28 Sep 2022

153

Virtualization and the Cloud Computing World

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 627

Pages: 2

Downloads: 0

The modern world is currently being continuously impacted by the rapid growth and advancements in technology. Not a single day passes without there being an innovation made in an area of information technology with the goal of solving life’s problem while increasing stability, interoperability, and efficiency. As a result, the future of Computing and Information Technology is greatly dependent on Infrastructure as a service (IaaS), Software as a service (SaaS), and Platform as a service (PaaS), the current technological models transforming the world today. 

Items that an organization’s IT / IS department should consider when an organization’s strategy calls for the use of SaaS, PaaS, or IaaS. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The concept of IaaS has it that instead of a user making a direct purchase of hardware, they can purchase service levels that will make it possible for them to keep track of, manage, and access all remote data infrastructures that are virtual. In a situation where an organizational strategy alignment requires it to make use of the IaaS architecture, then there are a number of items that are paramount. 

The company should begin by establishing a secure network connection, such as Virtual Private Networks (VPN), Wide Area Networks (WAN), and Local Area Networks (LAN), to facilitate the process of online hosting of infrastructure (Mahmood & Hill, 2011). 

Strong and advanced servers and computers are also very essential to ensure reliable availability of service. 

Also, sophisticated algorithms and firewalls must be considered to further enhance the security of the system. 

Ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI). 

The TCO for the cloud changes owing to the fact that the cloud changes the plan of action made by the IT department. In this case, distributed computing takes the data innovation warehouse and makes it a business administration. Besides, the TCO examination is of a multidimensional nature because of the fact that a cloud can be both a distinct option for and a component of in-house IT assets. The objective is to create particular results once you shift to the cloud. It is true that the cloud reduces capital expenses. However, there is no experimental proof to show that it will reduce the collective expense of proprietorship in the long run. 

Impact to the IT support personnel when an organization embarks on the strategy stated in Question 1. 

The IT provides choices to control, approach, and sourcing, and it bears a versatile considered set of administrations, which clients consider as having an enhanced cost proficiency , a consistent accessibility, a boundless limit, and expanded nimbleness. For the IT department to accomplish these qualities, then it is expected to move its conventional server-driven way to help it deal with a methodology that is more administration driven. 

Considerations that the organization’s management should be aware of. 

The firm must keep in mind the supplier’s Service Level Agreement (SLA) to help them create a good alignment with the service provider. 

The firm should also ensure that the workforce is enough and well trained to ensure successful implementation and integration of SaaS into the business activities (Vacca, 2013).  Any skill gaps will make it difficult for the firm to reap maximum benefits from SaaS. 

Finally, security is a very paramount consideration because cloud-related operations are exposed to countless vulnerabilities and threats and vulnerabilities (Vacca, 2013). 

Security issues that could arise from this type of an infrastructure. Use at least three quality resources in this assignment. 

Smoot & Tan (2011) state that network security is enhanced using advanced switches and strong firewalls in the traditional data centers. It is very important to secure networks in IaaS because communication within the system is continually increasing. When the network is not properly secured, then there might be a number of threats and vulnerabilities that are likely to compromise the company’s confidentiality (Smoot & Tan, 2011). Poor security architecture might also result in issues of reporting and eventing where teams will fire up virtual machines using self-service portals and this creates the need for an awareness of devices within the company’s infrastructure. Another security issue is related with Identity Management and Access Control (idAm) when dealing with Data and Service management issues within IaaS framework in the firm. 

References 

Mahmood, Z., & Hill, R. (Eds.). (2011).  Cloud Computing for enterprise architectures . Springer Science & Business Media. 

Smoot, S. R., & Tan, N. K. (2011).  Private cloud computing: consolidation, virtualization, and service-oriented infrastructure . Elsevier. 

Vacca, J. R. (2013).  Network and system security . Rockland, MA: Syngress. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Virtualization and the Cloud Computing World.
https://studybounty.com/virtualization-and-the-cloud-computing-world-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration