ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cloud and Beyond: Atlassian Corporation PLC

Verified

Added on Ā 2023/01/19

|24
|7449
|72
AI Summary
This report discusses the necessity of cloud computing in Atlassian Corporation PLC, an Australian software organization. It explores the benefits, solutions, and implementation process of cloud computing in the organization.

Contribute Materials

Your contribution can guide someoneā€™s learning journey. Share your documents today.
Document Page
Running head: CLOUD AND BEYOND
Cloud and Beyond: Atlassian Corporation PLC
Name of the Student
Name of the University
Authorā€™s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
CLOUD AND BEYOND
Executive Summary
The major objective of this report is to understand about the necessity of cloud computing in
the Australian software organization of Atlassian Corporation PLC. According to the analysts
of cloud computing, this particular technology enables the organizations in avoiding as well
as minimizing each and every up front expense of IT infrastructures. Cloud computing is also
responsible for allowing the enterprises in getting up of applications so that they could run
faster with improvised manageability or lesser maintenance. It even enables the teams of IT
to more promptly adjust these resources in fulfilling the fluctuating as well as unpredictable
demands. Major innovations and creativity within such distributed computing or
virtualization or even the improved accessibility to higher speed Internet connectivity for
having increased interests in cloud computing. This report has identified Salesforce.com or
SaaS solution appropriate for Atlassian for securing their products and services from any type
of external threat or risk. Moreover, the implementation process of Salesforce.com is also
provided in this report.
Document Page
2
CLOUD AND BEYOND
Table of Contents
1. Introduction............................................................................................................................3
2. Business Process Explanation or Application........................................................................4
3. Cloud Deployment Requirement............................................................................................7
4. Cloud Computing Solutions and Justifications....................................................................10
5. Cloud Computing Solution Issues in Ethical, Governance, Maintenance and Security......13
6. Implementation of the Proposed Cloud Computing Solution..............................................15
7. Conclusion............................................................................................................................17
References................................................................................................................................19
Appendix..................................................................................................................................22
Document Page
3
CLOUD AND BEYOND
1. Introduction
Cloud computing could be referred to as the on-demand accessibility for various
resources of computer systems, mainly for computing power and data storage. It does not
require direct active management by the respective user and hence cloud could easily and
promptly allow any kind of data transfer without involving complexities (Rittinghouse &
Ransome 2017). The major clouds even consist of such functions, which are being dispersed
on various distinctive locations from every centralized server. When this link of this cloud is
being checked with the user and is being checked as much close, it could be designated any
edge server.
The service providers of cloud could substantially screen, keep up and then gather
confidential data regarding firewalls, counteractive action framework, information streaming
and intrusion identification within the respective networks (Hashem et al. 2015). The
concepts of this time sharing system became extremely popular through remote job entries.
Full time sharing solutions were being made available with all popular vendors like DEC and
IBM and the major platforms that were involved were Multics, Cambridge CTSS and UNIX
ports. The respective model of data centre, in which users have submitted jobs to the
operators for running over IBM mainframes was substantially predominant (Botta et al.
2015).
The following report would be providing a brief discussion on deployment of cloud
computing in a popular Australian organization, Atlassian Corporation PLC. It is an
Australian enterprise software company, which eventually develops various products for the
respective software developer, content management and project managers. This specific
organization has become popular for its unique application of issue tracking, known as Jira
and even for its team collaboration or the wiki product, called Confluence (Atlassian.com.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CLOUD AND BEYOND
2019). They are serving more than 135000 customers and hence cloud would be an important
and significant requirement in the business. Subsequent cloud computing solutions and issues
for ethical, governance, maintenance and security would be provided in the report with
details.
2. Business Process Explanation or Application
Business process management in cloud computing could be demonstrated as the
utilization of tools, which are eventually delivered as the software services in a network
(Whaiduzzaman et al. 2014). The cloud business process management business logic is being
implemented over an application service as well as business data residing within the storage
of cloud. This particular business process of cloud helps in workload resilience and helps in
reducing redundant resources for ensuring resilient storages and even for keeping the
workloads running of the users, mainly in global regions. The computing resources are being
measured at this granular level and allows these users in paying only for various resources,
used by them. The cloud providers are extremely competitive in nature and they continuously
expand the services for differentiating themselves (Chen et al. 2015). It eventually led to the
public IaaS providers for offering much more than the storage instances and common
computing resources.
A server less computing allows the developers in creation of codes so that the cloud
providers could load and execute the code in response to the real world events and for this
reason the users do not need to consider regarding the instance and server aspects of cloud
implementation (Ali, Khan & Vasilakos 2015). The respective users have to pay only for
several transactions, which the function could execute. This public cloud even provides itself
effectiveness towards processing of big data that could demand for excessive computing
resources for smaller durations. These providers of cloud have also responded with the
Document Page
5
CLOUD AND BEYOND
services of big data like Google BigQuery for the larger scaling data warehouses to process
huge data sets.
The next crop for emerging cloud technology as well as service related to machine
learning and artificial intelligence (Tao et al. 2014). Such distinctive technologies help in
building machine understanding, enabling systems for mimicking human understandings or
even responding to the changes in confidential data for providing advantages to businesses.
Security has always been a top priority in implementing cloud computing technology. The
businesses that contemplate cloud adoption can eventually share the underlying hardware
infrastructures within several clients since public cloud is one of the multi-tenant
environments. The entire environment majorly hassles for the abundant isolations within
every logical computing resources (Wei et al. 2014). The subsequent access to the public
cloud storages is then guarded by the credentials of account login of every customer.
Several companies bound by the complicated regulatory obligations as well as
governance standards are hesitant for placing workloads and data within the public cloud for
theft or loss of data (Chen 2014). The resistance to data management often gets faded since
this logical isolations have proven to be scalable and has an addition of data encryption as
well as several tools of access and identity management with improvised security in the
cloud. The business process management is a basic discipline within operational
management, where individuals could utilize numerous methodologies for discovering,
modelling, analysis, measuring, improving, optimizing as well as automating the business
procedures. A proper combination of all such methodologies that are being utilized for
managing the organizational business process for cloud computing is termed as cloud
computing business process management (Almorsy, Grundy & MĆ¼ller 2016). The respective
procedures could be repeatable and structured as well as variable in nature. Although, these
Document Page
6
CLOUD AND BEYOND
are not needed, allowing technologies with cloud computing could be eventually utilized with
the business process management.
This could be differentiated from the program management or process management so
that the results of the projects are well improved. The major distinctions within project
management and program management mainly include predictability and repeatability
(Sadiku, Musa & Momoh 2014). When the working sequence or structure is absolutely
unique in nature, it refers to as a project. In this business process management, there exists a
sequence of work, which could vary from instances and there exist numerous business rules,
conditions and gateways. The main key would be predictability and it helps in understanding
the total conditions for the procedure to take any one route. Total quality management as well
as continual improvement procedural methods are being observed in this type of business
process management.
Since cloud can help in integrating application software tasks, it becomes quite easier
for the users to bring out effectiveness and efficiency in the business (Gai et al. 2016).
Atlassian has to deal with several complexities related to software management and for this
purpose, cloud computing would be an extremely good solution to eradicate any kind of
threats or issues. The main products of this particular organization include Jira, Confluence,
Stride or Hipchat, Bitbucket Server, Bamboo, Fisheye, OpsGenie, Trello, Crucible ad Crowd.
Each of these above mentioned products are extremely vulnerable to threats and risks and
should be protected under every circumstance (Botta et al. 2014). This particular technology
can visualize, measure, analyse, improvise, control and even re engineer the several processes
right from scratch for effective outcomes.
The entire process of cloud computing can be applied in the business of Atlassian
Corporation PLC as both of them are taking benefits of the cloud after offering a larger range

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7
CLOUD AND BEYOND
of services to both the consumers and the enterprises for using with greater potential as well
as flexibility offered by them (Aazam & Huh 2014). The respective computer processes and
calculations occur remotely and the customers, who sign up to the cloud services try to access
them online through either special computerized programs or within web browsers, in which
the required variables are being inputted for the task. It becomes quite easy to process remote
data and even storage systems.
3. Cloud Deployment Requirement
Atlassian Corporation PLC, being the part of the Australian software industry has to
ensure that no threat or risk is affecting the business processes and products under any
circumstance (Marinescu 2017). This cloud computing has always been a major technology
trend for the businesses and it has also become a main element of a modernized application
integration strategy. Cloud computing can save costly hardware while having to control as
well as maintain the data centre in house and hence numerous organizations are turning to the
cloud providers such as Microsoft Azure, Google Cloud and Amazon Web Services. It
ensures flexibility in cloud infrastructures for providing modern storage resources,
networking and computing (Jula, Sundararajan & Othman 2014). Atlassian, hence would be
able to gain various distinctive advantages and benefits in the business and even eradicating
issues related to risks and security threats. The various requirements of cloud computing in
the organization of Atlassian Corporation PLC are given below:
i) Service and Resource Management: The first as well as the most significant
requirement of cloud deployment in Atlassian would be service and resource management. A
cloud infrastructure can virtualize each and every component of a data centre (Aazam et al.
