Cloud Computing
Your paper must be 3 – 5 double-spaced pages in length, not counting reference and front pages (Table of Contents, cover page, etc.) and cited to APA style guidelines. All papers will be submitted through Safe Assign to ensure that they are not copied from the Internet or other sources. Use at least 3 external sources to cite your paper (otherwise, it is just opinion). Again, any papers that are copied will result in a 0 for the course

Introduction
The IT industry together with its commentators, have increasingly been impressed with the cloud computing phrases they seek to increase their knowledge on the meaning of this new technology. While it has garnered extensive attention in recent years, it is a concept that has existed for almost half a decade. This concept would grow into a multi-billion annual industry that provides its users various benefits such as cost savings, increased productivity, improved security of information, among others. Notably, this research intends to delve into cloud computing to understand what it entails, the extensive benefits accrued by the use and also what the future holds for it.
Cloud Computing Explained
Cloud computing encompasses hosting services being delivered to a client over the internet. It will allow the provision of large-scale services without the input of high investment costs. It is usually a subscription-based service such that the client will pay services when they need them. Currently, the three primary cloud providers are Amazon Web Services (AWS), Microsoft Azure and Google Cloud. Therefore, the clients will seek to obtain networked storage spaces and other computer resources, choose their provider, pay them; they have the desired services delivered (Huth & Cubella, 2011).
One way of illustrating cloud computing is to consider one’s experiences while interacting with their email (Huth & Cubella, 2011). So the email client such as Hotmail will cater to the hardware and software required to support the individual email account. Then when one wants to access the latter, they open the web browser, go to the email client for logging in. for successful access internet access is compulsory and the access will hence happen anywhere. The email is different from software such as Microsoft Word that is installed on the computer. This is because while the document produced through the software is stored in the device one uses and can only be moved physically by the user (Huth & Cubella, 2011). For the email client, which is equivalent to cloud computing, rather than gaining access to one’s email could choose the information they want as long as it is within the cloud.
There are several strategies in which the cloud is deployed, the first being the public cloud services provided by third-party service providers to the clients over the internet. It is prudent to note that the term public does not necessarily mean that it is free, but at a reasonably inexpensive cost to use, it also does not mean that other cloud users will see the user’s information (Srinivas et al., 2012). The providers have developed an access control mechanism that ensures all cloud users access only their data. It is an elastic and cost-efficient method for deploying solutions. The second type is the private cloud that offers advantages provided by the public cloud, including the elasticity and service-based. However, the two are different in terms of the private cloud having the organization managing data and processes with no limits on the network bandwidth, minimal security exposure and adherence to legal requirements that the public cloud may have omitted (Srinivas et al., 2012). Other benefits of the private cloud is the higher control levels of the cloud infrastructure, higher security levels and resiliency considering the restrictions and designations given to users in respect to their networks
The fourth strategy is the community cloud whose control and a group of organizations does utility with mutual interests which would meet one particular requirement of security (Srinivas et al., 2012). The members of the group will share access to the information and applications within the cloud. Finally, the hybrid cloud that is a combination of the public and private cloud such that the users can outsource the non-critical information and processing for the public cloud. In contrast, the private cloud deals with critical information and services as they are the parties in control (Srinivas et al., 2012).
Fundamental Characteristics of Cloud Computing
Cloud Computing has distinct traits that make it a revolutionary technology. The first is the one-demand self-service whether the clients unilaterally have the computing capabilities on a need basis and it will be provided automatically without any human involvement from any of the service providers (Srinivas et al., 2012). The second characteristic is its extensive network access as the available capabilities are across the entire network and are accessible via standard mechanisms which enforce the utilization of heterogeneous thin or thick client platforms. The third characteristic is in the resource pooling such that the cloud service provider brings together computing resources and provides them to their several clients via the multi-tenant model (Lewis, 2010). The distribution of these resources uses different physical and virtual resources that are assigned and assigned dynamically depending on the demand of the client.
A sense of independence concerning a location does exist such that the client will have no control or knowledge over the precise place of whether resources are located but can specify on their end through a greater abstraction level. Resources that are pooled by the service providers include storage, network bandwidth, memory, among others. Other characteristics include its availability, increased elasticity, lower infrastructure costs, scalability, virtualization, and mobility (Srinivas et al., 2012).
Barriers to the Adoption of Cloud Computing
Several concerns are raised in the process of adopting cloud computing that could impede the adoption rates. First, the interoperability concerns where the technology does not have a global set of standards and interfaces that should be expected from all service providers, which could cause a vendor lock-in (Lewis, 2010). There is also the latency concern that is present in every communication between the user and provider whenever the access top the cloys is done over the internet. Also, considering that cloud computing is still in its developing stage, there are still gaps in relation to its jurisdiction, data protection, the impartial information practices and transfer of information globally (Lewis, 2010). These issues mainly concern the organizations that handle confidential information and who would not risk using the platform without knowing the extensive impact of applicable law.
The Future of Cloud Computing
The market of cloud computing is increasing at a rate of 22.8% annually, and the coming years only indicate a faster growth. Its future will be characterized by an extensive storage capacity, enhanced internet performance, the Internet of Things Working along with cloud computing, modular software, among other potential benefits (DataFlair Team, 2019). As businesses look for innovative ways for growing and achieving their respective objectives, cloud computing will aid in growth. It is a robust and expansive technology whose potential has not even been partially exploited. Therefore, its future is bright with advantages to the hosts and clients.

References
DataFlair Team. (2019, February 23). Future of cloud computing – 7 trends & prediction about the cloud – DataFlair. Retrieved from https://data-flair.training/blogs/future-of-cloud-computing/#
Huth, A., & Cebula, J. (2011). The basics of cloud computing. United States Computer.
Lewis, G. (2010). Basics about cloud computing. Software engineering institute Carnegie Mellon University, Pittsburgh.
Srinivas, J., Reddy, K. V. S., & Qyser, A. M. (2012). Cloud computing basics. International journal of advanced research in computer and communication engineering, 1(5), 343-347.

Published by
Essays
View all posts