Need some help with an assignment

Write a 1-page executive summary.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Details of the assignment have been uploaded.

Thank you! 


Assignment Content

Top of Form

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

GTR is very pleased with the solutions you have provided thus far. 

Write a 1-page executive summary to include with your prior work. Include any recommendations to help your leadership team feel comfortable with taking the final step toward migrating to cloud from your current dispersed on-premises server architecture.

 Compile your prior work into one document and submit it with the executive summary.

All prior work has been uploaded as well.

Bottom of Form

Cite all sources in APA and give attribution where appropriate. 

Thank you for your help!

Running Head: EVALUATION 1

EVALUATION 6

Evaluation Report

Patrick M. Carrasquillo

University of Phoenix

BSA/531

Aviv Raveh

12/20/2021

Reasons for Switching to Cloud Architecture

Many organizations have decided to embrace Bring Your Own Device (BYOD) methodology, in which companies allow employees to bring and use their own devices for work. This decreases the cost of new machine deployment but also creates several issues that cloud computing can solve (McHaney, 2021). The biggest of these issues that arises is your ability to maintain a unified IT environment for your company when you don’t control the device. With cloud services, this issue becomes null and void, as the user simply needs to download the corresponding app on their mobile devices or go to a web browser on their PC/Mac to access the cloud application.

The fact that IT experts are hard to find as well as expensive, many companies don’t employ an IT professional or consultant, they struggle with putting the same technology in place that larger companies can employ putting those small companies at a disadvantage. Most small companies will not think about trying to deploy a server and complicated infrastructure, because they won’t have the staff to maintain it, but it is a necessary evil for many on premise technologies. With cloud services any company can find a cloud-based software that is similar to or better than the on-premises technology that they are thinking about deploying. That software, server, and security is all maintained by the cloud software vendor allowing a small company enterprise level technology without needing an entire IT staff.

Resilient Architectures

In cloud computing, resilient architecture is a cloud computing design that can deal with errors during operation and to deal with an incorrect entry. Resilience can cover many areas of computing, such as programming, machine learning as well as safety. A design that does not lock easily or is not affected by a single application failure (Drayer, 2018). A design that recovers quickly or resists well in exceptional circumstances a design that is not completely affected by an error in one aspect of it. A design that offers a wide range of capabilities.

Designing resilient architecture within an organization helps in minimizing downtime by two-thirds. Resilient architecture ensures systems functionality regardless of minimum errors. It creates a conducive working environment where people can work with minimum destructions. In cloud computing, any application that can fail without affecting the entire system or other applications can be said to be resilient.

Purpose of AWS

Amazon Web Services (AWS) is set of on-demand services offered for business, personal use, and for government project where one pay what he uses. It is a subsidiary of Amazon which is helping individuals, large- and small-scale businesses to build scalable and reliable applications/services.

Instead of buying new servers or add more servers for your application/service and set up an infrastructure on premise, you can simply deploy your whole infrastructure directly on the cloud, so that you don’t have to worry about scaling in or scaling out servers for your application, AWS does it for you (Wittig, 2018). It is a similar service to Azure and

Google

Cloud. They provide a wide range of services which comes under domains such as Storage, compute, networking, security, monitoring, developer tools, etc.

Your alternative to such a platform (and there are others) is to buy servers and co-locate them in data centers. Easy enough to do but you get to add months upon months to your planned growth, and you’ll have to own them, and you’ll have to pay various taxes on them (like personal property tax) and you’ll have to be the one to figure out what to do with them when they are done.

How AWS Helps Design Resilient Architectures

AWS services are designed with functional resiliency mind, yet you are liable for the engineering and design. While functional resiliency can be confounded, AWS can make itemized processes more straightforward to make do. Outfitted with the right AWS administrations, associations can accomplish ideal IT flexibility and accessibility with comprehensive planning. AWS can be installed to make it simpler for teams to find shortcomings in their surroundings at scale. This feature helps team with taking on an “everything flops at last” outlook, which will help them with focusing on resilient plan designs.

Advantages of AWS

AWS resources (storage, database, etc.) are replicated in several availability zone (geographically spread data centers) in a way that a power outage, fire or natural disaster occurring in a data center, will not cause any data loss nor service interruption because the replicas will be automatically replacing the “broken” node(s).

