In our world today, change is the only thing that remains constant. One can clearly see this through the rapid upgrades of various technologies. Well-known industry players like Samsung and Apple upgrade around twice a year, enticing customers with their new product’s sleek modern look, faster user-friendly Operating System, high-resolution camera and larger storage capacity. With the rapid influx of new technologies, one question comes to mind. Out of all the gadgets present amongst us, which one is the most reliable in storing sensitive personal data?
On July 10, Mr. Reggie Javier, the Chief Operating Executive of Cloudware Technology, Inc., had an engaging discussion with the KSearch employees regarding Cloud Computing. Throughout the session, he enumerated examples of cloud technologies, their classifications and benefits.
Storing data in a tangible device is risky especially if it gets broken, lost, or left behind in a public place. Imagine if your personal computer or laptop containing the same data crashes, or your company’s servers break down. To make matters worse, imagine that your external storage device inconveniently gets lost, damaged or attacked by computer viruses at the same time. Will you be able to bring back the lost data?
By using the Cloud, Reggie assures users that they do not have to worry about buying, monitoring, upgrading and keeping servers, databases and other storage devices in a secure location. The Cloud is a venue where one can store and access data through the internet instead of using a hard drive, USB, CD or any other external storage device.
People are not aware that they are using cloud technologies already. Examples of Cloud technologies are Yahoo, Facebook, Linkedin, YouTube, Bing and Google, among others. These are websites which people use to store, access and manipulate personal information or sensitive files. The Cloud is classified into three categories: public, private and hybrid – each one differing from the other in terms of the number of clients served, the location where it is hosted and the level of security it provides. Although all types are low cost and accessible through internet, the Private Cloud is more secure than the Public and Hybrid Cloud because the former only caters to a single client within a private network, and protected by a password or address.
Although it is not a full-proof system (according to Reggie, there is no technology that exists that is 100 % safe from being hacked), Cloud Computing is better than all the other tangible storage devices because the user does not have to invest a lot on upgrades, disaster recovery and maintenance of computer hardware and software. People do not have to worry about shelling out a lot of cash to buy upgraded technologies with features that are not fully maximized. With Cloud Computing, upgrades are automatic, personal data could be accessed anywhere where internet is present and users pay for the services they only need.
Evie Galera, Associate Consultant
IT Practice Area