29
Oct

Personalization In Cloud Services And Its Consequences

Personalization-In-Cloud-Services

During any period of time on the Web, there is a trend, the word is on everyone’s lips. All of them say, some people understand what they mean, some of them has an idea of how it works, and quite a few have combined knowledge all of the above. Most recently, this jargon was “social”. Sociality was everywhere on the Internet, on mobile, even outside the network, and only recently a wave of hysteria (because it is difficult to call it) began to decline. But the holy place is never empty and everyone is talking about the “cloud”. Yet, the concept is not clear to most of the users.

Personalization In Cloud Services

Dropbox, iCloud, Google Drive, eNlight – a “cloud”, it most definitely is. They occupied the niche of popular cloud services in the public consciousness and widely used. They are designed to store data. Other services do not have this unique association, such as Evernote, Wunderlist (task lists), Pocket (deferred reading). All these are popular services, but most people do not even realize that they are using them on “cloud”.

Online Services : Backup and synchronization existed before Dropbox, it is not an invention of Drew Houston. Another thing is that, the services were primarily used by system administrators, because the services were intended for them. The idea was to offer something similar to the mass market that does not appear out of the blue. An important role was played by the boom of mobile devices. Designed for continuous absorption of information, especially personalized, not having a large amount of internal memory, constantly (or almost constant) connected to the network, one way or another, they are ideally demonstrated by the benefits of cloud (in the broad sense) services. As the majority of all Internet users went out into the world with a network of these devices namely, the network adjust to their needs. The side facing the user, it becomes easier facing the network – is more complicated. Any breakthrough innovation, technology should be, roughly speaking, the next cycle of adoption:

  • There is a new idea, a concept. It must be a truly revolutionary and have a wide range of applications based on it for others.
  • The concept generates a set of solutions, each of which focuses on a fairly narrow segment of the market and solve a particular problem.
  • Market consolidation around solid solutions that combine multiple functions.

“The Cloud” as a concept is now approaching the third stage. Personal services are now actively replacing HDD as the main storage media (especially that promotes active promotion of “mobile lifestyle” and ultrabooks, which are equipped with SSD-drives with a relatively small capacity). We use these services, even though we do not notice them. Stage was used by enthusiasts, the cloud for a long time was on the way to mainstream phenomenon. Gartner Agency Forecasts report that a truly ubiquitous penetration of personal cloud services market will happen in 2015, but in 2014 more than 10% of the total number of users will use the cloud as primary storage without relying on physical media. But in order to become reality, the cloud services are tangled by fragmented services, which we are forced to use now, should be a single set, which will use them on many devices, many users, without failure, overload, quietly synchronizing data between all elements. Digital Ecosystems – PC, mobile devices, television equipment and so on. First signs of the beginning of this process are already visible. However, to successfully complete the transition, will have to solve a lot of problems, and chief among them – fragmentation, inefficiency and problems with information security.

Fragmentation

This problem may not seem obvious, but only at first glance. In many industries, we are still looking for new applications of new technologies. When this application is launched, it often does not fit well with other technologies. The set of cloud services that we use, are owned by different companies, and even though they often perform similar or related tasks, they do not interact with each other. For example, productive work requires a constant flow of new information, the ability to organize and classify it, and set The funds for working with documents. Ideally, it should be a single set of services. In reality, we create documents in Google Docs, keep notes in Evernote, find new information using Feedly and Prismatic, and manage a list of reading material via Pocket and so on. All this leads to excessive complexity. Many different services = a lot of different applications that take away from each other is endless megabytes of mobile data bandwidth. Checking all of these applications takes time and system resources, software applications may conflict with each other, requiring constant updating. An average smartphone is now set to 67 applications. In order to maintain the efficiency and effectiveness of all the services, we often need the services for the management of services. In the future, the focus will shift on not to create a separate application for each service, and the implementation of an integrated, multi-user and multi-service approach within a single application.

Safety

Security of cloud services from attacks – a constant headache for developers, and if they do not pay enough attention, then it becomes a problem for the users. Services are always a tasty morsel for hackers – a concentrated array of user information that may be useful as an ideological (show coolness of hacker) and economic (attached on the methods of payments and credit card numbers are in demand on the black market). Further complicating the problem is that, the attacks are not limited to the vulnerabilities of the service in its web incarnation – applications, especially those written without much attention to data protection allows attackers to gain access to users’ information with “reverse”. Mobile security is not given so much attention, and for good reason. So far, there has been no virus outbreaks on large-scale for the mobile OS, but the applications Trojans have appeared several times in the same Play Store. There cannot be a single solution to this problem, only joint efforts from platform holders and painstaking search for security can gradually reduce the level of threat. Innovations in technology and security authorization – for example, two-factor authentication can reduce the risk, but not eliminate them entirely.

Efficiency

Performance problems are directly related to fragmentation. Now large amounts of data transferred over the network and significant computational resources are spent on the maintenance of a large number of applications. Both problems can be solved by consolidating applications on a single infrastructure platform (for example, hosting on eNlight Cloud Services by ESDS, or, if we take an even more integrated solution, the ecosystem of Google applications) and a decrease in the number of applications for the benefit of versatility. As well as many IM-clients can support multiple protocols, as well, and cloud customers (in the future) will be able to work with multiple cloud services simultaneously. Alternatively, it can be assumed that over time, more and more successful cloud services will be purchased by IT-giants, which will be integrate into their own ecosystem of services.

The Key To Network

The most important application of any computer has long been the browser. In the nearly 20-year history, the program has succeeded in becoming a handler of http-requests to actually “OS operating system”. In the end, most of the users in the browser spends 90% of the time working on their PC. It is quite possible that cloud will be browser based in near future and not directly tied to the operating system running on a PC, and a browser that is installed on it. And in this case, Google has a significant advantage over the competition – its browser is an extremely effective multi-functional combine. It can even act as the operating system itself, which history proves, Chromebooks (and users support the idea, as evidenced by the extent of sales) and perform almost all the tasks you can perform with a traditional OS. Both the browser, in a sense, is the ideal environment for cloud applications. Its modular structure allows you to add and remove applications at any time, a unified framework allows them to interact with each other, and in connection with the widespread use of browsers, their producers put a lot of effort to ensure their security. In the near future, browser will become a single hub that interfaces and interacts with clouds and the Internet, connecting disparate systems into a single unit. And its role in the continuation of the invasion of the Internet in our lives will only increase.

ESDS

Leave a Reply

RSS
Follow by Email