECURITY ISSUES IN CLOUD COMPUTING
 
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013
ISDC 2013_Referat_Moshe Rappoport_IBM GTO 2013
 
Big Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 EraBig Data And Analytics: A Summary Of The X 4.0 Era
Big Data And Analytics: A Summary Of The X 4.0 Era
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Cloud Computing Role in Information technology

  • 1. Information Technology Group member information: Name ID Section Kamran Hasan Akash 193-15-13468 C Apurbo Roy 193-15-13467 C Sadman Sadik 193-15-13419 C
  • 2. Table of Content • Introduction. • Literature review. • Methodology. • Analysis of the paper. • Conclusion. • Summary. • References.
  • 3. Introduction: Simply put, cloud computing is the delivery of computing services— including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. Information technology (IT) is part of the value chain and corporate strategy of companies (PORTER, 1998). This area has been highlighted by its rapid development being responsible for several technological innovations, which affect the strategic positioning of companies. In the 1970s the computing model based on both proprietary technology and high cost large computers, known as mainframes, contributed to the formation of oligopolies in companies providing IT services which provided data processing to consumer companies.
  • 4. Literature review: The information technology sector has presented a fast technological evolution in the past five decades. At the same time, business models have evolved among IT provider and consumer companies. The first decade of this century saw the rise of significant advances in several areas of information technology. The processing power breakthrough at low costs, foreseen in the Moore's Law, known due to Gordon Moore's assertion (1965), founder of Intel, according to which "the number of transistors embedded in a chip will double approximately every 24 months", has been demonstrated in the doubling of computing power every two years. At the same time, advances in the power of communication networks, foreseen in the Metcalfe's Law, known due to the Robert Metcalfe's statement (1995), inventor of the Ethernet networking technology, according to which "the value (or importance) of a telecommunications network is proportional to the square of the number of communications devices connected", has been demonstrated through the growth of the Internet, accelerated by new connectivity technologies such as fiber optics and wireless networks of the third and fourth generations, resulting in a scenario described as hyper connectivity.
  • 6. Methodology This research is descriptive, since it aims to identify threats, opportunities and influences the type of the cloud computing model, from the perspective of executives responsible for IT areas of companies . According to Medeiros (2009, p. 30), the descriptive research is composed of "facts study, analysis, reporting and interpretation of the physical world without any interference from the researcher, e.g.: market and opinion surveys". For Gil (2010, p. 28), the researches that "aim to raise opinions, attitudes and beliefs of a population", are included in the descriptive research group. This research method will be the field survey and the survey instrument will be a structured questionnaire. According to Gil (2010, p. 35), the surveys "are characterized by direct questioning people whose behavior is wished to know. Basically, it proceeds in order to request information from a significant group of people around the problem studied and then, through a quantitative analysis, obtain the conclusions regarding the collected data". The main advantages of the questionnaire are: direct knowledge of reality, economy, agility and quantification (Gil, 2010). For Gil (2010, p. 103), "the questionnaire is the quickest and cheapest way to obtain information, in addition to not requiring staff training also ensuring anonymity." According to Kilter and Keller (2006, p. 103), "questionnaires should be developed, tested and enhanced very carefully before being applied in large scale." For Gil (2010, p. 99), the survey phases are, sequentially: Goal specifications; Concepts and variables operationalization; Data collection instrument preparation; Instrument pre-test; Sample selection; Data collection and verification; Data analysis and interpretation; Report Essay.
