this is for holding javascript data
Lisa Nelander edited untitled.html
almost 8 years ago
Commit id: e63355152477bfc86cb581b78448684fab877671
deletions | additions
diff --git a/untitled.html b/untitled.html
index 33d7283..ed9bd1f 100644
--- a/untitled.html
+++ b/untitled.html
...
constraints concerning development tools. Those are often offered by the
provider to enable the customer to develop custom cloud services. These tools often
only work in the provided architecture and thereby the custom services are tied
to the provider. Due to the dependence on the provider a change of contractor or switching back to in-house operation means that new cloud services have to be developed matching the architecture of the new vendor and the customer has to wait until the contract expires. This procedure can be very time consuming and costly and can lead to a lock-in-effect. This means that ____. Also the possibility that the provider could go broke has to be mentioned. The customer does not know what will happen to the servers, computer center and databases - including the own
data. data. class="ltx_cite" data-bib-text="@incollection{Lissen_2014,
doi = {10.1007/978-3-662-43473-4_2},
url = {http://dx.doi.org/10.1007/978-3-662-43473-4_2},
year = 2014,
...
author = {Nina Lissen and Christian Brünger and Stephan Damhorst},
title = {Risiken beim Cloud-Computing},
booktitle = {{IT}-Services in der Cloud und {ISAE} 3402}
}" data-bib-key="Lissen_2014" contenteditable="false">
Lissen 2014
A suggestion to prevent this dependence is to always have an exit strategy before entering a contract with a cloud provider.
data-toggle="context" data-target="#tableContextMenu" class="ltx_tabular
ltx_tabular_fullpage">
ltx_tabular_fullpage"> class="ltx_framed ltx_align_center">SWOT
ourtsourced class="ltx_framed ltx_align_center">Weaknesses· Dependent ltx_align_center">Weaknesses
· Dependent on
provider
· Risk provider
· Risk of renouncing own IT
competence
· Working competence
· Working internet connection
needed* needed
* Reliability of the
cloud
cloud class="ltx_framed ltx_align_center">External
innovation class="ltx_framed ltx_align_center">Threats· Safety ltx_align_center">Threats
· Safety and data
protection* protection
* Data protection
regulations
Table 1: SWOT Analysis
SWOT AnalysisHelpful | Harmful |
Internal | Strength · Cost ltx_align_center">Strength · Cost reduction
· Scalable · Scalable IT resources
· Technology resources · Technology is up to date
· No date · No investment risk* risk * Server management is ourtsourced |
|
Opportuinities · Green IT * ltx_align_center">Opportuinities · Green IT |
regulations