Discuss About The Marketing System Under Cloud Computing Environment.
Benefits of Cloud Computing in Marketing System
Cloud computing acts a means for sharing a pool of configurable computer resources such as storage application, servers, networks and services which can be provided at a swift speed. Therefore, cloud computing is making communication things quite easy and simple for use because it allows for the release of information with the least effort on the side of the user as well as the service provider (Stanberry, & Harindranath, 2015). Despite the fact that cloud computing services not being much old in the marketing, it has increasingly become a significant part of the digital economy of Australia. Accordingly, some of the outstanding services in the economy of Australia that have been driven by the emergent cloud computing services include:
It has become a storage as well as system retrieval access point for huge volumes of business and personal digital data particularly for social media service
Enabled the shift from PCs to off-site storage of information, applications and services
Enhanced the development of and heightening of online involvement together with collaborations through the establishment of “device-agnostic” services.
In the case of this paper, it uses a speculative loud computing company Akon IT Solutions as the reference point cloud computing company which is to facilitate small Information Technology (IT) businesses in Australia. The company shall be tasked with providing small IT businesses in Australia with cloud computing services. certainly, the core significance of cloud computing is that it has the capacity to substitute up-front resources infrastructure costs with affordable variable costs that will be capable of scaling up small businesses. The advantage with cloud computing is that there is no hassle of make arrangement for procuring of servers in addition to other IT infrastructure, instead cloud computing has simplified it by instantly spinning up numerous servers within a short period and fast delivery of results.
Business Vision: To offers a greatly dependable, low-cost infrastructure with a scalable platform within the clouds to span its powers to almost all small business across Australia.
Business Services: In order to make the heterogeneous IT needs a reality and Akon IT Solutions (AITS) has to be service cantered. Clients from both within and outside the small IT business are in need of solutions that has to achieve their business as well as personal operation needs, mobility requirements and device preferences. Therefore, AITS is tasked to see to it that the following three core areas that is social, cloud computing and mobility is no more a dream but a reality among small IT business. The main services that shall be offered by Akon IY Solutions include Web-Based cloud computing, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), managed services, utility services, hardware as a services, and workplace as a service.
Services offered by Akon IT Solutions
The cloud: In the current business world whether big or small cloud computing stands out as the heart engine that drives IT as a service. With the presence of cloud computing there is need of making large upfront investments in hardware as well as using a lot of time managing the same hardware. As an alternative, AITS cloud computing makes provides the best and correct type of computing resources that are cost efficient and cost effective to power small IT business very newest and bright ideas for their IT businesses. Since AITS understands that the cloud is the mainstream since its adoption is gaining momentum, small businesses can access to state-of-the-art technology as a flexible costs and with a fast speed than it has been before.
Mobility: When it comes to mobility it is evidently conspicuous that it has revolutionized the manner in which businesses are operated today, not only in Australia as a country but the globe as a whole. Therefore, AITS is tasked to ensuring that it makes information availability accessible in a range of devices, with increased accuracy, and in real time and not like it used to be before the advent of cloud computing. Accordingly, both mobility and the cloud as a team they are making businesses operations much easier for employee to become more and more productive in their respective places of work and not only while in offices. AITS has and strives to continue making sure that its client’s mobile tools and devices are secured and always ready to attain its clients’ needs despite the tough industry principles and the rise in cloud computing challenges and threats from cybercrime attackers.
Social: indeed, social media has is still continue to have an important influence on the manner in which individuals work today. With the advent of different social media platform such as Twitter, LinkedIn, Facebook and WhatsApp only but to mention a few; it has transformed the way in through which workforces share information in real time setting. Thus, it is the responsibility of AITS cloud computing see to it that the sharing of this information is possible using any devices and that it allows for transparency. The present day employee desire is being in the position to exchange information in a more personal but dynamic manner with no barriers and over a range of devices. As a result, AITS is striving to power a multiple tools and devices so that customers do not get stressed in the course of their information exchange with companies, friends and families do not experience challenges in any way.
