Friday, October 18, 2019

Questions for thought Assignment Example | Topics and Well Written Essays - 500 words

Questions for thought - Assignment Example It defines the kind of content that should not appear in the messages and the rights of the recipients. However, these laws have only been partially effective. As such, users have resorted to alternative means of preventing spams with an example being the use of the anti-spamming techniques embedded in products and software. In the current business setting, it is common to find enterprises allowing their employees to use their personal devices in their places of work to carry out work related duties. This practice, however, raises two major concerns, which include the privacy of information and misuse of company data. In order to ensure that the practice benefits the company rather than having detrimental effects, there is a need to have standards of practice in place. These will define the kind of device that can be used, how they are to be used and who can use it (Heary and Woland 56). In addition to this, employees should have specific credentials that allow them to access information. Finally it is imperative to ensure that the devices are only used to access information and not for storage purpose. This will prevent the material from reaching the wrong hand should the devices get lost. Cloud computing is a technique whereby by a group of remote servers and networks are used to facilitate storage of data in a central location. The data can then be accessed online by the company using the services (Voorsluys, Broberg and Buyya 23). This technology allows an organization to use computer systems as a utility rather than building their own infrastructure. It has been incorporated in several business practices, with the outcome being that it has freed the IT team from the duty of building or maintaining a computing infrastructure for the company. In addition to this, it has allowed the end users to spin up the existing computing resources without requiring the intervention of the IT

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.