Cloud Computing2 Title Advantages and disadvantages of cloud computing for business Introduction The aim of this research paper is to evaluate the importance of the cloud computing for the business by showing the advantages and disadvantages of it on the business. The cloud computing is considered as the effective innovation for the business in technology market as it facilitates many businesses to keep data in an effective manner. It reduces the unnecessary cost of the company and carries the efficiency. There are number of associations that use remote server to empower the employees to extensively get to gather of administrations and assets through use of web access. The previous report is carried out in this assignment in which the research methodology will be evaluated in a significant way so that the reader can understand from where data is collected.
Cloud Computing3 Project objective It is necessary for the researcher to accomplish the each activity which made at the time of implementation of the research.There are several benefits as well as drawbacks are entailed in this research program regarding cloud computing.The main objectives of this research are to evaluate the importance of cloud computing for the business effectively and to understand the various ways which may impact the business adversely due to use of cloud computing.
Cloud Computing4 Project scope The scope of the research topic is broad as it entails many factors in the form of benefits and drawbacks of cloud computing for the business. The research will be helpful for the reader to understand the various aspects in relation to cloud computing so that they might be aware about the implementation of cloud computing in their business. the example of Netflix will be carried out in this research paper from previous assignment.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing5 Literature review According toShuleski, Birsan,Cristea and Radu, (2016),the use of technology has increased day by day in which many organizations all over the world latest technology to increase the productivity and the efficiency of the business. As per the IDC, the global income from public IT cloud services is amplified around 22 billion in the year of 2010 and it has been anticipated that it will increase more than 73 billion in coming years (IDC, 2013). Microsoft, Amazon, Netflix and Google are some major player of the cloud computing that has adopted it in a significant manner and increasing the efficiency of the business. It has been found from the research of Dinh et al. (2013)that public uses cloud computing technology for number of purposes such as playing games, sharing content and conveying messages through email.The companies use this technology due to number of advantages because it helps company to develop the efficiency of the business (Chou, 2013). Netflix is provided number of facilities to its customer by using cloud computing technology.The use of cloud computing technology is re-imagined by this company to attain the competitive advantages over its competitors (Gomez-Uribe and Hunt, 2016). Amazon Web Services is being chosen by the company which is considered as the world’s largest clod based solution provides (Dastjerdi, Tabatabaei and Buyya, 2012). According to Berman et al. (2012) the services of AWS is effective for the business as it enables Netflix to develop the quality by increasing the efficiency of the business.The business is expanded day by day in every industry due to effective use of cloud computing technology. Netflix has enlarged its real content to attain the attained the fame all over the US such as Narcos, New Black, House of Cards, Orange and Stranger Things.
Cloud Computing6 The benefits of cloud computing in the business is reducing costs and increasing the efficiency of the business as well as employees. The costs of operation can be reduced of the business due to effective use of cloud computing in which the cost of system upgrades, new software and hardware might be involved in the contract. Along with that it provides the flexibility, efficiency and strategic value. Cloud based services assist many organizations to fulfil the demand of the business of any organization by providing them huge range of services (Butcher, 2014).It encourages the friendly environment that facilitates to utilize only the server space they needed. The technology has become convenient for many businesses as it can be afforded at minimal rate and can be utilized by small as well as large organizations.The examples of Easy jet are given in the first part in which the importance of cloud computing in this business has described to decrease their operations data. According toShuleski, Birsan,Cristea and Radu, (2016),that the global software as a Services (SaaS) market has been found as the major organizer of the cloud servicesthat announced to amplify from$55B in 2016 to $67B in 2018. It has been argued byBeloglazov, Abawajy and Buyya (2012) thatcloud computing can become the cause of losing data which cannot be controlled by the experts. Even though CSP executes the latest and advanced software features. it has been found that the risk of data breach and cyber attack is connected to the clod computing. As perBeloglazov, A., Abawajy and Buyya, (2012), since the cloud is dependent on the internet in which a cybercriminal can hack CSP data base and collect the personal informant about the clients. Moreover, corporations need to share the personal and confidential data with CSPs. According to Butcher, (2014), in such case, it is required for the business to take care the data with full of confidentiality otherwise it may lead the business in an adverse situation (Berman, Kesterson-Townes, Marshall and Srivathsa, 2012). Downtime of servers is another challenge of the cloud computing and in term to access their
Cloud Computing7 data, it is vital for the corporation to utilize a reliable and quick internet connection. The company has to face issue in case of not working internet (Frank, et. al., 2013).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing8 Research questions and hypothesis The research questions and the hypothesis of the research paper are defined below: Research questions What are the advantages and disadvantages of cloud computing for the business? In what way cloud computing impact the business to increase the productivity of the business? Hypothesis Cloud computing can impact the business efficiency and productivity in effective manner. Cloud computing cannot impact the business efficiency and productivity in effective manner. Research methodology Research methodology is the important part for the research paper in which a researcher relates for accumulating the desired information from the various available sources. Research methods The research methods entail qualitative and quantitative methods to gather the information for the research. The selection of the research method is dependent on the topic of the research. Qualitative method has been chosen for this research paper in which the data has been gathered regarding the chosen topic. It can be defined that the qualitative data is an approach which used in gathering the quality data that facilitates in handling the quality of the research (Smith, 2015).