  • 7. Analysis of the paper: Cloud computing represents a new technical and business paradigm, with the potential to enable the utility computing model and transform relations between IT consumer and provider companies. The findings of this study aim to contribute for the strategic preparation and positioning of IT consumer companies before this new paradigm. As for the goal of identifying barriers and opportunities to adopt the model, the survey showed that concerns about security, availability, performance, standardization, adaptation of applications and governance are barriers for the cloud computing adoption. So there are clear opportunities for improvement and differentiation of provider companies in these aspects. Moreover, regulators and standardization institutions should focus on the rapid evolution of standards, rules and regulations related to cloud computing. And finally, regarding the identification of the model influence on the IT professional role in organizations, it was noticed that in the new utility computing paradigm, the IT area in the consumer companies starts focusing on management of the cloud computing providers hired services in order to optimize business processes. In this scenario, there is an emphasis of the IT department in services, supply chain and performance management. As a result, the professionals should have an integrated profile of IT business analyst. There are therefore opportunities to adapt the training programs of these professionals, which should emphasize on business management, services and contracts knowledge and skill, besides the knowledge in technology.
  • 8. Conclusion: Information technology has been evolutionary progressing and leading to the concept of cloud technology. This identified as one of the major computing models, in which the interest of several educational and industrial organizations in the research on the successful paradigm increased. However, there is also an interesting question about security threats and problems that depend on cloud computing's attraction. Because the cloud architecture is based on a distributed framework, inheriting those threats and vulnerabilities that are relevant to distributed concepts would then be usual. Moreover, almost all of those risks over the cloud concept have strengthened. Future research in cloud computing governance on these and other attributes can inform research and practice on the impact of cloud computing. Cloud Computing and its role in the Information Technology addressed in this article. Although there was considerable discussion of the factors of interoperable, an open standardized framework was suggested in each of the influential usage examples. This paper focused mainly on major cloud paradigm security threats, one of those threats related to service disruption that can result from attacks such as a denial of service attacks, service hijacking, and VM-level attacks, etc. In addition, if we get a chance to address the limitations, we will try to address the limitations mentioned above and also try to address the issue of cloud paradigm security threats in information technology.
  • 9. Summary:  Cloud computing represents a new paradigm that enables the utility computing model in which computing resources are offered and consumed as a service on demand, pay as you go, in a model similar to that of electricity.  The objective of this work is to identify threats and opportunities of the cloud computing model and its influence on the strategy of companies that consume Information Technology.  We noticed the influence of cloud computing in migrating the focus of the corporate IT departments to the management of services and contracts, resulting into the demand for professionals with IT analyst integrated and business profiles.
  • 10. References: • RMBRUST, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing. University of California, Berkeley. [Accessed September,4 2010] • CARR, N. (2008). The Big Switch: Rewiring the World, from Edison to Google (1st Kindle ed.). Norton & Company, New York. Cloud Standards. (2010, 24-8). • CLOUD STANDARDS. [Accessed September 19, 2010] • EXAME: revista quinzenal de negócios. Ed. Abril. Maiores e Melhores 2009. [Accessed October 12, 2010] • GIL, A. C. (2010). Como elaborar projetos de pesquisa. Atlas, São Paulo. • HITT, M. A., Ireland, R. D., & Hoskisson. (2008). Administração Estratégica: competitividade e globalização (2 ed.). Cengage Learning, São Paulo. • IT4CIO. [Accessed September 11, 2010] • LEE, K. K. (2005). Building Resilient IP Networks. Cisco Press, Indianapolis. • MEDEIROS, J. B. (2009). Redação Científica. Atlas, São Paulo. • MELL, P., Grance, T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology. [Accessed September 14, 2010] • PETRI, G. (2010). Shedding Light on Cloud Computing. CA Technologies IT Management Software and Solutions. [Accessed October 23, 2010] • PORTER, M. E. (1998). Competitive Advantage: creating and sustaining superior performance: with a new Introduction (1st Kindle ed.). Free Press, New York. • ROTHON, J. (2009) Cloud Computing Explained: Implementation Handbook for Enterprises (2 Kindle ed.). Recursive Press, London. • SIMON, P. (2010). The next wave of technologies: opportunities from chaos. (1st Kindle ed.). John Wiley & Sons, New Jersey. • TSERONIS, P., Lewin, K., Garbas, K., & Mell, P. (2010). Federal Risk and Authorization Management Program (FedRAMP). National Institute of Standards and Technology. [Accessed September 4, 2010] • Selected February 11, 2013.