Page 25 - cloudComputing-En-V3
P. 25

D. Reputation and Reliability

                       Years ago, the biggest companies were the ones we heard about
                       as service providers, but today we have many companies that
                       have invested in this field. Therefore, it is important to refer to
                       the experiences of previous users in this field and those who
                       have work experiences to know their review of the services, and
                       the advantages and disadvantages of each company to
                       understand the reliability of the provided infrastructure.

                     E. Integrated Systems

                       There is a trend towards providing several solutions that suit
                       businesses today. Therefore, when choosing, there is no need to
                       deal with more than one service provider at the same time if one
                       of them provides the required services in a way that meets the
                       needs. There is no doubt that using digital solutions in the same
                       work environment facilitates the transition between resources
                       and makes their management flexible. However, this does not
                       necessarily mean that this will be followed in all cases.
                       Accordingly, the analysis will clarify to the decision-maker the
                       appropriate choice, the actual need for the provided services,
                       and how much and how these needs will be met.

                     F. Protection

                       The decision-maker does not need to emphasize that protecting
                       information security and the digital environment is something
                       that cannot be waived for the users. Therefore, all the necessary
                       procedures and precautions must be followed to provide this
                       protection need for the users. In this context, several service
                       providers adopt a shared liability policy. The service provider
                       bears part of the provision of data protection against attacks
                       and hacking programs, but the service user still has another part
                       of the responsibility, which is to know the basics of data
                       protection and the precautionary measures. For example, if a
                       user has software available on a cloud service, it must be
                       ensured that the program is free of vulnerabilities that allow
                       hackers to use the application incorrectly and even take over
                       customer data.

18 Training unit in the field of technological information - at the Supreme Council of Universities © Intellectual property rights 2024
   20   21   22   23   24   25   26   27   28   29   30