Cloud Computing9 Research approaches Qualitative and quantitative approaches have been selected. These approaches are selected because they help researcher to gather the information in quality as well as in quantity way. The qualitative approach assists in accumulating the data by enhancing knowledge of the opinions, reason and the perceptions which are not opened behind the title of the research.Primary and secondary sources used in this research to gather the quality information.The use of journal articles, books, online resources have been considered by the researcher at the time of collecting the information (Garcia-Valls, M., Cucinotta and Lu, 2014). Data collection The main aim of the data collection is to collect the data with well efficient manner so that the research can be implementing in an effective manner without any issues (Garcia-Valls, Cucinotta, and Lu, 2014). Primary sources are facilitated researcher to get the quick information from the respondents.To collect the information through primary data, the questionnaire has been prepared to gather the information from the employees of the company that use cloud computing technology in their operations (Thomas, 2015). On the other hand the secondary sources have been used to gather the information in more reliable manner. This reliability is done because the data from the secondary sources have been used by many researchers and others to their study, which is why; it amplifies the authenticity of the data (Johnston, 2014). Sampling techniques
Cloud Computing10 Sampling technique facilitates researcher to collect the data in more efficient manner because it is not possible for the researcher to analyse the huge quantity of the data in short span of time (Turkenburg & McAuley, 2013). For the utilization of time, random sampling technique has been opted by the researcher to analyse the huge quantity of the data. This technique has effective which has the ability to offer the equal chance to every sample of the population in which the analysis can be done in more efficiency manner(Nishad & Sankar, 2016). Research strategy The effectiveness of the research program is increased due to accomplishment of the research program on time. it is vital for the researcher to conduct the research in an efficient manner to attain the objective of the research. Research strategy should be done in an effective manner by taking consideration of the time schedule (Crossman, 2017).A systematic approach is being taken for this research as it facilitates to implement each activity in a sequence.Every activities of the research are entailed in the action plan that determines which activity is complemented in which time with explanation. Targeted market It is required for the research program to set the targets in the way in which it should be cleared that where information regarding to the research is to be gathered. It assists in recognition of the various sources from where data regarding to the topic has to be gathered.Primary and secondary sources are taken in the form of combination in which questionnaire has been made in the context of collecting the primary data. The questionnaire will be showedto the selected employees of the IT Company that use cloud computing services to bring efficiency in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing11 business. On the other hand, the use of secondary sources is taken to gather the data with the help of internet and from journal articles and books which are available after 2009. Ethical consideration The definition of the ethic is regarding to the accomplishment of each and every activity of the research which should be done in an ethical and valid manner. It facilitates researchers to carry the effective behaviour for completing the research in sophisticated way. The issue of plagiarism and the violation of copyright act have been faced by the researcher in terms of collecting the information regarding topic through secondary sources. These issues are moderated through the researcher by giving the full credit to the researchers in the relation to giving references and in texting in each paragraph (Nirmala, 2013). Research limitations The researcher can face the number of issues at the time of accomplishing the research program which may influence the research study in negative manner that can impact the outcome of the research. Lac of time is major limitation for the researcher in which the researcher is unable to collect the data by considering each and every aspects of the research activity. Lack of access of the data is considered as the second limitation that being the cause of issue at the time of executing the research. Along with that the money constraint may influence the researcher to create an valuable research. Due to less funding the researcher might be unable to get access of data sources from various locations of geographic to get the research data in specific way.
