1. Simple cloud bursting – SoftArc can deploy part of its IT resources to a remote facility owned by a service provider based in a given region. It lowers the risk of migration and thus is a convenient solution (Memon, 2015).
Fig: Cloud bursting
2. Auto-scaling hybrid design – An agile structure that has a dynamic network tier design. Because of this design, application resources can be varied based on the needs of the user. This horizontal adjustment enhances flexibility and mobility of the applications (NGINX, 2015).
Fig: Auto-scale hybrid design
Benefits |
Issues |
Minimal migration risks |
Security concerns |
Cost efficiency |
Data compatibility issues |
Increased flexibility and mobility |
Increased network considerations |
Benefits |
Issues |
Highly scalable |
|
Minimal expansion costs |
High implementation costs |
Adaptive to users needs |
Extended requirements including specialised experts. |
(Right scale, 2017)
Risk |
Control |
Security – Cloud computing is still in its infancy stages of development which predisposes it to many security threats. Moreover, it’s difficult for IT personnel to maintain the security of multiple platforms that require different access and management control |
Preparation is the key to solving security problems, SoftArc should implement a strategic plan for meeting the needs of both platforms. Moreover, this plan should include the best practices of security control. |
Compatibility issues – Cloud resources such as those of PaaS lack renowned standards of implementation which outline the multiple protocols used with them |
Establish a common standard of operation with the service provider. Moreover, the organization can implement open standards that are more compatible with other IT resources |
Integration problems – If SoftArc IT resources are extensive it will be difficult to isolate and move them into a new environment. Moreover, the collaboration between cloud and in-house facilities may fail. |
Implement low risk architectures such as cloud bursting where resources are slowly shifted to the new platform (Hewlett Packard, 2016). |
Loss of control – A new environment presents new challenges such as tagging and tracking resources e.g. data. |
Establish a resource management system that tracks all the resources owned by the organisation. |
(Shacklett, 2016)
In most organisations, BCP outlines the recovery procedures used to assist an organisation to recover from a disaster (Shinder, 2007). The following are the items proposed to SoftArc for its hybrid cloud requirements:
A lot is at stake based on the outlined migration procedure, to ensure the services provided are up to the requirements, and the resources are accounted for, the following items must be outlined:
References:
Amazon web service. (2016). Operational Checklists for AWS. Retrieved 18 May, 2017, from: https://d0.awsstatic.com/whitepapers/aws-operational-checklists.pdf
ATADATA. (2016). The five phases of migrating to Google Cloud Platform. Retrieved 18 May, 2017, from: https://atadata.com/blog/server-migration/the-five-phases-of-migrating-to-google-cloud-platform
Borovac. M. (2016). Overcoming 5 Key Challenges of Cloud Migration with a Streaming-based Approach. Velostrata. Retrieved 18 May, 2017, from: https://velostrata.com/blog/overcoming-5-key-challenges-of-cloud-migration-with-a-streaming-based-approach/
Hewlett Packard. (2016). Embrace risk: secure your hybrid cloud. Protected to innovate with the right mix. Retrieved 18 May, 2017, from: https://h20195.www2.hpe.com/v2/getpdf.aspx/4AA6-4577ENW.pdf?ver=1.0
Keating. C. (2016). 4 Steps to Securing Your Hybrid Cloud Solution & Business Cloud Storage. Zadara storage. Retrieved 18 May, 2017, from: https://www.zadarastorage.com/blog/tech-corner/4-steps-securing-your-hybrid-cloud-solution/
NGINX. (2015). 3 Cloud Architectures with NGINX Plus. Blog tech. Retrieved 18 May, 2017, from: https://www.nginx.com/blog/cloud-architectures/
Pulse secure. (2017). 17 Hybrid Cloud Security Threats and How to Fix Them. Retrieved 18 May, 2017, from: https://www.pulsesecure.net/lp/hybrid-cloud-security-threats
Right scale. (2017). Cloud Computing System Architecture Diagrams. Retrieved 18 May, 2017, from: https://docs.rightscale.com/cm/designers_guide/cm-cloud-computing-system-architecture-diagrams.html
Shacklett. M. (2016). 10 hybrid cloud risk areas that the enterprise must manage. Tech republic. Retrieved 18 May, 2017, from: https://www.techrepublic.com/blog/10-things/10-hybrid-cloud-risk-areas-that-the-enterprise-must-manage/
Shinder. D. (2007). 10 things you should cover in your business continuity plan. Tech republic. Retrieved 18 May, 2017, from: https://www.techrepublic.com/blog/10-things/10-things-you-should-cover-in-your-business-continuity-plan/
Zivic. K. (2012). 3 Steps to Migrating Applications to the Cloud. Forsythe focus. Retrieved 18 May, 2017, from: https://focus.forsythe.com/articles/79/3-Steps-to-Migrating-Applications-to-the-Cloud
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download