StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms - Case Study Example

Cite this document
Summary
From the paper "Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms" it is clear that cloud technology can provide great promise for Blah-Blah Telecoms. In Blah-Blah Telecoms, cloud capability would help to serve customers in a better way…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms
Read Text Preview

Extract of sample "Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms"

Information Security Management Executive Summary The report is based on understanding the business and technical challenges for transitioning cloud computing in Blah-Blah Telecoms. With the recent acquisition of Surf-Surf Communications, it has become imperative for Blah-Blah Telecoms to include cloud infrastructure in its existing IT system. However, in order to enable cloud infrastructure, Blah-Blah Telecoms is required to address several business and technical challenges. There are four key challenges that must be considered by Blah-Blah Telecoms consisting of recognition of services, relocation of infrastructure, safeguarding of information security and new application challenges. In order to mitigate the issues, there is a need to undertake various approaches by Blah-Blah Telecoms such as relocation roadmap, integration of the existing applications with cloud and implementation of security measures among others. Overall, in Blah-Blah Telecoms cloud computing can help to drive innovation and enhance the effectiveness of providing communication services. Table of Contents Executive Summary 2 Part 2 4 Introduction 4 What is Cloud Computing? 4 Identification of Key Business and Technical Challenges 6 Business Challenges 6 Technical Challenges 7 Recommendations to Mary for Transitioning Cloud Computing Strategy 8 Conclusion 12 References 13 Part 2 Introduction The report is based on enabling cloud infrastructure in Blah-Blah Telecoms, a locally oriented SME in the United Kingdom. The organisation operates in business communication segment and provides services such as wide area network, local area network, Wi-Fi network, radio along with hosted services. In order to enhance the business, the organisation intends to provide cloud services as an additional product offering (Booz Allen Hamilton, Inc., 2009). Thus, the report will provide information regarding various challenges that require to be considered while embracing cloud infrastructure and also offer recommendations for transitioning cloud computing strategy in the business. What is Cloud Computing? Cloud enablement is a natural progression for modern organisations which helps to support responsive businesses. Cloud infrastructure has appeared as a modern Information Technology (IT) pattern that amasses huge amount of computers in the central data centre in order to deliver the internet based working platform along with services (Booz Allen Hamilton, Inc., 2009). The architecture of cloud comprises clients and servers which interact with each other through the internet and virtual network. A key component of cloud computing architecture is abstract layers. These layers are depicted in the following figure: Five Abstract Layers of Cloud Computing (Hu & et. al., 2011) In this regard, it can be observed that a particular layer is categorized above the other if that concerned layer’s services could embrace services provided by the layer which is beneath it. The bottom layer is determined to the physical hardware, specifically the ‘cloud-provider owned servers’ along with switches that function as the mainstay of cloud. The clients or users of this particular layer comprise large organisations that necessitate a greater extent of a kind of service which is termed as Hardware as a Service (HaaS). Another important layer entails the software kernel of cloud. This layer is very important as it acts as a bridge in between software infrastructure related layer and hardware layer of cloud. It acts as a management agent of hardware resources of the server. In addition, the abstraction layer which is placed over the software kernel is named software architecture. The services that are rendered in the software architecture layer can be alienated into three distinct subsections namely, data storage, communication and computational resources. Infrastructure as a Service (IaaS) or computational resources are accessible to users or consumers of cloud in the process of virtual machines (VMs). There are a number of other layer based architectures within the periphery of cloud computing. Some of the examples include Sotomayor et al. proposed a three-layer model, VM manager, Virtual Infrastructure (VI) management. Cloud management offers secure as well as remote interfaces for observing, controlling along with creating resources that are virtualised upon an infrastructure-as-a-service based cloud (Hu & et. al., 2011). Cloud infrastructure permits users to vigorously and remotely control computing activities from pool of resources, thereby delivering the capability to stipulate and organise computing capability on demand. Through cloud infrastructure, if there is a requirement for scaling up the services, users can enhance additional resources through the internet. The huge data centre of cloud computing provides related services to numerous customers by leveraging shared resources. As a result, it helps to enhance the economies of scale and also minimise the service expenses (Booz Allen Hamilton, Inc., 2009). Identification of Key Business and Technical Challenges While transitioning the current IT infrastructure to cloud infrastructure similar to Surf-Surf Communications, Blah-Blah Telecoms needs to deal with several challenges. Business Challenges Recognition of Services: Blah-Blah Telecoms operates entirely on traditional IT infrastructure and transitioning to cloud infrastructure necessitates thorough rationalisation of the services and applications of the new IT environment. The cloud environment has specific requirements which might represent challenges for Blah-Blah Telecoms to deliver reliable services. Since the applications will change, extensive migration planning will be needed, involving transition from self-managed model to utility-oriented model (Schubert & Jeffery, 2012). Relocation of Infrastructure: There are certain collective misunderstandings regarding the differences between the requirements of data centre relocation and cloud transition. Cloud infrastructure provides the flexibility and scalability of services and also delivers storage and network facilities according to ‘pay-as-you-go’ model. On the other hand, data centre relocation does not provide every advantage of cloud and also does generate certain risks which can have a negative impact on the availability of the applications and services (Schubert & Jeffery, 2012). Technical Challenges Safeguarding Information Security: One of the biggest challenges of cloud transitioning is safeguarding information security. Possible cloud adopters are essentially concerned regarding the security of information beyond organisational firewall. Furthermore, cloud infrastructure also carries certain new risks such as risk of hacking. Since a cloud provider hosts several clients, each can be influenced by the action taken in contradiction of one of them, as in distributed denial-of-service attacks. This factor can create a chain of complicacies associated with the information security. Moreover, the entire system breakdown can leave the working process at a pause level wherein the company’s activities can be affected majorly (Willcocks & et. al., 2011). Application Challenges: There are several applications which have severe security requirements such as information privacy and authority which represent further challenges in transitioning the applications to cloud infrastructure. The applications might also have geographical restrictions where storage of information is controlled by national margins for legitimate or compliance reasons and as a consequence, regular transition might not be an appropriate choice for Blah-Blah Telecoms. Customers and employees usually necessitate cloud providers to have proper skills and experience in order to assist in altering the application infrastructure. Recommendations to Mary for Transitioning Cloud Computing Strategy In order to overcome these and other vital challenges, first there is a need to make sure that appropriate strategy is utilised. Every application used by Blah-Blah Telecoms first must be evaluated and planned in keeping with each infrastructure element of Surf-Surf Communications and there is a need to provide a criticality index on the basis of various aspects such as influence on business, downtime restraints and service accessibility requirements among others. This evaluation can plot the infrastructure and application interdependencies. The applications are then grouped together and transitioned simultaneously. Information elements are required to establish and made available just-in-time for every aspect, by utilising the ‘pay-as-you-go’ model that cloud infrastructure offers and by ramping up the resources as required (Schubert & Jeffery, 2012). Following section depicts certain recommendations for Blah-Blah Telecoms in order to effectively implement cloud infrastructure. Relocation of Services: Transitioning to cloud necessitates convincing key members in the IT and executive departments of Blah-Blah Telecoms. Before relocation begins, it is vital for Blah-Blah Telecoms to have a thorough roadmap. Every vital software program must be recognised, not only for utilising in cloud infrastructure, but also to identify the human resource requirements for the organisation and to determine how the information through different applications will be coordinated. The relocation roadmap also must contain a comprehensive plan on required infrastructure and should address what data centre would be used. Incorporation of Cloud Infrastructure with old IT infrastructure: Cloud application also must be integrated with the existing applications of Blah-Blah Telecoms. Information saved in cloud system must be available and cloud applications and information should be seamlessly incorporated into core business systems of Blah-Blah Telecoms. Safeguarding Information Security: Cloud computing carries several information security risks. A few of these security challenges can be reduced to a level by implementing new security applications such as strong encryption technology and information loss prevention software. Furthermore, Blah-Blah Telecoms also has the capability to capitalise more on sophisticated security measures such as analytics to evaluate infrequent activity across various virtual servers. Beyond this, Blah-Blah Telecoms can also reduce the information security risk by implementing hybrid cloud system, a situation where most servers are in cloud but the key data is accommodated internally by enhancing information domination. Correspondingly, scalability as well as cost-effectiveness defines the major beneficial proponents of hybrid cloud. It also enables to minimise the change within the working practices. It facilitates to address prudently areas such fault and security management, configuration management and change related control (Zavala, 2012). Training: As a part of transitioning to cloud infrastructure, employees require to set in their ways regarding the use of new applications and IT system. Furthermore, transition to the cloud necessitates understanding the way they interact with computers. Cloud computing performs effectively when every individual on-board can make the use of remote data and applications. Thus, it is vital for Blah-Blah Telecoms to train every employee properly related to the new incorporated technologies. In order to accomplish managed and successful transition, the most common strategies are