AWS provides top notch features across different industries, systems, applications, as well as business processes to meet objectives (McHaney, 2021). In a local data center, you will have to take care of data encryption, keys management, hacker attacks, physical access protection of the computer room, etc. In AWS even the communication among servers within the AWS intranet is encrypted and keys are dynamically rotated so even in case of breach of one server no further servers will be affected.

Disadvantages of AWS

AWS tries to optimize for their AWS based platform solutions, if you depend too much on them, it is not easy to shift. This is not a real problem but the more of their service you use the more the cost adds up. Optimizing managed services cost i.e., your cloud bill may be high as your utilization may be below 20%, This would require some real engineering, measuring, and tuning /scheduling to bump it up. Some cases AWS Lambda would save you money and in some cases it will not (Derry, 2019). Some cases auto-scaling will save you money and some cases it will not. This optimization could be a big headache and you could spend big bucks on cloud services if you are not careful about all these scaling up instances.

Competitors

Competitor

Strengths

Weaknesses

Microsoft Azure

· Easy to use and install

· Compatible with many platforms

· Allow maximization of idle capacity

· Few payment options

Alibaba Cloud

· Provides an exclusive range of cloud computing products/ and services

· Alibaba Cloud is committed to the highest levels of compliance including PCI DSS, HIPAA and GDPR.

· Expensive to Install

· High monthly charges

Google

· Higher Productivity owing to Quick Access to Innovation

· It’s cheap as compared to other cloud platforms

· Fewer features as compared to other cloud platforms

· It’s difficult to start and have small components

Reference

Derry, R. (2019). AWS: Amazon web services: The complete guide from beginners for Amazon web services. Independently Published.

Wittig, M., & Wittig, A. (2018). Amazon web services in action. Pearson Professional.

Drayer, E. (2018). Resilient operation of distribution grids with distributed-hierarchical architecture. kassel university press GmbH.

McHaney, R. (2021). Cloud technologies: An overview of cloud computing technologies for managers. John Wiley & Sons.

Running head: RETAIL CASE STUDY SUMMARY 1

AWS CUSTOMER SUCCESS 2

Retail Case Study Summary

Patrick Carrasquillo

University of Phoenix

Aviv Raveh

1/10/2022

AWS Customer Success

Volkswagen Group

The performance architecture of Volkswagen Group is to develop cloud architecture that accomplishes optimization of 3D models and automation of 3D data pipelines

.

The main issue is that the amount of 3D data that is needed for the procedure was too large for the available wireless VR headset to control. The retailer also tried to solve the issue of software management and to extract how users with applications can support numerous information pipelines from storage to application. Volkswagen gets prepared for the future in which its workers can access complicated AR/VR technology historically with comfortability and empower them to utilize VR environments that improve collaboration and productivity from any device. The outcomes of the result were effective, as it proved to be effective and simple to use AWS that contains native amenities while supporting architecture drafts and goals (aws. amazon, 2021).

The retailers face VR challenges, as no flexible and efficient architecture might remove the limitations of traditional VR systems such as exterior tracking tools, ropes, and workstations. The solutions related to these challenges were also found, as a proof-of-concept scheme of company stream pixels to VR devices directly in real and near the time by using NVIDIA CloudXR. AWS can aid GTR in creating performance architectures by improving infrastructure scalability, enhanced productivity of an employee, decreased prices of storage and computer, and acceleration of 3D information preparation. AWS Lambda is a server-less computer service that permits running code deprived of managing or provisioning servers, sustaining event incorporations, and creating cluster scaling logic.

Roche

Performance architecture mixed workplace, world, work, and worker in the system model. Organization can be examined as a dynamic scheme where each component influences each other component and aligns with all scheme components to attain the wanted findings(AWS.amazon, 2021). The issue retailers desire to solve is managing bed shortages in ICU and delaying inpatient care. There is also a need for technology, as healthcare specialists require virtualization to sustain the continuation of care and reduce the influence of COVID-19 pandemic concerned interruptions on patients with cancer, coronary artery disease, and COPD.

