Advantage and Disadvantage of Cloud Computing
VerifiedAdded on 2021/05/30
|19
|3122
|245
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: Cloud Computing 1
Business research
Advantage and Disadvantage of Cloud Computing for Business
Business research
Advantage and Disadvantage of Cloud Computing for Business
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing 2
Title
Advantages and disadvantages of cloud computing for business
Introduction
The aim of this research paper is to evaluate the importance of the cloud computing for the
business by showing the advantages and disadvantages of it on the business. The cloud
computing is considered as the effective innovation for the business in technology market as it
facilitates many businesses to keep data in an effective manner. It reduces the unnecessary cost
of the company and carries the efficiency. There are number of associations that use remote
server to empower the employees to extensively get to gather of administrations and assets
through use of web access. The previous report is carried out in this assignment in which the
research methodology will be evaluated in a significant way so that the reader can understand
from where data is collected.
Title
Advantages and disadvantages of cloud computing for business
Introduction
The aim of this research paper is to evaluate the importance of the cloud computing for the
business by showing the advantages and disadvantages of it on the business. The cloud
computing is considered as the effective innovation for the business in technology market as it
facilitates many businesses to keep data in an effective manner. It reduces the unnecessary cost
of the company and carries the efficiency. There are number of associations that use remote
server to empower the employees to extensively get to gather of administrations and assets
through use of web access. The previous report is carried out in this assignment in which the
research methodology will be evaluated in a significant way so that the reader can understand
from where data is collected.
Cloud Computing 3
Project objective
It is necessary for the researcher to accomplish the each activity which made at the time of
implementation of the research. There are several benefits as well as drawbacks are entailed in
this research program regarding cloud computing. The main objectives of this research are to
evaluate the importance of cloud computing for the business effectively and to understand the
various ways which may impact the business adversely due to use of cloud computing.
Project objective
It is necessary for the researcher to accomplish the each activity which made at the time of
implementation of the research. There are several benefits as well as drawbacks are entailed in
this research program regarding cloud computing. The main objectives of this research are to
evaluate the importance of cloud computing for the business effectively and to understand the
various ways which may impact the business adversely due to use of cloud computing.
Cloud Computing 4
Project scope
The scope of the research topic is broad as it entails many factors in the form of benefits and
drawbacks of cloud computing for the business. The research will be helpful for the reader to
understand the various aspects in relation to cloud computing so that they might be aware about
the implementation of cloud computing in their business. the example of Netflix will be carried
out in this research paper from previous assignment.
Project scope
The scope of the research topic is broad as it entails many factors in the form of benefits and
drawbacks of cloud computing for the business. The research will be helpful for the reader to
understand the various aspects in relation to cloud computing so that they might be aware about
the implementation of cloud computing in their business. the example of Netflix will be carried
out in this research paper from previous assignment.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing 5
Literature review
According to Shuleski, Birsan,Cristea and Radu, (2016), the use of technology has increased day
by day in which many organizations all over the world latest technology to increase the
productivity and the efficiency of the business. As per the IDC, the global income from public IT
cloud services is amplified around 22 billion in the year of 2010 and it has been anticipated that
it will increase more than 73 billion in coming years (IDC, 2013). Microsoft, Amazon, Netflix
and Google are some major player of the cloud computing that has adopted it in a significant
manner and increasing the efficiency of the business. It has been found from the research of
Dinh et al. (2013) that public uses cloud computing technology for number of purposes such as
playing games, sharing content and conveying messages through email. The companies use this
technology due to number of advantages because it helps company to develop the efficiency of
the business (Chou, 2013). Netflix is provided number of facilities to its customer by using cloud
computing technology. The use of cloud computing technology is re-imagined by this company
to attain the competitive advantages over its competitors (Gomez-Uribe and Hunt, 2016).
Amazon Web Services is being chosen by the company which is considered as the world’s
largest clod based solution provides (Dastjerdi, Tabatabaei and Buyya, 2012). According to
Berman et al. (2012) the services of AWS is effective for the business as it enables Netflix to
develop the quality by increasing the efficiency of the business. The business is expanded day by
day in every industry due to effective use of cloud computing technology. Netflix has enlarged
its real content to attain the attained the fame all over the US such as Narcos, New Black, House
of Cards, Orange and Stranger Things.
Literature review
According to Shuleski, Birsan,Cristea and Radu, (2016), the use of technology has increased day
by day in which many organizations all over the world latest technology to increase the
productivity and the efficiency of the business. As per the IDC, the global income from public IT
cloud services is amplified around 22 billion in the year of 2010 and it has been anticipated that
it will increase more than 73 billion in coming years (IDC, 2013). Microsoft, Amazon, Netflix
and Google are some major player of the cloud computing that has adopted it in a significant
manner and increasing the efficiency of the business. It has been found from the research of
Dinh et al. (2013) that public uses cloud computing technology for number of purposes such as
playing games, sharing content and conveying messages through email. The companies use this
technology due to number of advantages because it helps company to develop the efficiency of
the business (Chou, 2013). Netflix is provided number of facilities to its customer by using cloud
computing technology. The use of cloud computing technology is re-imagined by this company
to attain the competitive advantages over its competitors (Gomez-Uribe and Hunt, 2016).
Amazon Web Services is being chosen by the company which is considered as the world’s
largest clod based solution provides (Dastjerdi, Tabatabaei and Buyya, 2012). According to
Berman et al. (2012) the services of AWS is effective for the business as it enables Netflix to
develop the quality by increasing the efficiency of the business. The business is expanded day by
day in every industry due to effective use of cloud computing technology. Netflix has enlarged
its real content to attain the attained the fame all over the US such as Narcos, New Black, House
of Cards, Orange and Stranger Things.
Cloud Computing 6
The benefits of cloud computing in the business is reducing costs and increasing the efficiency of
the business as well as employees. The costs of operation can be reduced of the business due to
effective use of cloud computing in which the cost of system upgrades, new software and
hardware might be involved in the contract. Along with that it provides the flexibility, efficiency
and strategic value. Cloud based services assist many organizations to fulfil the demand of the
business of any organization by providing them huge range of services (Butcher, 2014). It
encourages the friendly environment that facilitates to utilize only the server space they needed.
The technology has become convenient for many businesses as it can be afforded at minimal rate
and can be utilized by small as well as large organizations. The examples of Easy jet are given in
the first part in which the importance of cloud computing in this business has described to
decrease their operations data. According to Shuleski, Birsan,Cristea and Radu, (2016), that the
global software as a Services (SaaS) market has been found as the major organizer of the cloud
services that announced to amplify from $55B in 2016 to $67B in 2018.
It has been argued by Beloglazov, Abawajy and Buyya (2012) that cloud computing can become
the cause of losing data which cannot be controlled by the experts. Even though CSP executes
the latest and advanced software features. it has been found that the risk of data breach and cyber
attack is connected to the clod computing. As per Beloglazov, A., Abawajy and Buyya, (2012),
since the cloud is dependent on the internet in which a cybercriminal can hack CSP data base and
collect the personal informant about the clients. Moreover, corporations need to share the
personal and confidential data with CSPs. According to Butcher, (2014), in such case, it is
required for the business to take care the data with full of confidentiality otherwise it may lead
the business in an adverse situation (Berman, Kesterson-Townes, Marshall and Srivathsa, 2012).
Downtime of servers is another challenge of the cloud computing and in term to access their
The benefits of cloud computing in the business is reducing costs and increasing the efficiency of
the business as well as employees. The costs of operation can be reduced of the business due to
effective use of cloud computing in which the cost of system upgrades, new software and
hardware might be involved in the contract. Along with that it provides the flexibility, efficiency
and strategic value. Cloud based services assist many organizations to fulfil the demand of the
business of any organization by providing them huge range of services (Butcher, 2014). It
encourages the friendly environment that facilitates to utilize only the server space they needed.
The technology has become convenient for many businesses as it can be afforded at minimal rate
and can be utilized by small as well as large organizations. The examples of Easy jet are given in
the first part in which the importance of cloud computing in this business has described to
decrease their operations data. According to Shuleski, Birsan,Cristea and Radu, (2016), that the
global software as a Services (SaaS) market has been found as the major organizer of the cloud
services that announced to amplify from $55B in 2016 to $67B in 2018.
It has been argued by Beloglazov, Abawajy and Buyya (2012) that cloud computing can become
the cause of losing data which cannot be controlled by the experts. Even though CSP executes
the latest and advanced software features. it has been found that the risk of data breach and cyber
attack is connected to the clod computing. As per Beloglazov, A., Abawajy and Buyya, (2012),
since the cloud is dependent on the internet in which a cybercriminal can hack CSP data base and
collect the personal informant about the clients. Moreover, corporations need to share the
personal and confidential data with CSPs. According to Butcher, (2014), in such case, it is
required for the business to take care the data with full of confidentiality otherwise it may lead
the business in an adverse situation (Berman, Kesterson-Townes, Marshall and Srivathsa, 2012).
