Cloud Computing – A Technology Revolution

When I need the water, I open the water tap, I have the water. All I have to consider is paying the water fees.

“Cloud” is essentially a network, and in a narrower sense, cloud computing is a network of resources that can be accessed at any time by users, used on demand, and seen as infinitely scalable, as long as they pay for what they use. The “cloud” is like a waterworks, we can receive water at any time, and there is no limit to the amount of water we can pay to the waterworks, according to the amount of water we use in our house.

The miracle of information technology over the past three decades has been computers and digital communications. Since IBM introduced the personal computer and invented the Internet in 1981, the computer and digital communication industry began to step into the track of rapid development. Human civilization has always relied on the processing of information, and the topic in the digital field has always been change. When people put forward higher demand for information transmission, cloud computing came into being.

More and more applications are being migrated to the cloud, and more and more cloud disk storage appears in our life. This seemingly new concept has appeared for nearly 10 years, and its field is still expanding. It can be predicted that most of the applications will be deployed in the cloud in the next 10 years, and most of the applications will provide us with various services directly through the mobile devices in hand.

Why do we need the cloud

With the increase of users in the market, traditional applications need to support more users and provide stronger computing power, and need to become more stable and secure. These growing demands are supported by better and more expensive hardware facilities. In order to meet these needs, enterprises have to buy all kinds of hardware equipment, including servers, storage space, etc. In addition, these hardware and software also need an operation team to manage and maintain, so as to support the normal operation of these hardware and software. These maintenance personnel need to be responsible for the installation, configuration, testing, operation and other aspects of the application. The cost of traditional applications in these areas will be huge, and will continue to increase with the continuous development of applications. For large enterprises, there are still users who constantly complain about the poor performance of the application and cannot meet their needs, so for small and medium-sized enterprises, the burden of operating costs will be unbearable.

The best solution to this problem is cloud computing. After the application is deployed to the cloud, you can no longer focus on the hardware and software problems, but hand these contents to the professional team of cloud service providers to solve. The hardware used by these services is shared, which means that using cloud services is like using tools. Only need to pay the relevant fees according to the requirements, the software update and resource expansion can be completed automatically.

The biggest advantage of cloud computing is undoubtedly the cost. From the day cloud computing was born, customers no longer need to buy hardware, software, set up and run the field data center investment. And cloud computing services often run on the global network of secure data centers, which are regularly upgraded to the latest hardware and software. Compared with a single enterprise data center, this can reduce the network latency of applications and reduce the pressure of capacity planning.

Cloud Computing Market (MarketsandMarkets 2020)

Until 2018, the market size of international cloud computing market size reached $272 billion and according to the current trend, the development of cloud computing is phenomenal. The predicted market size of cloud computing in 2023 will reach 623 billion dollars. This increase is absolutely enormous, and is the further proof of everything is going to the cloud. More and more applications and network based business will be based on cloud and get improved by the efficiency and economic characteristics of cloud computing.

Part 2

Biometric Identification – India and Australia

Biometrics technology has come a long way in the last decade and countries are further embracing the automated efficiency of human authentication powered by artificial intelligence. There is no doubt that the starting point of biometrics is to provide more security for human authentication and hopefully make life easier through biometrics. But there are two sides to any technology, especially when it comes to privacy and personal information, and the issues often become very complex.

From digital security to border security, from employee IDs to country IDs, biometrics identifies and authenticates individuals through biometric identification and identity verification. Biometrics can be through fingerprint recognition, retinal recognition, facial recognition, and even walking posture and voice. These biometrics use the specific nature of each person to verify the identity of the individual they generate. This technology is already widely used in national ID cards, law enforcement access control, etc., greatly reducing the likelihood of successful fraudulent identity deception.

Despite the enormous potential of biometric technology and applications, its security seems illusory due to the complex processes and personnel challenges it poses. And each person’s biometric information is also part of the individual’s privacy, a feature that can lead to conflicts between biometrics and human rights and privacy. The following section discusses whether biometrics should be used in Australia, drawing on the topics raised by biometrics in India.

India’s biometric system, Aadhaar, is considered to be the world’s largest biometric ID program with about 1 billion users, covering almost all of India’s population. The main purpose of this system is to simplify the government’s welfare policy plan and prevent identity fraud. The system was first introduced in 2010 and legalized by law in 2016. Public attitudes towards the scheme have also changed over time, and people first thought it was a well-intentioned move by the government to prevent the problems caused by false identities. But with the passage of time and the progress of people’s awareness of privacy, more and more people think that Aadhaar is a monitoring tool for privacy infringement. Critics say the system makes sensitive data more vulnerable to attacks and that many people are unable to join the system because of biometric information, such as workers’ fingerprints. Since 2012, Aadhaar has faced about 30 petitions and six dozen interventions, all of which have been formally resolved. Most of the challenges revolve around the legality of implementing the plan prior to its enactment, or whether it violates the Supreme Court’s privacy decisions since 2017.

A India woman is recording fingerprints

From the case of India, the reasonable application of biometric system is the main factor that the system can bring benefits to the society. With the continuous progress of information technology and encryption technology, it seems that protecting the information from attack and utilization is not a big problem. But on the other hand, the huge profits in personal information make some people want to make profits from it. For Australia, the use of biometric system can bring more convenience for citizens and government, and avoid the possibility of false identity crime. But the system needs to be strictly regulated by laws and government agencies to ensure that the biometric information is not leaked and used.

 

References

Lian, J. W. , Yen, D. C. , & Wang, Y. T. . (2014). An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in taiwan hospital. International Journal of Information Management, 34(1), 28-36.

 

Marketsandmarkets (2020) Cloud Computing Market by Service Model (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)), Deployment Model (Public and Private), Organization Size, Vertical, and Region – Global Forecast to 2025, retrieved from https://www.marketsandmarkets.com/Market-Reports/cloud-computing-market-234.html

 

Wagner, C, (2020) 9 Interesting Cloud Computing Statistics and Facts, retrieved from https://hostingpill.com/cloud-computing-statistics/#:~:text=9%20Interesting%20Cloud%20Computing%20Statistics%20and%20Facts%20%282020%29,services%2C%20at%20over%2040%25%20growth.%20More%20items…%20

 

Forbes, (2019) Hacking Our Identity: The Emerging Threats From Biometric Technology, retrieved from https://www.forbes.com/sites/cognitiveworld/2019/03/09/hacking-our-identity-the-emerging-threats-from-biometric-technology/?sh=6eea78465682/

 

Nair, & Vijayanka. (2018). An eye for an i: recording biometrics and reconsidering identity in postcolonial india. Contemporary South Asia, 1-14.

 

Time, (2020) The World’s Largest Biometric Identification System Survived a Supreme Court Challenge in India, retrieved from https://time.com/5388257/india-aadhaar-biometric-identification/