2014). The management of services is a measured package of every application or service,
which the end users could eventually implement and control through a private or public cloud
vendor. A simple tool for outlining as well as gauging services is extremely important for the
Document Page
8
CLOUD AND BEYOND
cloud administrators to ensure better market functionalities. The requirements of service
management for containing resource maintenance, guarantees of resources, billing cycles or
even measured regulation (Oliveira, Thomas & Espadanal 2014). As soon as cloud would be
implemented, these management services must help in creating policies for the workflows
and data for ensuring if it is absolutely efficient and the procedures are being delivered to the
systems within the cloud infrastructure.
ii) Data Centre Management Tools Integration: The second important and
significant requirement of cloud deployment in Atlassian would be efficient integration of
data centre management tools (Avram 2014). Every data centre use a variety of several
information technology tools for the management of systems, directories, billing, customer
care, provisioning and security amongst all others. These types of works with the services of
cloud management as well as open application programing interfaces are required for
integration with the existing operations, administration, provisioning as well as maintenance
of systems. The modernized cloud services can eventually support the existing infrastructure
of the data centre and even for leveraging modernized software, virtualization and hardware
or even any other technology (Stergiou et al. 2018). Hence, Atlassian Corporation PLC would
not be facing any complexity regarding integration of data centre management tools.
iii) Reporting, Security, Reliability and Visibility: The third distinctive and important
requirement of cloud deployment in Atlassian would be reporting, high security, reliability
and visibility (Toosi, Calheiros & Buyya 2014). The respective data centres require higher
levels of real time visibility and reporting capabilities within the cloud environments for
guaranteeing high compliance, service level agreements, charge backs, billing and security.
Without the presence of visibility and robust reporting, management of system performances,
customer services as well as the other procedures would be absolutely impossible. For being
completely reliable, the cloud infrastructure should operate regardless of the failing
Document Page
9
CLOUD AND BEYOND
components. Moreover, for the core purpose of safeguarding the cloud, these distinctive
services should make sure that the applications and data are absolutely secured while
providing accessibility to all those users, who are authorized and authenticated in nature
(Manvi & Shyam 2014). Thus, Atlassian would not get into any type of issue or complexity
in terms of data reliability and security.
iv) Interfaces for the Developers, Administrators and Users: This is yet another vital
and noteworthy requirement of cloud deployment for the organization of Atlassian
Corporation PLC (Rahimi et al. 2014). An automatic implementation as well as self-service
interfaces could make the complex cloud services much easier for the end users and hence
helping out customers with low operating costs as well as delivering subsequent adoption.
These self-service interfaces eventually offer the customers with the core capability of
efficiently launch the cloud services after management of their own data centres virtually,
driving and designing the templates, maintenance of virtual storages, using libraries and
networking resources. The administrator interfaces eventually present excellent visibility to
every resource, service offers, templates, several cloud users and virtual machine of Atlassian
Corporation PLC. These significant structures are responsible for integration of the
application program interfaces for their developers.
v) Providing better Flexibility and Agility: The business processes as well as the
products and services of Atlassian Corporation PLC would be gaining high flexibility and
agility and they would be able to eradicate all type of issues and complexities in a better
manner. Most of the cloud service infrastructures are being offered as self manageable, in
which the service changes could be eventually made in few moments only (Fehling et al.
2014). It eventually improvises the overall efficiency and uptime of the business systems,
during enabling every off site co-worker and partner in accessing the shared data over mobile
devices, whenever needed. With a proper cloud infrastructure managing the procedures, the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
CLOUD AND BEYOND
respective organization can become extremely focused on business and not only on
information technologies.
vi) High Security and Privacy: Another vital and noteworthy requirement of cloud
deployment for the organization of Atlassian Corporation PLC would be higher security as
well as privacy. There exists a basic misconception that these cloud services are not at all safe
and secured and the confidential data or information could be compromised. However, there
exist few risks, which could be blown out of proportion in respect to the enterprise level
cloud services and infrastructure (Xia et al. 2016). The respective providers and technologies
of cloud infrastructure are eventually improvising security and protection against the data
breaches, viruses and hackers with strong firewalls, advanced keys of encryption as well as a
hybrid approach, which could eventually store confidential data within the private cloud and
any other data and applications within the public cloud.
4. Cloud Computing Solutions and Justifications
Cloud computing helps in reduction of cost incurring in the business and hence it
becomes quite easier for the business to enhance extreme effectiveness and efficiency without
any type of complexity or issue. The overall operating expenses of Atlassian Corporation
PLC would be reduced after setting up and management of the own data centre (Barbarossa,
Sardellitti & Di Lorenzo 2014). Taking up of the process starts for adding up with several
types of software, IT experts and hardware as well as the up gradations come with the multi-
faceted set ups. There could be numerous solutions of cloud computing, which could be
deployed within the organization of Atlassian. The solutions with details and justifications
are provided below:
i) Web Based Services: This is the first solution of cloud that can be implemented
within the organization of Atlassian Corporation PLC for ensuring major effectiveness and
Document Page
11
CLOUD AND BEYOND
efficiency in their business (Gangwar, Date & Ramaswamy 2015). These web based services
eventually enable the businesses in selection of various web functionalities and not only a full
blown application. With the help of UDDI and XML open standards as well as any other
language over a protocol, these web based applications could eventually integrate with all
other parts of the business. The user could utilize web based services for easier payroll and
even account processing. Such distinctive services enable the user in choosing the assortment
of every web application for the respective business. Atlassian Corporation PLC would be
able to choose individual services via multiple providers and utilize them along with the
existing solution (Sen 2015). This type of service could even reduce the complexities of data
management and extra expenses.
