The SoftArc Engineering Company wants to provide access of office automation to the staffs of civil engineering. The facility of office automation can be provided by utilizing either cloud computing or business intelligence (Almorsy, Grundy & Muller, 2016). These technologies will be helpful in accessing the automation system of the organization in context to word processing, spreadsheet capabilities, online storage board as well as emails. These technologies are considered advantageous for the SoftArc Engineering Company but it is analyzed that inappropriate utilization of this technologies creates numerous challenges for the organization.
Benefits as well as disadvantages of Cloud computing is elaborated below:
Benefits:
Rapid Elasticity: The vendors of cloud help in providing numerous range of virtual storage as well as inestimable on demand resources for its different users (Bacon et al., 2014).The various consumers of the system do not have to spend much time on forecasting various resources.
Cost efficiency: With the utilization of cloud computing, the consumers can share their resources. Depending on both the demand as well as requirement, the vendors are able to forward the cost-efficiency to the various consumers.
Recovery: It is identified that cloud computing helps in providing proper data recovery or data backup facility (Bruneo, 2014). If any significant data related with the organization will get lost then they can be recovered easily.
Challenges:
Problem with change management: Sudden and inappropriate change in the platform are very much difficult to handle and as a result they creates number of issues.
Control issues: The services, which are provided with the help of cloud, computing cannot be handled appropriately by the in-house staff and as a result number of problems related with control rises.
Bandwidth issues: The consumers of the organization need to plan efficiently for performing properly (Huo et al., 2016). t is identified that if in a small data centre, huge amount of servers as well as storage are stored then number of issues related with bandwidth rises.
The problems as well as benefits of business intelligence are provided below:
Benefits: The business intelligence technology can be utilized for data integration and one of the significant business intelligence tool, which is referred as Hadoop, helps in accessing various types of data from the server appropriately (Bahrami & Singhal, 2015). The technology is considered quite significant for business transformation. It can also be utilized in making proper decisions related to the consumers.
Problems: If the data that are required for integration increases, then number of issues associated with business intelligence arises. If the employees of the organization lacks proper experiences then numerous technical issues rises in the organization (Hashem et al., 2015). Security is also considered as one of the disadvantage. If the servers does not utilize proper authentication or security then number of problems arises.
It is analyzed that cloud-computing technology is considered as the most suitable as well as appropriate approach for the SoftArc Engineering organization. Cloud computing is considered as the most appropriate technology as it helps in enhancing both the revenue as well as quality of service of the organization at the same time (Furuncu & Sogukpinar, 2015). The staffs of the company can easily access the automation system of the organization without facing much challenges. The technology of cloud computing is considered beneficial as it helps in providing the recovery facility with which the organization can get data as well as information that they have lost earlier. Due to all this advantages, the organization “SoftArc Engineering” is suggested to utilize the technology of cloud computing.
The differences are illustrated below:
Accessibility: The infrastructure, which is provided with the help of IaaS provider, is one of the most superior infrastructures. It is analyzed that they provide easy accessibility as compared to other infrastructure (Jo et al., 2015). It plays an important role in enhancing as well as by making proper improvement by achieving proper amount of data.
Cost: It is analyzed that cost is one of the most important factor between the locally hosted infrastructures as well as between the infrastructures, which is provided by the utilization of IaaS provider (Kavis, 2014). It is identified that infrastructure that is provided with the utilization of IaaS cloud is considered to be most expensive. On the other hand, locally hosted infrastructures are very much cost effective in comparison to other infrastructures.
Security: It is analyzed that local hosted infrastructure assists in providing higher level of both privacy as well as security in comparison to the infrastructure that is provided with the help of IaaS Provider (Hwang et al., 2016). The different data as well as information, which are shared by the organization with the help of cloud services, does not provide appropriate security.
The critical issues as well as factors are illustrated below:
Improper flexibility: The various types of services as well as applications of IaaS infrastructure mainly run with the help of third party. Therefore the company must exercise proper control of execution on different hardware as well as software of the organization.
Technical problems: The SoftArc Engineering faces number of challenges due to the IaaS provider. The problems include outrage as well as downtime (Lewis, 2013). It is identified that the issues, which are mainly related with connectivity as well as network, assists in creating the entire system useless without proper internet connectivity.
Privacy:
Enhanced Vulnerability: The various types of risks of hacking which can be done by the malicious hackers or users from authorized access enhances after migrating to an IaaS provider from the Web infrastructure.
Dependency on Vendor Lock in: The SoftArc Company should not depend on different services of cloud and if they are dependent, it is considered as an important concern (Wu et al., 2015). This concern is also known as vendor locks in and these problems, which are associated with dependency, must be resolved appropriately.