Downtime of servers is another challenge of the cloud computing and in term to access their
Cloud Computing 7
data, it is vital for the corporation to utilize a reliable and quick internet connection. The
company has to face issue in case of not working internet (Frank, et. al., 2013).
data, it is vital for the corporation to utilize a reliable and quick internet connection. The
company has to face issue in case of not working internet (Frank, et. al., 2013).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing 8
Research questions and hypothesis
The research questions and the hypothesis of the research paper are defined below:
Research questions
What are the advantages and disadvantages of cloud computing for the business?
In what way cloud computing impact the business to increase the productivity of the
business?
Hypothesis
Cloud computing can impact the business efficiency and productivity in effective
manner.
Cloud computing cannot impact the business efficiency and productivity in effective
manner.
Research methodology
Research methodology is the important part for the research paper in which a researcher relates
for accumulating the desired information from the various available sources.
Research methods
The research methods entail qualitative and quantitative methods to gather the information for
the research. The selection of the research method is dependent on the topic of the research.
Qualitative method has been chosen for this research paper in which the data has been gathered
regarding the chosen topic. It can be defined that the qualitative data is an approach which used
in gathering the quality data that facilitates in handling the quality of the research (Smith, 2015).
Research questions and hypothesis
The research questions and the hypothesis of the research paper are defined below:
Research questions
What are the advantages and disadvantages of cloud computing for the business?
In what way cloud computing impact the business to increase the productivity of the
business?
Hypothesis
Cloud computing can impact the business efficiency and productivity in effective
manner.
Cloud computing cannot impact the business efficiency and productivity in effective
manner.
Research methodology
Research methodology is the important part for the research paper in which a researcher relates
for accumulating the desired information from the various available sources.
Research methods
The research methods entail qualitative and quantitative methods to gather the information for
the research. The selection of the research method is dependent on the topic of the research.
Qualitative method has been chosen for this research paper in which the data has been gathered
regarding the chosen topic. It can be defined that the qualitative data is an approach which used
in gathering the quality data that facilitates in handling the quality of the research (Smith, 2015).
Cloud Computing 9
Research approaches
Qualitative and quantitative approaches have been selected. These approaches are selected
because they help researcher to gather the information in quality as well as in quantity way. The
qualitative approach assists in accumulating the data by enhancing knowledge of the opinions,
reason and the perceptions which are not opened behind the title of the research. Primary and
secondary sources used in this research to gather the quality information. The use of journal
articles, books, online resources have been considered by the researcher at the time of collecting
the information (Garcia-Valls, M., Cucinotta and Lu, 2014).
Data collection
The main aim of the data collection is to collect the data with well efficient manner so that the
research can be implementing in an effective manner without any issues (Garcia-Valls,
Cucinotta, and Lu, 2014). Primary sources are facilitated researcher to get the quick information
from the respondents. To collect the information through primary data, the questionnaire has
been prepared to gather the information from the employees of the company that use cloud
computing technology in their operations (Thomas, 2015). On the other hand the secondary
sources have been used to gather the information in more reliable manner. This reliability is done
because the data from the secondary sources have been used by many researchers and others to
their study, which is why; it amplifies the authenticity of the data (Johnston, 2014).
Sampling techniques
Research approaches
Qualitative and quantitative approaches have been selected. These approaches are selected
because they help researcher to gather the information in quality as well as in quantity way. The
qualitative approach assists in accumulating the data by enhancing knowledge of the opinions,
reason and the perceptions which are not opened behind the title of the research. Primary and
secondary sources used in this research to gather the quality information. The use of journal
articles, books, online resources have been considered by the researcher at the time of collecting
the information (Garcia-Valls, M., Cucinotta and Lu, 2014).
Data collection
The main aim of the data collection is to collect the data with well efficient manner so that the
research can be implementing in an effective manner without any issues (Garcia-Valls,
Cucinotta, and Lu, 2014). Primary sources are facilitated researcher to get the quick information
from the respondents. To collect the information through primary data, the questionnaire has
been prepared to gather the information from the employees of the company that use cloud
computing technology in their operations (Thomas, 2015). On the other hand the secondary
sources have been used to gather the information in more reliable manner. This reliability is done
because the data from the secondary sources have been used by many researchers and others to
their study, which is why; it amplifies the authenticity of the data (Johnston, 2014).
