Public Policies for Providing Cloud Computing Services to SMEs of Latin America

Author(s):  
Mohd Nayyer Rahman ◽  
Badar Alam Iqbal

SMEs are considered backbone of Latin American economic region as they represent an overwhelming majority of private enterprises in the region and account for 99% of businesses and employ 67% of employees. One of the elements in which SMEs need assistance is their involvement in the IT enabled services (ITES) both for greater efficiency and optimisation of the economic data. Cloud Computing as a modern concept has commercialised the use of ITES along with sharing of data at a wider scale. Tacit knowledge in the form of data can be easily shared at large scale with the help of cloud computing. While MNCs has started using cloud computing to benefit the organisations, SMEs are far behind in truly understanding the relevance of cloud computing in benefitting business operations. The present study aims to analyse the existing opportunities and then formulate relevant public policies for providing cloud computing services to SMEs of Latin America.

Author(s):  
Mohd Nayyer Rahman ◽  
Badar Alam Iqbal

SMEs are considered the backbone of the Latin American economic region as they represent an overwhelming majority of private enterprises in the region and account for 99% of businesses and employ 67% of employees. One of the elements in which SMEs need assistance is their involvement in the IT-enabled services (ITES) both for greater efficiency and optimization of the economic data. Cloud computing as a modern concept has commercialized the use of ITES along with sharing data at a wider scale. Tacit knowledge in the form of data can be easily shared at large scale with the help of cloud computing. While MNCs have started using cloud computing to benefit the organizations, SMEs are far behind in truly understanding the relevance of cloud computing in benefitting business operations. The chapter analyzes the existing opportunities and then formulates relevant public policies for providing cloud computing services to the SMEs of Latin America.


Author(s):  
Marcus Tanque ◽  
Harry J Foxwell

Big data and cloud computing are transforming information technology. These comparable technologies are the result of dramatic developments in computational power, virtualization, network bandwidth, availability, storage capability, and cyber-physical systems. The crossroads of these two areas, involves the use of cloud computing services and infrastructure, to support large-scale data analytics research, providing relevant solutions or future possibilities for supply chain management. This chapter broadens the current posture of cloud computing and big data, as associate with the supply chain solutions. This chapter focuses on areas of significant technology and scientific advancements, which are likely to enhance supply chain systems. This evaluation emphasizes the security challenges and mega-trends affecting cloud computing and big data analytics pertaining to supply chain management.


2014 ◽  
Vol 556-562 ◽  
pp. 6262-6265 ◽  
Author(s):  
Yuan Zhang ◽  
Lei Huang

Cloud computing is developing rapidly in recent years. Everyone is talking about cloud computing that provide large scale service to replace computers and software. Cloud computing has already become the development trend of present IT circles. This paper explains the basics of Cloud computing, analyzes the difference of cloud computing services, and points out the characteristics of the cloud computing services.


2019 ◽  
Vol 20 (4) ◽  
pp. 798-820 ◽  
Author(s):  
Violeta Mihaela Dincă ◽  
Alina Mihaela Dima ◽  
Zoltán Rozsa

The purpose of this paper is to explore the process of Cloud Computing adoption within Romanian Small and Medium sized Enterprises in the digital age. Most of the scientific papers related to this topic examine the general outlook of cloud computing implementation in Romania and focus on the use of the afore-mentioned technologies by large scale companies. In order to identify the factors that have an influence over the choice of Romanian SMEs to adopt cloud computing technology, a conceptual model has been set forth. The model’s dependent variable is the choice of the company’s management to implement cloud computing technologies. Five different independent types of variable structures which have an effect on the adoption of cloud computing within SMEs were identified. The five categories of variables are competition & government, ICT providers & firm departments, employee, manager and technological factors. Each of these categories of determinants encompasses at their turn two or more constructs. An online survey tested the model based on the responses of managers and directors from 198 Romanian SMEs from the cities of Bucharest and Cluj. The validity of the model was performed by completing factor analysis and reliability tests of the data; a logistic regression analysis was deployed to test the research hypotheses. The results emphasized that the managers’ know-how on cloud computing and the perceived costs of implementing the technology represent the main components influencing the spreading of cloud computing among Romanian SMEs. This study makes a valuable contribution to the academic environment but to businesses as well. The model can be used to examine the implementation of different innovative applications. Companies which offer cloud computing services could take advantage of the outcomes of this study to expand the degree of cloud service introduction among SMEs.


