Sunday, May 3, 2020

Virtualization and Cloud Computing Child Protection Nonprofit Organiz

Question: Discuss about theVirtualization and Cloud Computing for Child Protection Nonprofit Organization. Answer: Introduction The report depicts that cloud computing technology is able to offer complete solution to the nonprofit child protection organization. The solution will provide competitive advantages with top level management system and complete integrated approaches so that the combining strategy can provide efficient and cost effective service to the organization. The report will discuss why the remote administration, resource management and SLA management system is needed to be acquired by the cloud based solution. It will also demonstrate the reason for which the backup, disaster recovery and application resilience are required to be adopted to develop the over operation of the system. Finally, the report will provide the importance of SLA guidelines and how they can be used to access the SLA. Discussion on the Requirements for Remote Administration, Resource Management and SLA Management The existing data management system of the organization is traditional and the data management has become inefficient in nature. In order to develop the overall management the organization has planned to adopt a cloud based solution, so that manual adjustment can enhance the capacity of the database (Rittinghouse Ransome, 2016). The professional cloud solution has certain features including cloud ecosystem, cross platform integration, application program integration support and IT based cloud infrastructure. The selected cloud vendor is Microsoft where, the infrastructure service is Microsoft private cloud, software MS office 365 and the Platform is windows azure including .net, java and Php (Jadeja Modi, 2012). Remote Administration The remote administration is a mechanism that allows the cloud consumers to perform in the remote locations. The IT resources will minimize the amount of effort including the time and overall services. In this case, the web application interface is directly connected to the remote administration system that helps to control the overall service. On the other hand, the cloud administrator is connected to the remote administration service via different management tools. The management of the cloud service is different from the on premise private IT resource from all aspects. Again, a cloud based resource is transferred to the cloud provider being a part of the control and responsibility. Nowadays, remote administration service tools helps to connect and process different computers and servers together. It helps to avoid the technical risks (Beloglazov, Abawajy Buyya, 2012). The administrator will manage the complete system by monitoring without any external interruption. The professionals will help the end users to perform efficiently. Figure 1: remote administration (Source: Jadeja Modi, 2012, pp-877) Resource Management The resource management process is referred to as the usage and selection of the most effective resource for companys improvement. The resource might be tangible or it might be financial, device based or labour resources (Liu et al., 2015). This is the decision making process in which an organization can select the best suited option for the improvement of the company. It will provide a clear evidence to let the organization know that how many employees are busy and how many still not (Jadeja Modi, 2012). Particularly for this organization, the resource management team is divided into financial resource management, human resource management and inventory resource management. In order to develop the resource management system the organization is needed to allocate the resources of the organization and these resources includes different advanced technologies (Sadiku, Musa Momoh, 2014). Microsoft cloud solution serves automation software tools such as timesheet software, tracking and monitoring software. An appropriate resource management system will optimize the time and improve the bottom line. SLA Management Service level agreement (SLA) is referred to as a contract between the consumers and the service provider (Beloglazov, Abawajy Buyya, 2012). It will help the organization to perform up to the expectation of the clients. There are some agreements that are needed to be maintained by the organization to develop the overall system. The specific requirements are as follows: Whenever the data will be required the authorized employees can access the data from the storage. A standard or benchmark is specified to which the level of current performance off the organization will be performed (Garg, Versteeg Buyya, 2013). Response time is available according to the time. Usage statics are needed to be provided by the system. According to the user requirement the data might be changed including the overall system (Garg, Versteeg Buyya, 2013). Discussion on the Consideration of Application Resilience, Backup and Disaster Recovery Application Resilience The application resilience can be classified based on its affect on the consumers. As a single entity the complete application environment, data replication and digital devices are combined. These following categories are as follows: After the outage of the application the manual restart option is available but on the basis of the state of the data restart processes are applied in the practical field. The users are capable to resume the application whenever required and the manual repositioning system is also available (Jadeja Modi, 2012). Within a possible boundary the consumer and the service providers can transact their data when required. The distributed application is a system dull of complexity and the configuration, operation and the overall management system is collaboratively applied to the cloud solution so that the consumes can reflect their point of view (Whaiduzzaman et al., 2014). Backup As the traditional management system was based on file management thus data handling technology was very confusing and complex as well (Sadiku, Musa Momoh, 2014). Thus the organization is needed to setup a backup so that when any data is required that can be fetched from the data storage without any interruption or external attack. Disaster Recovery Before implementation of any cloud based technology an organization should analyze all the risks that might occur due to failure of the technology (Dinh et al., 2013). As in this case the confidential data could get hacked or attacked by the outsider and they can misuse these. Therefore, the organization must keep panning for the data recovery and all other disaster recovery. External and internal both data can be recovered by implementing proper cloud based solution (Rittinghouse Ransome, 2016). The Microsoft cloud vendor act very efficiently thus, it can fix all the disaster. Usability of Erls SLA Guideline to Access the Appropriate SLA The SLA guideline will help the organization to build a more efficient configuration. The guidelines are as follows: Revisit before finalization: The architecture must be applied once before practical implementation so that the organization will be able to understand whether the system is feasible or not (Garg, Versteeg Buyya, 2013). Marketing tool implementation: Marketing tools are needed to be used so that the business application becomes beneficial for the organization (Espadas et al., 2013). As the organization is nonprofit thus they do not want to focus o the benefit but they want to focus on the management system. Conclusion From the overall discussion it can be concluded that, the organization has adopted Microsoft cloud based solution for the organization thus, cost effective, reliable and flexible system has been generated. The report has also mentioned the importance and requirement of remote administration, application resilience and SLA management system. Apart from this, it has also mentioned the necessity of disaster recovery, backup and resource management. Finally, the report has also mentioned Erls SLA guideline needed to access the stored data. References Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Beloglazov, A., Abawajy, J., Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), 755-768. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Sadiku, M. N., Musa, S. M., Momoh, O. D. (2014). Cloud computing: opportunities and challenges.IEEE potentials,33(1), 34-36. Sadiku, M. N., Musa, S. M., Momoh, O. D. (2014). Cloud computing: opportunities and challenges.IEEE potentials,33(1), 34-36. Jadeja, Y., Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Liu, J., Zhu, W., Ebrahimi, T., Apostolopoulos, J., Hua, X. S., Wu, C. (2015). Introduction to the Special Section on Visual Computing in the Cloud: Fundamentals and Applications.IEEE Transactions on Circuits and Systems for Video Technology,25(12), 1885-1887. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Espadas, J., Molina, A., Jimnez, G., Molina, M., Ramrez, R., Concha, D. (2013). A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures.Future Generation Computer Systems,29(1), 273-286.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.