Thursday, October 17, 2019
The Disappearing Data Center Essay Example | Topics and Well Written Essays - 500 words
The Disappearing Data Center - Essay Example In addition, the system should have adequate authentication, access control and administration. The company should therefore examine the authentication options that are available, for instance, whether the system has trusted proxy, good security measures and so on. Comparatively, should access whether the technology and hosting are fit for purpose and is scalable. The company should determine whether the hardware is modern, reliable, the development cycle of the system, its ease in integrating with other systems and so on. Therefore, in a nut shell, when deciding where to host their system, the companies should evaluate the systemââ¬â¢s navigation and interface, content production and workflow, authentication, access control and administration, and the fitness level of the technology and hosting. Other considerations could comprise of whether the operating system, scripting software and server software meet the purpose of the company. Many small businesses are moving towards cloud computing as a way of saving their costs and attaining sophisticated and powerful hardware (Plant 2009). However, there are several issues surrounding moving a companyââ¬â¢s data center to the cloud computing. Some of the issues facing companies that have opted for cloud computing include the following;- First, cloud computing brings with it issues to deal with the security of the companyââ¬â¢s data transfer. This is because all the information that travels between the company network and the cloud passes through the and therefore there is a chance that hackers could distort it. Due to this, the management should ensure that their systems are well secured through the use of internet security measures such as encryption, proxy, industry standard protocols and so on. Equally important, the use of software interfaces could be a major issue affecting cloud computing. The use of a weak set of software interface could expose the company to various
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment