Cloud Computing

Cloud Computing

The Amazon Web Service (AWS) brings into being the best solution to Ericsson. It brings into realization a great sense of benefit in terms of the reduction of cost and fast product advancement.

The pricing structure has greatly declined infrastructure costs. It is through this that scaling up or down as necessary is assured as it pays for the correct computing capacity applied. In the updating of its automated software, Ericsson was able to update its software infrastructure with comprehensive tools, dependable load balancing and a bigger database size. In terms of remote access, the Amazon Web Services (AWS; amazon, 2011) offers a set of computing services which create the cloud computing to be on-demand over the internet. The services make it possible to offer block storage devices, offer MySQL and Oracle databases, offers a great volume of email sending tools as well as a scalable Domain Name System. It is through the on-demand availability that a company is able to offer infrastructure as a Service.

The Amazon Elastic Compute Cloud is a service which offers a resizable compute volume in the cloud which is modeled to create web-scale computing much better for developers. This service offers acquisition and configuration of size with little interference (Chris, 2011). It offers general control to computing resources and allows management of Amazon in computing environment. It allows or flexibility of the economics of computing by letting one to pay for the size used. The Amazon Simple Storage Service stores for the internet. It is made for web-scale computing for developers. It offers the connection for storage and acquisition of data of any size with no reliance on location. It is very scalable, dependable, safe, and fast and cheap that is applied in the global network of sites. The rightscale makes it possible to accord and control the vital aspects of business. It offers proper configuration, observation, automation and control of the cloud computing framework and services.

There are varied security concerns for cloud based services, these are; the concern over a safe data transfer mechanism. Considering that all data have to travel through the internet one has to make sure that the information being sent is through a safe medium by interfacing through a web browser with a URL with “https” as well as encryption and authentication has been done with standard protocol like IPsec created for the internet (Beckham, 2011). There use of safe software connections, for this to be done one has to be conversant with the software connections or APIs used in cloud services. There is also storage, where the information stored has to be encrypted in the servers. In user access control, the data that is stored have to be easily accessed by the staff. For this consideration should be given to the sensitivity of data. Consequently, there is data separation for this the user ought to use data encryption to stop access.

The scalability of cloud computing is hard; this may be sorted out by making a great sum of investment in a private cloud with a balance of automation and support facilities. There is also the effect of cloud outages. The services provided by cloud computing continue to suffer from disruptions. This may be solved by having a service-level agreement which protects data from the disruptions. Considering that cloud computing is great in backups with better storage the users may do away with backups. This may lead to loss of data. With reliability of cloud computing, it is hard to solve unexpected downtime if one does not know the system has fallen (Enki, 2011). Hence one has to have the knowledge of the system. In terms of cost saving matters, organizations use cloud-based services based on their ability to save cost and do not consider security of these services. Tough economic times have made it hard to purchase better cloud computing tools with no regard to cost (ComputerWeekly, 2012). This may however be sorted out if organizations paid more attention to the quality of service to be offered rather than the cost they would be exposed to. This would hence lead to proper service delivery to both the business and the clients.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Bibliography

Amazon. (2011). AWS Case Study: Ericsson. Retrieved May 24, 2012, from Amazon Web Services: http://aws.amazon.com/solutions/case-studies/ericsson/

Beckham, J. (2011). The Top 5 Security Risks of Cloud Computing. Retrieved May 24, 2012, from small business: http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing/

Chris. (2011). Amazon AWS and Amazon EC2. Retrieved May 24, 2012, from Perspectives from Cloud Computing: http://cloud-computing.learningtree.com/2011/02/20/amazon-aws-and-amazon-ec2/

Computer Weekly. (2012). Security in the cloud: Top nine issues in building users’ trust. Retrieved May 24, 2012, from http://www.computerweekly.com/feature/Security-in-the-cloud-Top-nine-issues-in-building-users-trust#2

Enki. (2011). Reliability and Cloud Computing. Retrieved May 24, 2012, from http://www.enki.co/blog/reliability-and-cloud-computing.html

 

 

Latest Assignments