Hello Sir
We are a premier academic writing agency with industry partners in UK, Australia and Middle East and over 15 years of experience. We are looking to establish long-term relationships with industry partners and would love to discuss this opportunity further with you.
Thanks & Regards
visit our website.
www.onlineassignmenthelp.com.au
www.freeassignmenthelp.com
www.btechndassignment.cheapassignmenthelp.co.uk
www.cheapassignmenthelp.com
www.cheapassignmenthelp.co.uk/
2. [Type text]
Contents
Executive Summary................................................................................................................... 2
Management and Remote Administration................................................................................. 3
Remote Administration.......................................................................................................... 3
Resource Management .......................................................................................................... 3
SLA Management .................................................................................................................. 4
Backup and Data Recovery....................................................................................................... 5
Application resilience............................................................................................................ 5
Backup and disaster recovery ............................................................................................... 5
SLA guidelines for chosen provider.......................................................................................... 6
References ................................................................................................................................. 7
Executive Summary
This report highlights the facts of cloud computing services that an organization needs to
take care while implementing the same to improve their working as well as service quality. These
services can be divided into three categories such as IaaS, PaaS and SaaS and are being used on
a large scale in today’s technical era. This report as well introduces a company with the SLA
guidelines, remote management and resource management that are some vital aspects of cloud
computing services. Knowledge of these aspects helps the organization to deal with the cloud
service provider for example the MICROSOFT. Not only with the important aspects as this
report also includes disaster recovery, backup recovery and appliance resilience of the
MICROSOFT (a chosen service provider for this report). Main motive to discuss its aspects as
well as risks associated with cloud computing services is so that an organization who is planning
to execute such services can understand the concept to use it in an appropriate manner.
3. [Type text]
Management and Remote Administration
Remote Administration
Organization can utilize remote administration to manage configuration as well as external
IT devices appropriately (Capsasolutions.com, 2016). Developing remote administrator makes it
easy for the organization to manage IT devices associated with cloud. To develop remote
administrator two common portals can be used such as:
1. Administrator Portal: -It used to centralized management for handling the cloud
associated IT resources.
2. Self Service Portal: - It permits clients to choose services they want from a cloud service
provider. It is most like a shopping portal that updates clients with the new assortment of
services being offered by the cloud provider.
A checklist of some requirements needs to be fulfilled:
It is advisable to the organization using cloud services to perform some terms by their
own such as storing the data virtually and using virtual servers.
4. [Type text]
Cloud computing system needs to interoperate with the cloud enabled VIM platform’s
proprietary API that can allow the organization to perform some terms their self.
Organization needs to ask for some necessary demands such as start, stop, scroll down
and replacing, etc.
Resource Management
Resource management is a core function that affects three basic criteria of the system such
as functionality, performance and cost. Here are some important facts linked with resource
management:
- The methodologies for cloud asset administration connected with the three cloud
conveyance models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and
Software as a Service (SaaS), contrast from each other.
- Cloud asset administration requires complex strategies and choices for multi-target
improvement.
- Unified control is unrealistic to give regular administration and assured execution.
- Auto Scaling can be utilized for impromptu spike masses, yet ensure there's a pool of
assets you can discharge or distribute on interest.
5. [Type text]
SLA Management
Basically, SLA (service-level-agreement) is a contract and a method that introduces with an
assortment available of cloud management products that can offer all the features such as
managing, notifications, data collection and reporting etc (Searchitchannel.techtarget.com, 2016).
SLA agreement is specially required where administrations are sourced from outer gatherings to
ensure adequate administration supply.
Backup and Data Recovery
Let’s us discuss about backup and data recovery keeping in mind the chosen service provider
is the MICROSOFT.
Application resilience
Application resilience used to ensure that the cloud services from the cloud contractor are
being supplied to the cloud client in an efficient manner or without disturbances
(Castsoftware.com, 2016). Checks this term performs are scalability, privacy issues, risks due to
the application failure and better performance.
