Cloud computing firms to earn the trust of businesses

Assignment Help Management Information Sys
Reference no: EM13998140

What assurances and practices do you feel are necessary from cloud computing firms to earn the trust of businesses and the public? What role can Canadian government(s) play in helping cloud computing realize its potential? And why do you think Microsoft, a company that has been historically opposed to open standards, is now lobbying for them?

Danger in the Cloud The general public has embraced cloud computing more readily than many businesses. Millions of people trust cloud computing technologies from Google to store their email, appointment calendars, and address books. They trust Facebook to store their photos and personal information. Businesses have been more hesitant to trust Internet firms with their valuable corporate information – and with good cause. Cloud computing services do fail, leaving users unable to access programs or data. It is not uncommon for Google, Twitter, Microsoft, Facebook, and other online companies to experience server outages. In other cases, cloud computing services have lost customer data. Perhaps the most notable was the catastrophe with T-Mobile’s Sidekick smartphone service. In October 2009, T-Mobile informed its thousands of Sidekick users that it had lost their data and might not be able to recover it. It advised the users not to turn off their cell phones, as the data stored on them would be irrecoverable. The Sidekick uses a cloud computing data service from a Microsoft subsidiary ironically named Danger, Inc., to back up user data from smartphones. The data stored includes user contacts, calendars, notes, photos, text messages, and other data typically stored on mobile phones. The cloud storage system for this data failed and had no backup system in place. As angry Sidekick users posted comments online, the failure gained the attention of businesses and consumers. In the end, much of the data was recovered, and those who lost data were compensated with a $100 credit. Still, the incident is considered a black eye for T-Mobile and cloud computing. Similar incidents such as Gmail outages cause businesses to be leery about trusting cloud computing with important data. The City of Los Angeles has decided to trust Google and its online applications rather than using traditional software such as Microsoft Office. The decision was not made lightly. The $75-million contract came with several stipulations. Google has agreed to pay a considerable penalty if a security breach occurs. Google is legally responsible for any release of data in violation of a nondisclosure agreement. The city’s data must also be encrypted, stored on a dedicated server, and kept in the United States with limited access. Such assurances are essential if cloud computing is going to live up to its potential for businesses. Microsoft wants to see new laws designed to offer protection for data stored in the cloud and to enact stiffer penalties for hackers who attempt to illegally access it. Microsoft hopes that government support for cloud computing will spread globally so that data can be safe wherever it is stored within the global business infrastructure. “We need a free trade agreement for data”, says Brad Smith, senior vice president and general counsel at Microsoft. Without government assistance, open standards, and international cooperation, some fear that cloud computing will be controlled by two or three big companies, leaving smaller companies unable to compete. Users may be locked into one service provider’s proprietary system. Open standards, on the other hand, would allow customers to easily transfer their cloud computing services from one company to another. Smith calls for cloud computing vendors to band to together to establish open standards for data storage that provide transparency for security and privacy. “Simply put, it should not be enough for service providers simply to say that their services are private and secure,” Smith said. “There needs to be some transparency about why this is the case.” Jonathan Rochelle, a group product manager at Google, suggests that cloud computing isn’t any more dangerous than storing data on your own PC or server. “While it feels more comfortable, the same way the money under your mattress feels more comfortable, it may not be the best way to manage your information,” suggests Rochelle. The point is that the public is willing to trust banks and companies with their financial well-being, so why not trust the companies that provide cloud computing services with your information?

Reference no: EM13998140

Questions Cloud

What are some of the applications : What are some of the applications that are based on the biometric signatures and explain how it works.
Explain the relevant first amendment : Please write clearly. Give examples, analogies, explanations, etc., as appropriate. Take a few minutes to think about each problem before you write. It may help to outline your answer on scratch pages. You may write your answer for each problem as on..
The key characteristics of a good network storage backup : Describe the following for your manager: The key characteristics of a good network storage backup policy Of the various data recovery solutions available, which would best fit your data recovery needs?
From the e-activity : From the e-Activity, determine whether or not the RSA customers should have depended on a third-party tool for access control. Suggest at least five ways that customers could have avoided this vulnerability. Determine how RSA could have been able to ..
Cloud computing firms to earn the trust of businesses : What assurances and practices do you feel are necessary from cloud computing firms to earn the trust of businesses and the public? What role can Canadian government(s) play in helping cloud computing realize its potential? And why do you think Micros..
How far out from the edge of the roof : A uniform beam 16.0 feet long and weighing 300 pounds is placed such that it protrudes 4.0 feet over the edge of a flat roof. How far out from the edge of the roof can a 150-pound man walk on the beam without tipping the beam?
Make a bar chart for a two-particle system : Make a bar chart for a two-particle system in which one particle is in a circular orbit around other as in Figure. A two-particle system. A particle of mass m orbits a particle of mass M at constant speed in a circular path of radius r.
How each is countered by a particular feature of ssl : Consider the following threats to Web security and describe (in detail) how each is countered by a particular feature of SSL: a. Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm. b. Repla..
How much time elapses before the ball : A rubber ball is held 4.0 m above a concave spherical mirror with a radius of curvature of 1.5 m. At time equals zero, the ball is dropped from rest and falls along the principal axis of the mirror. How much time elapses before the ball and its im..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What type of customers that may deal with in retail outlets

What are various type of customers that you may deal with in your retail outlets and how can you serve them in the most effective manner so that they end up as happy and loyal customers?

  Question about does the implementation of new technology

question about does the implementation of new technology always mean the end of old ways of doing things?does the

  Principles of user interface design presentation

Resource: Principles of User Interface Design presentation, Review the Principles of User Interface Design presentation located in the Week Three section of the student website

  Types of security threats to it

Information Security : explained - Access controls are good things and should be secure, but programmers continually add "backdoor access" to their programs. Is a good or a bad practice?

  Explain the it governance organization

IT Governance Structure Presentation - Explain two companies with a global presence and explain the IT governance organization and structure of each

  Find the value of information

Question about Value of information - Find the value of information? How does it affect the viability and competitive of nations?

  Important information about information security

Important information about Information Security - Analyzes available technological and procedural mitigants, identify best practices; and frame your plan to manage the risks.

  In what ways do we erode our own privacy online

In what ways do we erode our own privacy online? In what ways do we erode our friends' privacy Online? What are some of the possible long-term consequences of eroding our own privacy or our friends' privacy online

  Create a risk assessment matrix for the integration

Assignment: Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm

  Research the key terms applications software

Research the key terms "Applications Software", "Application Design", "Software Design"; find a journal publication pertaining to the subject, and write a 1-2 pages APA format report, summarizing the paper. Make sure to use references. The last secti..

  Description of the proposed technology solution

An architectural diagram that illustrates the placement of various communications components; and Contains the following section headings: Description of the Proposed Technology Solution and Architectural Diagram

  Describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization. Explain this use in your current place of employment or an organization with which you are familiar

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd