List three advantages of cloud-based storage

Assignment Help Computer Networking
Reference no: EM131438398

Assignment: The Ups and Downs of Cloud Computing

In this assignment, you will examine the advantages and disadvantages of cloud computing as they pertain to the scenario described below. Before you begin, make sure that you fully understand how the business is currently running and how moving to cloud computing would impact the business.

Scenario:

You work for a small business that handles PC and network maintenance. Your sales department has recently acquired a large client that has the potential to move this "small" business to a "mid-sized" business. Presently, all the data (issues, warranties, network designs, troubleshooting steps, and knowledge base for technical) pertaining to your current clients resides on a small file server that cannot be accessed by the technical team remotely from the field. The maintenance of this file server is handled in-house by a technical team member. The business knows that this one file server will not handle the load of the new client.

Your manager has tasked you to provide a list of advantages and disadvantages of cloud-based storage. You need to provide the advantages and disadvantages of storing your company data in the cloud. This report will assist management in making its decision of moving to the cloud or upgrading the present infrastructure.

Tasks:

• List three advantages of cloud-based storage and explain your rationale for choosing each one.
• List three disadvantages of cloud-based storage and explain your rationale for choosing each one.
• Share your rationale if you want to use collaboration in the above scenario. Collaboration can be both an advantage and a disadvantage.

Note: Your response should rely upon at least two sources from professional literature-articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and use accurate spelling, grammar, and punctuation.

Submission Details:

In a minimum of 300 words, post your response to the appropriate Discussion Area. Review and comment on at least two of your classmates' responses. Consider the following in your response:

• Provide a statement of clarification or a point of view with rationale.
• Challenge a point of discussion or draw a relationship between one or more points of the discussion.

Reference no: EM131438398

Questions Cloud

Contrast the three management theories : Compare and contrast the three management theories included in your leadership theory table?
What future implications were discussed in the video : Was the content of your video a personal crime, property crime, or policy issue? What causal factors were addressed in the video?What policy implications or recommendations were provided in the video to address the crime?Were budgetary or financial i..
Develop scope management plan and scope baseline : After creating the project document D, Kevin should develop scope management plan and scope baseline as a part of project planning. Develop the sample documents. - Total 60 Minutes
Schedule issues often cause the most conflicts on projects : Please discuss why you think schedule issues often cause the most conflicts on projects. Give an example from your experience.
List three advantages of cloud-based storage : List three advantages of cloud-based storage and explain your rationale for choosing each one. List three disadvantages of cloud-based storage and explain your rationale for choosing each one.
Pert and critical chain scheduling schedule development tool : Explain the following schedule development tools and concepts: Gantt charts, critical path method, PERT, and critical chain scheduling.
How would you approach providing holistic care : A home-based older adult with a mental health disorder is unable to perform his own activities of daily living. However, due to the patient's altered mental status, he is refusing help. If you were the home health nurse, how would you approach pr..
Cooperative networks with secrecy constraints : ITEC 630 - 9080 - Relay Selection for Multi-Destination in Cooperative Networks with Secrecy Constraints - The performance of the proposed system scheme is analysed using average secrecy capacity and outage probability, which are confirmed by nume..
Successful as new entrant to the global marketplace : Why is it important to study the culture of a country before marketing your product to this country with the hope of being successful as a new entrant to the global marketplace?

Reviews

Write a Review

Computer Networking Questions & Answers

  How do i control urlconnection uses the post or get method

What is a port? How do I control whether URLConnection uses the POST or GET method when sending data to an HTTP server?

  How to increase capacity if-fiber-optic line reach capacity

England and lies on ocean floor. This fiber-optic line has reached capacity. What alternatives can telephone company consider to increase capacity?

  Do you think cert should continue to post security holes

Some experts argue that CERT's posting of security holes on its Web site causes more security break-ins than it prevents and should be stopped. - What are the pros and cons on both sides of this argument?

  Describe the open systems interconnection

Describe the Open Systems Interconnection (OSI) protocol model. Identify the advantages and disadvantages of circuit switching and packet switching (X.25, Frame Relay, Asynchronous Transfer Mode, and Transmission Control Protocol/Internet Protocol

  What network connectivity do propose between the sites

what network connectivity do you propose between the sites? How will this support the disaster-recovery vision and the need to replicate data between the sites?

  Problem in using database dictionary managed tablespaces

Write the explanation for why your tablespace might have problem, and write at least two actions you can take to decrease problem.

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

  What is the amount of information in bits transmitted

What is the amount of information in bits transmitted by announcing the name of a chosen card from a deck of 52 playing cards?

  Professional nursing organizations in networking

Explain the value that professional nursing organizations in networking and in the legislative process.

  Single dsl router

if an office had two computers connected via Ethernet layer 2 switch,  sharing a single dsl router connected to the internet, which error detection scheme would be more suitable for this scenario?

  Explain authentication and authorization

Explain authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization.

  Information systems security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd