SlideShare a Scribd company logo
1 of 10
Cloud Computing
Where has it gone and
where is it going?

By: Joanna Hendricks
BMT 580
Trends
• Cloud-based applications
*Cut costs
*Create powerful applications

• Identity as security

*Increasing the security as of 2014

• More “as a service” offerings
*Flexibility with platforms and graphics
*Lower IT costs
Trust Issues
and Privacy/Security
Security is the biggest trust issue
with Cloud Computing.
1.
Inquire about exception monitoring systems
2.
Be vigilant around updates and making sure that
staff don't suddenly gain access privileges they're
not
supposed to.
3.
Ask where the data is kept and inquire as to the details of
data protection laws in the relevant
jurisdictions.
4.
Seek an independent security audit of the host
Find out which third parties the company deals with
and whether they are able to access your data
5.
Be careful to develop good policies around
passwords; how they are created, protected and
changed.
6.
Look into availability guarantees and penalties.
7.
Find out whether the cloud provider will accommodate
your own security policies
Cost
The upfront cost of cloud computing can be
expensive, but mostly because people are using
outdated computer software. In the beginning the
software must be updated and this can be costly.
More and more companies are switching to Cloud
Computing, therefore it eventually will be a must
for companies to do this so they can compete with
similar companies and their software capabilities.
In the end, IT costs have been shown to decrease
as access to more options, platforms and graphics.
Examples of Companies
Within the last few years some big companies have
switched to Cloud Computing. Here are just a few.

•
•
•
•
•
•

Netflix
Xerox
Pinterest
Instagram
Etsy
Apple
Advantages of the Cloud
Advantages:
*

Cost Efficiency: Eliminates stand alone servers, savings on licensing
fees, eliminates cost of data storage, software updates and
management.
*
Convenience and continuous availability: Public cloud is available
wherever the end user may be located.
*
Backup and recovery is simplified.
*
Cloud is environmentally friendly.
*
Resiliency and Redundancy
*
Scalability and Performance
*
Quick deployment and ease of integration
*
Increased storage capacity
*
Device diversity and location independence
*
Smaller learning curve
Disadvantages of the Cloud
Disadvantages:
*
*
*

Security and privacy
Dependency and vendor lock-in
Technical difficulties and downtime: because
the server is not on sight, it is not accessible
by the IT professional.
*
Limited control
*
Increased vulnerability
In conclusion:
It is becoming apparent that
businesses need to begin
moving toward cloud computing
or they are going to be left
behind.
References/Sources
•

Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready?
Thegaurdian Retrieved from:
http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat

•

Allouche, G. (2013, September 17). 7 well known companies who have moved to the
cloud. Smart Data Collective. Retrieved from:
http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud

•

McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes.
Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/

•

Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street
Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search?
q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+
news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE
5FF95F9B9538896D59D
References/Sources
•

Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready?
Thegaurdian Retrieved from:
http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat

•

Allouche, G. (2013, September 17). 7 well known companies who have moved to the
cloud. Smart Data Collective. Retrieved from:
http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud

•

McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes.
Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/

•

Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street
Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search?
q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+
news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE
5FF95F9B9538896D59D

More Related Content

What's hot

The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44Jisc
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceAberla
 
Oper8 document management solution v2.0
Oper8 document management solution v2.0Oper8 document management solution v2.0
Oper8 document management solution v2.0Tony Riley
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centersNarendran Vaideeswaran
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Doing business on the web new
Doing business on the web newDoing business on the web new
Doing business on the web newanilchop
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSKCSAIsrael
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology OperationsIvanti
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber SecurityNiki Upadhyay
 

What's hot (20)

The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Oper8 document management solution v2.0
Oper8 document management solution v2.0Oper8 document management solution v2.0
Oper8 document management solution v2.0
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Doing business on the web new
Doing business on the web newDoing business on the web new
Doing business on the web new
 
Cloud security
Cloud securityCloud security
Cloud security
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 

Viewers also liked

Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]GRUPIDEA
 
Kgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistasKgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistasMartin Triana
 
áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014palopilu
 
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...Clases particulares de alemán
 
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014John Feland
 
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008MARIA ODETE ALVES
 
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria AlimentariaFIAB
 
Simboli hemijskih elemenata
Simboli hemijskih elemenataSimboli hemijskih elemenata
Simboli hemijskih elemenataBiljana Ristic
 

