SlideShare a Scribd company logo
1 of 7
Running Head: PROJECT PAPER 1
PROJECT PAPER 4
Project Paper
Name
Institutional Affiliations
Section 1: Design Document
There are many reasons why many companies would want
to adopt cloud technology and virtualization within their
companies. The most significant ones are identified as business
performance resourcing, rapid-go-to-market, business agility, as
well as, cost reduction. Often, there are no serious reasons why
organizations choose to adopt cloud computing given that the
decisions always depends on the complex combination of
reasons, rather than being based on a single factor. Use of cloud
computing can change the risk posture and profile of a
company. For example, by companies using public cloud, they
will definitely avoid the risk that a large investment in IT
resources will not pay off; however, it can introduce security
risks because the resources are shared with unknown parties.
Conversely, there may be risk of non-compliance and
regulation, due to lack of control over where data is stored. The
need for using cloud technology within the company is the
ability to take advantage of new business opportunities, cost,
agility, and productivity.
Cloud computing delivers improved agility because it has
on-demand rapid elasticity. For instance, the IT resources can
be deployed more quickly and increased as needed to meet
demand. This gives opportunities for enterprises to innovate,
introduce new products and services, enter new markets, as well
as, adapting to changing circumstances. The other reason for the
need for the use of cloud technology and virtualization within
the company is that, it increases productivity. Cloud technology
provides a more productive environment not only for a
collaborative working, but also it improves the company’s
productivity by enabling participants in a business ecosystem to
share processing logic. Cloud computing or technologies create
new business opportunities, for example, it can give an
enterprise new business opportunities as a provider of cloud
services or added services. Companies that excel in quality of
its IT can become a public SaaS (Software-as-a-Service), PaaS
(Platform-as-a-Service) and IaaS (Infrastructure-as-a-Service)
provider. A good example of this is in a case where a company
implements a private cloud, has spare capacity, as well as, sells
that capacity as public cloud. Cloud computing within the
company also cut businesses costs. For example, given the
benefits of agility, productivity, and quality that cloud
computing have, companies might expect these to be generally
more expensive, however, this is not the case; reduced cost is
one of the main reasons why many companies are turning to the
cloud technologies (Perilli, 2009).
Research has shown that few technologies have affected
the IT industry. An example is cloud computing that delivers
computing as a service. Part of cloud’s appeal is evidently
financial; that is, it allows organizations to shed some of their
expensive IT infrastructure (software and hardware) and shifts
computing costs to more manageable operational expenses.
Cloud computing is not only about purchasing hardware and
infrastructure, instead, the companies, as well as, individuals
usually compare the cost of on-premise server to the cost of
cloud server. In the mind of these entities, the on-premise
server is most likely to depreciate itself may be in 3 years to
come while the cloud computing server will be treated as a
continuous expenditure. Cost savings in hardware infrastructure
are relatively easy to quantify. For example, if companies adopt
cloud technologies in a public cloud, on-site hardware will be
replaced less often and less new hardware has to be purchased.
This is significant because it will in turn lead to much-reduced
power, less space needed in the data center, as well as, cooling
costs. Studies shows that a medium-sized cloud deployments
lead to about 62 percent savings within a year compared with an
on-premise system. However, for larger cloud deployments, the
annual savings may be about 50 percent compared with on-
premise implementations (Schwartz, 2013).
Labor cost savings is one of the possible reduction of
human capital that can be realized from implementing and
virtualization technologies. By off-loading software, application
or a platform to a private cloud platform, less time is needed to
maintain, administer, as well as, troubleshoot the technologies.
For instance, if there is a system administrator who is in charge
of about 140 servers, the same system administrator can be in
charge or responsible for thousands of cloud –based servers as
well (Schwartz, 2013). IT management costs can as well be
reduced through automated provisioning. For example, in the
cloud, virtual servers are usually provisioned automatically
instead of manually. This is significant because it reduces the
downtime along with the compliance issues.
The diagram below illustrates how cloud and virtualization
technology aligns with the company’s business processes and
assist with attainment of organizational goals.
Cloud Provider
Cloud Consumer
Service Orchestration
Resource abstraction and control layer
Physical Resource Layer
Service
Management
PaaS
SaaS
IaaS
The main actors in the above diagram are cloud consumers
and cloud provider. A cloud consumer is an individual or
organization that acquires and uses cloud products and services,
while cloud provider in this case is a person or an organization
that are responsible for making a service available to a cloud
consumer.
One area concern from many organizations regarding cloud
technologies and virtualization is how to trust the infrastructure
upon which the data and workloads will be run. As a result,
companies who are interested in moving to the cloud and
manage their risk profiles should look for Cloud Service
Providers that offer security and trust services, as well as, the
ability to enforce and audit policy on the data being deployed.
A compelling recommendation for solution providers that could
help the company secure a firm competitive advantage using
cloud and virtual technologies is recommending these firms to
advance their server security for physical, virtual, and cloud
servers in regards to what enterprises chose to use for storing
their information in the cloud. Enterprises should adopt data
security that will protect the enterprise applications and data
from breaches, as well as business disruptions. This is important
because it will help organizations to simplify security
operations while enabling regulatory compliance and cloud
projects. Another compelling recommendation for solution
providers that could help the company secure a firm competitive
advantage using cloud and virtual technologies is through
automation and self service. Organizations should discover best
practices in the cloud and encapsulate those in new procedures
for ongoing support, provisioning of resources, as well as,
application design. In the case of automation, firms can
radically reduce the human cost of IT if they take the advantage
of schedule maintenance and provisioning.
Section 2: Revised Project Plan
One of the critical factors for project success is having a
well-developed project plan. There are various step approaches
to follow when creating a project plan which includes; project
description, project objectives, project management plan
purpose, project deliverables, project milestones, project Roles
and Responsibilities, project scope management, project time
management, and many others. In this case, we shall revise the
previous project plan while updating the project plan template;
from Project Deliverables 3: Database and Data Warehousing
Design with at least three new project tasks each consisting five
to ten subtasks.
A database is an organized collection of data that can
easily be accessed, managed, and updated. Databases are set up
so that one set of software programs allows users to access to
all. In databases, there are rows and columns which are used to
store information. Data warehouse is an electronic storage of a
large amount of information, and are stored in a manner that is
secure, reliable, easy to manage and retrieve. Usually, data
warehouse is the only option for data collection Company that
has a huge collection of data. For example, every moment users
visit a single page in a website that will generate thousand
records to be saved. Some of the new project tasks in project
deliverables for Database and Data Warehousing Design
include; improving information access, bringing the user in
touch with their data, enhancing the quality of decisions,
managing schema objects, such as tables, indexes, and material
views, managing users and security, as well as, providing cross-
function integration.
All the above project tasks in project deliverables for
Database and Data Warehousing Design are important and
difficult step for designing a software product for the reason
that they determine what the user wants, this is because users
often are unable to communicate the entirety of their needs, and
the information they provide may also be incomplete (Parker,
2012). By managing schema objects, such as tables, indexes,
and material views, some of the subtasks include defining
alternatives to triggers by defining data version control and
management while the subtasks of managing users and security
include creating login less users, implementing certificate-based
security, as well as defining appropriate database roles and
permissions for the users.
References
Perilli, W. (2009). The benefits of virtualization and cloud
computing. Retrieved on 18 Feb, 2016 from
http://virtualization.sys-con.com/node/870217
Parker, J. (2012). Business Requirments vs Functional
Requirements. Retrieved on 12 Feb, 2016 from
http://enfocussolutions.com/business-requirements-vs-
functional-requirements/
Schwartz, P. (2013). Cloud Computing can generate massive
savings for agencies. Retrieved on 18 Feb, 2016 from
https://fcw.com/microsites/2011/cloud-computing-
download/financial-benefits-of-cloud-computing-to-federal-
agencies.aspx
Running Head PROJECT PAPER1PROJECT PAPER4.docx

