Medusa

5 Threats you should know before engaging into the cloud

<p><img class&equals;"size-medium wp-image-3492 alignleft" alt&equals;"threat" src&equals;"https&colon;&sol;&sol;medusamagazine&period;com&sol;wp-content&sol;uploads&sol;2013&sol;04&sol;threat-300x90&period;jpg" width&equals;"300" height&equals;"90" &sol;>Cloud computing is turning out to be the &&num;8220&semi;IT&&num;8221&semi; buzz word among those who are in the IT industry&period; With the onset of a new and revolutionary way of how companies and businesses operate&comma; cloud computing will definitely not just change the way we do business&period; Cloud computing will affect the very lives of people&period; The premise is simple&comma; cut down operation costs of companies by offering a computer system that will give all the applications a worker needs such as a word processor&comma; a spreadsheet application&comma; and e-mail capabilities&period; No need to purchase expensive software AND the license to operate the software&period; This will all be available in an online cloud system that has unlimited space and limitless speed&period; Companies can even save and cut expenses from buying expensive computers with a large memories&period; Check out datacom systems&comma; for more information about cloud services&period; For those who are already using emails such as Hotmail&comma; Gmail&comma; and Yahoo they will already be familiar with the cloud system&period; The possibilities are limitless&period; It reaches as high as the heavens&period; But before one goes out and sells all the extra storage space and all the high end computers one has for ones&&num;8217&semi; company&comma; you should look at the possible threats that come with cloud computing&period; In this article we will discuss 5 threats you should know before engaging into the cloud&period;<&sol;p>&NewLine;<p><b>1&period;       <&sol;b><b>Middleware&period;<&sol;b><&sol;p>&NewLine;<p>In cloud computing&comma; there are three areas that make up the entire cloud system&colon; the front end or the client&comma; the middleware or the internet service provider&comma; and the back end or the cloud system company that provides the service&period; We can be sure that the back end will provide the service that the clients will demand but what about the middleware&quest; In some parts of the world where wifi and the internet are as basic as running water&comma; this is not a problem but what about countries or parts and areas of a country that cannot provide ready and speedy internet service&quest; One is then reliant on the internet service provider that is available in their area&period; This is crucial in making sure that the system works&period;<&sol;p>&NewLine;<p><b>2&period;       <&sol;b><b>Privacy&period;<&sol;b><&sol;p>&NewLine;<p>Since the client can pretty much access the information anywhere and on any platform&comma; information and the privacy of the user is at stake&period;  You can just imagine the worst&period; What if the person needed to access some top secret file&comma; and borrowed somebody&&num;8217&semi;s IPad to access this&period; What if he forgot to logout from the cloud system&quest; That file is now available to the IPad user&period;  That is why it is really important to have a proper authentitication process that guarantees that the files and information will be secured&period; You can check cloud security alliance for more information on cloud security&period;<&sol;p>&NewLine;<p><b>3&period;       <&sol;b><b>Ownership of Information&period;<&sol;b><&sol;p>&NewLine;<p>There is also a debacle going on about the ownership of the information being stored in the cloud system&period; Let&&num;8217&semi;s say that an employee resigns&period; What happens to the files he has uploaded on the system&quest; Granted&comma; he will be denied access to the company&&num;8217&semi;s cloud system&period; But what happens to the files&comma; does the company own it&quest; Does the cloud system service provider own it&quest; These are discussions that are still philosophical in nature&period; One must really trace and understand this better to form a fair judgment&period;<&sol;p>&NewLine;<p><b>4&period;       <&sol;b><b>Redundancy&period;<&sol;b><&sol;p>&NewLine;<p>It is possible to save the same file and information in different servers to have a as a means of back-up&period; This means of contingency means that there is a redundancy of the information that one creates in the system&period; This is then a concern for the back end of the cloud computing system that they can assure their clients that their systems are safe&comma; and will not be bogged down by the redundancy that is present in their servers&period;<&sol;p>&NewLine;<p><b>5&period;       <&sol;b><b>Shift of orientation&period;<&sol;b><&sol;p>&NewLine;<p>If cloud computing does become the next system we use as a means of doing business&comma; there will be a shift in orientation of IT troubleshooting and repair companies&period; They will be virtually unnecessary&period; This is because the cloud computing system will be able to have its own regenerating maintenance and repair&period;<&sol;p>&NewLine;<p>There are many implications that come with a system change&period; It is true for most things in life&period; But with the advancement that can be brought about by cloud computing&comma; the benefits are far more than the threats&period; In this case&comma; the sky&&num;8217&semi;s the limit&period;<&sol;p>&NewLine;

Exit mobile version