Cloud Computing12
Cloud Computing13 Research plan S. No. ActivitiesTime frame (week) Descriptions AChosen of the research topic 1 weekIt is the initiate step in which the topic will be selected for conducting the research plan BPlanning of the research 1 weekAfter selecting the topic of the research, the planning for the research is been discussed in this step in which it considers as the roadmap that instructs researcher to take step in each activity. CImplementation of the selected plan 3 weeks The planning which has been done in the second step will be implemented in this step. The plans will be carried out for further requirements. DSelection of the methods of data collection 1 weekIt is necessary for the research to collect the data regarding the topic. This step will be helpful for the researcher to select the appropriate strategy and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing14 techniques to collect the data. Primary and secondary sources are been considered to collect the data. EData analysis1 WeekAfter collecting data with appropriate method, the data will be analysed in an effective manner with the help of sampling data. EDiscussion2 weekThe analysed data will be discussed in an efficient way to take out the responses to the selected questions of the study of the research. FConclusion and Recommendation 2 weeks According to the data analysis and discussion, the conclusion will be drawn and the recommendations will be made. Gantt chart S.No.ActivitiesDuration12345678910 AChosen of the research topic1 Week BPlanning of the research1 Week CImplementation of the selected plan3 Week DSelection of the methods of data collection1 Week EData analysis1 Week FDiscussion2 Week GConclusion and recommendation1 Week Weeks
Cloud Computing15 Conclusion It has been concluded that the cloud computing is the effective technology that has been adopted by many companies in reducing the operation costs. The examples of various companies have been taken in this research assignment which showed the importance as well as the challenges of the clod counting in the business research. The research methodology section of this research assignment has given clear understanding about the process of collection the data in which primary as well as secondary sources have been chosen to conduct the research. The research limitations and the action plan have been made to define the importance of the research with showing the each activity with time frame.
Cloud Computing16 References Beloglazov, A., Abawajy, J. and Buyya, R. 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), pp.755-768. Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. 2012. How cloud computing enables process and business model innovation.Strategy & Leadership,40(4), pp.27-35. Butcher, M. 2014.Here’s What We Know So Far About The Celebrity Photo Hack.[Online] Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far- about-the-celebrity-photo-hack/ [Accessed 24 April 2018]. Chou, T.S. 2013. Security threats on cloud computing vulnerabilities.International Journal of Computer Science & Information Technology,5(3), p.79. Crossman, A., 2017.An Overview of Qualitative Research Methods.ThoughtCo. Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. 2012. A dependency‐aware ontology‐based approach for deploying service level agreement monitoring services in Cloud.Software: Practice and Experience,42(4), pp.501-518. Dinh, H.T., Lee, C., Niyato, D. and Wang, P. 2013. A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), pp.1587-1611.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing17 Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and Weber, R. 2013. Pushing CDN-ISP collaboration to the limit.ACM SIGCOMM Computer Communication Review,43(3), pp.34-44. Garcia-Valls, M., Cucinotta, T. and Lu, C. 2014. Challenges in real-time virtualization and predictable cloud computing.Journal of Systems Architecture,60(9), pp.726-740. Gomez-Uribe, C.A. and Hunt, N. 2016. The Netflix recommender system: Algorithms, business value, and innovation.ACM Transactions on Management Information Systems (TMIS),6(4), p.13. Johnston, M. P., 2014,“Secondary Data Analysis: A Method of which the Time Has Come”,Qualitative and Quantitative Methods in Libraries, pp. 619 –626. Nirmala, Y., 2013. Chapter four: research design,,Language in India, vol. 13, no. 2, pp. 102. Nishad, P.M. & Sankar, S., 2016. Efficient random sampling statistical method to improve big data compression ratio and pattern matching techniques for compressed data,International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 179. Smith, N.L., 2015. Using Action Design Research to Research and Develop Evaluation Practice. New Directions for Evaluation, vol. 2015, no. 148, pp. 57-72. Thomas, J. A., 2015. Using unstructured diaries for primary data collection. Nurse researcher, vol. 22, no. 5, pp. 25. Turkenburg, J. P. & McAuley, K. E., 2013. Data collection and processing. Acta Crystallographica Section D, vol. 69, no. 7, pp. 1193-1194.