Wednesday, May 6, 2020

Cloud Computing Technology Greentek Board in HQ

Question: Discuss about the Cloud Computing Technology for Greentek Board in HQ. Answer: Introduction The report depicts the importance of adapting cloud vendor to improve the existing business management and in order to provide proper risks management. Greentek Board in HQ has decided to consider the risks management approach to improve the business. For adapting the cloud vendor, the requirement for remote administration, resource management and SLA management are required to be considered. The cloud computing technology provides application resilience, backup and opportunity to disaster resilience; these are also demonstrated in this report. Finally the report will illustrate the Erls SLA guidelines. Requirements for Remote Administration In order to configure and administer cloud based Information Technology resource, the remote administration system mechanism gives different diagnostic tools and users interface for the external cloud resources (Oliveira et al., 2014). In addition to this the remote administration system can provide a portal as well that gives authentication it means that none of the external user without authentication cannot access the information from the cloud database. Moreover, a large data set can be managed in an organized manner with the help of remote administration system. Management of different underlying system, SLA as well as billing management of large to small organization is also become possible after adapting the concept of remote administration system. In order to develop and customize an online portal, website RAS serves many tools and application programming interface to the users effectively (Toosi, Calheiros Buyya, 2014). Both self service portal and administration portal can be managed well by remote administration system. Requirements for Resource Management In order to improve the existing business the organization should select appropriate resources that are beneficial and relevant to the business process. Whenever a cloud consumer wish to access data from the cloud storage that time tin order to avoid the negative impact set of toll are provided to the newly adapted cloud based solution so that, to protect the activities of the management system (De Benedictis et al., 2015). Due to limited amount of access the users and the employees of the organization are not capable to access whatever data they want to access. It provides security to the storage system. Therefore it can be said proper selection of resources and their management will help to increase the efficiency of the business process. Resource management is referred to as hard problems as heterogeneous type of resources are adapted to improve the system (Luna et al., 2015). Interdependency among the resources, unpredictability and viability of the resources are other issues associated to resource management system. Requirements for SLA Management Service level agreement is referred to as a contract between the consumer and service provider. The purpose of establishing a SLA is to furnish the standard performance of the organization in terms of meeting the requirements of the consumers (Motta et al., 2014). Certain metrics are associated to SLA those are required to accomplish the need to the consumers. Greentek Board in HQ will be able to get a holistic view of the entire business application. Best industry level practices including an improved employee productivity and standard IT resource approaches. After adapting cloud computing vendor for the organization, the return on Investment also increases (Wagner et al., 2015). Therefore, it can be said that the SLA is a very important in order to establish a cloud based solution for an organization. Analysis on consideration of Application Resilience, Backup and Disaster Recovery Application Resilience For the chosen cloud computing provider application resilience is needed to be considered by the organization. Application resilience is referred to as the ability of an application that can resolve any issue efficiently (Ahmed, et al., 2015). The application is not bother about the feature of the component rather to can effectively resolve the issue to increase the commercial benefit from the competitive marketplace. Due to rapid implementation and improvement of software and multiple technologies proper infrastructure is required to be served by the organization (Frey, Reich Lthje, 2013). In order to minimize the level of failure, the development team is required to deliver enough application resilience. It is also capable to determine hidden vulnerabilities of a system. The testing of application resilience is vital as it can provide reliable and efficient performance. Application Backup and Disaster Recovery Backup and disaster recovery are two important characteristics that should be possessed by the newly adapted cloud computing system. Proper data management is referred to as a vital thing for every organization (Casola et al., 2013). If large amount of data are stored in the data storage of an organization then, those are needed to be managed well so that while required the employees and the users as well can fetch the information from the storage. Sometimes it is also found that an old data has become important to be retrieved from the storage. Usage of virtual machine, gives opportunity to improve the backup status of large set of information. The terms