Thursday, June 6, 2019

Cloud Computing Essay Example for Free

Cloud Computing EssayHow did Ericsson benefit from Amazon nett Services (AWS)?According to Amazons Web Service website, it gives users the option to run just about everything using their service applications. By incorporating swarm computing, users be able to cut variable costs to a more attractive scale for the business by eliminating costly administrative and hardw atomic number 18 fees. Due to out-of-door approach, Ericsson was able to immediately take advantage of AWSs benefits since the infrastructure was already up and running. Demands change quickly and its important for a company to be able to adjust accordingly. By using the cloud system, Ericsson was able to employ softwargon updates and new applications quickly and more effectively. AWS service hundreds of thousands of customers in more than xcl countries, making their global infrastructure far more expansive than competitors this allowed Ericsson to have data centers in various parts of the world. According to in formation provided in the shift study, Ericsson chose AWS because they felt it was the most integrated public cloud provider in the Rightscale Cloud Management Platform (Rightscale).Amazon EC2, Amazon S3, and RightScaleAmazon EC2The AWS website describes Amazon fictile Compute Cloud (Amazon EC2) as a web service that provides resizable compute might in the cloud, making web-scale computing easier for developers. It also allows you to quickly scale capacity up and down if and when your computing requirements change. Because this system works on a pay-as-you-go method, you only pay for the capacity you use which is a great option from an economic stand point.Amazon S3Amazon S3 is described quite simply on the AWS websitestorage for the Internet. It sustains a developers job easier by providing for more convenient Web-scale computing. It gives them access to the same high quality infrastructure that Amazon uses to run its global network. With Amazon S3, star can store any amount data, anywhere, and have marrow access to it at any time via the web. The main purpose of this service is to maximize benefits of scale and pass them on to developers (AWS Website, 2012).RightScaleRightScale is your bridge between applications and your cloud infrastructure. It allows for simple deployment and management of apps across non only public clouds, but private and hybrid ones as well. RightScale configures efficiently and also provides organizations with better overall command of the cloud computing infrastructure and applications. Server management is an important aspect of using the cloud, and with this service, the company can scale and monitor more effectively, enhancing control. Organizations view the portability of RightScale as a huge incentive because it provides for greater flexibility and less restriction in a sense of provider options.Security Concerns How to Cope With ThemNaturally, with any cloud-based service, there are lots of security concerns, includin g but not limited to, recovery issues, who has access to sensitive information, and data location. Recovery IssuesIn the event that the organization loses information or experiences a tragic situation, the vendor who is sponsoring the cloud-based service should have a detailed and easily executable plan in place to resolve the issue and make the process of recovery as painless as doable. Its also important that both parties agree to the terms beforehand to avoid any surplus disagreements and issues.User AccessWhen an organization opts to use cloud-based computing, they release a level of control, to a certain degree. The vendor controls the cloud and their employees whitethorn have access to the leaf nodes information. Its vital that the client organization seek clarity on exactly who has that access and their credentialslevel of expertise, exact job cognomen and company responsibility, etc.Data LocationThe client organization wants to make sure they at least know what country t he cloud system they are using is located in. There are some cases where the organization has no clue where the cloud they are utilizing is based and that could potentially be a problem. star way to ease concern would be for the client to suggest specific locations and ensure that company privacy will not be breached. One proposition to cope with the afore mentioned security concerns would be a method called the layered approach. The good thing about this option is it not only offers protection for not only the organization, but the vendor as well. The multi-level technique makes for a layered defense model that keeps the company from totally relying on one option. Level onephysical securitywould focus on monitoring the actual facility that houses servers and other sensitive equipment.Level twonetwork securitywould ensure nonstop monitoring of the network by well trained personnel. Level threeintrusion detectionwould control the traffic that enters and leaves the network, making s ure that any possible intrusion would be detected immediately and handled accordingly. Level fourfirewall managementthese should be custom fitted for the organization. These are commonly used with organizations and provide that added cushion in the level of security. And finally, Level fivedata encryptionshould be conserveed inside and outside the cloud. Because the information that is transmitted over the cloud is so sensitive, maintain a high level of security is extremely important. This is mainly the vendors responsibility however, the client organization can absolutely make suggestions and requirements that personally cater to their needs.Scalability, Reliability, and Cost Issues Associated with Cloud Computing Organizations can easily capitalize on economies of scale and majorly cut costs because virtualization is the main vehicle for cloud-based computing. The need to get and maintain hardware and spend funds on administrative costs is basically eliminated. The mobility of the cloud network allows for total access of large amounts of data anywhere, anytime and companies queue that to be a very attractive incentive.The only issue that may arise is network reliabilityyes, the problem with data storage is limited and low-budget however, the probability of outages is unavoidable with this option. Cloud computing can become very expensive to install and get running however, the fact that companies only pay for services they use is great Eliminating the need to maintain subscriptions and licenses saves the company tons of money and makes running the infrastructure considerably more convenient. It is clear that the benefits outweigh the possible issues that may arise.BibliographyEricsson Case Study. 2011. http//aws.amazon.com/solutions/case-studies/ericsson/Security Techniques for Protecting Data in Cloud Computing. 2012. http//www.kaspersky.com/images/european_cup_2012_march5_Venkata%20Sravan%20Kumar%20Maddineni-10-141650.pdfUnderstanding Layered Securit y and Defense in Depth. 2008. http//www.techrepublic.com/blog/security/understanding-layered-security-and-defense-in-depth/703

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.