The solution for Roche is to develop scalable, cloud-based, and secure solutions to increase virtualization in care. Virtualization makes healthcare sectors more patient-centric and accessible as it delivers an opportunity to design a care distribution and leverage cloud-based solutions again. There is a requirement to sustain the continuation of care for cancer patients during the coronavirus pandemic, as Roche designed a cloud-based workflow invention to integrate patient information for care teams that determine optimum plans of treatment deprived of meetings personally. Similarly, cloud-based solutions and NAVIFY Symptom Tracker support solutions that specialists utilize to trail coronavirus patients recovering at home and others at danger for integrating self-documented information. Lastly, AWS can aid GTR to create presentation architectures based on consequences for the retailers. NAVY solutions can be made on AWS; Roche could ensure scalability, application integration, computing capacity, and security. These solutions are also a chief stage in enhancing engagement and accessibility of patients as well as confirming the continuation of care through the COVID-19 pandemic.

Intend

The performance architecture of CineSend is to stream content to users all over the world, as it also utilizes Amazon CloudFront as a content distribution network service constructed for developer suitability, security, and performance. Intend firstly targeted the video solution to filmmakers and focused on expanding the technology to support industries. The company is also a supplier of video security and antipiracy while possessing obvious watermark technology (AWS.amazon, 2021). Piracy Detector also distributes the analytics to aid creators in comprehending the media presentation and the return of content on investment. The company also selects AWS amenities to improve offerings that desire to utilize tools like Media Convert. It proved to be robust as compared to the offering of the provider.

Intend utilizes Amazon to encrypt information to show the clients that their content is accessible, secure, and safe once required. The security level is crucial for clients that in controlled industries offer monetary services. The major monetary institution that CineSend uses is to distribute customized programs for high-net-worth clients. AWS has various advantages, such as securing the video to users, aiding higher education clients to stream video content to pupils, and transcoding videos in seconds and minutes. It would also aid to unlock one thousand precepts video streaming growth of business in 2020 and secure the consumer information at rest. CineSend can also examine a rising demand for video-based and new marketing initiatives based on solutions like campaigns for aviation.

.

References

AWS.amazon. (2021). intend Grows Video Streaming Business by 1,000% with Secure Content Delivery Solution Built on AWS. Retrieved from us. Amazon: https://aws.amazon.com/solutions/case-studies/cinesend-case-study/

AWS.amazon. (2021). Roche Builds Personalized Healthcare Virtualization Solutions on AWS. Retrieved from aws.amazon: https://aws.amazon.com/solutions/case-studies/roche-case-study-video/?did=cr_card&trk=cr_card

Aws.amazon. (2021). Volkswagen Group Accelerates 3D Data Preparation and Remote Rendering for VR on AWS. Retrieved from us. Amazon: https://aws.amazon.com/solutions/case-studies/volkswagen-vr-ar/?did=cr_card&trk=cr_card

.

Running head: CLOUD SECURITY 1

CLOUD SECURITY 5

Cloud Security

Patrick Carrasquillo

University of Phoenix

Aviv Raveh

1/24/2022

Cloud Security

Interaction between more than bodies or persons presenting a similar type of action ensures the item’s creation. The participation of these systems might form an instinct and separate component of the product and participation that might not be distinct from other people. It squashes the risks that impede performance and concentration. The paper focuses on discussing the uniqueness of the shared responsibility model to the cloud environment, the shared responsibility model in cloud security, and the way security services aid to mitigate risks.


Shared Responsibility Model in Cloud Security

The shared responsibility model is a cloud security model that orders the security obligations of cloud computing providers and their users to assure responsibility. Various team members in the organization are accountable for cloud security, such as infrastructure team members, compliance team, apps team, security team, and network team (Demissie & Ranise, 2021). Cloud security is accountability between the wider organization and its cloud seller. Cloud is accountable for the protection of the cloud, and the consumers are accountable for protection in the cloud. Moreover, the cloud provider is also accountable for creating an infrastructure that can reliably and securely built-in a platform.


Why Shared Responsibility Model is Unique to Cloud Environment

The shared responsibility model is unique to the cloud environment because the cloud provider is accountable for cloud security and customers are accountable for cloud protection. There is shared accountability between user and CSP, as security for items like physical protection, network regulation, and information classification require clear possessors. Software-as-a-Service created accountability on CSP, as CSP organized the whole applications and infrastructure. Clients are accountable for organizing information and recognition permission.


Common Security Threats in Cloud Environment that GTR would desire to consider

Cloud computing endures to transfer the method by which firms utilize, store, and share information, workloads, and applications. It has given a host of new security challenges and threats. The security threats in the cloud environment must be considered unauthorized access, insecure APIs, and lack of visibility. The on-premises infrastructure deploys network and access to the public interest. Insecure APIs deliver various interfaces for clients. It causes problems if a consumer has not had appropriate security for cloud-based infrastructure. Various persons have weak passwords and reuse passcodes. Account hijacking is a serious issue of cloud security that depends on cloud-based infrastructure and apps of functions of the business. Cloud-based infrastructure is approachable from the internet that is not secured and deals with valuable and sensitive information. Cloud is utilized by various organizations, as successful attacks might be repeated various times with success. Cloud deployment of organizations is also a target of cyberattacks. Cloud is important for the capability of organizations to perform business.


Three Security Services

The security services are explained below:

Authentication

The assurance that is communicating an object that claims to remain in connection in authorized linkage delivers self-assurance. Information origin authentication ensures that the receipt information is requested (Lanz, 2021).

Data Confidentiality

It is regarding securing information against unauthorized, unlawful and unintentional theft. Confidentiality is concerned with privacy comprising authorization to examine, share and use information (Hong et al., 2018). Data with confidentiality concerns might be focused on the public and beyond the audience. For instance, information with higher confidentiality concerns comprises passcodes that should be confidential to secure accounts and systems and social protection schemes that remain confidential to secure recognized theft (Bharadwaj et al., 2018).

Access Control

It includes security of illegal usage of resources such as service regulations which have approach to resource beneath what situations can happen and what access the permitted capitals. It is a basic part of data security that follows permitted usage and access to resources and information of the company. Policies under access control assure proper access to the organization’s data.


How Security Services would aid to Mitigate Threats

Various security services can help to mitigate threats. There are various security threats; some are malicious because of negligence. Malicious risks might be recognized by workers’ behavior, such as trying to hoard information (Bruma, 2021). Monitoring solutions can be used to recognize and arrange the information that cannot be an important resource for trailing the cyber-attack sources.


Conclusion

It is concluded that the cloud provider is accountable for the protection of the cloud and comprises protection at network service layers, computation, and storage. Clients are accountable for protecting and organizing the operating systems, virtual machines, and networks in which clients also secure and organize data, interfaces, and applications. Various team members in an organization might be accountable for cloud protection and share accountability among wider sellers and organizations.

References

Demissie, B. F., & Ranise, S. (2021, September). Assessing the Effectiveness of the Shared Responsibility Model for Cloud Databases: the Case of Google’s Firebase. The 2021 IEEE International Conference on Smart Data Services (SMDS) (pp. 121-131). IEEE.

Brumă, L. M. (2021, August). Cloud security audit–issues and challenges. In 2021 16th International Conference on Computer Science & Education (ICCSE) (pp. 263-266). IEEE.

Bharadwaj, D. R., Bhattacharya, A., & Chakkaravarthy, M. (2018, November). Cloud threat defense–A threat protection and security compliance solution. In 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 95-99). IEEE.

Hong, S., Srivastava, A., Shambrook, W., & Dumitraș, T. (2018). Go serverless: Securing cloud via serverless design patterns, in 10th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 18).

Lanz, J. (2021). Cloud Computing: Friend or Foe?. The CPA Journal, 91(6/7), 24-29.

5

AWS

Reference

Table For Users

Patrick Carrasquillo

University of Phoenix

BAS/531

Aviv Raveh

01/31/2022

Reference Table

Resource Type

Description

Beneficiaries

Link

AWS Analyst Reports

These are reports written by experts to offer investors and other stakeholders the guidance they need as they seek to understand various industry issues involving cloud platforms and the fundamental role played by AWS. The reports focus on various topics like machine learning, infrastructure, and telecommunications.