Sampling techniques
Cloud Computing 10
Sampling technique facilitates researcher to collect the data in more efficient manner because it
is not possible for the researcher to analyse the huge quantity of the data in short span of time
(Turkenburg & McAuley, 2013). For the utilization of time, random sampling technique has
been opted by the researcher to analyse the huge quantity of the data. This technique has
effective which has the ability to offer the equal chance to every sample of the population in
which the analysis can be done in more efficiency manner (Nishad & Sankar, 2016).
Research strategy
The effectiveness of the research program is increased due to accomplishment of the research
program on time. it is vital for the researcher to conduct the research in an efficient manner to
attain the objective of the research. Research strategy should be done in an effective manner by
taking consideration of the time schedule (Crossman, 2017). A systematic approach is being
taken for this research as it facilitates to implement each activity in a sequence. Every activities
of the research are entailed in the action plan that determines which activity is complemented in
which time with explanation.
Targeted market
It is required for the research program to set the targets in the way in which it should be cleared
that where information regarding to the research is to be gathered. It assists in recognition of the
various sources from where data regarding to the topic has to be gathered. Primary and
secondary sources are taken in the form of combination in which questionnaire has been made in
the context of collecting the primary data. The questionnaire will be showed to the selected
employees of the IT Company that use cloud computing services to bring efficiency in the
Sampling technique facilitates researcher to collect the data in more efficient manner because it
is not possible for the researcher to analyse the huge quantity of the data in short span of time
(Turkenburg & McAuley, 2013). For the utilization of time, random sampling technique has
been opted by the researcher to analyse the huge quantity of the data. This technique has
effective which has the ability to offer the equal chance to every sample of the population in
which the analysis can be done in more efficiency manner (Nishad & Sankar, 2016).
Research strategy
The effectiveness of the research program is increased due to accomplishment of the research
program on time. it is vital for the researcher to conduct the research in an efficient manner to
attain the objective of the research. Research strategy should be done in an effective manner by
taking consideration of the time schedule (Crossman, 2017). A systematic approach is being
taken for this research as it facilitates to implement each activity in a sequence. Every activities
of the research are entailed in the action plan that determines which activity is complemented in
which time with explanation.
Targeted market
It is required for the research program to set the targets in the way in which it should be cleared
that where information regarding to the research is to be gathered. It assists in recognition of the
various sources from where data regarding to the topic has to be gathered. Primary and
secondary sources are taken in the form of combination in which questionnaire has been made in
the context of collecting the primary data. The questionnaire will be showed to the selected
employees of the IT Company that use cloud computing services to bring efficiency in the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing 11
business. On the other hand, the use of secondary sources is taken to gather the data with the help
of internet and from journal articles and books which are available after 2009.
Ethical consideration
The definition of the ethic is regarding to the accomplishment of each and every activity of the
research which should be done in an ethical and valid manner. It facilitates researchers to carry
the effective behaviour for completing the research in sophisticated way. The issue of plagiarism
and the violation of copyright act have been faced by the researcher in terms of collecting the
information regarding topic through secondary sources. These issues are moderated through the
researcher by giving the full credit to the researchers in the relation to giving references and in
texting in each paragraph (Nirmala, 2013).
Research limitations
The researcher can face the number of issues at the time of accomplishing the research program
which may influence the research study in negative manner that can impact the outcome of the
research. Lac of time is major limitation for the researcher in which the researcher is unable to
collect the data by considering each and every aspects of the research activity. Lack of access of
the data is considered as the second limitation that being the cause of issue at the time of
executing the research. Along with that the money constraint may influence the researcher to
create an valuable research. Due to less funding the researcher might be unable to get access of
data sources from various locations of geographic to get the research data in specific way.
business. On the other hand, the use of secondary sources is taken to gather the data with the help
of internet and from journal articles and books which are available after 2009.
Ethical consideration
The definition of the ethic is regarding to the accomplishment of each and every activity of the
research which should be done in an ethical and valid manner. It facilitates researchers to carry
the effective behaviour for completing the research in sophisticated way. The issue of plagiarism
and the violation of copyright act have been faced by the researcher in terms of collecting the
information regarding topic through secondary sources. These issues are moderated through the
researcher by giving the full credit to the researchers in the relation to giving references and in
texting in each paragraph (Nirmala, 2013).