Backup and disaster recovery
6. [Type text]
A proper backup and disaster recovery strategy should be provided by the cloud contractor
so that client can prevent the disturbance in their functionality during the downtime or system
failure. Such strategies can help organizations to keep copies of electronic data to use again.
Giving priority to such strategy is important because only it can save an organization from a
huge lose due to their data drop.
Some useful tips for the organizations to keep their data safe while implementing the cloud
computing: -
- Recognize what is vital to keep the business running for instance, email and database
back-up, application access and recuperation time objective.
- Association must move down its data minimum once in a day on a regular basis, yet
ought to emphatically consider more incessant go down or consistent information
insurance if justified (ComputerWeekly, 2016). Because, there is no advantage to making a
move down record of significant information if the data is not being exchanged through a
safe technique.
- A disaster recovery arrangement ought to be seen as a living record that can be
overhauled often when required. The testing period of the arrangement must contain
imperative check exercises to empower the arrangement to face most problematic
occasions.
- Associations need to secure its information and frameworks by introducing general
infection design redesigns as a feature of calamity recuperation arranging, which may
even keep an emergency from happening.
7. [Type text]
SLA guidelines for chosen provider
Some SLA guidelines are mentioned below to consider while executing the cloud
computing services within the organization:
Understanding the responsibilities: As a cloud client it is inevitable to have knowledge
of the division of the responsibilities between the service client and the service provider.
Who is in charge of which exercises guarantees that there are no holes which can cause
issues when utilizing cloud administrations.
Policy assessment: Ignoring the policies mentioned in the agreement same as people
ignore the terms & conditions while making an online account is not safe. Organization
while implementing the cloud services must consider the legal requirements and the
policies carefully (Anon, 2016). Such requirements may include aspects like client
requirements, data protection legislation applicable to the client, laws applicable where
the data placed.
Difference between service and deployment model: There are critical contrasts in the
levels of cloud asset deliberation, administration level targets, and key execution pointers
that will conceivably be incorporated into a SLA. It additionally represents to that how
regularly the supplier anticipates that their administration will fizzle. Thus, it is required
8. [Type text]
for a cloud client to know the dangers connected with the administrations, for example,
downtime, poor execution, security breaks and information lose.
Security and privacy requirements assessment: Security controls in distributed computing
are, generally, the same than security controls in any IT environment. Data and application
procedure are two regular classes that require security and protection thought for
distributed computing. To figure out which level of security is required, an uneven appraisal
of a benefit's affectability and significance is required.
Pricing: Pricing model may simplify by the service provider, but a total cost of it can be
determined by the services being received from the service provider. Pricing model depends
on several factors such as storage space, monthly traffic as well as the downtime or time
when services were not being used. One can understand its pricing with a suitable equation
given below:
100 * (x-y) / x
Here the “X” is the time measured in minutes in a month when the services were available and
the “Y” is the time of downtime when services were unavailable.
References
ComputerWeekly. (2016). Data backup and recovery tips. [online] Available at:
http://www.computerweekly.com/tip/Data-backup-and-recovery-tips[Accessed22May 2016].
Capsasolutions.com. (2016). Capsa Solutions Mobile Computing Medical Carts & Workstations, FirstDose
Long Term Care Medication Management, Rubbermaid Healthcare Computers. [online] Available at:
http://www.capsasolutions.com/[Accessed22May 2016].
9. [Type text]
Searchitchannel.techtarget.com. (2016). IT Channel information, news and tips - SearchITChannel.
[online] Available at:http://searchitchannel.techtarget.com/[Accessed22May 2016].
Castsoftware.com. (2016). Analyze and measure application software to control risk and improve
productivity - CAST.[online] Availableat:http://www.castsoftware.com/[Accessed22May 2016].
Anon, (2016). [online] Available at: http://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to-
Cloud-Service-Agreements.pdf[Accessed22May 2016].