Live 24/7 chat
Toll free :
Support :
← Computer Based Espionage and TerrorismSanctuary Soft →

Custom Cloud Computing essay paper

Live Chat

Excellent Cloud Computing essay writing service: professional academic help

Questions

1                    Introduction and Background Information

Within the field of IT, cloud computing is one of the emerging technologies in this era. This technology features large data storage, faster processing, as well as higher elements of the operating systems. Cloud computing allows take advantage of using these resources as a service instead of the installation process into computers. The term cloud computing has raised issues of confusion in that they are numerous aspects of service, which are inclusive. From another perspective, cloud computing is viewed as some variety of computing in which scalable elastic and adoptive aspects in IT are issued by the numerous users as a service.

Referring to a pure cloud computing model simply brings out the idea of being in possession of all the software and the data hosted in one server or a pool of these servers. This is after trying to access them from a local hard disk capacity in a processor, as well as a  memory, which will allow the  user easily use different computers. In other situations, a device which is equipped with a minimal operating system, in which it runs on a web browser, is the client. Through this research, we want to determine whether this solution is feasible and if limitations on the applications and the data access can be applied in such a computing model, with the key aim to determine the availability of the resources (Wang, 2012).

1.1.            Statement of the Problem

Cloud computing introduction brings a change to a conventional way of thinking in terms of what is put into consideration in a computer system, as well as the data, which to any extent is physically stored in certain computers. However, the two concepts that are data locus and system application have evolved to  geographical distribution. A logical deduction contributes in making hard in the sense that everything seems under someone’s control. Therefore, in many chief technological developments there is anxiety among the potential consumers. This concern is based on the limitation details as well as the potential implications that cloud computing may have.

In order to find out what these limitations comprises of we need to get the meaning of the cloud computing from different dimensions, especially in this research paper; therefore, we will put into consideration the legal, economic, as well as technical dimensions into consideration. In this research paper, we are going to analyze the questions the customers are to ask the providers of cloud computing before going ahead and signing a service agreement, as well as entrusting these providers with confidential data. We are going to try to find out how cloud computing will upgrade the life’s of customers technologically. This research paper mainly addresses the problems, which may arise and are related to performance of the applications that are running in the cloud computing. This analysis is based on previously done research and own experimentations from the cloud test bed. The goal of the research paper is to distinguish between the factors that enact performance and, at the same time, try to provide solutions as well as guidelines to users of the cloud computing that are at the risk of running into these performance problems.

1.2.            Objective of the Research

The objective of this research is to inspect the effectiveness and the efficiency of cloud computing limits and the advancements it may make to the art in the near future. The objective is to find out up to what extent has cloud computing penetrated in the business as a sample of the overall art in the IT resources. These objectives include the following:

1)      To determine the extent to which cloud computing has been adopted by various organization.

2)      To determine the key steps that cloud computing providers have adopted while offering the IT resources in ensuring equitable growth.

3)      To measure the efficiency and effectiveness of cloud computing.

1.3.            Research Questions

The study is to seek the answer to the following questions:

1)      How effective and efficient cloud computing is?

2)      To what extent have organizations enabled to incorporate cloud computing services in their organizations?

3)      What are some of the steps that cloud computing providers have adopted to ensure equitability in the services?

2           Literature Review

This chapter introduces the review of principles that were to form a basis for the study, qualitative characteristics of strong clouding computing system.

Analysis of cloud computing focuses on the fast growing market, including the ways in which it is managed and hosted by IT services. These services have a force on an internet-based delivery model as well as products, which are supportive to these efforts. The analysis also shows that, with the current growth and development in the technology, there is an improvement in the art of application, as time passes. This is because quite evident changes are often seen in the art of technology as time goes, because technology is improving with the increase in modernism and development in many countries especially in the economic sector.

Most cloud-computing providers have been offering well-managed services over both private IP networks and public web, over some years now. They use hosted applications as well as computing utility offers. On the other hand, it is remarkably clear that evolving businesses and pricing models, as well as the technological advances such as virtualization, are found to be pouring a dramatic increase as far as the number of businesses taking on cloud computing process is concerned (Arias, 2011). This is happening because businesses are on the run with an aim of adopting and advancing with change and avoiding being thrown out of the market.

The providers of a cloud computing analysis have shown that they deliver technology services to venture clients who in the end promise or show some efforts of providing a cost, which is effective. These costs are effective in the sense that they allow to manage applications and other resources from IT internally. The cloud-computing providers offer the computing capabilities, which are delivered throughout the network or maybe at a data center classically outside a clients’ own abilities. Following some current analysis there are emerging trends, such as changes in the market conditions, challenges and possible growth opportunities.

2.1              Basic Elements of Cloud Computing

Some of the mixture in computing model providers makes an organization to leverage computing services both private and public for a cost effective and flexible computing value. When we talk of private, we refer to the network storages, hardware and software owned by a third party for use by other companies, as well as individuals; for a private one it is owned by an organization and the users are the organization’s employees (Hurwitz, 2010). Finally, we have the hybrid one, which combines data and services to give a unified computing environment. It is, therefore, noteworthy to note that whichever the element of cloud computing one needs, it should provide elastic application and be affordable.

2.2              Hypothesis Development

Cloud computing is a web based form of subscription which enables its users to pay as per their usage. These models of computing provide IT services as well as online capabilities with data shared from a third party server. In this context, we are going to focus more on the organizations, companies, firms, and business as the users, as well as up to what limit cloud computing is going to position these sectors in the near future. Therefore, as the cloud computing users pay for these services on monthly and hourly basis, cloud computing will result in costs reduction; thus, leading to saving in the income of people or expenditure of these enterprises in the end. This will influence the benefits arising from the ERP solutions. At the same time, firms, businesses, organizations, and companies may be outsourcing IT resources by renting them in the course of usage over the internet. Cloud computing customers normally are using internet services, and because these corporations have a strong access to a wide range of capabilities in IT through cloud computing, they, therefore, are can focus on the center and main objectives of their business in the market environments. This will result into positive performance of the organization (Buyya, Broberg & Gos%u0301cin%u0301ski, 2011). Cloud computing is one of the key methods to use while communicating to investors, as well as the stakeholders, and; therefore; can leverage their latest innovations in technology. Therefore, in the process of trying to determine the limits of cloud computing in art in the near future, it is hypothesised that cloud computing and form of adoption announcement will result into optimistic shareholder returns.

Most organizational strategies are characterized by the presence of key objectives such as efficiencies in their operations; these attempts are aimed at reducing the cost and giving an increase in productivity and an increased overall growth of organizations or companies. The objective also helps in enlarging the available market and giving better market strategies to the customers linked in IT services. The efficiency or effectiveness of any organization lies under the IT implementation into its production activities. Cloud computing will pose limits, to which extent organizations, companies, businesses and firms will be able to enhance their operations efficiently, so as to meet the highest performance levels, in the near future. Cloud computing will depend on strategic intentions, which would consider how any market would react towards adoption of organizations into this system. It is, therefore, possible for investors and stakeholders to determine and evaluate the value of their firms in the near future. That is the limits up to which cloud computing adoption will have affected its operations.

Hypothesis 2: Through cloud computing a form of adoption announcement will result into a considerably different shareholder income according to strategic goals taken or adopted.

In the process of advancing in the near future, IT outsourcing mostly targets business sector, which is significantly adapting to all available changes in technology. In this case, the focus is on large companies because they are in the front line in investment as well as the cost maintenance, substantially. However, cloud computing is a business model which mainly offers potential ability to the upcoming enterprise (Hugos & Hulitzky, 2010). This is one statement, which can enable base the research argument or determine the limits, in the near future. This is because most of these firms allocate most of their resources in building up their business and rather not on just IT investment. Most economies work on to ensure that cloud computing models are affordable  for all sectors, especially to those corporations which  are not established and are struggling enormously to obtain these IT resources. With such laid assumptions, we can anticipate that all market returns in the business upon adoption of cloud computing can differ in respect to the size and ability of organizations.

3           Research Methods

In this chapter, the details of all information in regard  to the methods that had to be used in carrying out the research, form of research design used, the sample size, sampling methods, and procedure used to obtain the samples, the research instruments used and methods of data collection were also discussed. This chapter finally discussed how the data was to be collected and organized whereby it indicated how the analyzed data was to be presented.

3.1       Target Population

This research targeted not a particularly large group, but just a sample of a group picked from different organizations in the IT departments, where they comprised of IT specialists, software engineers in technological cooperation’s, as well as anti- cyber hacking organizations.

Table 1: Target Population

Anti- cyber

Software Engineers

IT department

Total

10

6

10

26

3.2       Sample Selection

The target population was 26 areas of expertise in cloud computing from the three randomly selected areas of study. In this randomly select population, a sample of characters from each population was selected and research done on them. Information represented was summarized in the table, as follows.

Table 2: Sample Selection

Category

Target Population

Sample Size

Sample Size Percentage

Category

Heads

3

3

100%

 

Staff

23

19

82.6%

 

Total

26

22

84.6%

 

3.3        Research Instruments and Data Collection Techniques

The main instruments of data collection were from primary and secondary sources. The primary sources were through interviews with the selected people in the target population. Secondary sources were through research from library books and the target groups’ official websites, as well as other internet official sites, in cloud computing.

3.4         Data Presentation and Aanalysis

The data collected from this research was quantitative and qualitative. Qualitative data was used in essence that it was pre-coded into categories, in order to process them into some information that could be described and presented. Charts and graphs, as well as statistics, were part of the qualitative analysis. Charts, graphs, and statistics were some of the quantitative analysis techniques used in exploring of this survey. Then pie charts and bar charts were used to present the analyzed data.