More Related Content

Similar to Running Head PROJECT PAPER1PROJECT PAPER4.docx

Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Justrassity996
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promisesGrand Crue
 
Ibm cloud wl aanalysis
Ibm cloud wl aanalysisIbm cloud wl aanalysis
Ibm cloud wl aanalysisSanjeev Kumar
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET Journal
 
Cloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterCloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterDataCore Software
 
The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingMindi Schneider
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futuredailytimeupdate.com
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudSourabh Saxena
 
Cloud computing CXO's guide
Cloud computing CXO's guideCloud computing CXO's guide
Cloud computing CXO's guideAspire Systems
 
Enterprise Cloud Analytics
Enterprise Cloud AnalyticsEnterprise Cloud Analytics
Enterprise Cloud Analyticsiosrjce
 
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudAchieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudDr. HJ Raza, Ph.D/MBA
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...IRJET Journal
 

Similar to Running Head PROJECT PAPER1PROJECT PAPER4.docx (20)

Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
Cloud-Computing-Has-Two-Main-Advantages-Namely-Fle16
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 
The cloud promises
The cloud promisesThe cloud promises
The cloud promises
 
Ibm cloud wl aanalysis
Ibm cloud wl aanalysisIbm cloud wl aanalysis
Ibm cloud wl aanalysis
 
IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
 
Cloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data CenterCloud Infrastructure for Your Data Center
Cloud Infrastructure for Your Data Center
 
Cloud Computing AoC Position Paper
Cloud Computing AoC Position PaperCloud Computing AoC Position Paper
Cloud Computing AoC Position Paper
 
The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz Manufacturing
 
Ibm cloud
Ibm cloudIbm cloud
Ibm cloud
 
Microsoft Cloud Computing E-Book
Microsoft Cloud Computing E-BookMicrosoft Cloud Computing E-Book
Microsoft Cloud Computing E-Book
 
2011 keesvan gelder
2011 keesvan gelder2011 keesvan gelder
2011 keesvan gelder
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docx
 
Cloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloudCloud computing and migration strategies to cloud
Cloud computing and migration strategies to cloud
 
Cloud computing CXO's guide
Cloud computing CXO's guideCloud computing CXO's guide
Cloud computing CXO's guide
 
Enterprise Cloud Analytics
Enterprise Cloud AnalyticsEnterprise Cloud Analytics
Enterprise Cloud Analytics
 
C017341216
C017341216C017341216
C017341216
 
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudAchieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
 
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
A NEW APPROACH FOR SECURITY IN CLOUD DATA STORAGE FOR IOT APPLICATIONS USING ...
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxcharisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxcharisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxcharisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxcharisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxcharisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxcharisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxcharisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxcharisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxcharisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxcharisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxcharisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxcharisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxcharisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxcharisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxcharisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxcharisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxcharisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxcharisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxcharisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxcharisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

