Sample essay on porters 5 forces analysis of kodak company
Saturday, 28 March 2015.
Technology and communication
In the area of technology and communications, there have been rapid changes in the development of certain technical developments and advances. Cloud computing is a new trend towards moderne in the technology and communications sector, and has expanded since its inception in 2007 (Zissimi, 2010). Cloud computing is an Internet-based technology that allows you to manage data and place them in real time across a network or across the Internet, primarily for business and personal applications. Technology and communications have been accepted by many specialists, especially in the field of communications and technology, for the purpose of conservation, in response with the new era of technological change. The technology is also considered safe, efficient and appropriate for companies that have in Amazon and Google (Winkler, 2011). Never, the creating use of cloud computing by different companies is unciterin about the existing communication IT application. There are many advantages and disadvantages of cloud computing, its problems and risks, and the future potential of organizations to use or adopt technology and communication
Cloud computing is efficient and subject to invest in expensive and stand-alone servers or programmes over a network. Using cloud computing capabilities, organizations in store roles, save costs, and save time, including data storage, management, and software upgrades. Typical, the cloud can be used at rates that are significily lower then mental notes, since IT amateur technology in total IT costs accounting to the Gulf and Bowler (2009). For example, technology scales and is fortable with payment models, such as pay-out-go, and online payments that make cloud computing much more attractive (Gens, 2008). Cloud computing thus enables firms to be more analgic and technical, as technology provides width use of money by excluding capital costs associated with the development and maintenance of server infrastructure. It also simplifies the process of backing up data because the data in the cloud is not on a physical device (Zissis 2010). because of this, second cloud solutions offer a flexible and recoverable backup of data and a data recovery solution
Cloud technologies funther increase storage capacity for enterprise and applications. A loan-based application and system can store and store more data than computers because they provide unlimited storage capacity. In this way, this effectivey addresses the cons related to the possibility of leaving the storage space. In addition, it allows enterprisses to upgrade data storage hardware, which reductions the total cost of information technology (Gulf, 2009). In addition, cloud computing also provides efficient performance and disability for business and personal applications. For example, loud instances often explorde whenever they are Needed. Therese will pay for the storage of the data and the space of the applications they need. In addition, loud computing, as well as elasticity, is simply because cloud technologies can be scaled effectively to meet changing technology and communication requirements. With regard to performance, cloud computing uses distributed architecture that offer excell computing speed. Accinding to (Zissis) 2010, the cloud computing system also includes small forms of training for people, as well as for business. Applications also have smallller learning curves, because people are independently or implicely used to them, and that more users can easily accept them as Google Docs and Gmail
Privacy and protection are often major problems in cloud computing. By using a cloud-based infrastructure, organizations are actually providing confidential information and data that are confidential and confidential. Cloud service providers should provide management management management, protection and protection of critical data. Therefore, it is important that cloud providers be available (Anthens, 2010). The existence of organizations could be jopardized and, as such, all possible alternatives should be decided before a decision on the use of cloud computing was taken. At the same time, end-users may not feel the desire and are uncommforthcoming that they will easy give their data to a third party. According to Winkler (2011), when it comes to cloud computing, confidentiality is a key issue, as users and firms need to protect their data in their response and sure that they are not accessed by unauthorized users
In general, cloud computing services, technical and temporary trafficking. This is because of this, most organs are unable to work in the area with lod providers, which often face downtime and technical difficulties. However, over time, all systems might experience and downtime, and even for external clothing providers. In addition, Anthens (2010) argument that all oud computing depends on the ideal access to the Internet, and the communications problems or networks make the complex installation usiness. Galrajani and Bowler also note that cloud services provide limited and management (2009). By using cloud services and applications that run in a third or remote virtual environment, users and organizations in most cases have limited control over both hardware and software functions and execution. In addition, because the remote server and software are used in oud computing, there is really a pack of most features in the system if applications are running locally (Gens, 2008)
Another disadvantage of clouds computing is its absolute dependence on a vendor, which often results in a vendor lock. The vendor lock often results in organizations unable to migrate from their suppliers as soon as they start using their services (Gens, 2008). For example, if a user wants to switch to another alternative clod provider, it will be very hard and hard, because there are big data to move from the existing cloud provider to the new one. Thus, it was a reason for the organizations and people in general to be careful and to consider the options for supplier selection. Cloud computing is typically vulnerable because clone solutions are available on the Internet as such, they suffered from serious attacks, as well as other security reports. In addition, due to the system’s interdependencies, once the data system is compromissed, important business data and personal information can be easy hacked
In conclusion, cloud computing is a complete new trend in communication and technology upgrading, which has been significantly expanded from the beginning. The technology is considered to be protected, costattive, as well as relevant organizations that are already investment in technology, such as Amazon and Google. Despite these drawbacks, cloud computing is at an early stage, and it has great potential in the future, as well as well as well as well as well as well as the possibility of additional research to reduce the weakness ness associated with the service