Computing And Business: Benefits And Limitations Of Cloud Computing
Cloud Computing simplifies the uses by making it possible to overcome the constraints of the traditional computer tool (installation and updating of software, storage space, data portability …). The provision is immediate. In addition, the user has no infrastructure to manage, it is the cloud provider to maintain the server hardware, storage, networks. The company can, therefore, focus primarily on its business, its activity, and its know-how.
It allows starting a professional activity without having to invest in a very expensive IT infrastructure internally. And for businesses that already have their own infrastructure but additional IT needs, such as managing business peaks, cloud computing is the most cost-effective way to meet them. Indeed, the company adjusts its infrastructure to its needs and increases or decreases the available resources. By subscribing to Cloud Computing offers, the user only pays for what he consumes. Finally, the user does not have to bear the costs related to the maintenance and renewal of equipment. With cloud computing, the user company significantly reduces its IT investments (Capex costs) and optimizes its operating and operating costs (Opex).
High availability of the service
Contrary to popular belief, Cloud Computing can guarantee access and availability of services, which is important today because companies employ more and more nomadic employees. Employees must be able to access all their applications and data without interruption of service. Cloud Computing contracts are therefore very important for customers because they allow precise answers to the guarantees offered by suppliers on SLAs (service continuity levels). The service availability offered by a cloud service provider must be between 98 and 99.99% including server downtime for maintenance or unexpected interruptions.
Security: the guarantees of the supplier
Cloud Computing brings more security. And due to lack of time, skills and budget, companies are less and less able to fully ensure the security of their own information system. On the other hand, Cloud Computing guarantees this security by owning better devices and security services (data replication, disaster recovery plan, cyber defense, etc.) with regular updates and audits. On the other hand, it is important to privilege a “French Cloud Computing”. Indeed, it is more reassuring for the company to know that its data are located in France and therefore benefit from the French legislation on data protection. The place of storage of data is a recurring issue of the user companies, they are very suspicious of the Patriot Act. Indeed, it should be remembered that US law allows government agencies to have virtually unlimited access to information belonging to companies. Finally, do not panic, contracts providing reversibility clauses with restitution of all data for businesses are now taken into account by suppliers.
Attacking cloud computing networks and disabling their virtual services is a worrying risk: Lacking service for a few minutes can mean losing millions of dollars to an organization. Access to databases of information that travels in the clouds when they are found in the computers of service providers is even more worrying. Because if it is difficult to get into the virtual systems of cloud computing, it can be much easier to do so once the information is no longer in the clouds.
The data is stored outside the corporate network, perhaps even overseas, which may violate your country’s data protection laws and regulations. If your Internet connection is unstable, you may have problems accessing your services. Moreover, the dispersion of data, as well as the multiplicity of stakeholders, weakens the company in its ability to ensure these criteria.
Using a cloud provider computing creates a risk of undermining the overall integrity of the information system due to the loss of technical expertise, or even dependence on the provider. More specifically, the client organization’s management of cloud-based services is more distant and restricted than in other outsourcing cases, leading in the long term to a significant risk of dependency: loss of knowledge of the information system and close competences and enslavement to the specific technologies of the provider, which can prevent the reversibility of the service.Tags: hardware