Sie sind auf Seite 1von 3

Running Head: CLOUD COMPUTING 1

Cloud Computing

Name

Institution
Cloud Computing 2
There are tools which can be used in data collection from a database, one of the tools is a

Statspack which is a very simple to use data analytic tool which can be used in tuning the scripts,

the data collected suing Statspack can be analyzed and their repot provided Statspack uses high

resource SQL statements and other wait events to analyze data. In order to diagnose the database

performance problem, the performance baseline is made for latter comparison, and without this

baseline, it can be difficult to identify the new problems and even analyses the volume of

transactions, many tools could be used in database analysis such as Oracle Enterprise Manager,

BSTAT and the use of the command line tools (Buyya, Venugopal, Broberg, & Brandic, 2009).

Most of the tools use historical data in measuring data performance, however, there are

command line and rea time tools which can be used in analyzing real time data such as EM

Intelligent Agent data gathering tools can be used in collecting a scheduled data. The data is

automatically stored and both real time and historical performance can be analyzed using the

tool. Data interpretation points such as hit ratios can easily be used in data analysis and

determining if there is a problem. With wait events, it is possible to analyses the time and real

time statistics (Armbrust & Zaharia, 2010).

One of the disadvantages of cloud computing is downtime, this has had effects on some

important servers such as Amazon, one instance when outage really hit these companies is when

the down time cost the publicly traded company almost $150. Therefore if a database is designed

to work online, it should have disaster recovery events in mind. Overhead costs such as having

AWS Direct Connect, Google Cloud connection are part of the contingencies needed to have the

server always up and running. Another problem with cloud computing is data security and

privacy issues. To overcome the security issues with the cloud computing, the firms involved

must have the understanding of the access and resource services which would limit the access to

the sensitive information. Securing data must be risk based and multi-auth system must be used

in accessing data.
Cloud Computing 3

References
Armbrust, M., Fox, A,. & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM,
53(4), 50-58.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging
IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future
Generation computer systems, 25(6), 599-616.

Das könnte Ihnen auch gefallen