Analysis of Cloud Computing Implementation for Blue Frontier, UK

Verified

Added on  2020/07/22

|14
|4219
|94
Project
AI Summary
This business research project analyzes the implementation of cloud computing for Blue Frontier, a UK-based IT service provider. The project begins with an introduction to cloud computing, defining its role in modern business and its relevance to Blue Frontier. The objectives include understanding the concept of cloud computing, analyzing its significance for Blue Frontier, evaluating its advantages and disadvantages, and recommending improvement strategies. The project scope focuses on assessing the effectiveness of cloud computing in business processes and its impact on business services. The literature review explores the advantages and disadvantages of cloud computing, referencing various academic sources to support the analysis. Advantages discussed include cost reduction, scalability, reliability, and quick deployment, while disadvantages include potential security risks, reliance on service providers, and integration challenges. The project concludes with a discussion of the findings and recommendations for Blue Frontier's cloud computing implementation.
Document Page
Business Research project
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TABLE OF CONTENTS
Introduction......................................................................................................................................1
Project objectives.............................................................................................................................1
Project scope....................................................................................................................................1
Literature Review.............................................................................................................................1
Advantages and disadvantages of cloud computing for business..........................................1
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Document Page
Introduction
Cloud computing is an important network which is used by organisation to protect and
store there are large scale business information. Popular technology in today's driven world is
Cloud computing which can be termed as storage and accessing data over internet rather than in
hard drive of computers. It is the most important and growing idea in the world of information
technology services, which is born out of the requirements for computing on the go. Present
report is based on analysis of Blue frontier which is IT technology service provider in UK.
Further, various advantages and disadvantages of cloud computing for Blue frontier have been
discussed on the basis of literatures.
Project objectives
Some important objectives are mentioned above:
To understand the concept of cloud computing.
To analyse the significance of cloud computing for Blue frontier.
To analyse advantages and disadvantages of Cloud computing for blue frontier.
To recommend strategies for improvement in implementation of this technology for blue
frontier.
Project scope
On the basis of present report or research it will be presenting the effectiveness of cloud
computing in the business process. Moreover, another objective of this report is to analyse the
productive impact of cloud computing on business services. Cloud computing is the effective
process tool and technology of computers which easily store data of businesses with no particular
limits. It helps to store huge data of the company in one single device. Besides, it includes some
risk factors as well.
Literature Review
Advantages and disadvantages of cloud computing for business.
Overview of cloud computing
As per the view of Avram, (2014), the popular technology in today's driven world is
Cloud computing which can be termed as storage and accessing data over internet rather than in
hard drive of computers. It is the most important and growing idea in the world of information
technology services, which is born out of the requirements for computing on the go. For large
1
Document Page
scale business enterprises, it is found as means of storing data of large number of customer and it
can be easily accessible whenever their requirements of information. According to Aljabre,
(2012), cloud computing is the delivery system that delivers computing in the same way a power
grid delivers electronics. For example: Google also use the Cloud computing network to keep
information about its large number of users and provide them information whenever there is
requirement. Moreover, for the average users of computer. it provides the advantage of
delivering the information technology without the users desire to achieve in depth knowledge of
the technology. Similar to the ways, a consumer can access electricity without being an
electrician.
In present context, Blue Frontier is UK digital agency providing professional web design,
development, mobile apps, SEO, PPC and IT services. They help their clients to expand, cut
costs and reduce risk plus improvement of business efficiency (Garrison, Kim and Wakefield,
2012). Company provides its cloud computing services to various business organisations who are
their customers and have their business operations in different industries and sectors such as
healthcare, mobile communication, hotels, travel and tourism sectors etc. As per the
organisation, design and implementation of security on the cloud computing technology is
mainly different from the basic security on the premises IT infrastructure and applications. On
contrary to this, Lin and Chen, (2012) has said that cloud computing service always tends to be
responsible for providing physical security to client's business infrastructure and data. Their
security always to protect important business information and data of client from the insider
threats.
Significance of cloud computing for Blue Frontier
According to Zissis and Lekkas, (2012), cloud computing is the most important and latest
technological buzzword which is doing rounds in different business enterprise these days. It is
used as model which enables ubiquitous, relevant and on requirements' accessibility to a shared
pool of confidential computing resources (for example, networks, storage, servers, applications
and the important services).