IaaS |
SaaS |
PaaS |
IaaS is abbreviated as infrastructure as a service which is mainly used in giving the facility of virtualized resources over the internet |
Software as a Service is defined as a model which is useful in delivering various types of applications over the internet as a service. The software can be accessed easily without paying much attention to installation as well as maintenance of software (Furuncu & Sogukpinar, 2015). |
PaaS is abbreviated as Platform as a Service which helps in delivering number of application on the internet. In the model of PaaS, the cloud provider generally helps in delivering both the software as well as hardware tools, which are generally required for the development of the application. |
In the model of IaaS, the hardware, server storage as well as software is hosted with the help of the third party provider (Huo et al., 2016). |
SaaS applications are also known as Web based software. The access of the application is managed by the provider, which include availability, security as well as performance. |
PaaS providers generally assist in hosting both the software as well as hardware on their own infrastructure. |
In IaaS, all the different resources are generally available in various form of services (Kavis, 2014). |
The users of the application does not have to worry about the various types of software updates as well as applications of hardware |
The billing procedure as well as subscription can be managed by utilizing various types of tools (Hashem et al., 2015). |
It helps in allowing various types of dynamic scaling that is basically dependent on the infrastructure of the cost. |
Integration as well as third party application can be only completed due to the help of the application programming (Hwang et al., 2016). |
It helps in offering various integrated web services as well as database. |
It is analyzed that IaaS is the most appropriate as well as suitable cloud model for the SoftArc Engineering. The IaaS is selected as it has the capability to include various numbers of users on a single platform. This model is considered to e ideal for the SoftArc Engineering Company as it assists in providing numerous applications for offering complete control (Wu et al., 2015).This model is not only suitable for start up business but it found to be proper for the various other business organization. It helps in meeting all the volatile demands that are associated with the volatile demands of the consumers. It is identified that each of the model of cloud computing has some unique feature but IaaS is selected for the SoftArc Engineering Company as the organization wants to move to 2013 SharePoint (Lewis,2013).Thus, it is analyzed that IaaS model is considered best for the organization.
The problems, which are identified by utilizing the IaaS model, include:
Security: security is considered the most significant challenge before the SoftArc Engineering Company with the adoption of IaaS model (Furuncu & Sogukpinar, 2015). This is because IaaS model does not helps in providing proper authentication as well as security to the various data and information, which are stored in the servers of the organization.
Dependency: IaaS model is considered one of the best mode among the three for the SoftArc Engineering company. However, the model is very much dependent on different programs that generally run over the internet.
Capability of the on-demand infrastructure: The capability of the on-demand infrastructure is coupled by enhancing the utilization of various types’ of mobile devices (Almorsy, Grundy & Müller, 2016). This helps in brining number of challenges for the consumers.
Proper Security: The risk management of the associated organization must adopt proper strategies as well as policies that are helpful in providing proper security as well as privacy to the organization. With the help of proper security, only the authorized users can access data
Authentication: Proper authentication must be provided so that various data and information, which are stored in the servers of the organization, are not hacked by some unauthorized users. This helps in managing various data as well as information of the organization appropriately.
Technical improvement: The model of IaaS must be developed technically in order to resolve various problems, which are related with the security as well as data storage.
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Bacon, J., Eyers, D., Pasquier, T. F. M., Singh, J., Papagiannis, I., & Pietzuch, P. (2014). Information flow control for secure cloud computing. IEEE Transactions on Network and Service Management, 11(1), 76-89.
Bahrami, M., & Singhal, M. (2015). The role of cloud computing architecture in big data. In Information granularity, big data, and computational intelligence (pp. 275-295). Springer International Publishing.
Bruneo, D. (2014). A stochastic model to investigate data center performance and qos in iaas cloud computing systems. IEEE Transactions on Parallel and Distributed Systems, 25(3), 560-569.
Furuncu, E., & Sogukpinar, I. (2015). Scalable risk assessment method for cloud computing using game theory (CCRAM). Computer Standards & Interfaces, 38, 44-50.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Huo, Z., Mukherjee, M., Shu, L., Chen, Y., & Zhou, Z. (2016, September). Cloud-based Data-intensive Framework towards fault diagnosis in large-scale petrochemical plants. In Wireless Communications and Mobile Computing Conference (IWCMC), 2016 International (pp. 1080-1085). IEEE.
Hwang, K., Bai, X., Shi, Y., Li, M., Chen, W. G., & Wu, Y. (2016). Cloud performance modeling with benchmark evaluation of elastic scaling strategies. IEEE Transactions on Parallel and Distributed Systems, 27(1), 130-143.
Jo, M., Maksymyuk, T., Strykhalyuk, B., & Cho, C. H. (2015). Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications, 22(3), 50-58.
Kavis, M. J. (2014). Architecting the cloud: Design decisions for cloud computing service models (SaaS, PaaS, AND IaaS). John Wiley & Sons.
Lewis, G. A. (2013, January). Role of standards in cloud-computing interoperability. In System Sciences (HICSS), 2013 46th Hawaii International Conference on (pp. 1652-1661). IEEE.
Wu, D., Rosen, D. W., Wang, L., & Schaefer, D. (2015). Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation. Computer-Aided Design, 59, 1-14.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download