Write a 1-page executive summary.
Details of the assignment have been uploaded.
Thank you!
Assignment Content
Top of Form
GTR is very pleased with the solutions you have provided thus far.
Write a 1-page executive summary to include with your prior work. Include any recommendations to help your leadership team feel comfortable with taking the final step toward migrating to cloud from your current dispersed on-premises server architecture.
Compile your prior work into one document and submit it with the executive summary.
All prior work has been uploaded as well.
Bottom of Form
Cite all sources in APA and give attribution where appropriate.
Thank you for your help!
Running Head: EVALUATION 1
EVALUATION 6
Evaluation Report
Patrick M. Carrasquillo
University of Phoenix
BSA/531
Aviv Raveh
12/20/2021
Reasons for Switching to Cloud Architecture
Many organizations have decided to embrace Bring Your Own Device (BYOD) methodology, in which companies allow employees to bring and use their own devices for work. This decreases the cost of new machine deployment but also creates several issues that cloud computing can solve (McHaney, 2021). The biggest of these issues that arises is your ability to maintain a unified IT environment for your company when you don’t control the device. With cloud services, this issue becomes null and void, as the user simply needs to download the corresponding app on their mobile devices or go to a web browser on their PC/Mac to access the cloud application.
The fact that IT experts are hard to find as well as expensive, many companies don’t employ an IT professional or consultant, they struggle with putting the same technology in place that larger companies can employ putting those small companies at a disadvantage. Most small companies will not think about trying to deploy a server and complicated infrastructure, because they won’t have the staff to maintain it, but it is a necessary evil for many on premise technologies. With cloud services any company can find a cloud-based software that is similar to or better than the on-premises technology that they are thinking about deploying. That software, server, and security is all maintained by the cloud software vendor allowing a small company enterprise level technology without needing an entire IT staff.
Resilient Architectures
In cloud computing, resilient architecture is a cloud computing design that can deal with errors during operation and to deal with an incorrect entry. Resilience can cover many areas of computing, such as programming, machine learning as well as safety. A design that does not lock easily or is not affected by a single application failure (Drayer, 2018). A design that recovers quickly or resists well in exceptional circumstances a design that is not completely affected by an error in one aspect of it. A design that offers a wide range of capabilities.
Designing resilient architecture within an organization helps in minimizing downtime by two-thirds. Resilient architecture ensures systems functionality regardless of minimum errors. It creates a conducive working environment where people can work with minimum destructions. In cloud computing, any application that can fail without affecting the entire system or other applications can be said to be resilient.
Purpose of AWS
Amazon Web Services (AWS) is set of on-demand services offered for business, personal use, and for government project where one pay what he uses. It is a subsidiary of Amazon which is helping individuals, large- and small-scale businesses to build scalable and reliable applications/services.
Instead of buying new servers or add more servers for your application/service and set up an infrastructure on premise, you can simply deploy your whole infrastructure directly on the cloud, so that you don’t have to worry about scaling in or scaling out servers for your application, AWS does it for you (Wittig, 2018). It is a similar service to Azure and
Cloud. They provide a wide range of services which comes under domains such as Storage, compute, networking, security, monitoring, developer tools, etc.
Your alternative to such a platform (and there are others) is to buy servers and co-locate them in data centers. Easy enough to do but you get to add months upon months to your planned growth, and you’ll have to own them, and you’ll have to pay various taxes on them (like personal property tax) and you’ll have to be the one to figure out what to do with them when they are done.
How AWS Helps Design Resilient Architectures
AWS services are designed with functional resiliency mind, yet you are liable for the engineering and design. While functional resiliency can be confounded, AWS can make itemized processes more straightforward to make do. Outfitted with the right AWS administrations, associations can accomplish ideal IT flexibility and accessibility with comprehensive planning. AWS can be installed to make it simpler for teams to find shortcomings in their surroundings at scale. This feature helps team with taking on an “everything flops at last” outlook, which will help them with focusing on resilient plan designs.
Advantages of AWS
AWS resources (storage, database, etc.) are replicated in several availability zone (geographically spread data centers) in a way that a power outage, fire or natural disaster occurring in a data center, will not cause any data loss nor service interruption because the replicas will be automatically replacing the “broken” node(s).
