5.1. Students will be organized into three teams.
Team One: Is Google Cloud Computing Services, and their job is to ‘pitch’ the advantages of their cloud services to the Aerofarms Company. This team must address issues of cost, convenience, security concerns over ransomware, data security, and data privacy in comparison to onsite computing.
Team Two: Is Hewlett-Packard Computing, and their job is to ‘pitch’ their traditional onsite computing solutions to the Aerofarms Company. This team must address issues of cost, convenience, security concerns over ransomware, data security, and data privacy in comparison to cloud computing.
Team Three is the Aerofarms Company. Aerofarms is currently a Newark, New Jersey based company who is transforming agriculture utilizing data intense algorithms to achieve a 95% reduction of water usage while growing crops in a recycled plastic bottle medium devoid of soil. Aerofarms continues to double production annually while dozens of nations across the globe are negotiating contracts to set up Aerofarms in their countries. The Aerofarms Company team must evaluate whether they want to go with cloud computing or onsite computing as their operations expand across the United States and around the planet.
5.2 Pitching – 15 minutes
Team One Google Cloud Computing Services gives a 5-7 pitch to AeroFarms in order to win the contract for computing services.
Team Two Hewlett-Packard Computing gives a 5-7 pitch to AeroFarms in order to win the contract for computing services.
5.3 Deliberation and Decision – 8-10 minutes
Team Three AeroFarms takes 4-6 minutes to deliberate what system and company to award the contract to. They then take 3-5 minutes to explain what factors swayed their decision.
5.4 Class Discussion and Reflection 10-15 minutes
A – Discuss how Actor Network Theory applies to cloud computing?
B – Discuss how Actor Network Theory applies to the pitching-decision process followed in this lab exercise.
C – Do we need to reconceptualize trust in privacy of data with cloud computing, or have we simply erroneously conceptualized having control over data privacy in onsite computing?
D – What steps can individual users and organizations take to protect privacy and data from unauthorized use in cloud computing?