Kayla Matthews

The California Consumer Privacy Act: What You Should Know

The California Consumer Privacy Act GDPR or the European Union’s General Data Protection Regulation effectively altered the way that businesses interact with European citizens. It doesn’t matter whether a company is located within the boundaries of Europe or not — if it does business with
/
How the Oil Industry Can Benefit from IoT Technology

How the Oil Industry Can Benefit from IoT Technology

Oil Industry Can Benefit from IoT In 2010, the Deepwater Horizon oil tragedy struck and took the nation’s attention for months. Two-hundred million gallons of oil spilled, 16,000 miles is the range it spread across the coastline from Florida to Texas, 8,000 animals were killed,
/

Cloud Deployment Models: Private, Community, Public and Hybrid Cloud

Cloud Deployment Models

Nowadays, access to reliable high-performance hardware and software resources without large capital outlays, easier access to applications and services, capability of handling large amounts of information have encouraged managers of  companies to migrate to cloud computing.

Cloud computing is a service-oriented technology that use both hardware and software to provide services through a network regardless of time and location. Cloud computing consists of three different service models and a company should cover all three distinctive service models in order to adopt cloud computing. These three cloud service models are: infrastructure as a service (IaaS), platform as a service (PaaS), software as a service ( SaaS).  (Infographic Source: Horn Group)

cloud-strat

According to the National Institute of Standards and Technology (NIST), infrastructure as a service (IaaS) is : “the capability provided to the consumer to process, store, network, and access to other fundamental computing resources  from cloud vendors”;  platform as a service (PaaS) is: “the capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquire applications created using programming languages and tools supported by cloud vendors”; and software as a service ( SaaS) is “the capability provided to the consumer to use software or applications from various client devices through the Internet”.  Special and unique characteristics of cloud computing; such as broad network access, on-demand self-service, resource pooling, rapid elasticity for faster scalability, and measured service ; encourage companies to choose a cloud computing solution.

Cloud computing is composed of four deployment models which are Private Cloud, Community Cloud, Public Cloud, and Hybrid Cloud. Public cloud provides the opportunity for general public to access infrastructure and computational resources through the Internet. It is controlled and operated by a cloud provider and the services are usually accessible free or on a pay-per-use model. “The security risks and lack of negotiability of the terms of public cloud services typically will foreclose the possibility of subscribing to an off-the-shelf public cloud provider”. On the other hand, a private cloud is a deployment model that provides core technologies such as virtualization and multitenant application exclusively for a single organization. It is clear that this deployment model is less threatening than a public cloud. Most companies adopt cloud computing through a hybrid process which is a mixture of both public and private cloud services. Decision makers should understand the characteristics of public and private clouds and evaluate carefully security and privacy requirements.

Hsu and his colleagues (2014) conducted an empirical research to examine cloud computing adoption and deployment models. Their results illustrated that companies with higher levels of business concerns tend to choose private cloud over public cloud. In fact, business concerns refer to risks or problems such as data lock-in, confidentiality, insufficient service quality guarantee, bandwith bottlenecks, and reliability that a company can encounter adopting cloud computing. Therefore, The adoption of cloud computing requires a careful and in-depth examination. ICT decision makers should select their cloud models wisely and align them closely with their organization’s business model in order to deploy an effective, economical solution and to address the issues of reliability, data management, and security effectively.

By Mojgan Afshari

Mojgan Afshari Contributor
Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data and protect against data loss ...
Daren Glenister

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation ...
Michela Menting

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been ...
Amazon logo

Nominations for New Amazon Small Business Awards Open Now

/
Amazon Small Business Awards Open Now Awards will recognize the Small Business of the Year, Woman-Owned Small Business of the Year, and Small Business Owner Under 30 of the Year ...
BBC Tech

Data on almost every Ecuadorean citizen leaked

/
Personal data about almost every Ecuadorean citizen has been found exposed online. Names, financial information and civil data about 17 million people, including 6.7 million children, was found by security company ...
Wired

Amazon and the All-Electric Future of Fleet Vehicles

/
Fleets, like the 100,000 delivery vans the retailer ordered from startup Rivian, will make electrics seem more commonplace, and easier to charge. Let’s put Amazon’s order for 100,000 electric delivery ...

TRENDING | TECH NEWS