Viewers also liked (13)

Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]
 
Muebles20
Muebles20Muebles20
Muebles20
 
C07 23
C07 23C07 23
C07 23
 
Crowdfunding im Dokumentarfilmbereich
Crowdfunding im DokumentarfilmbereichCrowdfunding im Dokumentarfilmbereich
Crowdfunding im Dokumentarfilmbereich
 
Kgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistasKgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistas
 
áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014
 
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
 
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
 
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
 
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
 
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
 
Simboli hemijskih elemenata
Simboli hemijskih elemenataSimboli hemijskih elemenata
Simboli hemijskih elemenata
 
Moenda
MoendaMoenda
Moenda
 

Similar to Cloud computing web 2.0 By Joanna Hendricks BMT 580

Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptxnischal52
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfanilgoelslg
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!imogokate
 
Cloud Deployment Models.pdf
Cloud Deployment Models.pdfCloud Deployment Models.pdf
Cloud Deployment Models.pdfHasanRaza331074
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 

Similar to Cloud computing web 2.0 By Joanna Hendricks BMT 580 (20)

Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Cloud Deployment Models.pdf
Cloud Deployment Models.pdfCloud Deployment Models.pdf
Cloud Deployment Models.pdf
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Cloud computing web 2.0 By Joanna Hendricks BMT 580

  • 1. Cloud Computing Where has it gone and where is it going? By: Joanna Hendricks BMT 580
  • 2. Trends • Cloud-based applications *Cut costs *Create powerful applications • Identity as security *Increasing the security as of 2014 • More “as a service” offerings *Flexibility with platforms and graphics *Lower IT costs
  • 3. Trust Issues and Privacy/Security Security is the biggest trust issue with Cloud Computing. 1. Inquire about exception monitoring systems 2. Be vigilant around updates and making sure that staff don't suddenly gain access privileges they're not supposed to. 3. Ask where the data is kept and inquire as to the details of data protection laws in the relevant jurisdictions. 4. Seek an independent security audit of the host Find out which third parties the company deals with and whether they are able to access your data 5. Be careful to develop good policies around passwords; how they are created, protected and changed. 6. Look into availability guarantees and penalties. 7. Find out whether the cloud provider will accommodate your own security policies
  • 4. Cost The upfront cost of cloud computing can be expensive, but mostly because people are using outdated computer software. In the beginning the software must be updated and this can be costly. More and more companies are switching to Cloud Computing, therefore it eventually will be a must for companies to do this so they can compete with similar companies and their software capabilities. In the end, IT costs have been shown to decrease as access to more options, platforms and graphics.
  • 5. Examples of Companies Within the last few years some big companies have switched to Cloud Computing. Here are just a few. • • • • • • Netflix Xerox Pinterest Instagram Etsy Apple
  • 6. Advantages of the Cloud Advantages: * Cost Efficiency: Eliminates stand alone servers, savings on licensing fees, eliminates cost of data storage, software updates and management. * Convenience and continuous availability: Public cloud is available wherever the end user may be located. * Backup and recovery is simplified. * Cloud is environmentally friendly. * Resiliency and Redundancy * Scalability and Performance * Quick deployment and ease of integration * Increased storage capacity * Device diversity and location independence * Smaller learning curve
  • 7. Disadvantages of the Cloud Disadvantages: * * * Security and privacy Dependency and vendor lock-in Technical difficulties and downtime: because the server is not on sight, it is not accessible by the IT professional. * Limited control * Increased vulnerability
  • 8. In conclusion: It is becoming apparent that businesses need to begin moving toward cloud computing or they are going to be left behind.
  • 9. References/Sources • Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready? Thegaurdian Retrieved from: http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat • Allouche, G. (2013, September 17). 7 well known companies who have moved to the cloud. Smart Data Collective. Retrieved from: http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud • McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes. Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/ • Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search? q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+ news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE 5FF95F9B9538896D59D
  • 10. References/Sources • Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready? Thegaurdian Retrieved from: http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat • Allouche, G. (2013, September 17). 7 well known companies who have moved to the cloud. Smart Data Collective. Retrieved from: http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud • McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes. Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/ • Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search? q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+ news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE 5FF95F9B9538896D59D