100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 16 Cloud Storage and Collaboration tools - Assignment 1 - Learning Aim A - Distinction work

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
27-05-2025
Written in
2024/2025

BTEC Information Technology IT Level 3 Cloud Storage and Collaboration Tools, Learning Aim A. Distinction work.













Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 27, 2025
Number of pages
17
Written in
2024/2025
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

Unit 16 Assignment 1:
How can cloud technology be
used in organisations
Alisha Nasir

,Table of Contents
Introduction:..........................................................................................................................................3
Characteristics of cloud computing:......................................................................................................3
On-demand self-service:....................................................................................................................3
Ubiquitous access:.............................................................................................................................4
Resource pooling:..............................................................................................................................4
Measured service:.............................................................................................................................5
Rapid elasticity:..................................................................................................................................6
Different cloud technology models:.......................................................................................................7
Software as a Service (SaaS):.............................................................................................................7
Platform as a Service (PaaS):..............................................................................................................8
Infrastructure as a Service (IaaS):......................................................................................................8
Visualisation and Cloud Services:.......................................................................................................9
How delivery models can be used to meet company’s aims and needs:...............................................9
Community Models:..........................................................................................................................9
Hybrid Models:................................................................................................................................10
Private Models:................................................................................................................................11
Public Models:.................................................................................................................................12
Self-Hosted Services vs Third-Party Services:...................................................................................13
Other Characteristics:..........................................................................................................................13
Automation:.....................................................................................................................................13
Cloud Bursting:................................................................................................................................14
Just-in-Time service:........................................................................................................................15
Multi-tenancy..................................................................................................................................15
The effects of cloud technologies on business organizations:.............................................................16
Implications of cloud computing services:.......................................................................................16
Implications of cloud services and solutions....................................................................................16
Legal requirements:.............................................................................................................................17
Conclusion:..........................................................................................................................................17
References:..........................................................................................................................................17

,Introduction:
I will do research on cloud storage, focusing on its organisational usage, benefits, and challenges that
come with the technology. I will be researching different cloud technologies to make an informed
decision and determine how cloud storage can meet the needs of clients. My research will cover
characteristics of cloud computing, different cloud technology models, delivery models suited for the
goals of clients, and overall impact on companies due to cloud technology.

Characteristics of cloud computing:
On-demand self-service:
On demand self-service is a characteristic of cloud computing that allows users to access their virtual
resources without the need of a service provider. This allows them to access their data at anytime
and anywhere without needing to interact with anyone to do so. This service allows users to access
their files without the help of staff to fulfil the request manually as needed with some physical
hardware servers. Requests in traditional servers often took hours or days which is not an issue using
on demand self-services.

Advantages:

The cloud service model ensures that resources are used in accordance with how much of the
storage is used and, therefore, allows for scaling storage up or down, without extra costs for unused
capacity. This proves to be especially advantageous for a small business organisation, as it can
procure high quality resources without spending a lot of money on expensive hardware that will not
be used. As well as the cloud service model allowing organisations to save money on expensive
hardware in general which may cost a lot and may take up a lot of physical space that the building
may not have room for.

Another benefit is the efficiency and speed at which users can access data. In many cases, traditional
server systems are bound by manual processing such as needing administration to approve their
requests to access files which may take days or weeks and hardware constraints such as hardware
being expensive and difficult to access remotely, but on-demand self-service eliminates these
obstacles. Users can immediately access resources and data without waiting for approvals or manual
setups by IT staff and are able to access their files anywhere as long as they have an active internet
connection. This rapid access ensures higher productivity and allows businesses to respond quickly
to changing needs, ensuring they are meeting their clients’ needs efficiently.

Disadvantages:

Though it has advantages, on-demand self-service can also come with higher subscription fees.
Recurring costs of cloud services especially for large resource usage or premium features can add up
fast for a business. This may sometimes end up being more expensive than using a traditional server
system since the costs are recurring instead of a one-time payment for the hardware. Due to the
increasing size of most organisations, organisations will also be forced to increase their storage
subscription often which may start to cost drastically more than a traditional server.

Another major drawback is vulnerability to hackers and data theft. Resources can be accessed over
the internet; hence, cloud systems are inherently vulnerable to cyber threats. Sensitive data in the
cloud becomes a target for hackers, and a business has to invest in extra security measures to
mitigate these risks. Unlike a traditional server which is more secure and less vulnerable to cyber-
attacks due to its nature of only being accessible onsite. A breach or unauthorised access can cause

,data loss or reputational damage, so robust cybersecurity practices become a necessity for users of
cloud computing services to ensure the organisation does not come under attack.

Ubiquitous access:
On-demand ubiquitous access implies the ability to seamlessly get access to data, applications, or
services, from any place, at any point in time, using any device that has access to the Internet. The
concept of cloud computing and IoT is strongly linked with ecosystems, where connected devices
and systems rely on microprocessors to facilitate fast and efficient communication. It is a basis for
modern technologies such as self-driving vehicles and home automation, where real-time
information processing and access are very important. The main reason why ubiquitous access
depends upon stable internet connectivity is to provide functionality and enable access to the wide
availability of digital resources.