Research limitations
The researcher can face the number of issues at the time of accomplishing the research program
which may influence the research study in negative manner that can impact the outcome of the
research. Lac of time is major limitation for the researcher in which the researcher is unable to
collect the data by considering each and every aspects of the research activity. Lack of access of
the data is considered as the second limitation that being the cause of issue at the time of
executing the research. Along with that the money constraint may influence the researcher to
create an valuable research. Due to less funding the researcher might be unable to get access of
data sources from various locations of geographic to get the research data in specific way.
Cloud Computing 12
Cloud Computing 13
Research plan
S.
No.
Activities Time
frame
(week)
Descriptions
A Chosen of the
research topic
1 week It is the initiate step in which the topic will be selected
for conducting the research plan
B Planning of the
research
1 week After selecting the topic of the research, the planning for
the research is been discussed in this step in which it
considers as the roadmap that instructs researcher to
take step in each activity.
C Implementation of
the selected plan
3
weeks
The planning which has been done in the second step
will be implemented in this step. The plans will be
carried out for further requirements.
D Selection of the
methods of data
collection
1 week It is necessary for the research to collect the data
regarding the topic. This step will be helpful for the
researcher to select the appropriate strategy and
Research plan
S.
No.
Activities Time
frame
(week)
Descriptions
A Chosen of the
research topic
1 week It is the initiate step in which the topic will be selected
for conducting the research plan
B Planning of the
research
1 week After selecting the topic of the research, the planning for
the research is been discussed in this step in which it
considers as the roadmap that instructs researcher to
take step in each activity.
C Implementation of
the selected plan
3
weeks
The planning which has been done in the second step
will be implemented in this step. The plans will be
carried out for further requirements.
D Selection of the
methods of data
collection
1 week It is necessary for the research to collect the data
regarding the topic. This step will be helpful for the
researcher to select the appropriate strategy and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Computing 14
techniques to collect the data. Primary and secondary
sources are been considered to collect the data.
E Data analysis 1 Week After collecting data with appropriate method, the data
will be analysed in an effective manner with the help of
sampling data.
E Discussion 2 week The analysed data will be discussed in an efficient way
to take out the responses to the selected questions of the
study of the research.
F Conclusion and
Recommendation
2
weeks
According to the data analysis and discussion, the
conclusion will be drawn and the recommendations will
be made.
Gantt chart
S.No. Activities Duration 1 2 3 4 5 6 7 8 9 10
A Chosen of the research topic 1 Week
B Planning of the research 1 Week
C Implementation of the selected plan 3 Week
D Selection of the methods of data collection1 Week
E Data analysis 1 Week
F Discussion 2 Week
G Conclusion and recommendation 1 Week
Weeks
techniques to collect the data. Primary and secondary
sources are been considered to collect the data.
E Data analysis 1 Week After collecting data with appropriate method, the data
will be analysed in an effective manner with the help of
sampling data.
E Discussion 2 week The analysed data will be discussed in an efficient way
to take out the responses to the selected questions of the
study of the research.
F Conclusion and
Recommendation
2
weeks
According to the data analysis and discussion, the
conclusion will be drawn and the recommendations will
be made.
Gantt chart
S.No. Activities Duration 1 2 3 4 5 6 7 8 9 10
A Chosen of the research topic 1 Week
B Planning of the research 1 Week
C Implementation of the selected plan 3 Week
D Selection of the methods of data collection1 Week
E Data analysis 1 Week
F Discussion 2 Week
G Conclusion and recommendation 1 Week
Weeks
Cloud Computing 15
Conclusion
It has been concluded that the cloud computing is the effective technology that has been adopted
by many companies in reducing the operation costs. The examples of various companies have
been taken in this research assignment which showed the importance as well as the challenges of
the clod counting in the business research. The research methodology section of this research
assignment has given clear understanding about the process of collection the data in which
primary as well as secondary sources have been chosen to conduct the research. The research
limitations and the action plan have been made to define the importance of the research with
showing the each activity with time frame.
Conclusion
It has been concluded that the cloud computing is the effective technology that has been adopted
by many companies in reducing the operation costs. The examples of various companies have
been taken in this research assignment which showed the importance as well as the challenges of
the clod counting in the business research. The research methodology section of this research
assignment has given clear understanding about the process of collection the data in which
primary as well as secondary sources have been chosen to conduct the research. The research
limitations and the action plan have been made to define the importance of the research with
showing the each activity with time frame.
Cloud Computing 16
References
Beloglazov, A., Abawajy, J. and Buyya, R. 2012. Energy-aware resource allocation heuristics for
efficient management of data centers for cloud computing. Future generation computer
systems, 28(5), pp.755-768.
Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. 2012. How cloud computing
enables process and business model innovation. Strategy & Leadership, 40(4), pp.27-35.
Butcher, M. 2014. Here’s What We Know So Far About The Celebrity Photo Hack. [Online]
Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far-
about-the-celebrity-photo-hack/ [Accessed 24 April 2018].
Chou, T.S. 2013. Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Crossman, A., 2017. An Overview of Qualitative Research Methods. ThoughtCo.
Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. 2012. A dependency‐aware ontology‐based
approach for deploying service level agreement monitoring services in Cloud. Software: Practice
and Experience, 42(4), pp.501-518.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P. 2013. A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611.
References
Beloglazov, A., Abawajy, J. and Buyya, R. 2012. Energy-aware resource allocation heuristics for
efficient management of data centers for cloud computing. Future generation computer
systems, 28(5), pp.755-768.
Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. 2012. How cloud computing
enables process and business model innovation. Strategy & Leadership, 40(4), pp.27-35.
Butcher, M. 2014. Here’s What We Know So Far About The Celebrity Photo Hack. [Online]
Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far-
about-the-celebrity-photo-hack/ [Accessed 24 April 2018].
Chou, T.S. 2013. Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Crossman, A., 2017. An Overview of Qualitative Research Methods. ThoughtCo.
Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. 2012. A dependency‐aware ontology‐based
approach for deploying service level agreement monitoring services in Cloud. Software: Practice
and Experience, 42(4), pp.501-518.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P. 2013. A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Computing 17
Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and
Weber, R. 2013. Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Computer
Communication Review, 43(3), pp.34-44.
Garcia-Valls, M., Cucinotta, T. and Lu, C. 2014. Challenges in real-time virtualization and
predictable cloud computing. Journal of Systems Architecture, 60(9), pp.726-740.
Gomez-Uribe, C.A. and Hunt, N. 2016. The Netflix recommender system: Algorithms, business
value, and innovation. ACM Transactions on Management Information Systems (TMIS), 6(4),
p.13.
Johnston, M. P., 2014,“Secondary Data Analysis: A Method of which the Time Has
Come”,Qualitative and Quantitative Methods in Libraries, pp. 619 –626.
Nirmala, Y., 2013. Chapter four: research design,,Language in India, vol. 13, no. 2, pp. 102.
Nishad, P.M. & Sankar, S., 2016. Efficient random sampling statistical method to improve big
data compression ratio and pattern matching techniques for compressed data, International
Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 179.
Smith, N.L., 2015. Using Action Design Research to Research and Develop Evaluation Practice.
New Directions for Evaluation, vol. 2015, no. 148, pp. 57-72.
Thomas, J. A., 2015. Using unstructured diaries for primary data collection. Nurse researcher,
vol. 22, no. 5, pp. 25.
Turkenburg, J. P. & McAuley, K. E., 2013. Data collection and processing. Acta
Crystallographica Section D, vol. 69, no. 7, pp. 1193-1194.
Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and
Weber, R. 2013. Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Computer
Communication Review, 43(3), pp.34-44.
Garcia-Valls, M., Cucinotta, T. and Lu, C. 2014. Challenges in real-time virtualization and
predictable cloud computing. Journal of Systems Architecture, 60(9), pp.726-740.
Gomez-Uribe, C.A. and Hunt, N. 2016. The Netflix recommender system: Algorithms, business
value, and innovation. ACM Transactions on Management Information Systems (TMIS), 6(4),
p.13.
Johnston, M. P., 2014,“Secondary Data Analysis: A Method of which the Time Has
Come”,Qualitative and Quantitative Methods in Libraries, pp. 619 –626.
Nirmala, Y., 2013. Chapter four: research design,,Language in India, vol. 13, no. 2, pp. 102.
Nishad, P.M. & Sankar, S., 2016. Efficient random sampling statistical method to improve big
data compression ratio and pattern matching techniques for compressed data, International
Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 179.
Smith, N.L., 2015. Using Action Design Research to Research and Develop Evaluation Practice.
New Directions for Evaluation, vol. 2015, no. 148, pp. 57-72.
Thomas, J. A., 2015. Using unstructured diaries for primary data collection. Nurse researcher,
vol. 22, no. 5, pp. 25.
Turkenburg, J. P. & McAuley, K. E., 2013. Data collection and processing. Acta
Crystallographica Section D, vol. 69, no. 7, pp. 1193-1194.
Cloud Computing 18
Cloud Computing 19
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.