Explore BrainMass
Share

Applicability of Cloud Computing in an Information System

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Please provide a one paragraph response for each question along with references if applicable. Please provide the responses back in a Word doc ONLY.

1. How does Salesforce.com use cloud computing? Define the Cloud Computing delivery models and services provided by Salesforce.com.
2. What kinds of business could benefit from switching to Salesforce and why? What factors would you take into account in deciding whether to use Salesforce.com for your business?
3. What people, organization, and technology factors contribute to security and control problems in the cloud?
4. If you are in charge of your company's IS department, what issues would you want to clarify with prospective cloud vendors? Would you entrust your corporate systems to a cloud computing provider? Why or why not?
5. What are the advantages and disadvantages of using cloud-based enterprise applications?
6. What management, organizations, and technology issues should be address in deciding whether to use a conventional ERP or CRM system versus a cloud-based version?

© BrainMass Inc. brainmass.com October 25, 2018, 7:30 am ad1c9bdddf
https://brainmass.com/business/management-information-systems/applicability-of-cloud-computing-in-an-information-system-505271

Attachments

Solution Preview

Cloud

1. How does Salesforce.com use cloud computing? Define the Cloud Computing delivery models and services provided by Salesforce.com.

Cloud computing is a general term for anything that involves delivering hosted services over the Internet (Rouse, 2010).

Salesforce.com, Inc. (2012) said that with cloud computing, you eliminate those headaches because you're not managing hardware and software. The shared infrastructure means it works like a utility: You only pay for what you need, upgrades are automatic, and scaling up or down is easy.

Salesforce.com offers these capabilities (mentioned in their official website, Salesforce.com):

a.) Proven Web-services integration. By their very nature, cloud computing technology is much easier and quicker to integrate with other enterprise applications (both traditional software and cloud computing infrastructure-based), whether third-party or homegrown.

b.) World-class service delivery. Cloud computing infrastructures offer much greater scaleability, complete disaster recovery, and impressive up-time numbers.

c.) No hardware or software to install: A 100% cloud computing infrastructure. The beauty of cloud computing technology is its simplicity and in the fact that it requires significantly fewer capital expenditures to get up and running.

d.) Faster and lower-risk deployment: One can get up and running in a fraction of the time with a cloud computing infrastructure. No more waiting months or years and spending millions of dollars before anyone gets to log into your new solution. The cloud computing technology applications are live in a matter of weeks or months, even with extensive customization or integration.

e.) Automatic upgrades that don't impact IT resources: Cloud computing infrastructures put an end to a huge IT dilemma. Hardware and software upgrades are virtually taken over by the cloud company.

f.) Pre-built, pre-integrated apps for cloud computing technology: The Force.com AppExchange features hundreds of applications built for cloud computing infrastructure, pre-integrated with Salesforce CRM application or your other application development work on Force.com.

References:

Rouse, Margaret (December 2010). ...

Solution Summary

The solution shows the rationale of employing cloud computing system in the organization's information system.

$2.19
See Also This Related BrainMass Solution

Evaluation of computer system security: business v. vendor

Auditors test the computer controls for effectiveness through inquiry and observation. Auditors also review the computer security programs, risk policies, procedures, and standards on all major systems and facilities. They further check on who is responsible for monitoring, backups, log-ins, passwords, and vulnerabilities. In addition, auditors should check for the risk of errors, risk of fraud, effectiveness of application controls, risk of financial statement misstatements regarding security of data and assets, and relevant components of internal control.

In 1998 and 1999, Y2K was a term that was used to describe an anticipated computer problem that would occur in the year 2000. When reading the year, computers were originally designed to read two numbers instead of four numbers. Many people thought items that were run by computers would be unable to read the year 2000 and would revert back to the year 1900, potentially causing systems to fail. Many industries had to implement disaster recovery or contingency plans in preparation for this failure. As a result, auditors had to be prepared to review those plans.

Auditors must be prepared to test the effectiveness of controls and be able to evaluate a disaster recovery or contingency plan. Read the information provided in the Week 7 Application Form (linked below) about Anthony's Orchard's information system.

Week 7 Application Form
Evaluate the organizational structure and access to system program controls for Anthony's Orchard. Write a 2- to 3-page paper discussing the MDAC system and controls. Consider the following:

How would you delegate duties differently?

Did the organization use enough methods of asset protection and control provided by those methods?

What are the risks associated with the system?

What would you have done differently with system program control to improve asset protection?

Overall, does Anthony's Orchard have an effective disaster recovery/contingency plan? Your 2- to 3-page paper should reflect the application of the resources presented this week, as well as knowledge gained from previous weeks' required or optional readings.

View Full Posting Details