Wednesday, May 6, 2020

Virtualization and Cloud Computing Child Protection

Question: Describe about the Virtualization and Cloud Computing for Child Protection Nonprofit Organization. Answer: Introduction The report depicts the crucial necessity of implementation of manual payroll management system in the non profitable child protection organization. The organization is facing several issues due to lack of management system. In order to develop the overall management system the organization has decided to introduce a cloud based solution for the organization. The cloud based solution is cost effective and efficient and for this organization the selected cloud vendor is HP. The Report will describe the ways in which HP support the remote administration, resource management and SLA management. Apart from this, the report will also discuss the application resilience, need of recovery of the information stored in the database of the organization and the disaster recovery management system. Apart from this, the report will also demonstrate the usability of Erls SLA guidelines that are required to access the cloud provider. Finally, the opportunities that the organization will get by adopting the cloud solution will lo be demonstrated in this report. Requirements for remote administration, resource management and SLA management In this nonprofit child protection organization the numbers of staffs are increasing at a rapid rate, therefore management of all those names has become difficult to the organization. In order to improve the overall management the organization is suggested to adopt cloud based solution so that with the help of manual adjustment the information can be handled with proper balance (Hussain Abdulsalam, 2014). The cloud based solution has SaaS HP software as a service; PaaS cloud application delivery, IaaS enterprise services cloud-compute (Bernstein, 2014). For complete improvement proper resource management, remote administration maintenance and SLA management system should are also required. Remote administration Remote administration is one of the most importance features, required to be considered before implementing cloud computing solution to an existing system. The mechanism known as remote administration system provides supportive user interface and diagnostic tools for external cloud resources. It also helps to frame up cloud computing based IT resources. The system can establish portals to access management based features for different system. The application program interface and operating tools can build a customized and programmatically controllable manual system to the organization. Two primary portals can be created with the help of remote administration. These are as follows: Administration portal and usage: This portal is referred to as a centralized management control IT cloud based resource that, help to develop the manual programming. Self service portal: This is referred to as all the shopping carts. The four major questionnaires can be answered with the proper implementation of the remote administration services. These are based on how, when and what. On the basis of the job role authenticated users can access personnel and financial information from the data storage. On the other hand, everything can be accessed by everyone only authorized people can access data. Based on the time and atmosphere information can be retrieved from database by the users and none of the outsiders can access it. Resource management Resource management is a supportive cloud based environment that provides modern data centre and heterogeneous resources. In order to configure a cloud environment different resources are required, after that the resources are analyzed in an appropriate manner. Resource management technology is provided to the child protection organization to improve the cloud application and manual balancing. HP cloud vendor is capable to provide these user supports to the organization whenever required. Matching, scheduling and mapping are three basic segments that took individual attention for overall development of the system (Amanatullah et al., 2013). Matching is referred to as the combination and match between proper job and proper employee. Multiple kind job resources are available in different locations. Mapping process is the combination of matching and scheduling. Particularly for HP cloud vendor reservation request and demand requests are available. Different hardware and software resources are available such as digital devices and software applications. SLA management Different cloud based software and service level agreements are provided by the HP cloud vendor. The SaaS model gives dynamic solution to the child protection organization. As advanced cloud based solution has many positive aspects at the same time it also provides different challenges to the organization (Espadas et al., 2013). In order to solve this problem service level agreement is required to be introduced to the existing management system. The main objective of the organization is to achieve a cost effective and efficient advanced cloud based solution with maximum amount of profit (Bernstein, 2014). Various optimal processes and challenging methodologies are implemented in the existing service level agreement. The organization needs to acquire SLA management system because it is capable to combine information and expected reliability for all the single documents (Fernandes et al., 2014). It can state the requirement metrics and the balanced responsibility. Discussion on application resilience, backup and disaster recovery Application resilience Application resilience is referred to as a web scale based operation where, the consumers can use several data center at a time. Basically, the operation can be enhanced by implementing different innovative software and technology within the system (Amanatullah et al., 2013). In order to avoid different issues this system provides various advanced level components with the best collection of possible solution. Backup storage This is another technology that is needed to be considered before implementing the cloud based solution to the organization. All the information of the organization is stored in the database of the system. However, due to the dynamic web attack there is a lot of chances of data hacking. Data can be hacked by the attackers and also can be misused for bad intention of people (Fernandes et al., 2014). Every organization should keep the backup of all those data, so that whenever the data will be required the employees they can get it. In the existing system of the organization the data backup storage was very week and retrieval of the stolen data was very difficult. In the new data storage of HP provided cloud based solution the annual database management system is present. Therefore, the employees can fetch data whenever needed. Disaster recovery These applications are needed to resolve or fix any predetermined issue. It is a set of policies and procedures that one organization must maintain to balance the investment and profit. Sometime it is also referred to as business continuity planning (ODriscoll, Daugelaite Sleator, 2013). It helps to determine that with what kind of disaster the technology can deal with. The applications can enhance the functionality of the operations including the cloud applications. This is the risk management process. As the organization has traditional file management system thus, the chances of risk occurrence are also very high. The main threats that affect the system are accidental threat, deliberate threats and environmental threat (Espadas et al., 2013). Intentionally or may be unintentionally the employees might affect the stored data. Therefore, disaster recovery is needed to be adopted to fix the issues. Usability of Erls SLA guideline to access the cloud provider The organization has the traditional payroll management system, but in order to develop the overall management cloud based solution provided by the HP cloud solution is adopted by the system. After the adaptation the traditional system has become manual and in this system the consumers and the service provider can interact with other very frequently (Jadeja Modi, 2012). There is a service level guideline that is needed to access the data from the storage. The guideline states the follows: Guideline Impact Technology The technology provided by the system is neutral in nature (Borgman et al., 2013). Even, this is the necessary technology foundation. In this system the service provider and the consumer can interact with each other without any outside interruption (Jadeja Modi, 2012). World wide application It provides world wide application Unambiguous system Data redundancy can be avoided and data update is also possible (Dinh et al., 2013). Conclusion From the overall discussion it can be concluded that, the child protection nonprofit organization has adopted the HP cloud base solution. The system provided SLA guideline, remote access, resource management system and all other required technology. The technical manager of the organization has decided to implement this system which is capable to provide application resilience, backup storage and disaster recovery. References Amanatullah, Y., Lim, C., Ipung, H. P., Juliandri, A. (2013, June). Toward cloud computing reference architecture: Cloud service management perspective. InICT for Smart Society (ICISS), 2013 International Conference on(pp. 1-4). IEEE. Bernstein, D. (2014). Containers and cloud: From lxc to docker to kubernetes.IEEE Cloud Computing,1(3), 81-84. Borgman, H. P., Bahli, B., Heier, H., Schewski, F. (2013, January). Cloudrise: exploring cloud computing adoption and governance with the TOE framework. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 4425-4435). IEEE. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Espadas, J., Molina, A., Jimnez, G., Molina, M., Ramrez, R., Concha, D. (2013). A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures.Future Generation Computer Systems,29(1), 273-286. Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., Incio, P. R. (2014). Security issues in cloud environments: a survey.International Journal of Information Security,13(2), 113-170. Hussain, M., Abdulsalam, H. M. (2014). Software quality in the clouds: a cloud-based solution.Cluster Computing,17(2), 389-402. Jadeja, Y., Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. ODriscoll, A., Daugelaite, J., Sleator, R. D. (2013). Big data, Hadoop and cloud computing in genomics.Journal of biomedical informatics,46(5), 774-781. Younis, Y. A., Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey.Liverpool John Moores University, United Kingdom, Tech. Rep.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.