
there has been hesitancy for people to gain the benefits of cloud computing because of a preconceived notion that data on servers owned by another person is insecure. While it is true that there have been cases where law enforcement issues a subpoena to the service provider, but if the information were on a server internal to the organization, then it would be also susceptible for the subpoena. However, let us not throw away the baby with the bath water. In this presentation, we look at the disadvantages of small to medium-sized businesses hosting common applications such as an email server or a customer relationship database as compared to having the services hosted through a subscription and talk about how companies who providing hosting services now have IAAS to improve the process of their clients.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
