From Information Systems Outsourcing to Cloud Computing

Author(s):  
Mohammad Nabil Almunawar ◽  
Hasan Jawwad Almunawar

We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely, public cloud, private cloud and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). This paper highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources through cloud computing.

Author(s):  
Mohammad Nabil Almunawar ◽  
Hasan Jawwad Almunawar

We are witnessing the business prospects of cloud computing becoming apparent as many cloud computing services have been made available online. Previously, outsourcing of computing resources employs a third party to set up, develop, and maintain the infrastructure within or outside the business organization. However, nowadays many business organizations all over the world see that outsourcing their computing resources through cloud computing is a highly viable option as it saves a business organization from the complicated setup and maintenance costs of computer infrastructure. There are three generally known types cloud computing, namely public cloud, private cloud, and hybrid cloud. There also three generally service models namely software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). This chapter highlights the development of cloud computing technology, benefits and issues of outsourcing an organization's computing resources through cloud computing.


2018 ◽  
Vol 130 ◽  
pp. 504-509 ◽  
Author(s):  
Khubaib Amjad Alam ◽  
Rodina Ahmed ◽  
Faisal Shafique Butt ◽  
Soon-Gohn Kim ◽  
Kwang-Man Ko

Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


2018 ◽  
Vol 45 (1) ◽  
pp. 287-304
Author(s):  
Paweł Stąpór ◽  
Dariusz Laskowski

Abstract Universal access to cloud computing services means that users expect services to be provided in a reliable and secure manner. The availability of newer and more efficient end devices raises the question of whether the mobile device used affects an access reliability. In the article the authors taking into account the type of mobile device (laptop, tablet and smartphone) and the access method (WiFi and LTE) heck what effect the end device on the reliability of access has.


2014 ◽  
Vol 3 (2) ◽  
pp. 63-68 ◽  
Author(s):  
Rian Rahmanda Putra ◽  
Wanda Kinasih ◽  
Dana Indra Sensuse

Cloud computing is an innovation that allows the use of IT as a utility based on-demand. Since cloud computing is a new technology, its led to a variety of risks that required an assessment model to assess the organization's readiness to adopt cloud computing. Moreover, by using cloud computing services means organizations or outsourcing involves a third party. Before adopting cloud computing technology, organizations need to consider some of the effects that arise as a result of cloud computing, namely in terms of costs, risks and benefits. To assist organizations to consider the migration of existing IT systems to the cloud, it can be used the cost approach valuation models and risk and benefit. This paper discusses two models of cost-based assessment of risk and benefit modeling and modeling that can be used as a tool to assist organizations in making decisions related to the migration of existing IT systems to the cloud. 


Author(s):  
Tejal R. Patil

Cloud computing is a technology that allows users to access shared computing resources over the internet on demand, and it is an internet-based model for handling, storing, and processing data. It develops and deploys flexible enterprisewide operations on the cloud platform. In cloud we store, manage and process data on remote server. Many industries, such as banking, education the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, etc in cloud computing No experts required for hardware and software maintenance. Even No server space required. The cloud is provide better data security. Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Platform as a Service) are three types of cloud computing services. This research paper analyses the cloud computing Architecture, different Deployment and service model and research technologies.


Author(s):  
Pooja Gupta

Educating the digitally literate generation is a privilege and a challenge because this generation is exposed to enormous proliferation of affordable computers, Internet and digital education content. With the advancements in technology, there is a definite improvement in learning methods; similarly performance assessment, career preparation and credential documentation should also be driven by technology. An e-portfolio is a tool for teaching, learning and assessment. The purpose of the e-portfolio is to highlight the student's best work. Current e-portfolio systems pose problems of scalability and sustainability, as they provide limited user storage space in a centralized server. With the rapid use of multimedia, there is a drastic increase in storage load imposed by any user on the e-portfolio system. Cloud computing can provide e-portfolio service that can be delivered to a higher education community. An e-portfolio service provided by cloud computing (c-portfolio) can be accessed from a standalone system. The c-portfolio can also be accessed from local servers of an educational institute, or from a third-party service provider that is accessed via the Internet. Such cloud computing services allow users to share their c-portfolios with anyone, anywhere and at anytime. This chapter defines and categorizes c-portfolio, addresses issues and challenges faced by c-portfolio's implementation in higher education.


2014 ◽  
Vol 3 (2) ◽  
pp. 440-445
Author(s):  
Atefeh Heydari ◽  
Mohammad Ali Tavakoli ◽  
Mohammad Riazi

Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter. Nowadays with the development of cloud computing services, a huge number of peoples and organizations are served in terms of computational needs by large scale computing platforms. Offering enormous amounts of economical compute resources on-demand motivates organizations to outsource their computational needs incrementally. Public cloud computing vendors offer their infrastructure to the customers via the internet. It means that the control of customers’ data is not in their hands anymore. Unfortunately various security issues are emerged from this subject. In this paper the security issues of public cloud computing are overviewed. More destructive security issues are highlighted in order to be used by organizations in making better decisions for moving to cloud.


Sign in / Sign up

Export Citation Format

Share Document