As per the view of Alshamaila, Papagiannidis and Li, (2013), “As more consumers and
business use tools like Smart phones, tablets, the ability to host data on the cloud and access it
from just about anywhere on the planet is mainly becoming more vital”. For the business of Blue
Frontier, it is significant to reduce the cost of their business clients in storage of data and
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
applications of security systems on premises. Based on the size of enterprise and IT
requirements, Blue Frontier can avail any of these three key services from their umbrella of
cloud computing such as Software as a service (SaaS), Infrastructure as service (IaaS), platform
for a service (PaaS) and Anything as a Service (AaaS) etc. As per Patidar, Rane and Jain, (2012),
Most of the organisations in UK have requirement to conduct their business on go, especially on
the smartphones and tablets. Cloud computing provides 24/7 on demand services and allows the
users of organisation to stay in tune with the real time information and data from any computing
device, every time and at every location.
Advantages of cloud computing for Blue Frontier
According to Lian, Yen and Wang, (2014), it is confirmed that business can achieve
benefits from this cloud computing network. In present scenario, it is evolving just like never
grown earlier, with organisation of all shapes and sizes associated with this new technology. As
per the view of Jadeja and Modi, (2012), emergence of this new technology has provided major
support to IT service providers and developers towards increasing their client base. Industry
experts considered that this major trend will always continue to achieve growth and development
in the coming few years. As per Ramya and Ramya, (2013), cloud computing technology is the
most effective and economical method to use, sustained and up gradation. It also implies that
traditional desktop software provides major costs burden on organisations. Moreover, Adding up
of various licensing fees for large number of users has analysed very costly for Blue Frontier. On
the other hand, Cloud computing services are available at much cheaper rates and it also provides
data security to the clients of organisation. It can significantly lower the information technology
expenses for clients of Blue Frontier. Brender and Markov, (2013), imply that company will be
able to save substantial costs of its capital with zero in house server storage and requirement of
applications by using this technology. On contrary to this, Sadiku, Musa and Momoh, (2014)
viewed that this technology can sometimes increase costs of organisation when data is
substantially hacked by professional of IT service providers. If staff is experienced and does not
have information to use this technology, then they will not be able to use these services. It is
mostly suitable for large business organisations who are able to afford and use the cloud.
According to Chen and Zhao, (2012), along with the managed platform of service, cloud
computing is very much reliable and consistent for the users as compared to In house It
infrastructure. Blue Frontier offers a service level agreement to their client businesses which
3
Document Page
guarantees 24/7 availability. Their clients can benefit from a major pool of the redundant
information technology resources. Moreover, if any server fails, then it can be easily transited to
any of the other servers which are available in the premises. According to Rittinghouse and
Ransome, (2016), Cloud is very reliable and effective for business as it provides on demand
services at any time however in contrast to this, author has led its more focus on its
manageability. Cloud computing technology has provided an increased and implied management
of IT services along with the maintenance of capabilities through the central administration of
resources and vendor controlled infrastructure. As per the view of Venters and Whitley, (2012),
there are various business enterprises who have eliminated their maintenance and up-gradation of
IT infrastructure because their overall resources are maintained by service providers. Blue
Frontier is also a service provider organisation which is responsible for management of overall
resources of their client’s business.
On contrary to this, Xu, (2012) implies that storing important information in this
technology provides almost ultimate capacity of storage. It is not required for clients to worry
about the running of the storage space and increasing their present capability of storage. Further,
it is identified that is beneficial for organisation in increasing their information storage capacity.
For example: Mobile companies use this cloud computing networks and provide 24/ 7 services to
its users. In contrast to this, kasi Viswanath, Kusuma and Gupta, (2012) stated that the most
important benefits of cloud computing for organisation include integration of software which can
be done easily through this network. This clearly means that clients of Blue Frontier have no
requirement to make their efforts in customising and integration of their own applications
according to their preferences. Through this, Blue Frontier can enable to use its own and
effective applications for providing service to their clients. Business tends to achieve its growth
when they will meet the requirements of customers (Advantages and Disadvantages of Cloud
Computing, 2017). For example: Google provides security storage service to its users in its
application called Gmail. Data can also be encrypted by users which do not allow any other
person to access this information. With continuous increase in use of Smartphones, clients will
be able to meet the requirements of their users.
According to Pearson, (2013), cloud computing has also provided flexibility for growth
to business enterprise as it is easily scalable so that organisation can simply add or reduce
4
Document Page
resources depending upon their own requirements. As the organisation grows, their system will
also grow with them.
Through this, Blue Frontier can allow its customers to customise options with the great
ease. Moreover, they can also pick those service and software applications which they consider is
more suitable for their business enterprise and provide support in achievement of growth. Along
with this, in cloud computing services, Blue Frontier can also provide an advantage of quick
deployment to its clients. Once business opted for this method of functioning, its overall system
will be fully functional in just minutes. On contrary to Ahmed and Hossain, (2014), it also
carries out some problems for those enterprises who don't have any information about how these
methods can be used and they will not be able to use its services. Rapid increase in computing
resources will provide a competitive edge to the client of Blue Frontier over their competitors in
market because the time required for IT procurement is nil (Kumar and Buyya, 2012). For
example: Hotel needs to provide 24/7 service to their customers, users of cloud computing can
easily store their data at any time at any point this helps to transfer files easily to cloud data base.
