Personal Cloud Reflection

docx

School

Maryville University *

*We aren’t endorsed by this school

Course

481

Subject

Business

Date

Jun 10, 2024

Type

docx

Pages

7

Uploaded by MissRedDevil

Report
Personal Cloud Reflection 1 Personal Cloud Reflection Miranda Loukota Department of Business, Maryville University ISYS 481: Virtualization & Cloud Computing Professor Eric Kruse 28 April 2024
Personal Cloud Reflection 2 Personal Cloud Reflection Cloud-based technologies have become commonplace in enterprise settings with the hope that they will continue to change how business operations are conducted in the future. In this article, the reasons for, problems with, and strategic aspects of the move to cloud computing are all carefully looked at. The growing reliance on cloud services, the difficulty of cloud-native designs, and the imperative to address security concerns are just a few of the factors that contribute to the dynamic IT infrastructure and operations. This essay looks at these patterns and what they mean by looking at the future of enterprise IT and how cloud technologies could change the way things are done. Discussion Cloud-based technologies will have a big impact on future enterprise operations. A lot of businesses are moving their operations to the cloud because it saves them money, lets them change things easily, and has a lot of space. When users combine private and public clouds with hybrid and multi-cloud solutions, they can improve the management and performance of their data. Adding AI and machine learning to the cloud will make it more useful by letting it do advanced analytics and automation. As cloud security solutions keep getting better, people will feel safer and more confident again (Thomas et al., 2013). Adopting cloud-native programming methods is necessary to stay competitive. These methods allow quick and flexible responses to what the market needs, which encourages quick creativity. Although cloud technologies are already changing the way businesses work, they will have a bigger effect on the future, which will be more connected, efficient, and resilient. Even while enterprises may want cloud solutions, they may keep infrastructure management in-house at their data centers for several reasons. To preserve data privacy and
Personal Cloud Reflection 3 comply with regulations, banks and hospitals require on-premises hosting (Rawindaran et al., 2021). Internal hosting may be useful for ancient systems and programs with complex dependencies because it speeds up the transfer process. Due to cost, enterprises that work with big data or HPC technologies may prefer on-premises solutions over cloud options. Maintaining the local site helps keep things going in regions with insecure internet connections. Even if there are few strategic drivers and use cases, self-hosting is still a viable alternative to cloud computing. While cloud-based solutions are growing more popular, some companies still use on- premise systems. Remote data storage risks loss or inability to comply with laws. A major privacy and data protection issue. Indirect control can cause inactivity, data loss, and security issues (Liang et al., 2019). Moving to the cloud worries many firms about hidden costs and price. Part of the cost estimate. Companies may have problems integrating new systems to outdated equipment (Thomas et al., 2013). Institutions can automate non-essential tasks and study cloud computing while solving challenges. Prioritize encryption, access limits, and frequent audits for data security and compliance. Lack of control and transparency hampers cloud computing. Understand SLAs and talk to cloud providers (Kumar et al., 2023). Fund staff training and change management to reduce skill issues and hasten cloud-based system migration. Businesses can overcome their worries and use cloud technology by addressing these concerns and employing suitable partners. People, procedure, and technology must be considered while planning cloud technology. I must evaluate staff readiness for cloud-based procedures. We can teach personnel cloud apps with continual learning and training. To overcome employee resistance and gain support, change management is needed (Butt et al., 2020). Process optimization is essential for cloud platform
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Personal Cloud Reflection 4 adaptability and scalability. Governance frameworks, operations enhancements, and DevOps may need workflow reengineering. Select and configure the right technology to make the cloud computing transition easy and rapid (Thomas et al., 2013). Identifying the optimal cloud service models and providers for the organization's goals requires evaluation. Data must flow freely between on-premises and cloud platforms for future scalability and integration. Enterprises must address "people, process, and technology" to maximize cloud benefits and minimize drawbacks. Saying shifting to the cloud is as simple as changing implementation and following regulations and standards is too simple. Although data security, governance, and compliance remain important, the cloud environment changes how they are implemented. Distributed data management, shared accountability models, and dynamic resource provisioning require new and updated policies in cloud computing (Kumar et al., 2023). Organizations must also ensure that their internal policies meet cloud service security and compliance standards. To ensure security and compliance in changing situations, governance solutions must be flexible and quick to update. Because cloud resources change quickly and are transient. Cloud computing regulation and standardization are important, but they must be evaluated to reflect its unique character. Organizations must review and update cloud computing policies to meet with regulations and industry standards. Despite its attraction, portability over several clouds or one is tough. Follow the standard method for transferring or implementing these infrastructures and apps without a cloud provider. Providers may have different infrastructure architectures, management tools, service offers, and APIs that hinder app transfer. Cloud agnosticism provides security without vendor lock-in, freedom of choice, reduced costs, and greater performance due to the huge number of cloud services used. To ensure interoperability and true portability across environments, abstraction
Personal Cloud Reflection 5 layers, automation, and compatibility testing demand a lot of resources (Kumar et al., 2023). Another fairness concept may cost the company optimization opportunities, benefits, and distinctive characteristics. Many businesses struggle with cloud administration due to added operational management, security, governance, and security requirements (Thomas et al., 2013). This may reduce the benefits of cloud technology. Before adopting the cloud, companies should assess its merits and cons. The cloud-agnostic approach has advantages. "Cloud-native" application design and deployment use cloud infrastructure services to avoid manual provisioning and management. Use cloud services and technologies instead. Architecturally, the alteration is beneficial. Cloud providers' managed services, flexibility, and scalability help develop apps and reduce expenses. Enterprises will focus on application creation and creativity rather than infrastructure maintenance with provider-originated networks, data, and computation (Rawindaran et al., 2021). Cloud native applications are modular, have little support resources, and are constantly available, increasing flexibility and reliability. The technique uses containerization, microservices, and serverless computing to implement and modify projects instantly. Before going cloud native, the company must examine needs, technical environment, and cloud prerequisites. Native cloud solutions are scalable and adaptive, but they may require professional partnerships and production process changes. A successful cloud native solution uses provider-managed services, interoperability, long-term expenses, and vendor lock-in. Conclusion Data and infrastructure in the cloud must be secure, as well as applications. For effective governance, technical measures are only one component of cloud security. The security governance of the cloud also involves good governance structures, universal cloud compliance
Personal Cloud Reflection 6 standards, and security awareness in the whole company. Cloud technologies and the new threat landscape have brought it to the point where enterprises are now expected to take on the role as security providers. Cloud security is a popular area of investment among businesses from many different industries that use encryption, identity and access management, and response to threats and attacks. The IT industry will be changing direction since cloud security capabilities gradually become more important. More enterprises are going to embrace the cloud by shifting critical tasks to a cloud platform. As a consequence, demand for cloud security design, compliance, and risk management professionals will increase. Next-generation technologies such as Machine Learning (ML) and Artificial Intelligence (AI) are going to be used to automate threat identification, incident resolution and other issues, which in a turn will transform the cloud security.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Personal Cloud Reflection 7 References Butt, U. A., Mehmood, M., Shah, S. B. H., Amin, R., Shaukat, M. W., Raza, S. M., ... & Piran, M. J. (2020). A review of machine learning algorithms for cloud computing security.  Electronics 9 (9), 1379. Kumar, N. V., Daniel, M. P., Paul, K. J., & Sunil, D. (2023). Emerging Technology: Cloud Computing for Enhanced Resource Accessibility-A Review.  Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14 (03), 536-541. Liang, F., Hatcher, W. G., Liao, W., Gao, W., & Yu, W. (2019). Machine learning for security and the internet of things: the good, the bad, and the ugly.  IEEE Access 7 , 158126- 158147. Rawindaran, N., Jayal, A., Prakash, E., & Hewage, C. (2021). Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME).  Future Internet 13 (8), 186. Thomas, E., Zaigham, M., & Ricardo, P. (2013). Cloud computing concepts, technology & architecture.