0% found this document useful (0 votes)
5 views8 pages

Management Information System CW2

The document discusses the roles of Cloud Computing, Edge Computing, and Virtualization in enhancing business performance at TitanTech, highlighting their benefits and challenges. It addresses issues such as data sovereignty, security concerns, and cost implications, while suggesting strategies for optimization and compliance. Additionally, it outlines key hardware components for edge computing and provides a process map for procurement workflows.

Uploaded by

ayentaby787
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Management Information System CW2

The document discusses the roles of Cloud Computing, Edge Computing, and Virtualization in enhancing business performance at TitanTech, highlighting their benefits and challenges. It addresses issues such as data sovereignty, security concerns, and cost implications, while suggesting strategies for optimization and compliance. Additionally, it outlines key hardware components for edge computing and provides a process map for procurement workflows.

Uploaded by

ayentaby787
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

AYEN CHOL ALANG MAGUET 23/605/BBA-M

Assessment: Cloud Computing, Edge Computing and Virtualization in TitanTech.


1. Role of Cloud Computing , Edge Computing and Virtualization in Business
Performance
Cloud Computing
• Provides on-demand computing power and scalability for AI- driven solutions
and IoT applications.
• TitanTech uses multi-cloud (AWS,Azure,Google Cloud) for global
accessibility and storage
Edge Computing
• Moves data processing closer to IoT devices, reducing latency and improving
real-time decision-making.
• Helps TitanTech process critical data in smart cities and industrial automation.
• without relying on the cloud.
Visualization
• Allows multiple virtual machines to run on one physical server, improving
resource allocation.
• Increase efficiency in TitanTech’s data centers and edge devices.
Challenges in Integration
1. Data Sovereignty& Compliance: Some governments require local data storage,
limiting full cloud adaptation.
2. Security & Integration: Ensuring secure communication between cloud, edge and
on-premises system ia difficult.
3. Cost & Performance Balance: Edge computing improves speed but increases
hardware investment
4. Scalability Issues: Managing ohh growing IoT ecosystem without network
congestion is a challenge.
(Citations:Mell & Grance,2011;Shi et al.,2016)
Question 2: How Edge Computing Reduces Latency and Enhances IoT Applications
How edge computing reduces Latency
• Process data locally on edge devices instead of sending it to the cloud.
• Use edge AI algorithms to make real-time decisions.
• Reduces bandwidth usage, minimizing network congestion.
Real world examples:
❖ Tesla- Uses edge computing in its Autopilot system to process real-time sensor data for
self-driving cars
❖ Amazon Go- Uses edge AI in cashier-less stores where cameras and sensors process
transactions locally.
❖ GE Industrial IoT- Uses edge computing to monitor factory equipment and predict
maintenance needs.
(Citations: Satyanarayanan,2017; Varghese & Wang, 2020)
Question 3: Balancing Cloud Computing and Edge Processing for Data Sovereignty
Challenges with Data Sovereignty
• Countries require companies to store and process data locally ( e.g., GDPR in
Europe, China’s Cybersecurity Law)
• Cloud sevices operate globally, making compliance difficult.
Balancing Cloud and Edge for Compliance
1. Local Edge Processing- Process sensitive data on edge servers within the country
while using the cloud for non-sensitve tasks.
2. Hybrid Cloud Model- Store regulated data in private /local cloud while using
public cloud data for analytics.
3. Regional Data Centers- Establish localized cloud data centers in compliance-
heavy regions
( Citations:AI-Rubaye et al., 2019; Zhou et al., 2020)
Question 4: Security Concerns & Mitigation Strategies
Major security concerns
1. Data exposure & Breaches – Cloud and edge systems store large amounts of
sensitve data ,making them cyberattack targets.
2. Cyber Threats( DdoS,Malware)- IoT devices and edge servers are vulnerable to
hacking and malware functions.
3. System Intergration Risks- Different cloud vendors have incompatible security
frameworks ,increasing attack risks.
Mitigation Strategies
1. Data Encryption & Zero- Trust Security – Encrypt data at rest and in transit and
limit user access.
2. AI-Powered Threat Detection- Use AI driv en intrusion detection systyems to
monitor network activity.
3. Multi- Factor Authemication (MFA)- Implement MFA across cloud and edge
devices to prevent unauthorised access.
(Citations: Fernandes et al.,2014; Stojmenovic & Wen, 2014)
Question 5: Cost Implications: Cloud vs. Edge Computing & Optimization Strategy
Cloud Computing Costs
• Pay-as-you-go pricing makes it cost-effective for scalable workloads.
• High data transfer fees for real- time applications.
Edge Computing Costs
• Higher hardware costs (edge servers,IoT gateways)
• Reduces cloud costs by minimizing data transfer and cloud storage usage.
Recommended Strategy
• Hybrid Approach- Use cloud for long term storage and edge for real time processing
.
• Optimize Edge Investments- Deploy edge computing only in high-latency areas to
reduce costs.
• Use Serverless Computing- Leverage cloud-based functions to avoid unessary
infrastructre costs.
(Citations: Gubbi et al.,2013;Li et al.,2018)
Question 6: Key Hardware Components for Edge Computing
1. Edge Servers
• Process and store data locally, reducing cloud dependency.Example NVIDIA
Jetson Xavier for AI-driven real-time analytics
2. GPUs & TPUs (Processing Units)
• Enhance machine learning interence speed at the edge. Example Google Coral
Edge TPU accelerates AI processing in IoT applications.
3. Edge Gateways
• Securely connect IoT devices to cloud and local networks. Example Cisco IoT
Gateways ensure fast ,secure data transmission.
(Citations: Satyanarayanan,2017; Zhou et al., 2019)
Question 7:Process Map for Procurement Workflow

Key Stages:
➢ Order Placement – Customer places an order online.
➢ Order Processing – Order details are verified, and inventory is checked.
➢ 3. Packaging & Shipping – The order is packed and dispatched.
➢ 4. Delivery & Confirmation – Order is delivered, and confirmation is sent.
Stakeholders:
➢ Customers, Order Management Team, Warehouse Staff, Delivery Personnel.
Bottlenecks & Inefficiencies:
➢ Delays in inventory updates.
➢ Inefficient packaging workflows.
Process Improvement Suggestions:
➢ Automate inventory updates using IoT sensors.
➢ Implement AI-driven route optimization for faster deliveries.
(Citations:Turban et al., 2018; Laudon & Laudon, 2020)

References (APA Format)


• Satyanarayanan,M.(2017). The Emergence of edge computing.
Computer,50(1),30-39.
• Stojmenovic,I.,& Wen,S.(2014). The Fog Computing Paradigm. IEEE
wireless Communications,23(5),36-42.

You might also like