123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Cloud Computing: The Advantages And Risks

Profile Picture
By Author: Susan Smith
Total Articles: 132
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The use of hardware and software for the purposes of computing such as delivery of services over an internet network is called cloud computing. The process has been so named because it uses a symbol which has the shape of a cloud to describe the system diagrams that are used as abstractions for complex infrastructures. Like all forms of technology, cloud computing also comes with its own set of advantages and disadvantages. Here we take a look at some of the benefits and risks that this service poses for enterprises:

Advantages of Cloud Computing

The backing up of data was not only a costly process before, but also time consuming. Earlier, enterprises had to use tapes to store the daily important data. The equipment that enterprises had to invest in for the purpose was expensive and restoration of the data from such equipment was a lengthy process. Again, most companies could not afford to invest in the equipment needed to restore data if it so happened to get lost at times of device or app crashes. With cloud computing comes a disaster recovery server wherein enterprises can create a backup of all types of information ...
... automatically. Restoration of data is a simple, quick, and cost effective process using cloud computing services. The additional benefit of using the cloud computing tools is that developers can now test restore data efficiently just like it is done in a staging or lab type environment. Therefore, users enjoy access to only safe data when enterprises make use of cloud computing services.

Risks of Cloud Computing

This type of service also has its disadvantages for an enterprise because not all types of data can be stored on the cloud. The integrity and confidentiality of information is often jeopardized if it is stored on the cloud. For instance, every enterprise that utilizes or has access to data related to healthcare and safeguarded by HIPPA must impose strict security norms for its workforce that uses the services of the cloud. Similarly, not only the senior management but also several other units of a workforce may get access to the personal details of an individual employee like his/her personally identifiable information including data related to name, driving license number, social security number, state ID number, credit card information, or email address if cloud computing services are deployed in the organization. Therefore, while an enterprise may use the cloud computing features, it also has to invest in ways of protection of information by incorporating state privacy laws, the GLBA (Gramm Leach Biley Act), and create security measures such as firewalls, encryption, limited data access, and password protection. Again, it should be mentioned here that just by ensuring all such privacy methods are in place, an enterprise cannot ensure the non occurrence of a cyber attack. In the case of such attacks, the enterprise may be sued for breach notification if timely disclosure is not made to the employees whose data was accessed and acquired through a cyber attack. Failure to do so results in not only financial loss for the enterprise but also defamation of its products and services.

Therefore, cloud computing has both its positives and negatives for enterprises. The owner of an organization or business unit must thus consider every type of possibility before placing its information on the cloud.

The author is associated with a well known enterprise mobile application developer and iPhone application development company, providing Dallas mobile app development solutions

Total Views: 169Word Count: 574See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Why Silent Pods Are Essential For Modern Open-plan Offices?
Author: Silent Pod

2. Innovative Design, Unmatched Quiet: Explore Our New Pods
Author: Silent Pod

3. How Silent Pod Is Revolutionizing Workspaces In The Uae?
Author: Silent Pod

4. Discovering The Advantages Of Various Types Of Silent Pods
Author: Silent Pod

5. Drone Spraying: A Game Changer For Hard-to-reach Vineyards
Author: Alex Wilkinson

6. Comparative Analysis Of Glass Cloth Electrical Tape And Fiberglass Tape For Transformer Insulation
Author: jarod

7. Which Certification Is Best For A Java Full Stack Developer?
Author: Shankar Singh

8. Streamlining Operations With Heavy Equipment Tracking Solutions
Author: Asset Tracker

9. Why Choose Laravel : Explore Its Features & Benefits For Building Web Applications
Author: Rob Stephen

10. Why Your Business Needs An Inventory Management Software Solution
Author: nagaraj

11. What Thickness And Width Options Are Available For Polyimide Tape?
Author: jarod

12. Ứng Dụng Máy In Số Thứ Tự Trong Các điểm Giao Dịch Công
Author: xephangsmart

13. Navigating Challenges And Seizing Opportunities In Tech Development
Author: Yash Tamakuwala

14. Business Process Outsourcing Market Insights: The Impact Of Digital Marketing Strategies
Author: Grand View Research

15. Why Your Business Needs E-invoicing Software For Hassle-free Billing
Author: nagaraj

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: