Computing environments that provide access to acutely sensitive data often have a business requirement to restrict unauthorized access to that data. In other instances, cost or special use cases of the system can make pivoting to the cloud infeasible. In these cases, deploying a computing environment in an on-premises or co-located data center can be the preferred method of providing necessary computing resources to end users to achieve the organization’s business requirements. Security concerns can likewise lead to such a decision.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Carnegie Mellon University Software Engineering Institute |
Published: | July 1, 2021 |
License: | Public Domain |