Knowledge Articles

Skip Navigation Links.
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Gems of KSearch…
Back to Basics
The Search for a better 2013 Starts in You
Validate a Good First Impression
When Things Go Wrong
Online Presence – Your Indispensable Business Booster
Liberate yourself from the many stresses of everyday life
Waiting for a Promotion
Living the Brand
The Long Wait Before the Interview
Why Philippines Continue to Lose IT Talents to Singapore and Other Countries
Solving Conflicts at Work
Staying Motivated at Work Despite Rejections
Why Prioritize Urgent Matters over Important Ones
Which Executive Search Provider Do You Choose?
Job Interview Is Over – What Next?
Make Each Day Count
The Interview -- The Moment of Truth
What Not To Do When Developing a Resume
A Pleasant Surprise
KSearch “Profits” from Employees’ Diverse Backgrounds
KSearch CEO’s Remarks to AmCham’s BOP Participants
Say No to Facebook and Twitter
Nail That Interview and Win a Career!
Facing the Challenge of being a Working Mom
The VP Talks about Her Career Boost in KSearch
Winning Targets
Interview with the Consulting Director
My First Five-Year Journey with KSearch
No Substitute to Communicating and Listening Effectively
How to Succeed in Your First Job
The HR Head -- The CEO’s “Life Support”
You’ve Earned Your College Degree -- Now What?
“PEOPLE – OUR SO-CALLED MOST IMPORTANT ASSET”
The CIO – How Critical is His Role?
Is Change In Our Country Realizable At All?
Is It Greed 101 All Over Again?
Man of the Hour: The CFO

Latest News

Skip Navigation Links.

KSearch Examines the Cloud


In our world today, change is the only thing that remains constant. One can clearly see this through the rapid upgrades of various technologies. Well-known industry players like Samsung and Apple upgrade around twice a year, enticing customers with their new product’s sleek modern look, faster user-friendly Operating System, high-resolution camera and larger storage capacity. With the rapid influx of new technologies, one question comes to mind. Out of all the gadgets present amongst us, which one is the most reliable in storing sensitive personal data?

 

On July 10, Mr. Reggie Javier, the Chief Operating Executive of Cloudware Technology, Inc., had an engaging discussion with the KSearch employees regarding Cloud Computing. Throughout the session, he enumerated examples of cloud technologies, their classifications and benefits.

 

Storing data in a tangible device is risky especially if it gets broken, lost, or left behind in a public place. Imagine if your personal computer or laptop containing the same data crashes, or your company’s servers break down. To make matters worse, imagine that your external storage device inconveniently gets lost, damaged or attacked by computer viruses at the same time. Will you be able to bring back the lost data?

 

By using the Cloud,  Reggie assures users that they do not have to worry about buying, monitoring, upgrading and keeping servers, databases and other storage devices in a secure location. The Cloud is a venue where one can store and access data through the internet instead of using a hard drive, USB, CD or any other external storage device.

 

People are not aware that they are using cloud technologies already. Examples of Cloud technologies are Yahoo, Facebook, Linkedin, YouTube, Bing and Google, among others. These are websites which people use to store, access and manipulate personal information or sensitive files. The Cloud is classified into three categories: public, private and hybrid – each one differing from the other in terms of the number of clients served, the location where it is hosted and the level of security it provides.  Although all types are low cost and accessible through internet, the Private Cloud is more secure than the Public and Hybrid Cloud because the former only caters to a single client within a private network, and protected by a password or address.

 

Although it is not a full-proof system (according to Reggie, there is no technology that exists that is 100 % safe from being hacked), Cloud Computing is better than all the other tangible storage devices because the user does not have to invest a lot on upgrades, disaster recovery and maintenance of computer hardware and software. People do not have to worry about shelling out a lot of cash to buy upgraded technologies with features that are not fully maximized. With Cloud Computing, upgrades are automatic, personal data could be accessed anywhere where internet is present and users pay for the services they only need. 

 

 

Prepared by:

Evie Galera, Associate Consultant

IT Practice Area

Comments ()
site search by freefind advanced