Pages

Wednesday 12 September 2012

Drawbacks of Cloud Computing for Mobile Workers

By Allyson Westcot


Applications you may use on your laptop PC could be better installed to the system itself or they may be better used online "in the cloud." Cloud applications run on a central server so the application essentially runs online rather on your system. While there are some cases where there is a definite advantage to using cloud-based applications, there are also some circumstances where desktop applications may be the better choice.

Whenever you need to run a cloud-based program or use such a service, it makes use of bandwidth. The more information and processing power a cloud application uses, the more bandwidth it utilizes. If you are using a service that shows adverts, or if you need to transfer a large amount of data, you can slow your web speed to a crawl.

Most people using rugged laptops and tablets on a tight schedule like to stay connected. Mobile broadband keeps the link on all of the time, but Wi-Fi is a choice, as well. Using cloud apps in these examples isn't a problem. But if you can't get online, you can't work if your applications are cloud-based.

If all the info you need is on your laptop computer, it's reasonably easy to use a firewall, antivirus software and other safety measures to protect it. If the data is placed in the cloud or must constantly go backwards and forwards from the cloud to your net browser, that offers more opportunity for the information to be picked up on by a third party.

Many people erroneously think that any application that can be accessed thru a browser is usually a cloud application, when this isn't always true. True cloud computing stores everything from info to applications on a central server or set of servers, is accessible from anywhere and needs to have a secure interface. If you are doubtful whether a program is true cloud computing, then storing the data on your sturdy portable computer instead of that particular system is perhaps best and may offer far better security.




About the Author:



0 comments:

Post a Comment