2021 ◽  
Vol 13 (1) ◽  
pp. 9-17
Author(s):  
Mohamad Iqbal Suriansyah ◽  
Iyan Mulyana ◽  
Junaidy Budi Sanger ◽  
Sandi Winata

Analyzing compute functions by utilizing the IAAS model for private cloud computing services in packstack development is one of the large-scale data storage solutions. Problems that often occur when implementing various applications are the increased need for server resources, the monitoring process, performance efficiency, time constraints in building servers and upgrading hardware. These problems have an impact on long server downtime. The development of private cloud computing technology could become a solution to the problem. This research employed Openstack and Packstack by applying one server controller node and two servers compute nodes. Server administration with IAAS and self-service approaches made scalability testing simpler and time-efficient. The resizing of the virtual server (instance) that has been carried out in a running condition shows that the measurement of the overhead value in private cloud computing is more optimal with a downtime of 16 seconds.


Author(s):  
Shahkar Riyaz Tramboo

The purpose of the paper is to present the different views of how cloud computing is being adopted as a service in the field of Information Science, and the varied services being provided by the Cloud. An online survey was carried out to look for cloud services and its level of penetration in the field of information science as a services provider. Also previous work on the same topic by various researchers was also taken into account as they provided the required impetus for the research process. The study assesses the cloud computing and the use of its services in the field of Information Science, along with few relevant examples of large scale cloud computing services. The finding can be used by the professionals to get basic understanding of the cloud computing and its services for information storage and dissemination.


2014 ◽  
Vol 3 (2) ◽  
pp. 440-445
Author(s):  
Atefeh Heydari ◽  
Mohammad Ali Tavakoli ◽  
Mohammad Riazi

Traditionally, computational needs of organizations were alleviated by purchasing, updating and maintaining required equipments. Beside expensive devices, physical space to hold them, technical staffs to maintain them and many other side costs were essential prerequisites of this matter. Nowadays with the development of cloud computing services, a huge number of peoples and organizations are served in terms of computational needs by large scale computing platforms. Offering enormous amounts of economical compute resources on-demand motivates organizations to outsource their computational needs incrementally. Public cloud computing vendors offer their infrastructure to the customers via the internet. It means that the control of customers’ data is not in their hands anymore. Unfortunately various security issues are emerged from this subject. In this paper the security issues of public cloud computing are overviewed. More destructive security issues are highlighted in order to be used by organizations in making better decisions for moving to cloud.


2011 ◽  
Vol 1 (1) ◽  
pp. 23-27
Author(s):  
Akanksha Akanksha ◽  
Dr. Gurdev Singh

With the increasing prevalence and demand of large scale cloudcomputing environment, a researcher has to draw more attentiontowards the services provided by the CLOUD. As the access tothe server is increasing, centralized and distributed computingarchitecture will produce bottlenecks data which affect thequality of cloud computing services and bring the huge supportto users. In this paper we are going to propose certain vitalaspects such as memory utilization, storage capacity to check theefficiency and performance of various clouds in cloudcomputing environment. This is based upon the static data. Theproposed mechanism enables users to access memories invarious systems depending on the predefined criteria. Selectionmethod for accessing the memory of a resource is properlyintroduced in this paper. Our evaluation results show that theaggregation of various clouds is effective in indicating the betterefficiency and also to reduce network traffic sent over cloudnetworks.


2013 ◽  
Vol 17 (4) ◽  
pp. 159-170 ◽  
Author(s):  
Mathew Nicho ◽  
Mahmoud Hendy

Even though cloud computing, as a model, is not new, organizations are increasingly implementing it because of its large-scale computation and data storage, flexible scalability, relative reliability, and cost economy of services. However, despite its rapid adoption in some sectors and domains, it is evident from research and statistics, that security-related threats are the most noticeable barrier to its widespread adoption. To investigate the reasons behind these threats, the authors used available literature to identify and aggregate information about IS security threats in cloud computing. Based on this information, the authors explored the dimensions of the nature of threat by interviewing a cloud computing practitioner in an organization that uses both the private and public cloud deployment models. From these findings, the authors found that IS security threats in cloud computing must be defined at different levels; namely, at the business and technical level, as well as from a generic and cloud-specific threat perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix (CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully comprehend the concerns so that they can make relevant decisions while availing cloud computing services.


Sign in / Sign up

Export Citation Format

Share Document