Investors.

Researchers.

AWS Stakeholders.

https://aws.amazon.com/resources/analyst-reports

AWS Executive Insights

These are insights provided by industry leaders regarding how cloud innovation and transformation can be achieved via leadership, talent, and culture (AWS, 2021).

Organizational Leaders.

Researchers.

Students.

https://aws.amazon.com/executive-insights/?nc2=h_ql_exm_exi

AWS Architecture Center

This resource offers reference architecture diagrams, well-architected best practices, and vetted architecture solutions, among others (AWS, 2021).

IT Professionals.

AWS Customers.

https://aws.amazon.com/architecture/?nc2=h_ql_exm_arc

AWS Documentation

This resource allows people to access user guides, API references, developer guides, and tutorials, among others (AWS, 2021).

Technical researchers.

AWS Customers.

https://docs.aws.amazon.com/index.html?nc2=h_ql_exm_doc

AWS Whitepapers & Guides

This resource provides AWS technical content to help one expand his/her knowledge regarding the cloud. It contains reference architecture diagrams, reference material, technical guides, and technical whitepapers.

Technical researchers.

Educators.

Students.

https://aws.amazon.com/whitepapers/?nc2=h_ql_exm_wp

AWS Educate

This resource connects students from more than 200 countries around the world, it ensures students can access pertinent information necessary to enhance their skills as they pursue cloud-related careers. Also, this resource connects companies with qualified student job seekers.

Students pursuing careers related to cloud-functions.

Companies seeking to hire student job seekers.

https://aws.amazon.com/education/awseducate/?nc2=h_ql_exm_edu

Reference

AWS. (2021). Resources. Amazon Web Services.

https://aws.amazon.com/?nc2=h_lg

MIGRATING TO CLOUD
Patrick Carrasquillo
University of Phoenix
Aviv Raveh
1/17/2022

Introduction

Cloud migration

Is the process of moving applications, data or other business aspects to the cloud (Fahmideh et al., 2018)

Operational drivers that cause migration

One of the most prevalent motivations for companies to move to the cloud is to save money on IT infrastructure. IT leaders may simply right-size computer resources based on specific operational needs in the cloud, reducing wasted spending.
3

Reducing operational costs (Li & Sun, 2020)
1
Improving operational security
2
Leveraging new operational technologies
3

Operational drivers that cause migration cont…

Improvements in IT agility, or the ability of IT to be more responsive to business demands and respond more quickly to market developments, are the most important technological drivers for 66 percent of organizations globally. Since a result of SaaS technology, this aim is particularly reachable in a cloud environment, as the IT department is no longer need to be distracted with conventional application administration activities. It is also simpler to upgrade and replace cloud technology in order to fit changing company requirements. Having said that, it’s crucial to recognize that the cloud environment necessitates the development of a new set of IT skills in the areas of management and brokering of these goods. Additionally, although more agility can be beneficial to the internal customer experience by facilitating the introduction of new technology that users desire, it can also be detrimental to it by reducing IT’s capacity to give professional assistance to users.
4

Enhancing

Enhancing operational efficiency

Improving

Improving agility (Li & Sun, 2020)

Improving

Improving collaboration in teams

Operational drivers that cause migration cont…

As cloud computing becomes more widely available, self-configurable, and cost efficient, a growing number of businesses are turning to it for their needs. With remote working becoming increasingly popular among businesses, cloud computing is empowering employees to work from any location, at any moment, and on any device. Mobility has emerged as a crucial driver of Cloud adoption in recent years, thanks to the maturity and acceptance of the smart mobile device industry in recent years. In the coming weeks and months, it is projected that more and more businesses will join the race to introduce new Cloud computing solutions of all kinds in order to become more efficient and acquire a competitive edge.
5

Enforcing operational mobility

Creating new operational avenues (Li & Sun, 2020)