AWS provides top notch features across different industries, systems, applications, as well as business processes to meet objectives (McHaney, 2021). In a local data center, you will have to take care of data encryption, keys management, hacker attacks, physical access protection of the computer room, etc. In AWS even the communication among servers within the AWS intranet is encrypted and keys are dynamically rotated so even in case of breach of one server no further servers will be affected.
Disadvantages of AWS
AWS tries to optimize for their AWS based platform solutions, if you depend too much on them, it is not easy to shift. This is not a real problem but the more of their service you use the more the cost adds up. Optimizing managed services cost i.e., your cloud bill may be high as your utilization may be below 20%, This would require some real engineering, measuring, and tuning /scheduling to bump it up. Some cases AWS Lambda would save you money and in some cases it will not (Derry, 2019). Some cases auto-scaling will save you money and some cases it will not. This optimization could be a big headache and you could spend big bucks on cloud services if you are not careful about all these scaling up instances.
Competitors
Competitor |
Strengths |
Weaknesses |
Microsoft Azure |
· Easy to use and install · Compatible with many platforms |
· Allow maximization of idle capacity · Few payment options |
Alibaba Cloud |
· Provides an exclusive range of cloud computing products/ and services · Alibaba Cloud is committed to the highest levels of compliance including PCI DSS, HIPAA and GDPR. |
· Expensive to Install · High monthly charges |
· Higher Productivity owing to Quick Access to Innovation · It’s cheap as compared to other cloud platforms |
· Fewer features as compared to other cloud platforms · It’s difficult to start and have small components |
Reference
Derry, R. (2019). AWS: Amazon web services: The complete guide from beginners for Amazon web services. Independently Published.
Wittig, M., & Wittig, A. (2018). Amazon web services in action. Pearson Professional.
Drayer, E. (2018). Resilient operation of distribution grids with distributed-hierarchical architecture. kassel university press GmbH.
McHaney, R. (2021). Cloud technologies: An overview of cloud computing technologies for managers. John Wiley & Sons.
Running head: RETAIL CASE STUDY SUMMARY 1
AWS CUSTOMER SUCCESS 2
Retail Case Study Summary
Patrick Carrasquillo
University of Phoenix
Aviv Raveh
1/10/2022
AWS Customer Success
Volkswagen Group
The performance architecture of Volkswagen Group is to develop cloud architecture that accomplishes optimization of 3D models and automation of 3D data pipelines
.
The main issue is that the amount of 3D data that is needed for the procedure was too large for the available wireless VR headset to control. The retailer also tried to solve the issue of software management and to extract how users with applications can support numerous information pipelines from storage to application. Volkswagen gets prepared for the future in which its workers can access complicated AR/VR technology historically with comfortability and empower them to utilize VR environments that improve collaboration and productivity from any device. The outcomes of the result were effective, as it proved to be effective and simple to use AWS that contains native amenities while supporting architecture drafts and goals (aws. amazon, 2021).
The retailers face VR challenges, as no flexible and efficient architecture might remove the limitations of traditional VR systems such as exterior tracking tools, ropes, and workstations. The solutions related to these challenges were also found, as a proof-of-concept scheme of company stream pixels to VR devices directly in real and near the time by using NVIDIA CloudXR. AWS can aid GTR in creating performance architectures by improving infrastructure scalability, enhanced productivity of an employee, decreased prices of storage and computer, and acceleration of 3D information preparation. AWS Lambda is a server-less computer service that permits running code deprived of managing or provisioning servers, sustaining event incorporations, and creating cluster scaling logic.
Roche
Performance architecture mixed workplace, world, work, and worker in the system model. Organization can be examined as a dynamic scheme where each component influences each other component and aligns with all scheme components to attain the wanted findings(AWS.amazon, 2021). The issue retailers desire to solve is managing bed shortages in ICU and delaying inpatient care. There is also a need for technology, as healthcare specialists require virtualization to sustain the continuation of care and reduce the influence of COVID-19 pandemic concerned interruptions on patients with cancer, coronary artery disease, and COPD.
The solution for Roche is to develop scalable, cloud-based, and secure solutions to increase virtualization in care. Virtualization makes healthcare sectors more patient-centric and accessible as it delivers an opportunity to design a care distribution and leverage cloud-based solutions again. There is a requirement to sustain the continuation of care for cancer patients during the coronavirus pandemic, as Roche designed a cloud-based workflow invention to integrate patient information for care teams that determine optimum plans of treatment deprived of meetings personally. Similarly, cloud-based solutions and NAVIFY Symptom Tracker support solutions that specialists utilize to trail coronavirus patients recovering at home and others at danger for integrating self-documented information. Lastly, AWS can aid GTR to create presentation architectures based on consequences for the retailers. NAVY solutions can be made on AWS; Roche could ensure scalability, application integration, computing capacity, and security. These solutions are also a chief stage in enhancing engagement and accessibility of patients as well as confirming the continuation of care through the COVID-19 pandemic.
Intend
The performance architecture of CineSend is to stream content to users all over the world, as it also utilizes Amazon CloudFront as a content distribution network service constructed for developer suitability, security, and performance. Intend firstly targeted the video solution to filmmakers and focused on expanding the technology to support industries. The company is also a supplier of video security and antipiracy while possessing obvious watermark technology (AWS.amazon, 2021). Piracy Detector also distributes the analytics to aid creators in comprehending the media presentation and the return of content on investment. The company also selects AWS amenities to improve offerings that desire to utilize tools like Media Convert. It proved to be robust as compared to the offering of the provider.
Intend utilizes Amazon to encrypt information to show the clients that their content is accessible, secure, and safe once required. The security level is crucial for clients that in controlled industries offer monetary services. The major monetary institution that CineSend uses is to distribute customized programs for high-net-worth clients. AWS has various advantages, such as securing the video to users, aiding higher education clients to stream video content to pupils, and transcoding videos in seconds and minutes. It would also aid to unlock one thousand precepts video streaming growth of business in 2020 and secure the consumer information at rest. CineSend can also examine a rising demand for video-based and new marketing initiatives based on solutions like campaigns for aviation.
.
References
AWS.amazon. (2021). intend Grows Video Streaming Business by 1,000% with Secure Content Delivery Solution Built on AWS. Retrieved from us. Amazon: https://aws.amazon.com/solutions/case-studies/cinesend-case-study/
AWS.amazon. (2021). Roche Builds Personalized Healthcare Virtualization Solutions on AWS. Retrieved from aws.amazon: https://aws.amazon.com/solutions/case-studies/roche-case-study-video/?did=cr_card&trk=cr_card
Aws.amazon. (2021). Volkswagen Group Accelerates 3D Data Preparation and Remote Rendering for VR on AWS. Retrieved from us. Amazon: https://aws.amazon.com/solutions/case-studies/volkswagen-vr-ar/?did=cr_card&trk=cr_card
.
Running head: CLOUD SECURITY 1
CLOUD SECURITY 5
Cloud Security
Patrick Carrasquillo
University of Phoenix
Aviv Raveh
1/24/2022
Cloud Security
Interaction between more than bodies or persons presenting a similar type of action ensures the item’s creation. The participation of these systems might form an instinct and separate component of the product and participation that might not be distinct from other people. It squashes the risks that impede performance and concentration. The paper focuses on discussing the uniqueness of the shared responsibility model to the cloud environment, the shared responsibility model in cloud security, and the way security services aid to mitigate risks.
Shared Responsibility Model in Cloud Security
The shared responsibility model is a cloud security model that orders the security obligations of cloud computing providers and their users to assure responsibility. Various team members in the organization are accountable for cloud security, such as infrastructure team members, compliance team, apps team, security team, and network team (Demissie & Ranise, 2021). Cloud security is accountability between the wider organization and its cloud seller. Cloud is accountable for the protection of the cloud, and the consumers are accountable for protection in the cloud. Moreover, the cloud provider is also accountable for creating an infrastructure that can reliably and securely built-in a platform.
Why Shared Responsibility Model is Unique to Cloud Environment
The shared responsibility model is unique to the cloud environment because the cloud provider is accountable for cloud security and customers are accountable for cloud protection. There is shared accountability between user and CSP, as security for items like physical protection, network regulation, and information classification require clear possessors. Software-as-a-Service created accountability on CSP, as CSP organized the whole applications and infrastructure. Clients are accountable for organizing information and recognition permission.
Common Security Threats in Cloud Environment that GTR would desire to consider
Cloud computing endures to transfer the method by which firms utilize, store, and share information, workloads, and applications. It has given a host of new security challenges and threats. The security threats in the cloud environment must be considered unauthorized access, insecure APIs, and lack of visibility. The on-premises infrastructure deploys network and access to the public interest. Insecure APIs deliver various interfaces for clients. It causes problems if a consumer has not had appropriate security for cloud-based infrastructure. Various persons have weak passwords and reuse passcodes. Account hijacking is a serious issue of cloud security that depends on cloud-based infrastructure and apps of functions of the business. Cloud-based infrastructure is approachable from the internet that is not secured and deals with valuable and sensitive information. Cloud is utilized by various organizations, as successful attacks might be repeated various times with success. Cloud deployment of organizations is also a target of cyberattacks. Cloud is important for the capability of organizations to perform business.
Three Security Services
The security services are explained below:
Authentication
The assurance that is communicating an object that claims to remain in connection in authorized linkage delivers self-assurance. Information origin authentication ensures that the receipt information is requested (Lanz, 2021).
Data Confidentiality
It is regarding securing information against unauthorized, unlawful and unintentional theft. Confidentiality is concerned with privacy comprising authorization to examine, share and use information (Hong et al., 2018). Data with confidentiality concerns might be focused on the public and beyond the audience. For instance, information with higher confidentiality concerns comprises passcodes that should be confidential to secure accounts and systems and social protection schemes that remain confidential to secure recognized theft (Bharadwaj et al., 2018).
Access Control
It includes security of illegal usage of resources such as service regulations which have approach to resource beneath what situations can happen and what access the permitted capitals. It is a basic part of data security that follows permitted usage and access to resources and information of the company. Policies under access control assure proper access to the organization’s data.
How Security Services would aid to Mitigate Threats
Various security services can help to mitigate threats. There are various security threats; some are malicious because of negligence. Malicious risks might be recognized by workers’ behavior, such as trying to hoard information (Bruma, 2021). Monitoring solutions can be used to recognize and arrange the information that cannot be an important resource for trailing the cyber-attack sources.
Conclusion
It is concluded that the cloud provider is accountable for the protection of the cloud and comprises protection at network service layers, computation, and storage. Clients are accountable for protecting and organizing the operating systems, virtual machines, and networks in which clients also secure and organize data, interfaces, and applications. Various team members in an organization might be accountable for cloud protection and share accountability among wider sellers and organizations.
References
Demissie, B. F., & Ranise, S. (2021, September). Assessing the Effectiveness of the Shared Responsibility Model for Cloud Databases: the Case of Google’s Firebase. The 2021 IEEE International Conference on Smart Data Services (SMDS) (pp. 121-131). IEEE.
Brumă, L. M. (2021, August). Cloud security audit–issues and challenges. In 2021 16th International Conference on Computer Science & Education (ICCSE) (pp. 263-266). IEEE.
Bharadwaj, D. R., Bhattacharya, A., & Chakkaravarthy, M. (2018, November). Cloud threat defense–A threat protection and security compliance solution. In 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 95-99). IEEE.
Hong, S., Srivastava, A., Shambrook, W., & Dumitraș, T. (2018). Go serverless: Securing cloud via serverless design patterns, in 10th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 18).
Lanz, J. (2021). Cloud Computing: Friend or Foe?. The CPA Journal, 91(6/7), 24-29.