Running Head PROJECT PAPER1PROJECT PAPER4.docx

  • 1. Running Head: PROJECT PAPER 1 PROJECT PAPER 4 Project Paper Name Institutional Affiliations Section 1: Design Document There are many reasons why many companies would want to adopt cloud technology and virtualization within their companies. The most significant ones are identified as business performance resourcing, rapid-go-to-market, business agility, as well as, cost reduction. Often, there are no serious reasons why organizations choose to adopt cloud computing given that the decisions always depends on the complex combination of reasons, rather than being based on a single factor. Use of cloud computing can change the risk posture and profile of a company. For example, by companies using public cloud, they will definitely avoid the risk that a large investment in IT resources will not pay off; however, it can introduce security risks because the resources are shared with unknown parties. Conversely, there may be risk of non-compliance and regulation, due to lack of control over where data is stored. The need for using cloud technology within the company is the ability to take advantage of new business opportunities, cost, agility, and productivity. Cloud computing delivers improved agility because it has
  • 2. on-demand rapid elasticity. For instance, the IT resources can be deployed more quickly and increased as needed to meet demand. This gives opportunities for enterprises to innovate, introduce new products and services, enter new markets, as well as, adapting to changing circumstances. The other reason for the need for the use of cloud technology and virtualization within the company is that, it increases productivity. Cloud technology provides a more productive environment not only for a collaborative working, but also it improves the company’s productivity by enabling participants in a business ecosystem to share processing logic. Cloud computing or technologies create new business opportunities, for example, it can give an enterprise new business opportunities as a provider of cloud services or added services. Companies that excel in quality of its IT can become a public SaaS (Software-as-a-Service), PaaS (Platform-as-a-Service) and IaaS (Infrastructure-as-a-Service) provider. A good example of this is in a case where a company implements a private cloud, has spare capacity, as well as, sells that capacity as public cloud. Cloud computing within the company also cut businesses costs. For example, given the benefits of agility, productivity, and quality that cloud computing have, companies might expect these to be generally more expensive, however, this is not the case; reduced cost is one of the main reasons why many companies are turning to the cloud technologies (Perilli, 2009). Research has shown that few technologies have affected the IT industry. An example is cloud computing that delivers computing as a service. Part of cloud’s appeal is evidently financial; that is, it allows organizations to shed some of their expensive IT infrastructure (software and hardware) and shifts computing costs to more manageable operational expenses. Cloud computing is not only about purchasing hardware and infrastructure, instead, the companies, as well as, individuals usually compare the cost of on-premise server to the cost of cloud server. In the mind of these entities, the on-premise server is most likely to depreciate itself may be in 3 years to
  • 3. come while the cloud computing server will be treated as a continuous expenditure. Cost savings in hardware infrastructure are relatively easy to quantify. For example, if companies adopt cloud technologies in a public cloud, on-site hardware will be replaced less often and less new hardware has to be purchased. This is significant because it will in turn lead to much-reduced power, less space needed in the data center, as well as, cooling costs. Studies shows that a medium-sized cloud deployments lead to about 62 percent savings within a year compared with an on-premise system. However, for larger cloud deployments, the annual savings may be about 50 percent compared with on- premise implementations (Schwartz, 2013). Labor cost savings is one of the possible reduction of human capital that can be realized from implementing and virtualization technologies. By off-loading software, application or a platform to a private cloud platform, less time is needed to maintain, administer, as well as, troubleshoot the technologies. For instance, if there is a system administrator who is in charge of about 140 servers, the same system administrator can be in charge or responsible for thousands of cloud –based servers as well (Schwartz, 2013). IT management costs can as well be reduced through automated provisioning. For example, in the cloud, virtual servers are usually provisioned automatically instead of manually. This is significant because it reduces the downtime along with the compliance issues. The diagram below illustrates how cloud and virtualization technology aligns with the company’s business processes and assist with attainment of organizational goals. Cloud Provider Cloud Consumer Service Orchestration Resource abstraction and control layer Physical Resource Layer Service Management PaaS
  • 4. SaaS IaaS The main actors in the above diagram are cloud consumers and cloud provider. A cloud consumer is an individual or organization that acquires and uses cloud products and services, while cloud provider in this case is a person or an organization that are responsible for making a service available to a cloud consumer. One area concern from many organizations regarding cloud technologies and virtualization is how to trust the infrastructure upon which the data and workloads will be run. As a result, companies who are interested in moving to the cloud and manage their risk profiles should look for Cloud Service Providers that offer security and trust services, as well as, the ability to enforce and audit policy on the data being deployed. A compelling recommendation for solution providers that could help the company secure a firm competitive advantage using cloud and virtual technologies is recommending these firms to advance their server security for physical, virtual, and cloud servers in regards to what enterprises chose to use for storing their information in the cloud. Enterprises should adopt data security that will protect the enterprise applications and data from breaches, as well as business disruptions. This is important because it will help organizations to simplify security operations while enabling regulatory compliance and cloud projects. Another compelling recommendation for solution providers that could help the company secure a firm competitive advantage using cloud and virtual technologies is through
  • 5. automation and self service. Organizations should discover best practices in the cloud and encapsulate those in new procedures for ongoing support, provisioning of resources, as well as, application design. In the case of automation, firms can radically reduce the human cost of IT if they take the advantage of schedule maintenance and provisioning. Section 2: Revised Project Plan One of the critical factors for project success is having a well-developed project plan. There are various step approaches to follow when creating a project plan which includes; project description, project objectives, project management plan purpose, project deliverables, project milestones, project Roles and Responsibilities, project scope management, project time management, and many others. In this case, we shall revise the previous project plan while updating the project plan template; from Project Deliverables 3: Database and Data Warehousing Design with at least three new project tasks each consisting five to ten subtasks. A database is an organized collection of data that can easily be accessed, managed, and updated. Databases are set up so that one set of software programs allows users to access to all. In databases, there are rows and columns which are used to store information. Data warehouse is an electronic storage of a large amount of information, and are stored in a manner that is secure, reliable, easy to manage and retrieve. Usually, data warehouse is the only option for data collection Company that has a huge collection of data. For example, every moment users visit a single page in a website that will generate thousand records to be saved. Some of the new project tasks in project deliverables for Database and Data Warehousing Design include; improving information access, bringing the user in touch with their data, enhancing the quality of decisions, managing schema objects, such as tables, indexes, and material
  • 6. views, managing users and security, as well as, providing cross- function integration. All the above project tasks in project deliverables for Database and Data Warehousing Design are important and difficult step for designing a software product for the reason that they determine what the user wants, this is because users often are unable to communicate the entirety of their needs, and the information they provide may also be incomplete (Parker, 2012). By managing schema objects, such as tables, indexes, and material views, some of the subtasks include defining alternatives to triggers by defining data version control and management while the subtasks of managing users and security include creating login less users, implementing certificate-based security, as well as defining appropriate database roles and permissions for the users. References Perilli, W. (2009). The benefits of virtualization and cloud computing. Retrieved on 18 Feb, 2016 from http://virtualization.sys-con.com/node/870217 Parker, J. (2012). Business Requirments vs Functional Requirements. Retrieved on 12 Feb, 2016 from http://enfocussolutions.com/business-requirements-vs- functional-requirements/ Schwartz, P. (2013). Cloud Computing can generate massive savings for agencies. Retrieved on 18 Feb, 2016 from https://fcw.com/microsites/2011/cloud-computing- download/financial-benefits-of-cloud-computing-to-federal- agencies.aspx