backup and disaster recovery are though complementary to each other but not interchangeable (Frey, Reich Lthje, 2013). If a system does not hold the backup feature then it cannot possess disaster recovery management. Due to lack of management or lack of inexperienced expert team a system can be crashed and all the information store d in the data storage can be loss. In order to retrieve those lost availability of data disaster recovery management is needed. By maintaining the following steps lost financial and personnel data could be fetched whenever required. Disaster recovery management system is not costly, faster, and easy and comparatively more compact than other system. Rebuilding of new software or infrastructure is not required to fetch the data from the cloud storage. Erls SLA guidelines to access SLA In the contractual relationship between the cloud service provider and the cloud consumers, cloud Service Level Agreement (SLA) is referred to as one of the most important components. The principles of SLA guideline include negotiation, agreement, a quantified service level and responsibilities. Negotiation: Between the service provider and cloud consumer in order to make sure the service agreement negotiation is needed to be presented. Proper understanding of the position of the baseline is needed so that, the employees of the organization could easily measure whether the performance served by the current service is meeting the expectation of the consumers or not (Luna et al., 2015). The key activities and the outcome of the system can be clearly understood by the management team of the organization. It will also help to understand the demand and the drivers of the consumers requirements. The management team could easily identify the gaps and challenge of the system and will also adapt the required steps that can mitigate the issues. Agreement: The negotiation process will lead to creating a contract between the consumer and the service provider (Toosi, Calheiros Buyya, 2014). The agreement could benefit both the parties. The requirement of the consumers can be easily understood by the development team of the organization. Clarification of the responsibilities: While developing and adapting a new cloud computing system, the responsibilities of the team members are also divided into segments so that the system could be better understood by the development team (Oliveira et al., 2014). It will help to meet the requirement of the consumers. Conclusion From the overall discussion it can be concluded that, adaptation of risk management system in terms of cloud computing system will help to improve the efficiency of the Green Board in HQ. The existing process is not enough effective and thus they have decided to adapt a cloud based solution which will provide application resilience; backup and disaster recover management as well. Apart from this, the ERLs Service Level Agreement (SLA) guideline is also provided to the organization. The cloud computing technology needs remote administration, resource management and SLA management system those are also mentioned in this report. References Ahmed, E., Gani, A., Khan, M. K., Buyya, R., Khan, S. U. (2015). Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges.Journal of Network and Computer Applications,52, 154-172. Casola, V., De Benedictis, A., Rak, M., Rios, E. (2016). Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.Procedia Computer Science,97, 53-62. De Benedictis, A., Rak, M., Turtur, M., Villano, U. (2015, June). Rest-based sla management for cloud applications. InEnabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2015 IEEE 24th International Conference on(pp. 93-98). IEEE. Frey, S., Reich, C., Lthje, C. (2013, September). Key performance indicators for cloud computing SLAs. InThe Fifth International Conference on Emerging Network Intelligence, EMERGING(pp. 60-64). Luna, J., Suri, N., Iorga, M., Karmel, A. (2015). Leveraging the potential of cloud security service-level agreements through standards.IEEE Cloud Computing,2(3), 32-40. Motta, G., You, L., Sfondrini, N., Sacco, D., Ma, T. (2014, June). Service level management (slm) in cloud computing-third party slm framework. InWETICE Conference (WETICE), 2014 IEEE 23rd International(pp. 353-358). IEEE. Oliveira, A. C., Chagas, H., Spohn, M., Gomes, R., Duarte, B. J. (2014, June). Efficient network service level agreement monitoring for cloud computing systems. InComputers and Communication (ISCC), 2014 IEEE Symposium on(pp. 1-6). IEEE. Oliveira, A. C., Chagas, H., Spohn, M., Gomes, R., Duarte, B. J. (2014, June). Efficient network service level agreement monitoring for cloud computing systems. InComputers and Communication (ISCC), 2014 IEEE Symposium on(pp. 1-6). IEEE. Rodger, J. A., Bhatt, G., Chaudhary, P., Kline, G., McCloy, W. (2015). The Impact of Business Expertise on Information System Data and Analytics Resilience (ISDAR) for Disaster Recovery and Business Continuity: An Exploratory Study.Intelligent Information Management,7(04), 223. Toosi, A. N., Calheiros, R. N., Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey.ACM Computing Surveys (CSUR),47(1), 7. Wagner, C., Hudic, A., Maksuti, S., Tauber, M., Pallas, F. (2015, August). Impact of critical infrastructure requirements on service migration guidelines to the cloud. InFuture Internet of Things and Cloud (FiCloud), 2015 3rd International Conference on(pp. 1-8). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.