re-host, re-factor, integrate and replace. Re-Host: In re-host strategy, applications are reinstalled on the new IT platform in a managed cloud atmosphere. In this strategy, techniques such as replication and copying are applied to keep new and old information in synchronisation (Zavala, 2012). Re-Factor: Re-factor is the most invasive strategy for transition and is basically required for those applications which are developed in COBOL, PLI and IMS among other legacy programming languages. This strategy must be commenced with the understanding that cloud oriented applications are preferably aimed for peak usage with slight performance degradation. Re-factoring can also be used in order to develop application for using in cloud based platform. In re-factor strategy, industry standard and third party implements are used in order to transform existing application image into virtual case to be presented within private, public and hybrid cloud infrastructure (Zavala, 2012). Integrate: There are certain strategies which can simplify cloud integration. The integration approach can influence several integration tools such as using enterprise service or covering external legacy applications among others. Replace: There are several applications which are highly customised or obsolete and thus can be quite difficult for Blah-Blah Telecoms to transform or maintain in cloud atmosphere. Thus, by replacing selected applications, with advanced technologies, Blah-Blah Telecoms can accomplish certain advantages such as provide more features, while minimising long-run expenses. In replace strategy, organisations usually abandon legacy requests and use modern tools and applications, delivered as a service. Naturally in this strategy only information necessitates to be transitioned onto the new software-as-a-service setting (Zavala, 2012). The following figure demonstrates the strategic approach of cloud implementation Successful transition of cloud infrastructure should concentrate on delivering measurable outcomes while mitigating expenses and risks. With regard to transition, Blah-Blah Telecoms should describe, establish and organise application dependences in a manner that ensures smooth transition to the service delivery environment. Increased courtesy should also be provided on cloud oriented information security. In most of the circumstances, reorganised applications are equipped for the transition to an accessible application management and hosting service environment, which can be delivered by international enterprise scale distribution system. Since cloud computing supports several combination of disposition models, service categories and level of virtualisation, Blah-Blah Telecoms can select any of the positioning models such as public or private or hybrid method. It can be affirmed that amid the possible options hybrid cloud can be a prudent choice as it facilitates to incorporate the benefits of both public and private cloud. Hybrid cloud can also enable to attain organisational objectives with the aid of features such as cost-effectiveness as well as scalability. Conclusion Cloud technology can provide great promise for Blah-Blah Telecoms. In Blah-Blah Telecoms, cloud capability would help to serve customers in a better way, to drive innovation and to minimise risks and inadequacies. However, in order to completely realise the opportunities, Blah-Blah Telecoms must address the challenges and understand the requirements of this essential transformation of IT infrastructure. Blah-Blah Telecoms can gain several tangible and intangible advantages through enabling the cloud feature in the business operations. The passage to cloud transition extensively depends on the business strategy and individual application complexities. Nevertheless, gradual transition of existing IT platform to cloud platform is recommended as it minimises the operational threats. Henceforth, the requirements of cloud transition for Blah-Blah Telecoms depend on extensive planning in combination with the support and expertise of a trusted cloud provider. References Booz Allen Hamilton, Inc., 2009. Cloud Computing: A Transition Mythology. Media. [Online] Available at: http://www.boozallen.com/media/file/it-cloud-computing-a-transition-methodology-fs.pdf [Accessed February 24, 2014]. Hu, F. & et. al., 2011. A Review on Cloud Computing: Design Challenges in Architecture and Security. Journal of Computing and Information Technology, Vol. 1, pp. 25-55. Schubert, L. & Jeffery, K., 2012. Advances in Clouds: Research in Future Cloud Computing. European Union. [Online] Available at: http://cordis.europa.eu/fp7/ict/ssai/docs/future-cc-2may-finalreport-experts.pdf [Accessed February 24, 2014]. Willcocks, L. & et. al., 2011. Meeting the Challenges of Cloud Computing. Accenture, No. 1, pp. 1-2. Zavala, D., 2012. Transition to a More Efficient Enterprise Environment Applications Transformation to the Cloud. Hewlett-Packard Development Company, L.P. [Online] Available at: http://h20195.www2.hp.com/V2/GetPDF.aspx%2F4AA4-0537ENW.pdf [Accessed February 24, 2014]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Business and Technical Challenges for Transitioning Cloud Computing in Case Study Example | Topics and Well Written Essays - 2000 words, n.d.)
Business and Technical Challenges for Transitioning Cloud Computing in Case Study Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/1810148-information-security-management
(Business and Technical Challenges for Transitioning Cloud Computing in Case Study Example | Topics and Well Written Essays - 2000 Words)
Business and Technical Challenges for Transitioning Cloud Computing in Case Study Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1810148-information-security-management.
“Business and Technical Challenges for Transitioning Cloud Computing in Case Study Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/1810148-information-security-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms

Cloud Computing as a New IT Paradigm

This paper aims to educate industry on the value of cloud computing to business starting by defining it, outlining its pros and cons and describing its applicability.... … cloud computing is a new IT paradigm that allows provisioning of IT infrastructure through the flexible pay-per-use model.... cloud computing is arguably the most popular emergent computing paradigm of the last decade (Hayes, 2009) and a technology at the peak of the Gartner hype cycle (Schonfeld, 2008)....
14 Pages (3500 words) Essay

National Institute of Standards and Technology

Concluding the standing of cloud computing in the modern Era.... However, for a novice to get to know the basics of the concept the definition provided by the National Institute of Standards and Technology (NIST) is quoted as follows: NIST defines cloud computing in the following few words: “model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.... Topic:  “cloud computing" Submitted to: Submitted by: Submitted on: 11 May 2012 Abstract The increasing usability of the internet and the advancements in information and communications technology, a newly formed virtual infrastructure of cloud computing has emerged....
34 Pages (8500 words) Thesis

Cloud Computing

Parkhill comprehensively discussed all the contemporary features of cloud computing in his book “The Challenge of the Computer Utility” (Banerjee, 2011).... Ramifications of cloud computing in the technology world 1.... cloud computing is a process that employs the use of both software and hardware computing resources which are delivered over such networks as the Internet as a service.... hellip; “As business adapts to changing government and industry regulations, evaluates new business partnerships, and anticipates competitive threats, IT needs to help the business find new ways to respond” and cloud computing helps the business achieve that....
10 Pages (2500 words) Research Paper

Cloud Computing in Telecommunications

Professor Name ID cloud computing in Telecommunications Introduction The term ‘cloud computing' refers to the application of a cloud image to correspond to the internet or some huge networked setting.... This paper will also outline the implications of cloud computing in telecommunications.... In other words, cloud computing is a standard term for anything that engages offering hosted tools and services on the internet (TechTarget; Hartig)....
6 Pages (1500 words) Research Paper

Advancements in Communications The Use of Cloud Computing

This paper will also outline the implications of cloud computing in communications.... hellip; This paper discusses the use of the cloud computing in communication.... This paper will also outline the implications of cloud computing in communications.... cloud computing is one of the emerging concepts in the telecom sector.... Basically, the term 'cloud computing' refers to the application of a cloud image to correspond to the internet or some huge networked setting....
8 Pages (2000 words) Research Paper

The Future of Cloud Computing

This coursework "The Future of cloud computing" describes key aspects and future aspects of cloud computing.... In this context, the author pointed out that cloud computing will become more dominant than the desktop in the near future.... In the author's view, cloud computing is used synonymously and inaccurately using terms as utility computing as a service of software and grid computing.... nbsp; Underlying techniques for implementing cloud computing is grid computing....
6 Pages (1500 words) Coursework

Pros and Cons of Cloud Computing

iscuss the following issues within an organisation in relation to cloud computing:11Conclusion13Recommendations14Reference14IntroductionCompanies globally are increasingly looking at implementing innovative services to reduce costs, optimally use the available resources and add to their bottomline without much investment.... The implementation of cloud computing has helped many companies to achieve these targets by providing innovative and flexible technique to test, develop and create various products and utilize services without the requirement of a full-fledged infrastructural set-up....
15 Pages (3750 words) Assignment

Security Challenge in Cloud Computing

This paper "Security Challenge in cloud computing" brings in a comprehensive analysis of the security challenges in cloud computing security, by mainly concentrating on denial of service, and how the company's research and development (R&D) can be used to alleviate the situation.... hellip; cloud computing is defined as an IT service set that is offered to a customer through a network on a hired basis as well as with the capacity to scale down or up the requirements of their services....
12 Pages (3000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us