However, it can be said that this technology helps in reducing the time required for marketing of
new application and services.
Disadvantages of cloud computing for business
Blue Frontier is the marine conservation activist organisation, it is important or necessary
to make the systematic system of marine which needs to be perfect and according to set
structure. Cloud computing is an information technology paradigm that enables ubiquitous
access to assess information of any data. This makes effective technologies with minimal efforts.
It helps in sharing the resources to achieve better objective goals. According to Ali, Khan and
Vasilakos, 2015 cloud computing is not very much productive for the company business due to
presence of risk factors. Besides this, they are no longer in control of business such as when
information moving to the cloud, it means company sends all its data and information in cloud.
IT companies’ employees are not able to resolve the issues on 24 hours basis. On the basis of
effective source of ideas along with that, cloud computing also may not get all the features
perfectly as per the demand source.
As per Almorsy, Grundy and Müller, 2016 all cloud computing is not the same some
cloud computing tend to offer limited which influence the effective changes. Due to this,
company could not receive every feature. As per the view of author, business always needs to go
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
through the services at the time of Signing up. Another drawback of the cloud computing is No
redundancy as per the view of author, cloud server is not redundant nor is it backed up. It
becomes costly for the company while purchasing the redundancy plan. It is an extra cost.
Moreover, cloud computing is not very much effective for the company business in order to have
high risk volume. Another major issue with cloud data base is security issues in which company
fails to secure the data of the organisation. Due to presence of high technology and data serving
effects, the company is facing the risk of security. Clients use cloud computing data which
affects organisation huge data base information and includes high risk of security precautions
Besides this, according to Michael redding managing director of Accenture technology
that cloud computing is the helps to improve security factor within Blue Frontier. On the basis of
Botta and et.al., 2016 cloud computing involves high inflexibility which is another disadvantage
of cloud computing. It is very essential for the company to choose a cloud vendor systematically.
However, it is very difficult for the business to migrate from one accounting package to another.
Before, if you are considering a move to the cloud it is necessary for the business to stipulate the
risk factor in order to mitigate uncertainties. Earlier days of cloud computing were poor. Due to
high risk involves it affects company customer services. As per Hashem and et.al., 2015 cloud
computing is also limited control of assess. Cloud computing is totally owned, managed and
monitored by the service provider. It has limited assess on customer control. Customers only
control the applications of cloud computing rather than others. Blue Frontier may facing the
issues in different manner. Sometimes, company fails to migrate their services from one vendor
to another. It gives negative impression on the prospective due to which they facing hurdles and
challenges in order to safe the data and information. Hosting and integrating current cloud
application on another platform may give interoperability and support issues. Using cloud
powered technologies needs to provide access the data and impacting on the different aspects of
the information. Blue Frontier has different clients to which they provide services. Meanwhile,
being public using the cloud base services risk factor has been increasing more highly. Due to
multiple servers of the cloud services, overloading increases in constant manner.
On the basis of Martinez and Pulier, ServiceMesh Inc, 2015 when company moves the
file or data to the cloud storage folder, this will permanently move its original place to cloud
computing.
6
Document Page
This increases the risk of loss of data. It is necessary for the company to adopt the proper
security precaution in order to ensure the safety. Every cloud computing service has their
specific allowance. If organisation surpasses the given allowance, this becomes major changes in
the business. This called cloud computing has disadvantage of high bandwidth. According to the
view of Pulier, Martinez and Hill, ServiceMesh Inc, (2015) if there is no internet connection,
cloud computing were not going to start and access. This process or availability of internet gives
restriction and limitation to the concept of cloud computing. On the other side, it also gives great
impact on other technologies which gives substitute services to customers. Another drawback of
cloud computing is software; if company needs to want any document, all files first they need to
download all files that make necessary changes. This section provides restriction on the cloud
computing.
This factor gives negative impact on the behaviour of customers. In accordance to the
views of Rittinghouse and Ransome, (2016) downtime is the worst disadvantage of cloud
computing is Downtime no one cloud provider can assure the safety of service outages because it
is totally based on the computer system. This fails to provide the effective services of cloud
computing. Cloud computing is very much dependent software on internet service.. Another
disadvantage of the software is vulnerability to attack. This gives the negativity that due to lack
of secure data, connectivity will not be stable and certain. Moreover, as per the views of Xia and
et.al., 2016 the conclusion is that environment is having huge potential for many business
models. Due to this drawbacks company constantly facing high cost and inflexibility among the
business plans. Moreover, according the views of various authors, they suggested that cloud
computing is not very much fruitful for the company business plans. Cloud computing certainly
benefited for some enterprises in terms of reducing the cost and allowing them to concentrate on
their core business. The major drawback of this software with Blue Frontier is lack of accuracy
level which gives certain risk factor through company facing customer dissatisfaction.
CONCLUSION
In this report, it is concluded that cloud computing plays an important role in protection
and storing the information of large of customers of organisations. Blue frontier has provided an
effective cloud computing network to their clients which has provided them support by
increasing their security and reduction cost of setting IT infrastructure in premises. Clients of
Blue frontier are identified as large scale business enterprise in different sector such Healthcare,
7
Document Page
telecommunication, Hotel and Aviation industry etc.Company will achieve in market if they will
improvement their network and overcome the disadvantages which cloud computing has on
business of their clients.
8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals:
Ahmed, M. and Hossain, M. A., 2014. Cloud computing and security issues in the cloud.
International Journal of Network Security & Its Applications. 6(1). p.25.
Ali, M., Khan, S. U. and Vasilakos, A. V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Aljabre, A., 2012. Cloud computing for increased business value. International Journal of
Business and social science. 3(1).
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Alshamaila, Y., Papagiannidis, S. and Li, F., 2013. Cloud computing adoption by SMEs in the
north east of England: A multi-perspective framework. Journal of Enterprise Information
Management. 26(3). pp.250-275.
Avram, M. G., 2014. Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology. 12. pp.529-534.
Botta, A. and et.al., 2016. Integration of cloud computing and internet of things: a
survey. Future Generation Computer Systems, 56, pp.684-700.
Brender, N. and Markov, I., 2013. Risk perception and risk management in cloud computing:
Results from a case study of Swiss companies. International journal of information
management. 33(5). pp.726-733.
Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Vol. 1, pp. 647-651). IEEE.
Garrison, G., Kim, S. and Wakefield, R. L., 2012. Success factors for deploying cloud
computing. Communications of the ACM. 55(9). pp.62-68.
Hashem, I. A. T. and et.al., 2015. The rise of “big data” on cloud computing: Review and open
research issues. Information Systems, 47, pp.98-115.
Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
kasi Viswanath, M. D., Kusuma, S. and Gupta, S. K., 2012. Cloud computing issues and benefits
modern education. Global Journal of Computer Science and Technology.
9
Document Page
Kumar, S. and Buyya, R., 2012. Green cloud computing and environmental sustainability.
Harnessing Green IT: Principles and Practices, pp.315-339.
Lian, J. W., Yen, D. C. and Wang, Y. T., 2014. An exploratory study to understand the critical
factors affecting the decision to adopt cloud computing in Taiwan hospital. International
Journal of Information Management. 34(1). pp.28-36.
Lin, A. and Chen, N. C., 2012. Cloud computing as an innovation: Percepetion, attitude, and
adoption. International Journal of Information Management. 32(6). pp.533-540.
Martinez, F. R. and Pulier, E., ServiceMesh Inc, 2015. System and method for a cloud
computing abstraction layer with security zone facilities. U.S. Patent 9,069,599.
Patidar, S., Rane, D. and Jain, P., 2012, January. A survey paper on cloud computing. In
Advanced Computing & Communication Technologies (ACCT), 2012 Second
International Conference on (pp. 394-398). IEEE.
Pearson, S., 2013. Privacy, security and trust in cloud computing. In Privacy and Security for
Cloud Computing (pp. 3-42). Springer, London.
Pulier, E., Martinez, F. and Hill, D. C., ServiceMesh Inc, 2015. System and method for a cloud
computing abstraction layer. U.S. Patent 8,931,038.
Ramya, R. and Ramya, K., 2013. Cloud computing.
Rittinghouse, J. W. and Ransome, J. F., 2016. Cloud computing: implementation, management,
and security. CRC press.
Sadiku, M. N., Musa, S. M. and Momoh, O. D., 2014. Cloud computing: opportunities and
challenges. IEEE potentials. 33(1). pp.34-36.
Venters, W. and Whitley, E. A., 2012. A critical review of cloud computing: researching desires
and realities. Journal of Information Technology. 27(3). pp.179-197.
Xia, Z. and et.al., 2016. A privacy-preserving and copy-deterrence content-based image retrieval
scheme in cloud computing. IEEE Transactions on Information Forensics and
Security, 11(11), pp.2594-2608.
Xu, X., 2012. From cloud computing to cloud manufacturing. Robotics and computer-integrated
manufacturing, 28(1), pp.75-86.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
Online:
10
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]