Information Age Activity

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

INFORMATION AGE ACTIVITY

CLOUD COMPUTING

a primary source in history is written from a first person perspective by people


who experienced it. They give us some very specific information from a time
and place. Examples of primary sources can be original manuscripts, original
cultural memorabilia, witnesses, history makers, original artifacts from
excavation of the past, and interviews with subjects of history. They are also
considered to be the best type of evidences.

Secondary sources are written by historians and others who heard it from other
historians or read the books and biographies of others. Secondary sources of
history likely provide alternative perspectives on the same historical facts, so
there will not just a dominant view of history

Since people say that primary source are the best type of evidence, then do all primary sources
justify history?
ISSUES:
1. KNOWLEDGE-RELATED ISSUE:
Sensitive Data Files Need a More Secure Storage
The service consumers should be more careful about the storage of sensitive information using
the cloud storage technology. However, the solution is to encrypt your data and the question will
be how and where to decode it. It is very advisable for the consumers that the encrypted data
should never be stored together with the coding key. It is important that the consumers must be
knowledgeable regarding this matter in order to avoid any circumstance or consequence in the
future.
2. POLICY-RELATED QUESTIONS AND CHALLENGES
Long-Term Viability
Ideally, cloud providers will never be swallowed up by other companies, get acquired or go
broke. In case this happens, the consumers must be assured that their data stored in the cloud
provider will be safe. As a consumer, we should ask our provider or check their policies on what
measures they have put in place to return the stored data to the consumer in case their
company goes under or encounter some long-term issues that may severely affect their
customers.
3. TECHNOLOGY-RELATED ISSUES
Access to Certain Files and Transfers Highly Depend on the consumers Internet Speed
The consumer must have a stable and dependable internet connection to view the files from the
provider's data storage. It's vital to remember that wired internet is susceptible to natural
disasters. Even though these files are accessible via mobile devices, their applications are
limited. Especially some consumers whom reside in countries whose internet connection speed
is slow, they are on the losing side of the thread. So, companies should at least make their
cloud services more flexible for people to access it more.

SOURCES USED:

Srivastani, A. (2019). What are the security issues around cloud computing. Quora. Retrieved

June 16, 2022, from https://www.quora.com/What-are-the-security-issues-around-cloud-

computing

You might also like