SlideShare una empresa de Scribd logo
1 de 10
Cloud Computing
Where has it gone and
where is it going?

By: Joanna Hendricks
BMT 580
Trends
• Cloud-based applications
*Cut costs
*Create powerful applications

• Identity as security

*Increasing the security as of 2014

• More “as a service” offerings
*Flexibility with platforms and graphics
*Lower IT costs
Trust Issues
and Privacy/Security
Security is the biggest trust issue
with Cloud Computing.
1.
Inquire about exception monitoring systems
2.
Be vigilant around updates and making sure that
staff don't suddenly gain access privileges they're
not
supposed to.
3.
Ask where the data is kept and inquire as to the details of
data protection laws in the relevant
jurisdictions.
4.
Seek an independent security audit of the host
Find out which third parties the company deals with
and whether they are able to access your data
5.
Be careful to develop good policies around
passwords; how they are created, protected and
changed.
6.
Look into availability guarantees and penalties.
7.
Find out whether the cloud provider will accommodate
your own security policies
Cost
The upfront cost of cloud computing can be
expensive, but mostly because people are using
outdated computer software. In the beginning the
software must be updated and this can be costly.
More and more companies are switching to Cloud
Computing, therefore it eventually will be a must
for companies to do this so they can compete with
similar companies and their software capabilities.
In the end, IT costs have been shown to decrease
as access to more options, platforms and graphics.
Examples of Companies
Within the last few years some big companies have
switched to Cloud Computing. Here are just a few.

•
•
•
•
•
•

Netflix
Xerox
Pinterest
Instagram
Etsy
Apple
Advantages of the Cloud
Advantages:
*

Cost Efficiency: Eliminates stand alone servers, savings on licensing
fees, eliminates cost of data storage, software updates and
management.
*
Convenience and continuous availability: Public cloud is available
wherever the end user may be located.
*
Backup and recovery is simplified.
*
Cloud is environmentally friendly.
*
Resiliency and Redundancy
*
Scalability and Performance
*
Quick deployment and ease of integration
*
Increased storage capacity
*
Device diversity and location independence
*
Smaller learning curve
Disadvantages of the Cloud
Disadvantages:
*
*
*

Security and privacy
Dependency and vendor lock-in
Technical difficulties and downtime: because
the server is not on sight, it is not accessible
by the IT professional.
*
Limited control
*
Increased vulnerability
In conclusion:
It is becoming apparent that
businesses need to begin
moving toward cloud computing
or they are going to be left
behind.
References/Sources
•

Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready?
Thegaurdian Retrieved from:
http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat

•

Allouche, G. (2013, September 17). 7 well known companies who have moved to the
cloud. Smart Data Collective. Retrieved from:
http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud

•

McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes.
Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/

•

Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street
Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search?
q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+
news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE
5FF95F9B9538896D59D
References/Sources
•

Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready?
Thegaurdian Retrieved from:
http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat

•

Allouche, G. (2013, September 17). 7 well known companies who have moved to the
cloud. Smart Data Collective. Retrieved from:
http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud

•

McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes.
Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/

•

Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street
Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search?
q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+
news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE
5FF95F9B9538896D59D

Más contenido relacionado

La actualidad más candente

Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
drewz lin
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
CSAIsrael
 

La actualidad más candente (20)

The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Greenbone vulnerability assessment - Networkshop44
Greenbone vulnerability assessment  - Networkshop44Greenbone vulnerability assessment  - Networkshop44
Greenbone vulnerability assessment - Networkshop44
 
Strategy Cloud and Security as a Service
Strategy Cloud and Security as a ServiceStrategy Cloud and Security as a Service
Strategy Cloud and Security as a Service
 
Oper8 document management solution v2.0
Oper8 document management solution v2.0Oper8 document management solution v2.0
Oper8 document management solution v2.0
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Doing business on the web new
Doing business on the web newDoing business on the web new
Doing business on the web new
 
Cloud security
Cloud securityCloud security
Cloud security
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 

Destacado

Kgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistasKgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistas
Martin Triana
 
áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014
palopilu
 
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
MARIA ODETE ALVES
 

Destacado (13)

Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]Arquitectos estrella. Artículo Expansión 22.2.2011[1]
Arquitectos estrella. Artículo Expansión 22.2.2011[1]
 
Muebles20
Muebles20Muebles20
Muebles20
 
C07 23
C07 23C07 23
C07 23
 
Crowdfunding im Dokumentarfilmbereich
Crowdfunding im DokumentarfilmbereichCrowdfunding im Dokumentarfilmbereich
Crowdfunding im Dokumentarfilmbereich
 
Kgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistasKgosni 111 más ataques a zapatistas
Kgosni 111 más ataques a zapatistas
 
áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014áRea de ciencias sociales y jurídicas.ppt2014
áRea de ciencias sociales y jurídicas.ppt2014
 
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
PRIMERA LECCIÓN ALEMÁN - Guten Tag, mein Name ist...
 
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
 
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
Consumer Trends in Wearable Devices and Flexible Displays, SID 2014
 
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
Extrativismo da carnaúba relações de produção tecnologia e mercados 2008
 
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
20131128 Guía Gestión de Alérgenos en la Industria Alimentaria
 
Simboli hemijskih elemenata
Simboli hemijskih elemenataSimboli hemijskih elemenata
Simboli hemijskih elemenata
 
Moenda
MoendaMoenda
Moenda
 

Similar a Cloud computing web 2.0 By Joanna Hendricks BMT 580

Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
anilgoelslg
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 

Similar a Cloud computing web 2.0 By Joanna Hendricks BMT 580 (20)

Cloud computing(Basic).pptx
Cloud computing(Basic).pptxCloud computing(Basic).pptx
Cloud computing(Basic).pptx
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Cloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdfCloud brings advantages such as flexibility and scalability cloud co.pdf
Cloud brings advantages such as flexibility and scalability cloud co.pdf
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Welcome to the Cloud!
Welcome to the Cloud!Welcome to the Cloud!
Welcome to the Cloud!
 
Cloud Deployment Models.pdf
Cloud Deployment Models.pdfCloud Deployment Models.pdf
Cloud Deployment Models.pdf
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Cloud computing web 2.0 By Joanna Hendricks BMT 580

  • 1. Cloud Computing Where has it gone and where is it going? By: Joanna Hendricks BMT 580
  • 2. Trends • Cloud-based applications *Cut costs *Create powerful applications • Identity as security *Increasing the security as of 2014 • More “as a service” offerings *Flexibility with platforms and graphics *Lower IT costs
  • 3. Trust Issues and Privacy/Security Security is the biggest trust issue with Cloud Computing. 1. Inquire about exception monitoring systems 2. Be vigilant around updates and making sure that staff don't suddenly gain access privileges they're not supposed to. 3. Ask where the data is kept and inquire as to the details of data protection laws in the relevant jurisdictions. 4. Seek an independent security audit of the host Find out which third parties the company deals with and whether they are able to access your data 5. Be careful to develop good policies around passwords; how they are created, protected and changed. 6. Look into availability guarantees and penalties. 7. Find out whether the cloud provider will accommodate your own security policies
  • 4. Cost The upfront cost of cloud computing can be expensive, but mostly because people are using outdated computer software. In the beginning the software must be updated and this can be costly. More and more companies are switching to Cloud Computing, therefore it eventually will be a must for companies to do this so they can compete with similar companies and their software capabilities. In the end, IT costs have been shown to decrease as access to more options, platforms and graphics.
  • 5. Examples of Companies Within the last few years some big companies have switched to Cloud Computing. Here are just a few. • • • • • • Netflix Xerox Pinterest Instagram Etsy Apple
  • 6. Advantages of the Cloud Advantages: * Cost Efficiency: Eliminates stand alone servers, savings on licensing fees, eliminates cost of data storage, software updates and management. * Convenience and continuous availability: Public cloud is available wherever the end user may be located. * Backup and recovery is simplified. * Cloud is environmentally friendly. * Resiliency and Redundancy * Scalability and Performance * Quick deployment and ease of integration * Increased storage capacity * Device diversity and location independence * Smaller learning curve
  • 7. Disadvantages of the Cloud Disadvantages: * * * Security and privacy Dependency and vendor lock-in Technical difficulties and downtime: because the server is not on sight, it is not accessible by the IT professional. * Limited control * Increased vulnerability
  • 8. In conclusion: It is becoming apparent that businesses need to begin moving toward cloud computing or they are going to be left behind.
  • 9. References/Sources • Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready? Thegaurdian Retrieved from: http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat • Allouche, G. (2013, September 17). 7 well known companies who have moved to the cloud. Smart Data Collective. Retrieved from: http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud • McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes. Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/ • Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search? q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+ news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE 5FF95F9B9538896D59D
  • 10. References/Sources • Welton, B. (2013, April 29). Moving to the Cloud: When will your business be ready? Thegaurdian Retrieved from: http://www.theguardian.com/media-network/media-network-blog/2013/apr/29/cloud-business-strat • Allouche, G. (2013, September 17). 7 well known companies who have moved to the cloud. Smart Data Collective. Retrieved from: http://smartdatacollective.com/gilallouche/145341/7-well-known-companies-havemoved-cloud • McKendrick, J. (2013, July 17). Hidden Costs of Cloud Computing, Revealed. Forbes. Retrieved from: http://www.forbes.com/sites/joemckendrick/2013/07/17/hidden-costsof-cloud-computing-revealed/ • Lesson’s from Amazon’s Cloud Computing Failure. The Wall Street Journal, Mean Street. Retrieved from: http://www.bing.com/videos/search? q=Cloud+computing+video+news+articles&qpvt=Cloud+computing+video+ news+articles&FORM=VDRE#view=detail&mid=E5FF95F9B9538896D59DE 5FF95F9B9538896D59D