Improving productivity

Stages of cloud adoption

In most cases, the organizations that use this book are in the “Project” stage of cloud adoption, throughout which they are beginning with a small number of employees and a few initiatives to gain an understanding of how they may use the cloud to solve a business requirement. As soon as a company has realized some benefit from the cloud through the deployment of a few projects in production, the company tends to progress to the “Foundation” stage, in which the company makes more extensive investments in its people, processes, and cloud foundation in order to scale cloud adoption throughout the company with the aim of realizing even greater business benefits. Migration follows which ensures data and other organizational applications are moved to the cloud. Optimization and reinvention follows which ensures the organization keeps adapting to changes in its environment.
6

Project

Foundation

Migration

Optimization and reinvention (Fahmideh et al., 2018)

The migration process

A critical initial step in preparing for data migration onto a publicly accessible cloud is determining the use case that will be accommodated by the service provider’s public cloud. Important at this stage is the evaluation of the current environment and the identification of elements that will influence the migration, such as the presence of vital application data and legacy data, as well as application compatibility. It is also vital to understand how much you rely on information. Determining these requirements will assist you in developing a solid plan for the tools you’ll need during the migration process, including trying to identify which information needs to be migrated and when, whether the data requires any scrubbing, the type of destination volumes to use, and whether you’ll require encryption of the data both at rest and in transit, among other things. After your environment has been evaluated and a migration strategy has been developed, it is required to carry out the migration. The most difficult task here is to complete your migration with the least amount of disturbance to normal operations, at the lowest possible cost, and in the shortest amount of time. As soon as the data has been sent to the cloud, it is critical to guarantee that it is properly optimized, safe, and easily retrievable in the future. This tool also aids in the monitoring of real-time changes to essential infrastructure as well as the forecasting of workload contention.
7

Cloud migration planning

Defining business case

Data migration

Monitoring and maintenance (Ahmad et al., 2018)

The process include;

Common migration strategies

Lift and shift, often known as rehosting, is the process of removing servers or apps from their existing hosting environment and moving them to a facilities in the public cloud. Rehosting and lift and shift are popular migration strategies for firms that are just getting started on their migration journey. Lift and shift are altered as a result of replatforming. During the migration step, replatforming makes adjustments to the application to make it more efficient. Drop end shop is a term used to describe the act of repurchasing anything. This refers to the choice made by the business to switch to a different product, which may entail terminating existing license and restructuring services on a new platform or service, among other things. Refactoring and rearchitecting are generally motivated by a great desire to improve the quality of services provided. The reason for this might be that it is impossible to enhance the present environment, or that it is necessary to increase availability and dependability promptly in order to fulfill certain security and compliance standards. During the course of a cloud migration project, you may wish to keep some aspects of the IT portfolio. However, there are certain apps that you aren’t quite ready for migration to the cloud and would choose to maintain on-premises instead. If company find itself in this situation, it makes sense to keep certain components of the IT services in their present environment and undertake a mixed or part migration approach to replace them.
8

Rehosting (Ahmad et al., 2018)

Repurchasing

Replatforming

Refactoring

Retire

Retain

Migration strategy useful for the organization

Rehost

This strategy is beneficial as it will allow;

Shifting applications to the cloud

Less resistance

Scalability

Stages of cloud adoption diagram

10

Project

Foundation

Migration

Optimization and reinvention

The migration process diagram

11

Cloud migration planning

Defining business case

Data migration

Monitoring and maintenance

References
Ahmad, N., Naveed, Q. N., & Hoda, N. (2018). Strategy and procedures for Migration to the Cloud Computing. 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS). https://doi.org/10.1109/icetas.2018.8629101
Deighton, T., & Wakefield, M. (2020). Keep security top of mind when moving into the cloud. Network Security, 2020(6), 17–19. https://doi.org/10.1016/s1353-4858(20)30069-6
Fahmideh, M., Daneshgar, F., Rabhi, F., & Beydoun, G. (2018). A generic cloud migration process model. European Journal of Information Systems, 28(3), 233–255. https://doi.org/10.1080/0960085x.2018.1524417
Li, S., & Sun, W. (2020). Utility maximisation for resource allocation of migrating enterprise applications into the cloud. Enterprise Information Systems, 1–33. https://doi.org/10.1080/17517575.2020.1730445

Order a unique copy of this paper

600 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal

Order your essay today and save 25% with the discount code GREEN