5
AWS
Reference
Table For Users
Patrick Carrasquillo
University of Phoenix
BAS/531
Aviv Raveh
01/31/2022
Reference Table
Resource Type |
Description |
Beneficiaries |
Link |
AWS Analyst Reports |
These are reports written by experts to offer investors and other stakeholders the guidance they need as they seek to understand various industry issues involving cloud platforms and the fundamental role played by AWS. The reports focus on various topics like machine learning, infrastructure, and telecommunications. |
Investors. Researchers. AWS Stakeholders. |
https://aws.amazon.com/resources/analyst-reports |
AWS Executive Insights |
These are insights provided by industry leaders regarding how cloud innovation and transformation can be achieved via leadership, talent, and culture (AWS, 2021). |
Organizational Leaders. Researchers. Students. |
https://aws.amazon.com/executive-insights/?nc2=h_ql_exm_exi |
AWS Architecture Center |
This resource offers reference architecture diagrams, well-architected best practices, and vetted architecture solutions, among others (AWS, 2021). |
IT Professionals. AWS Customers. |
https://aws.amazon.com/architecture/?nc2=h_ql_exm_arc |
AWS Documentation |
This resource allows people to access user guides, API references, developer guides, and tutorials, among others (AWS, 2021). |
Technical researchers. AWS Customers. |
https://docs.aws.amazon.com/index.html?nc2=h_ql_exm_doc |
AWS Whitepapers & Guides |
This resource provides AWS technical content to help one expand his/her knowledge regarding the cloud. It contains reference architecture diagrams, reference material, technical guides, and technical whitepapers. |
Technical researchers.
Educators. Students. |
https://aws.amazon.com/whitepapers/?nc2=h_ql_exm_wp |
AWS Educate |
This resource connects students from more than 200 countries around the world, it ensures students can access pertinent information necessary to enhance their skills as they pursue cloud-related careers. Also, this resource connects companies with qualified student job seekers. |
Students pursuing careers related to cloud-functions. Companies seeking to hire student job seekers. |
https://aws.amazon.com/education/awseducate/?nc2=h_ql_exm_edu |
Reference
AWS. (2021). Resources. Amazon Web Services.
https://aws.amazon.com/?nc2=h_lg
MIGRATING TO CLOUD
Patrick Carrasquillo
University of Phoenix
Aviv Raveh
1/17/2022
Introduction
Cloud migration
Is the process of moving applications, data or other business aspects to the cloud (Fahmideh et al., 2018)
Operational drivers that cause migration
One of the most prevalent motivations for companies to move to the cloud is to save money on IT infrastructure. IT leaders may simply right-size computer resources based on specific operational needs in the cloud, reducing wasted spending.
3
Reducing operational costs (Li & Sun, 2020)
1
Improving operational security
2
Leveraging new operational technologies
3
Operational drivers that cause migration cont…
Improvements in IT agility, or the ability of IT to be more responsive to business demands and respond more quickly to market developments, are the most important technological drivers for 66 percent of organizations globally. Since a result of SaaS technology, this aim is particularly reachable in a cloud environment, as the IT department is no longer need to be distracted with conventional application administration activities. It is also simpler to upgrade and replace cloud technology in order to fit changing company requirements. Having said that, it’s crucial to recognize that the cloud environment necessitates the development of a new set of IT skills in the areas of management and brokering of these goods. Additionally, although more agility can be beneficial to the internal customer experience by facilitating the introduction of new technology that users desire, it can also be detrimental to it by reducing IT’s capacity to give professional assistance to users.
4
Enhancing
Enhancing operational efficiency
Improving
Improving agility (Li & Sun, 2020)
Improving
Improving collaboration in teams
Operational drivers that cause migration cont…
As cloud computing becomes more widely available, self-configurable, and cost efficient, a growing number of businesses are turning to it for their needs. With remote working becoming increasingly popular among businesses, cloud computing is empowering employees to work from any location, at any moment, and on any device. Mobility has emerged as a crucial driver of Cloud adoption in recent years, thanks to the maturity and acceptance of the smart mobile device industry in recent years. In the coming weeks and months, it is projected that more and more businesses will join the race to introduce new Cloud computing solutions of all kinds in order to become more efficient and acquire a competitive edge.
