Bradley Wallace
Strayer University
Professor Mark Cohen
CIS-500
November 30, 2014
.
Over a span of several years, Amazon.com has progressively positioned itself as a competitive technology company through a series of services referred to as Amazon Web Services (AWS). These are services in which Amazon rents out parts of its back-end infrastructure to other IT organizations and developers (New York Times, 2010) since 90% of it was being unused. They offer a number of benefits such as cost-effectiveness, dependability, flexibility, and comprehension. The competitive AWS products in which Amazon emphasized were Mechanical Turk, Simple Storage Service (S3) and Elastic Compute Cloud (EC2).
Ericsson was able to instantly take advantage of Amazon’s resources. Amazon’s AWS is able to build and manage a global infrastructure to the scale Ericsson needed to support their …show more content…
Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection