Wednesday, July 17, 2019

Cloud computing and web 2.0 Essay

drove reason refers to technological reason that matter on sharing of figure resources as opposed to having organizational devices or topical anaesthetic servers to take c ar of the practises in the organization. The pronounce denigrate is metaphoric to the cyberspace. In a nutshell, the phrase debase reckoning refers to computing ground on the net profit where various servers applications and storage atomic number 18 delivered to the computers and devices of the organization.How validations use corrupt ComputingToday, disdaines use cloud computing to opening chore education completelywhere by use of compatible devices. distant storing development in the computer or having office servers, cloud computing alters info storage on the internet. Khan& Zaheer, (2012) asserts that the application works by availing the schooling from a central wind vane establish hub that enable allone in possession of accurate authentication to access the nurture anywher e with internet connection. This stomachs mobile workings which except reduces the monetary value of office space renting expenditures. Perhaps, nigh importantly, the engine room is unsubtlely utilize in selective information back-up. This prevents sack of vital information in-case of placement failure or any disaster. The cloud allows automatic modify of the data eon at work as well as creating copies of data off-site safe from any disaster. debauch computing withal allows data synchronization for all the devices connected to the cloud permitting constant update with real-time information. The organizations use the cloud to access all types of files, use the office information and further collaborate with cater members while working on a homogeneous project in different locations which enable sharing of information.Businesses use cloud engineering to plan for future growth of the business and Business owners always aim at reducing the a standrophize of convergencei on and boilers suit business costs without sacrificing their ability to get by and run business. For this reason, most businesses use the computing process to store functional programs which founding power imply customer service tools, explanation services and remote desktop hosting. A recent study noticed that businesses that point on cloud technology rescue gamyer competitive edge than their competitors who do not use the technology. They mentioned argonas such as efficiency in customer service, digital information storage, market, quick information up-dates and fit employee focus. applied science Required in in operation(p) Cloud ComputingThe organization must(prenominal) poses business and financial, technological cleverness to in effect operate cloud computing. Innovations in pass on on investment making vox populi on business metrics based on performance versus costs of subscribing the cloud. Secondly, the staff must have technical skill to cause on the clo uds. Knowledge based on internet applications such as java and NET, languages and open source tools are required. Architectural development and counsel skills overly come forefront in the management of the cloud computing. This is essential for laying cypher road map of IT services and dissertation the language of the business. The organization must also marshal key stakeholders to agree on the timelines, goals and meet the project objectives. Furthermore, the beau monde must invest in technological auspices measures to provide protection for confidential information.Advantages and Disadvantages of Cloud ComputingCloud technology furnishs wide advantages to the users. The technology is cost effective and favorable to update and maintain. Traditional desktops are financially ineffective and increase business costs. The company evict, therefore, maximize on returns by get down the costs. Secondly, it offers unlimited storage for data then no worry of storage space. The tech nology has recovery and backup for stored data that eliminates loss of data in case of any damages. Lastly, cloud computing offers easy access to information by the users anywhere they are, and the cloud integrates software automatically.However, the drawbacks of victimization cloud computing technology are double. Firstly, implementation of cloud computing in the organization requires personnel training. Additionally, it demands the establishment of elaborate and effective troubleshooting establishment during and after the launching of the cloud. Organizations are further charged with challenges of addressing hesitant employees who are unknown with the cloud computing technology. Secondly, certification risks are major c one timerns of cloud technology (Khan& Zaheer, 2012). The owners of the businesses and finding makers majorly worry vulnerability of sensitive data in the cloud to the unauthorized users. Although the users are provided with passwords and usernames, the verifi cation of these details remains a top challenge. These threaten the safety of information in the cloud as the internet hackers understructure access confidential information. meshing 2.0 weather vane 2.0 refers to the term used to severalize the second generation of the World liberal network aimed at the ability of the users to grapple information and collaborate online. It mentions the transition derived from dormant HTLM weave foliates to advanced and dynamic web based on serving applications of the web users in an organized manner.How Organizations use nett 2.0Today, according to Richardson, Helen, & Hope, Beverley. (2003) businesses embrace web 2.0 technologies to build relationships with customers and to improve the employee welfare while reducing costs. Web 2.0 services such as YouTube slide bundle and twitter batch add value to businesses. The technology is used to empower the organizations employees through and through sharing of productive business innovational i nformation which in turn leads to high sales, assists in strengthening the company stag, unified identity and image. Furthermore, the organizations use the web 2.0 technologies to serve recruitment of employees and simultaneously improving their working environments and relationships.Research one by Organization for sparing Co-operation and Development, (2013) shows that businesses shit pages in facebook and necessitate the users and customers to become fans of the page. In the page, all the fans willing receive notifications on news feeds. With time, the page develops into galore(postnominal) fans of the business that creates room for spread head awareness of the corporate identity and the brand of the business. Therefore, mixer pages such as facebook offer excellent advertising services at a lower cost as opposed to media advertisement which is very expensive. The social sites offers good program for the target listening and location. Additionally, the social sites offe r grounds for receiving feedback from the customers as a process of the tracking system of the business. Using the fans feedback, businesses can adjust to the inescapably of the customers in product services and in conclusion grow.Also, YouTube offers online videos allowing the site users to watch countless times. wad register in YouTube for free and once they have registered, they can download the videos and share via email, or post on blogs. Advertisements can be done through YouTube and raft will have a take place to rate the products by commenting on the videos.Advantages and Disadvantages of Web 2.0Web 2.0 is user-centered that allows collaboration, interaction and sharing of information. Web 2.0 users enjoy the freedom of sharing thoughts, likes, doctrines views and dislikes. The technology assists in media marketing at a lower cost and use of optimum search engines for business development. Social networking increases the circles of friends who have the hazard to post t heir comments and views regarding the business. Furthermore, it promotes online business for products and services and constant invoice and update of information.Contrastingly, the technology has some drawbacks which include loading of information by many users who post their views. This creates confusion to the users and sometimes the subject matter of information posted is unreliable. Additionally, the freedom of bank bill can create a chance for competitors to post negative comments about the business creating unfavorable business environment. Lastly, online hackers and forgeries can create crime by accessing confidential information (Richardson, Helen, & Hope, Beverley, 2003). engineering science required in operational Web 2.0Web 2.0 covers wide black market of technologies. Widely used are blogs, podcasts, farsightedness markets, wikis, and information tagging and social networks. New technologies should be adopted to run these applications as the world continues to evol ve. The companies must understand the voltage of the staff in the management of the project victimisation technological means. Finally, the business must introduce in technological measures that can allow the company to offer optimum security system measures. The use of web 2.0 often attracts criminals who can derail the business. Therefore, technology in security comes on forefront in the management of the web 2.0 technology.ReferencesKhan, Zaheer, Ludlow, David, McClatchey, Richard, & Anjum, Ashiq. (2012). An architecture for integrated light in urban management using cloud computing. (BioMed Central Ltd.) BioMed Central Ltd.KI Voigt, & M Ernst. (2011). Use of Web 2.0 applications in product development an empirical study of the potential for knowledge creation and exchange in research and development. (International Journal of Engineering, Science and Technology Vol 2, No 9 (2010).) MultiCraft Limited.Organisation for Economic Co-operation and Development. (January 01, 2013) . Ensuring the Global Participation in the earnings Economy for Development.Richardson, Helen, & Hope, Beverley. (2003). The Role of nurture Systems and Technology in Case Management a case study in health and welfare insurance. (Australasian Journal of Information Systems Vol 10, No 2 (2003).) Australasian Association for Information Systems.Source document

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.