Advantages:

The greatest benefit of ubiquitous access is the ability to retrieve and manipulate data or services
from anywhere in the world, independent of the physical location. Users can easily connect with the
cloud, continuing what they were working on and managing their devices connected via IoT. All this
translates into a greater level of flexibility, therefore increasing productivity and convenience—
especially for people who must deal with remote systems.

Ubiquitous access works across a wide range of devices, from smartphones and laptops to tablets
and even IoT-enabled wearables. This means users are not bound to any one device; hence, it is
easier to switch between devices without losing their data. For example, a user can start a task on
their smartphone and continue it on their laptop without interruptions. With contexts such as in self-
driving cars and home automation, ubiquitous access means that the device is always in
communication and response in real time. For instance, a self-driving car requires continuous access
to data for it to move effectively; similarly, smart home systems need to be always connected to
react to user's commands or automate tasks of lighting and temperature control.

Disadvantages:

However, ubiquitous access requires an active internet connection, which can be a huge limitation in
areas with poor network coverage or during outages. Without connectivity, users can't access cloud-
stored data or interact with IoT devices; the system is useless when it's needed most. The risk of
unauthorised access increases with data being accessible from anywhere. For users depending on
ubiquitous systems, cybersecurity threats such as hacking and data breaches are big concerns.
Strong security protocols must be in place to minimise these risks. In addition, maintaining
ubiquitous access requires huge infrastructure, including dependable servers, high-speed networks,
and highly secured data centres. This could further lead to increased costs for the providers, which
may be passed on to users in the form of subscription fees or other expenses. Additionally, the
energy consumption of continuously connected devices may impact sustainability efforts

Resource pooling:
Resource pooling is defined as a technique in managing and administering computing resources, be
it a server, a storage, network, and applications for several consumers under the multi-tenancy
model. This is why such resources are allocated and dynamically reallocated when new requirements
are given to increase efficiency for the organisations.

Abstraction is one of the most important aspects of resource pooling, as it provides users with the
capability of accessing the resources without knowing where they are located or how they function.

, This design principle lends itself toward the scalability of the solution; providers could scale
resources up or down to match changing workload demands. Even more, strict access controls and
redundancy mechanisms assure both security and high availability of services.

Advantages:

Resource pooling brings the benefit of effective utilisation of resources. In cases where many
consumers share resources, it will ensure that the organisation gets the greatest use out of them,
ensuring there is no wastage or extra costs. That way, there is the assurance that the resources are
going to be used precisely where they are required, according to workload demand and other
specific requirements like location or type of workload.

Other benefits include better scalability. With resource pooling, the service provider can scale up or
down dynamically based on the demand requirements. For example, in the case of peak traffic, more
resources are scaled up to ensure the flow of operations; otherwise, in low-demand situations,
resources are scaled down for optimal performance at lower costs.

Lastly, the pooling of resources causes high availability and reliability. For instance, redundancy
mechanisms might ensure that the services are never unavailable concerning the occurrences of
hardware or network failure. This makes it very useful for critical systems with demands for few or
no disruptions at all.

Disadvantages:

All these advantages come with some limitations. The biggest disadvantage originates from the
dependence on local resources. If there is a failure in services close to the end-users, then there may
be a failure in satisfying the customers. This will dissolve the expectations of performance and
latency that the consumers have regarding the underserved regions.

Another disadvantage of this technology is the variabilities in providers' capabilities. Not every
service provider has the resources to handle some demands, especially during peak hours of work or
in less developed areas. Such inconsistency can cause either complete or partial service interruption,
or reduced performance, which frustrates the users and may damage the business operations.

Finally, while resource pooling stresses efficiency, it also introduces complexity in management and
security. Much stronger systems are needed for the management of resources fairly by multiple
tenants, ensuring that no resource conflicts happen and that tight access controls are in place.
Otherwise, inefficiencies or security vulnerabilities might lead to misuse of resources.

Measured service:
Measured service is a cloud computing model in which providers of resources such as storage,
bandwidth, or computing power meter, regulate, and bill customers in a pay-as-you-use manner.
Providers keep a real-time count of resource use; thus, customers only pay for the services they use.
This is achieved through advanced metering and analytics tools that calculate the consumption of
resources and generate invoices for them based on actual, exact usage. Transparency from
measured service ensures both provider and customer cost efficiency due to charges being linked to
actual usage rather than via a flat fee or estimation.

Advantages:

One of the most attractive benefits associated with measured service is cost savings. The customer
only pays for what they use, so there would be no need for up-front investments in hardware or
overpaying for capacity never used. This model is very good for startups, small businesses, or
£9.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
alishanasir

Also available in package deal

Thumbnail
Package deal
BTEC IT Level 3 Unit 16 Cloud Storage and Collaboration – Full Distinction Package (Assignments 1 & 2) (Learning Aims A,B and C)
-
2 2025
£ 19.98 More info

Get to know the seller

Seller avatar
alishanasir Sir George Monoux College
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
6 months
Number of followers
0
Documents
11
Last sold
6 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions