Beruflich Dokumente
Kultur Dokumente
Cloud Computing
Name
Institution
Cloud Computing 2
There are tools which can be used in data collection from a database, one of the tools is a
Statspack which is a very simple to use data analytic tool which can be used in tuning the scripts,
the data collected suing Statspack can be analyzed and their repot provided Statspack uses high
resource SQL statements and other wait events to analyze data. In order to diagnose the database
performance problem, the performance baseline is made for latter comparison, and without this
baseline, it can be difficult to identify the new problems and even analyses the volume of
transactions, many tools could be used in database analysis such as Oracle Enterprise Manager,
BSTAT and the use of the command line tools (Buyya, Venugopal, Broberg, & Brandic, 2009).
Most of the tools use historical data in measuring data performance, however, there are
command line and rea time tools which can be used in analyzing real time data such as EM
Intelligent Agent data gathering tools can be used in collecting a scheduled data. The data is
automatically stored and both real time and historical performance can be analyzed using the
tool. Data interpretation points such as hit ratios can easily be used in data analysis and
determining if there is a problem. With wait events, it is possible to analyses the time and real
One of the disadvantages of cloud computing is downtime, this has had effects on some
important servers such as Amazon, one instance when outage really hit these companies is when
the down time cost the publicly traded company almost $150. Therefore if a database is designed
to work online, it should have disaster recovery events in mind. Overhead costs such as having
AWS Direct Connect, Google Cloud connection are part of the contingencies needed to have the
server always up and running. Another problem with cloud computing is data security and
privacy issues. To overcome the security issues with the cloud computing, the firms involved
must have the understanding of the access and resource services which would limit the access to
the sensitive information. Securing data must be risk based and multi-auth system must be used
in accessing data.
Cloud Computing 3
References
Armbrust, M., Fox, A,. & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM,
53(4), 50-58.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging
IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future
Generation computer systems, 25(6), 599-616.