Strategic Alliance and Information Security
With the dynamic transformations happening in the today’s business environment as a result of going more digital, the issue that surrounds cloud computing has undergone change (Sharma, Bansal, & Sharma, 2015). The issue is not about where the business or personal data is kept or the amount of money they are paying for the service, but it is concerning the way the business is making breakthroughs in technology to drive and attain their business value.
With the use of Akon IT Solutions (AITS) customers are able to harness information technology in the latest way unlike utilizing smart IT to only save on the expenses, AITS provides latest services, which understands its clients better, improves productivity and moves in the market at a fast pace. That is to say that AITS supports small IT businesses to come up with solutions which directly impact on the bottom line. Consequently, with the usage of AITS it empowers consumers to gain access to data, keep their data safe and secure across all small business in the region without forgetting that it has the capacity to unleash mobility (Dillon, & Vossen, 2015). Subsequently, through the use of AITS businesses stand a chance to use free valuable resources available in the cloud to control the complex and expensive datacentres on a strategically greater parts of the business.
Task: |
Status: |
Business Plan Writing |
Completed |
Business marketing plan |
On going |
Choice of Business organization |
Partnership |
Registration and licensing |
On going |
ABN application |
23 127 642 901 |
Trademark and IP protection |
On going |
ASIC Registration |
Agent No. 27310 |
Domain Name Registration |
https://www.connectme.com |
Tax-Registration-GST and TFN |
Tax Agent No. 22377796 TFN: 136648654 |
Legal-ACCC, Retail Law, Privacy Laws, OAIC |
On going |
Codes of practice and principles |
In Progress |
Control, policies and procedures |
On going |
Workforce management and accountability |
On going |
Safety cover and protection |
Account ID: FEL43675189002 |
Record Keeping and accounting systems |
In Progress |
Staff Employment (up to data) |
To be structured |
Akon IT Solutions has a strategic alliance program whose core target is to realize Leadership in the cloud market. Accordingly, AITS partnering with small IT Businesses strategy is driven by the following primary goals:
- To deploy the best-in-class cloud computing technology and platform
- To leverage both domestic and international leadership in terms of business applications (Rittinghouse, & Ransome, 2016).
- To drive outstanding practice models in consulting, management services, integrations and sales
Accordingly, the strategic partners with Akon IT Solutions will include, Microsoft, VMware, Accenture and Cisco. For instance, Cisco shall be used to in this context to build, deploy as well as make use of clouds to offer small IT businesses with fundamental building blocks, solutions in addition to services like Hosted Collaboration Solutions for big companies.
The most important aspect that is advocated by AITS is information security of its customers. Security is the heart functional necessity which safeguards mission-critical information from both inadvertent as well as intentional leakage, theft, deletion and integrity compromise. Under the AITS accountability model, the firm intent to offer both domestic and international secure infrastructure for computing, networking, storage, database services and advanced service levels. AITS looks forward to prove several security services and features that shall be used by its customers for secure use of their assets.
AITS is designed to enable customers address a range of challenging business difficulties using reliable and innovative services (Tehrani, & Shirazi, 2014). Regardless of the type of business that one want to start such as if it is to operate a supply chain software, an electronic commerce website or a complex model of biotechnological products, AITS has the capacity to support the business access latest fast insight, delivery services. Also, it helps businesses by creating new offerings that are based on customer demand that business are not aware off yet.
Capacity to support different types of business
With a multitude of services across a range of technologies, with a wide based partner environment in addition to continuous, AITS aid business in driving business solution that in return help to facilitate he growth of the business (Yeboah-Boateng, & Essandoh, 2014). The platform for AITSS complies with a majority of international standards, which offers consumers the reliability as well as user experience that is vital for leveraging new business.
In the case of this context cloud computing main prospective customer is small business groups like Small Medium Businesses (SMBs) as well as Small Medium Enterprises (SMEs). Could computing primary target is small IT business because they are being face d with the challenge of adopting latest technologies. The reason being that technology keeps changing at a faster pace thus most small business have fear of obsolesce, which makes them to become hesitant to take any move in terms of technological variations in their operations. But, forgoing the new technology is not a remedy for small businesses, since staying with outdated operation systems is much more expensive. Therefore, cloud computing, social and mobile analytics stand as the best support business for small businesses. These analytics play a significant part in leveraging new opportunities which makes it easier to manage business operations. Accordingly, the acceptance of social media Cloud Company offers small businesses a more efficient procedures which grants them more effective ways to involve with clients.
Cloud computing is an emerging paradigm of computing ideas which enables both technology and information infrastructure as well as software that has to be directly delivered across the internet as a service. Therefore, this is a structure that will enable Akon IT Solutions to intensify its network abilities by running applications directly to its clients via the internet (Hashem, et al., 2015). Accordingly, with the delivery of services across the internet AITS stands a better chance to radically decline the IT expenses among small and medium-sized enterprises. As a result, AITS will work to ensure that its cloud computing services take lower budgetary needs in addition to commitments to enable the small corporations to include cloud computing services in the service delivery without incurring extra expenses of purchasing legacy server as well as stowage systems. In so doing, the load of developing as well as maintaining the technological expertise needed for running the network is shifted to the service provider in this case AITS. AITS will make sure that small business enjoy the pay-per-use based cloud computing to aid in transforming the manner in which IT sector and the deployment of customised applications in this era of difficulties (Kanagal, 2015).
Akon IT Solution will be a licensed cloud computing service provider that will be located in Australia. The target of AITS is to locate several secure and long-term standard offices in ideal locations that will be suitable for easy access by small IT business across Australia. The primary services that will be offered by Akon IT Solutions include web-based cloud computing, Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), managed services, utility services, hardware as a service, service commerce, and work place as a service (Liu, 2017). Akon IT Solutions is conversant with the present day business which is diversified as well as sophisticated techniques. As a result, it will position itself as a cloud computing service provider that will offer a broad service range in accordance to the customer’s request. Similarly, AITS is client-centred cloud computing service provider that will offers its services in a broad-based experience as a less costly cost that will not in any way place a hole in the pocket of its clients.
Social Media Cloud Segment Market |
Number of Users (Millions) |
Statistics Release Dates |
YouTube |
2,000 |
30th June 2018 |
|
4,000 |
1st June 2018 |
|
200 |
31st September 2018 |
|
500 |
31st September 2018 |
|
125 |
31st August 2018 |
SnapChat |
97 |
31st September 2018 |
|
300 |
30th June 2018 |
Type of Business |
Monthly Price ($) |
Profiles |
Accounts |
Micro Business |
Free |
3 |
1 |
Small Business |
20.00 |
5 |
2 |
Small Medium Enterprise |
200.00 |
>5 |
20 |
Large Business |
2,000.00 |
>15 |
>20 |
- Email marketing
- Online-Social Media Marketing such as Twitter, Facebook, ScapChat, YouTube, Instagram, LinkedIn, and Pinterest.
- Print Media
- Local TV and radio channels
Network Dependency: Cloud computing is dependent on the internet. The major drawback of cloud computing is its reliance on internet connectivity as the only way for accessing the clouds. That means that it gets affected directly if there is no internet connection, thus it is prone to outages and service disruptions any time the internet face interruption. As such, could lead to disruptions of transactions if it happens that the internet is interrupted in the course of the transaction, which results in delays and the worst of all losses if the transaction is time sensitive.
Centralization: Businesses normally outsource data as well as applications services from a central service provider. Centralized data further acts as another risk to cloud computing because if the service provider is down, all the clients will be affected.
Data security/Integrity: Could computing face a number of external attacks from hackers thus it stand a high risk of data breach which place small business data and information at risk.
Reduced Customer Trust: It is inevitable that data breaches leads to reduced trust from customers. Consequently, the rise in the cases of data breaches is making many small business to have fear of obsolesce which makes them to prefer doing business in the traditional way.
Data breach: Data breaches can lead to the loss of sensitive information from different premises such as small medium business, personal credit card information being stolen (Puthal, Sahoo, Mishra, & Swain, 2015). The nature of cloud computing capability to utilize remote processors to perform parallel operations, thus it leaves it free to malicious infiltrations at sacral points. Consequently, if it happens that an attacker gain access into the control of the core workstation, it might expose the hypervisor.
Loss of data: The loss of data take place through accidents, for example when a disk drive dies and it does not have a backup. The loss of data can be as a result of human errors in a range of unimaginable ways or can be due to malicious attacks from hackers (Puthal, Sahoo, Mishra, & Swain, 2015).
Traffic or account hijacking: account hijacking is a major challenge in cloud computing because it is much easier for hackers to find their ways to sensitive information through phishing and other social Civil engineering approaches where one can illegally gain access to an individual’s user account.
Malicious and careless insiders: At times cloud computing is likely to face threats from unhappy workforces’ saboteurs and ignorant and careless employees who marks the worst of all (Ali, Khan, & Vasilakos, 2015). The existence of this threats is not only compromising to cloud computing but places the entire company as risk since the breach of data causes all stakeholders within the business.
Accordingly, cloud computing provides a number of solutions to the various challenges related to the issue of data breaches, from huge burdens on small departments to efficient control of massive data stores. Cloud computing depend on remote network, which consists of virtually distributed servers linked on the internet to store. Consequently, cloud computing only manage, access, process data and run applications instead of letting these operation conducted internally at the business level. This service is facilitated by a type of service referred to as cloud service provider (CSP). CSP relieves Information technology departments the challenge of local server maintenance (Chou, 2015). Despite cloud computing trusting valuable data to a collection of virtual machines in performing operations, these machines are managed by hypervisor which can lead to a vulnerability. Therefore, cloud computing mitigates these risks in the following ways:
Intrusion Detection: The initial step when it comes to data breaches is to identify the person that is constantly striving to sneak into one’s backyard (Ali, Khan, & Vasilakos, 2015). Therefore, active monitoring as well as blocking should be the initial counterattack steps to protect one’s firewall. Akon IT Solutions will use Security Information and Event Monitoring (SIEM) since it gives forensic analysis about access attempts to a network, which helps to keep the business alert to a probable attack.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, 529-534.
Chou, D. C. (2015). Cloud computing risk and audit issues. Computer Standards & Interfaces, 42, 137-142.
Chou, D. C. (2015). Cloud computing: A value creation model. Computer Standards & Interfaces, 38, 72-77.
Goutas, L., Sutanto, J., & Aldarbesti, H. (2015). The building blocks of a cloud strategy: evidence from three SaaS providers. Communications of the ACM, 59(1), 90-97.
Keskin, T., & Taskin, N. (2015). Strategic pricing of horizontally differentiated services with switching costs: A pricing model for cloud computing. International Journal of Electronic Commerce, 19(3), 34-53.
Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Kanagal, N. B. (2015). Innovation and product innovation in marketing strategy. Journal of Management and marketing research, 18, 1-25.
Liu, Q. (2017, May). Design and Implementation of Precision Marketing System under Cloud Computing Environment. In Smart Grid and Electrical Automation (ICSGEA), 2017 International Conference on (pp. 231-234). IEEE.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Essay: Cloud Computing's Marketing System Benefits And Services.. Retrieved from https://myassignmenthelp.com/free-samples/marketing-system-cloud-computing-environment.
"Essay: Cloud Computing's Marketing System Benefits And Services.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/marketing-system-cloud-computing-environment.
My Assignment Help (2019) Essay: Cloud Computing's Marketing System Benefits And Services. [Online]. Available from: https://myassignmenthelp.com/free-samples/marketing-system-cloud-computing-environment
[Accessed 22 December 2024].
My Assignment Help. 'Essay: Cloud Computing's Marketing System Benefits And Services.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/marketing-system-cloud-computing-environment> accessed 22 December 2024.
My Assignment Help. Essay: Cloud Computing's Marketing System Benefits And Services. [Internet]. My Assignment Help. 2019 [cited 22 December 2024]. Available from: https://myassignmenthelp.com/free-samples/marketing-system-cloud-computing-environment.