International Journal of Computing, Programming and Database Management

P-ISSN: 2707-6636, E-ISSN: 2707-6644
Printed Journal   |   Refereed Journal   |   Peer Reviewed Journal

2022, Vol. 3, Issue 1, Part A

An assessment of audio file from library system (social networks) using cloud computing

Author(s): Affum Quaye Mark

Accessing data from social networks using cloud computing has been adopted by many IT enthusiasts. It allows easy access to data and easy sending of data for communication purposes. For many social network users, cloud computing can simplify processes and save time and money. This article defines cloud computing and shows how one can quickly, safely and easily access data. It also discusses how cloud computing solutions could be beneficial to libraries in these basic areas: technology and acquisition.
Today’s more libraries and social networks are joining the cloud. But despite the numerous social networks and data acquisition sites demand for data are still escalating—as they always will. To be able to access data conveniently today’s data competitiveness users of search engines must carefully scrutinize various libraries as well as social media to ensure that they match key data and communication needs and deliver intended results in the most efficient and cost-effective way. To meet these challenges, IT organizations are increasingly moving away from a device-centric view of IT, to a view that is application-, information- and people-centric. Cloud computing aligns with this new world view. Cloud computing technology is enabling IT to do more with the infrastructure that already exists, as well as adding new ways to expand capacity quickly and economically by using external cloud computing resources. This technology is enabling IT managers to treat infrastructure as a common substrate on which they can provision services to users faster in a much more flexible and cost-effective way –without having to re-design or add to the underlying infrastructure. Given the benefits of cloud computing, its broad appeal is not surprising. However, this new approach does raise some concerns. Chief among them is securing data in the cloud. This white paper will briefly review the basic fundamentals of cloud computing and describe how virtualization are enabling enterprises to move toward a flexible, federated computing model with a cohesive mix of private external and internal cloud environments. It then discusses the security implications of cloud computing and provides insights into addressing them, and offers a view of security best practices to adopt when considering cloud services.
Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. Optimal IT hardware, software, expertise and infrastructure management resources that may not otherwise be available from a cost perspective can be rapidly deployed and easily scaled. Processes, applications and services can be available on demand, regard-less of the user location or device. The cloud provider is responsible for the environment, so organizations can make use of resources for short periods of time without having to maintain the environment when it is not being used. While cloud computing models are attractive because of their flexibility and cost effectiveness, certain challenges must be addressed in order to provide a viable option to traditional data services. First and foremost is the issue of security. The externalized aspect of outsourcing can make it harder to maintain data integrity and privacy, support data and service availability, demonstrate compliance, and secure highly available access to applications and information. In short, cloud computing can present an added level of risk. Organizations must therefore establish trust relationships with their cloud computing providers and understand risk in terms of how these providers implement, deploy, and manage security on their behalf. Whether delivered as part of the service or as specific components added in, your cloud provider should address the fundamentals of security and risk management through a comprehensive approach.

DOI: 10.33545/27076636.2022.v3.i1a.37

Pages: 30-36 | Views: 214 | Downloads: 51

Download Full Article: Click Here
How to cite this article:
Affum Quaye Mark. An assessment of audio file from library system (social networks) using cloud computing. Int J Comput Programming Database Manage 2022;3(1):30-36. DOI: 10.33545/27076636.2022.v3.i1a.37
International Journal of Computing, Programming and Database Management
Call for book chapter