My instruction manual for upgrading to windows 10 in a business/ university settings can be found online here
Author: Quazi Hedayet
Expanded Definition of Cloud Computing
To: Prof: J. Ellis
From: Quazi Hedayet
Date: 10/27/2021
Subject: Expanded Definition of Cloud Computing
INTRODUCTION
The goal of this article is to explore the history of a phrase for computer system technology students. “Cloud Computing” is the word I am defining. While the majority of people are chasing short-term advancement of technologies and networking policies, so I would like to take a different approach to representing the concept of cloud computing, one in which the user’s privacy and security concerns are paramount in the development of a long-term cloud computing solution. In this paper, I’ll go through the definitions of the phrase as well as the context in which it is used.
DEFINITION
The Oxford English Dictionary defines cloud computing as âthe use of networked facilities for the storage and processing of data rather than a user’s local computer, access to data or services typically being via the internet.â Cloud computing is the distribution of on-demand computing resources over the internet and on a pay as you go basis, ranging from software to storage and processing power. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active control by the user. In other words, cloud computing is the use of network facilities for the storage and processing of data rather than a userâs local computer, access to data or services. Cloud computing is on-demand access, via the internet, to computing resources applications, servers, data storage, development tools, networking capabilities, and more hosted at a remote data center managed by a cloud services provider (CSP). The CSP makes these resources available for a monthly subscription fee or bills them according to usage. The term “cloud computing” also refers to the infrastructure that enables cloud computing to function. This includes virtualized IT infrastructure, which consists of servers, operating system software, networking, and other infrastructure that has been abstracted using special software and can be pooled and divided across physical hardware boundaries.
CONTEXT
According to this journal article âSecure Integration of IOT and Cloud Computingâ, âCloud infrastructure involves the hardware and software components required for proper implementation of a cloud computing model. Cloud computing can also be thought of as utility computing, or on-demand computingâ (Stergiou et al., 2018, p. 964). Instead of owning their own computer resources or data centers, companies can rent access to anything from apps to storage from a cloud service provider, according to the authors. One advantage of cloud computing is that companies can escape the upfront costs and complexities of owning and managing their own IT infrastructure by paying only for what they need, when they use it. Mobile Cloud Computing is a relatively modern technology that refers to an infrastructure that stores and processes data outside of the mobile device. The Internet of Things is a relatively new technology. Another article âcloud computing acceptance among public sector employeesâ stated that âHowever, in todayâs rapidly changing technology, with the transition to the industrial revolution 4.0 (IR 4.0) environment, it has opened a new dimension to the world computing. The emergence of cloud computing technology as a new platform for computing has opened the eyes of technology industry players to further benefit from this innovation. Many studies have proven that this technology provides many benefits to the industry and users such as its ability to reduce operating costs, improve collaboration, more secure security levels and more mobile accessibilityâ (Amron et al., 2021, p.124). The idea of business agility is often stated by cloud proponents as a major advantage. Companies that use cloud platforms can move faster on projects and try out ideas without having to go through lengthy procurement processes or incur large upfront costs because they only pay for the tools they use. Turning the eyes into the mobile clouding the authors states that, âMobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile deviceâ (Stergiou et al., 2018, p. 964). The ability to spin up new services without the time and effort associated with traditional IT procurement should mean that is easier to get going with new applications faster. The Internet of Things (IoT) is a relatively new telecommunications technology that is quickly gaining popularity. The authors also stated that, âCloud computing also cuts costs related to downtime. Since downtime rarely happens in cloud computing, companies don’t have to spend time and money to fix any issues that may be related to downtimeâ (Stergiou et al., 2018, p. 964).
WORKING DEFINITION
Cloud computing is related to the key computer system technology, according to the definition and quotes I discussed. Cloud computing, in my perspective, is the supply of a variety of services, including data storage, servers, databases, networking, and software. It also enables us to save or work on files remotely in databases, as well as recover them as needed. Cloud computing is incredibly convenient since it eliminates the need for us to be concerned about computer crashes. It saves files and allows access to them via the internet.
REFERENCES
- Oxford University Press. (n.d.). Cloud Computing. In Oxford English Dictionary. Retrieved March 1, 2021, from https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/34689?redirectedFrom=cloud+computing#eid189443962
- Stergiou, C., Psannis, K., Kim, B., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78, 964â975. https://doi.org/10.1016/j.future.2016.11.031
- Amron, M. T., Ibrahim, R., &Bakar, N. A. (2021). Cloud Computing Acceptance Among Public Sector Employees. Telkomnika, 19(1), 124-133. https://doi.org10.12928/TELKOMNIKA.v19i1.17883
500-word summary article about Security in Social Networking Services
To: Prof. Ellis
From: Quazi Hedayet
Date: 10/05/2021
Subject: 500-word summary article about Security in Social Networking Services
The following article is a 500-word summary of a peer-reviewed titled, âGeosocial Media as a Proxy for Security: A Reviewâ by Mr.Zhigang Han, Somgnian Li, Caihui Cui, Daojun Han, and Hongquan Song, published in 2019. The article identifies various prominent themes in need of more research in the ongoing growth of social security concern and cybercrime management. While most people are looking for a quick fix, the author takes a different approach to redefine the concept of security in social networking, emphasizing the importance of users’ privacy and security concerns in the development of long-term social networking, and using geosocial media as a proxy for this security.
Social networking is a collection of rules and configurations for maintaining the integrity, confidentiality, and usefulness of all software and hardware technologies used in computer networks and data. Any firm, regardless of size, sector, or infrastructure, needs network security solutions in place to protect itself from the ever-growing array of cyber-attacks in the wild today.
In other words, the author intends to explain to the public that network security is the protection against hacking, misuse, and unwanted device access to files and directories on a computer network. Specifically, when combined with location data, geosocial media can be utilized as a proxy for security event detection and situational awareness. This paper summarizes the general structure of security-related analyses based on geosocial media, as well as the geosocial media data and associated processing/analysis methodologies utilized for detecting protection incidents. The scientists write is, âSocial media data give extensive information that represents people’s social behaviorâ. Various terrorist and gang groups have increasingly realized the significance of social media in the security field and have actively used it to plan and organize activities, recruit members, promote terrorist ideas, and post various terrorist messages to grow their influenceâ (Han et al., 2019, p. 154225). The authors classify security-related analysis tasks into two sorts, based on the economic and moral aspects of an equation: security event detection and security situational awareness and assessment.
Natural catastrophes, man-made disasters, violent occurrences, military events, sociopolitical events, and other security events are among the six types. When it comes to the analysis of various networking systems, the author goes above and beyond to demonstrate the general process of security-related analysis based on geosocial media, identifying two types of data sets: social media datasets and auxiliary analysis datasets, as well as discussing the data acquisition and preprocessing methods. Users of geosocial networks and apps, such as Facebook locations can share their geolocated data. Knowing an individual’s location is one of the most serious risks to his privacy of all the Personal Identifiable Information (PII). The prevalence of geosocial media around the world, particularly significant adoption by the urban poor in many developing countries, is one of the most intriguing prospects for the technology. For example, a person’s spatio-temporal data could be used to deduce the location of his home and office, track his movements and activities, learn more about his core interests, or even notice a deviation from his usual behavior.
Natural language processing, social network analysis, position inference and geospatial analysis, and picture or video interpretation and visual analysis were all highlighted in the papers as significant technology for detecting security occurrences and assessing security situations. The report finishes with potential future research directions and areas to be addressed and examined.
REFERENCES:Han, Z., Li, S., Cui, C., Han, D., & Song H. (2019). Geosocial Media as a Proxy for Security: A Review. IEEE Access, 7, 154224-154238. https://doi-org.citytech.ezproxy.cuny.edu/10.1