preview

Inf 103: Computer Literacy

Better Essays

Running head: Cloud Computing the Future of Business Cloud Computing the Future of Business NAME Ashford University INF 103: Computer Literacy Instructor: Date CLOUD COMPUTING THE FUTURE OF BUSINESS The national Institute of Standards and Technology under the department of Commerce defines Cloud Computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”. Another definition for cloud computing is a term used to describe a network of computers that deliver information technology …show more content…

In the educational group project setting it will also make it easier for people to get the correct amount of credit regarding a research paper. When there is a group of five or seven students, unless the group is mature they will tend to not work equally on the project yet receive the same amount of credit when the research project has been completed. If you take into account the work done on the cloud and how the cloud logs in each user and quantifies the amount of work done by each student then you can accurately divide the credit up in a more even fashion. There are several consideration when thinking about whether utilizing a clod computing system in which you will work together with peers to collaborate on a project or not. One of the biggest considerations to have is the electronic security of the cloud you are working on. Without being naïve about the “hackers” capabilities, we need to make sure that whatever project we may be working on is protected from others for simple reasons such as data integrity or for more severe reasons such as national security if it a project we are working on for work that involves classified material. A hacker is a person or group of people that choose to illegally enter secure websites for illicit purposes. These hacker individuals are very advanced and usually have a very simple mission statement they follow as a justification for why it is they do what they do. Security is always at the top of peoples mind when doing

Get Access