5
Enforcing operational mobility
Creating new operational avenues (Li & Sun, 2020)
Improving productivity
Stages of cloud adoption
In most cases, the organizations that use this book are in the “Project” stage of cloud adoption, throughout which they are beginning with a small number of employees and a few initiatives to gain an understanding of how they may use the cloud to solve a business requirement. As soon as a company has realized some benefit from the cloud through the deployment of a few projects in production, the company tends to progress to the “Foundation” stage, in which the company makes more extensive investments in its people, processes, and cloud foundation in order to scale cloud adoption throughout the company with the aim of realizing even greater business benefits. Migration follows which ensures data and other organizational applications are moved to the cloud. Optimization and reinvention follows which ensures the organization keeps adapting to changes in its environment.
6
Project
Foundation
Migration
Optimization and reinvention (Fahmideh et al., 2018)
The migration process
A critical initial step in preparing for data migration onto a publicly accessible cloud is determining the use case that will be accommodated by the service provider’s public cloud. Important at this stage is the evaluation of the current environment and the identification of elements that will influence the migration, such as the presence of vital application data and legacy data, as well as application compatibility. It is also vital to understand how much you rely on information. Determining these requirements will assist you in developing a solid plan for the tools you’ll need during the migration process, including trying to identify which information needs to be migrated and when, whether the data requires any scrubbing, the type of destination volumes to use, and whether you’ll require encryption of the data both at rest and in transit, among other things. After your environment has been evaluated and a migration strategy has been developed, it is required to carry out the migration. The most difficult task here is to complete your migration with the least amount of disturbance to normal operations, at the lowest possible cost, and in the shortest amount of time. As soon as the data has been sent to the cloud, it is critical to guarantee that it is properly optimized, safe, and easily retrievable in the future. This tool also aids in the monitoring of real-time changes to essential infrastructure as well as the forecasting of workload contention.
7
Cloud migration planning
Defining business case
Data migration
Monitoring and maintenance (Ahmad et al., 2018)
The process include;
Common migration strategies
Lift and shift, often known as rehosting, is the process of removing servers or apps from their existing hosting environment and moving them to a facilities in the public cloud. Rehosting and lift and shift are popular migration strategies for firms that are just getting started on their migration journey. Lift and shift are altered as a result of replatforming. During the migration step, replatforming makes adjustments to the application to make it more efficient. Drop end shop is a term used to describe the act of repurchasing anything. This refers to the choice made by the business to switch to a different product, which may entail terminating existing license and restructuring services on a new platform or service, among other things. Refactoring and rearchitecting are generally motivated by a great desire to improve the quality of services provided. The reason for this might be that it is impossible to enhance the present environment, or that it is necessary to increase availability and dependability promptly in order to fulfill certain security and compliance standards. During the course of a cloud migration project, you may wish to keep some aspects of the IT portfolio. However, there are certain apps that you aren’t quite ready for migration to the cloud and would choose to maintain on-premises instead. If company find itself in this situation, it makes sense to keep certain components of the IT services in their present environment and undertake a mixed or part migration approach to replace them.
8
Rehosting (Ahmad et al., 2018)
Repurchasing
Replatforming
Refactoring
Retire
Retain
Migration strategy useful for the organization
Rehost
This strategy is beneficial as it will allow;
Shifting applications to the cloud
Less resistance
Scalability
Stages of cloud adoption diagram
10
Project
Foundation
Migration
Optimization and reinvention
The migration process diagram
11
Cloud migration planning
Defining business case
Data migration
Monitoring and maintenance
References
Ahmad, N., Naveed, Q. N., & Hoda, N. (2018). Strategy and procedures for Migration to the Cloud Computing. 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS). https://doi.org/10.1109/icetas.2018.8629101
Deighton, T., & Wakefield, M. (2020). Keep security top of mind when moving into the cloud. Network Security, 2020(6), 17–19. https://doi.org/10.1016/s1353-4858(20)30069-6
Fahmideh, M., Daneshgar, F., Rabhi, F., & Beydoun, G. (2018). A generic cloud migration process model. European Journal of Information Systems, 28(3), 233–255. https://doi.org/10.1080/0960085x.2018.1524417
Li, S., & Sun, W. (2020). Utility maximisation for resource allocation of migrating enterprise applications into the cloud. Enterprise Information Systems, 1–33. https://doi.org/10.1080/17517575.2020.1730445