3.5          Findings

This chapter’s aim was to analyze the data statistically, as well as present data in a summary form. This presentation includes both secondary and primary data, which was gathered from the respondent of this research study. The data presented under the chapter is known as primary data, as it is in the form of raw data and; therefore, it is only offering personal information before the analysis is done in the last chapter five, in this research. The data analysed in chapter three can be represented by means of pie chart.

Table 3: Target Population

Anti- cyber

Software engineers

IT Department

Total

10

6

10

26

The information shown above can be presented in a pie chart:

Table 4: Response in Reference to the Selected Samples

Category

Target Population

Sample Size

Sample Size Percentage

Heads

3

3

100%

Staff

23

19

82.6%

Total

26

22

84.6%

At the end of the research project, the expected results included:

The cloud computing providers had a well designed IT services provider to provide reasonable assurance to the enterprises management in regard the preparation and fair offering of the services. This system of cloud computing system does not lack limitations, never mind how ; well it might be designed. Some of them imply a high level of influence and interference from the humans. Therefore, to assess the effectiveness of this control system in technology, although determined to be effective, could provide only reasonable assurance with respect to assessment.

Financial report is an indicator of institutions performance within a certain period. It shows the exact picture of organization's financial status on a real time basis. Reports also summarize, analyze, and present the organization’s financial performance. Thus, determining the duration of time taken in preparation of these reports implied that the management gets information on an exact financial standing of organization, which would help management in deciding strategies for future.

4           Summary, Conclusion and Recommendations

4.1              Summary of the Study

Chapter one of this study acknowledges the people who supported the researcher when conducting the research; it also shows the objectives and the problem of the study. It also highlights the reasons for conducting the study and the people who benefits from the study, who are the users. The study in the first section tries to introduce and outline the levels in which cloud computing is adopted by many organizations. Chapter two contains the literature review. It discusses the study in details and analyses more on the providers of the cloud computing and the users. It also focuses on the limits, with which users are conversant in these IT services. This chapter analyses the basic elements of cloud computing, as well.

Next to it, there is a hypothesis formulation in chapter three, in which hypotheses try to look into the adoption of cloud computing by its stakeholder, it also tries to bring out the issue of announcements resulting from cloud computing adoption, as well as the income that the stakeholders have under the program implementation. All these formulations have somehow been justified by the study. In chapter four, data collection instrument are stated, and target population is defined; the data collection procedures are also given in details. In this section, method used to analyses data is highlighted and clearly stated.

In chapter four, data is represented by use of graphs, tables, and pie charts, and statistics is presented through the usage of percentages. Then the data is further interpreted by means of descriptive research.

In chapter four, conclusions of every chapter are made. The researcher gives the general conclusions of the study, as well as the remedies for the problems.

From the data analyzed in chapter four, it is evident that the target population in this research had some knowledge on the existence of cloud computing. They are not aware about the limits in terms of impacts of cloud computing, and they showed hope of cloud computing improving as it penetrates increasingly into the organizations.

4.2              Conclusions

There are a number of challenges that draw the organization from its objectivities; these challenges include, inadequate technology and non-availability of crucial information, among others. In this case, organizations, employees and other stakeholders are not conversant with this new technology, and the organizations need to have added cost in the process of their training. It is clear that cloud computing is in its base phase, and it has yet to become more advanced.

The challenges are caused by various factors such as underpayment, lack of motivation, inability to understand the organization objectives. In addition, problems should be dealt with by means of involving the employees to familiarise themselves with what cloud computing is as a new IT service in technology.

4.3              Recommendations

In this section from the research, it is clear that cloud computing is maturing whereby both public and private cloud computing has become a priority for many providers as well as vendors. Therefore, the researcher recommends that they are targeted to ensure that services and data are moving smoothly along these computing infrastructures, thus emphasizing them as some crucial areas. Today, cloud-computing companies are at the level that enables enterprises transfer workload amongst their own data centers. The key focus in cloud computing is to make cloud computing free from human interaction, which assumes that providers should ensure that no human interferes with the services.

4.4              Suggestion for Further Research

The researcher would recommend that cloud computing with a key respect to IT strategic plan and services are other areas to conduct a study. This will enable the cloud computing  providers have a clear picture of what the clients expects from them, as well as how they will increase the growth phase in these services. It is an area which will give an insight of how to have zero interference of cloud computing by humans beings.

The expectation gap in cloud computing is to ensure that the providers fill the industry gap with the aim of achieving full automation. At present, the data management centres do their work manually; however, cloud computing providers should call upon automation, which energetically help in the allocation of resources up to the agreed levels of services and the optimum level of the data centre. They also expect to be aware of what the client expects from them. Therefore, they mostly focused on this area. In the end, it will enable clients to obtain the benefit capabilities of the final point that will optimise application liberation in a secure method.

Excellent Cloud Computing essay writing service: professional academic help


Related essays

  1. Sanctuary Soft
  2. Risk Assessment Report
  3. Computer Based Espionage and Terrorism
  4. Database Administrator for Department Store


Order now