Apple Cloud, which is commonly called Apple icloud, is a service that is designed for cloud computing as well as cloud storage (Rodrigues, Lin & Lloret, 2014). This service, however, replaces mobileme service of Apple, and act as a data syncing centre for calendars, notes, emails, to-do-list or reminders, bookmarks, photos, documents, and other data. Further, this service also facilitates users to backup their iphone OS device wirelessly to iCloud without any need of doing it manually. It also allows the users to store their data like IOS application and music on remote computer services in order to download in several devices. The characteristics of iCloud are reliability, security, maintenance, sociability, performance, location and device independence, and virtualization. iCloud helps in backup and restore. It automatically backs the information on daily basis over internet or Wi-Fi on connection of device with the power source. It is also helpful in locating macs and iOS devices. Additionally, its functionality can be defined in terms of a secure database that permits information, which includes login password of user on the website, password of Wi-Fi connection, credit card management, debit card management via CVV, and other data associated with account.
There are 5 essential characteristics of the Cloud that are mentioned in the video. These characteristics are on-demand self service, Through-thick-or-thin clients, permitting consumers the provision of resources without any involvement of service provider or resource pooling, broad access to the network in the form of traditional or web services, and from several endpoint devices such as phone, desktops, PDAs, and laptops, rapid elasticity, and measured service. Presence of on demand self service facilitates the users to have an easy access to the services, and makes the user capable of changing cloud service via an online control panel, or by involvement of the provider. Broad network access makes the team capable of accessing business management solutions by using laptops, tablets, office computers, and smart phones etc.
Resource pooling allows sharing of resources among multiple consumers, and help in hiding their geographical and physical characteristics (Phaphoom, Wang, & Abrahamsson, 2013). Rapid elasticity helps in the provision of resources in a timely manner as and when required by the customers. rapid elasticity allows easy and rapid addition and removal of features associated with software, users, and many other resources. Measured service helps in ensuring control, and also monitor and report on consumer usage.
The influence of people can be considered by the response of the company to woks of people in case of emergency situations. The quality of works is dependent on the care that is provided to employees. The consideration of safety and well-being of employees helps the company to attract more employees in future.
System exerts its impact on BIA by making or backing a business. However, if communication is not effective in the organization, secondary systems can ensure proper communication, and also helps in generation of business activity with the clients. Remaining out of touch with the business partners paves the way to wastage of time, resources, and cancellation of agreement.
Proper collection of data is effective for BIA as it lead to minimization, even elimination of risk. For example, in insurance companies, people, data, systems, and property exert their influence on BIA, and can lead to effective accomplishment of task, and also pave the way to failure of an organization.
There are two types of risk analysis, which are qualitative risk analysis and quantitative risk analysis. Qualitative risk analysis helps in acquisition of safety against the identified and recognized risks, and it also helps in increasing management’s alertness, attentiveness of team members, and all individuals who are vulnerable to the risks. A pre-defined scale of rating is used in qualitative risk analysis. This can be explained with the help of an example that the negative cost estimate associated with a project can be overlooked, when personal preference of manager of the project exerts influence on his decision.
Quantitative risk analysis is meant for analyzing highest priority risks in which quantitative rating is used (Kloppenborg, 2014). It helps in quantifying probable outcomes, and also helps in assessing possibility of attaining particular objectives of the project.
Qualitative risk analysis is done at risk level, whereas quantitative is done at project level. Qualitative risk analysis focuses on subjective analysis of impact and probability, whereas quantitative focuses on probable estimates of cost and time. Quantitative is time consuming while qualitative is easy and also quick to conduct. There are no particular tools or software required for qualitative risk analysis, while quantitative risk analysis may need some specialized tools.
References
Kloppenborg,T. (2014). Contemporary Project Management. Nelson Education Limited, Canada
Phaphoom, N., Wang, X.,& Abrahamsson,P. (2013). Foundations and Technological Landscape of Cloud Computing. Hindawi Publishing Corporation
Rodrigues,J.J.P., Lin, K., & Lloret, J. (2014). Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications. IGI Global, New York