ii) Software as a Service: The second important and significant solution of cloud
computing that could be implemented within the organization of Atlassian Corporation PLC
for ensuring major effectiveness and efficiency in their business would be SaaS or software
as a service (Yannuzzi et al. 2014). It is considered as the most commonly utilized area of
cloud computing, which eventually provides numerous cloud tenant accessibility to any
particular application. Office 365 is the basic form of software as a service, in which anyone
could open a monthly subscription to the suite of Microsoft Office products and services.
This particular cloud computing solution can provide a completed solution being owned as
well as managed by the provider of information technology services (Etro 2015). Such
distinctive solutions are referred to as optimal for all types of end user applications for the
regular operations.
iii) Infrastructure as a Service: Another vital and significant solution of cloud
computing that could be implemented within the organization of Atlassian Corporation PLC
for ensuring major effectiveness and efficiency in their business would be IaaS or
infrastructure as a service (Hsu, Ray & Li-Hsieh 2014). This specific cloud computing model
Document Page
12
CLOUD AND BEYOND
involves the basic necessities for cloud and even for offering major accessibility to the
networked functions, storage spaces, dedicated hardware and virtual machines. Such
distinctive technologies could easily server as the major foundation for each and every
business related operation. These kinds of technologies even consider software as a service
and any other cloud based service for their business. The two most common and efficient
providers of this infrastructure as a service include Windows Azure and Amazon Web
Services. These enable the user in outsourcing infrastructures such as backups and storage
space that are required for better testing (Bera, Misra & Rodrigues 2014). Windows Azure
eventually offer accessibility towards virtual networks, message queues, and non-relational
storage platform and service buses.
iv) Platform as a Service: The next vital and significant solution of cloud computing
that could be implemented within the organization of Atlassian Corporation PLC for ensuring
major effectiveness and efficiency in their business would be PaaS or platform as a service.
PaaS is responsible for involving the various operating systems and hardware that are require
for deploying as well as managing the cloud applications (Lian et al. 2014). It eventually
helps out in incrementing the overall business efficiency without even having the issue to
manage, plan, procure and even maintain the respective cloud based solution. Both IaaS and
PaaS go hand in hand since, the organization would require a significant platform for
management of the IT based infrastructure. One of the most promising provider of PaaS
model would be Windows Azure, which eventually supports .NET, Python, Ruby, Java and
few other languages. With the respective kits of software development as well as Visual
Studio, these developers could easily and promptly create as well as implement the
applications (Mastelic et al. 2015). The respective developers can even select from a SQL
database, Blobs and Tables.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
13
CLOUD AND BEYOND
v) Hosted Cloud: This is another popular cloud computing solution that might
eradicate the issues of security and privacy in Atlassian Corporation PLC. A hosted cloud is
an entire cloud deployment with every application and service that is being needed (Boru et
al. 2015). The respective applications are completely available and every new application
could be eventually developed on the lower or higher level infrastructures. These hosted
cloud solutions are eventually controlled, maintained and owned by any specific managed
service provider and even need monthly subscription fees.
vi) On Premises: A significant and popular solution of cloud computing that is solely
responsible for reducing complexities and problems in infrastructure would be on premises.
Such distinctive solutions are not completely based on cloud and they utilize tools of resource
management and virtualization (Khalil, Khreishah & Azeem 2014). These on premises
solutions eventually offer the most dedicated resources and they are quite effective for setting
up a front end interface for their potential customers and clients via accessible portals and
keeping the sensitive resources absolutely private in nature. This cloud computing has also
become the standards for businesses in obtaining accessibility to the respective software,
infrastructure resources and hardware. The business solutions of cloud computing enables the
organization into leveraging resources, which the providers of cloud service could manage
and then store in the private and secured networks and servers (Shi & Dustdar 2016). This
specific cloud solution can eventually offer an easier solution to the backups and then
mobilize data or network resources.
5. Cloud Computing Solution Issues in Ethical, Governance, Maintenance and Security
Amongst the above mentioned six distinctive types of cloud computing solutions, the
most effective as well as efficient for this organization of Atlassian Corporation PLC would
be SaaS. It is the model of software distribution, in which a third-party provider could host
every application and then make them available to the clients on the Internet connection
Document Page
14
CLOUD AND BEYOND
(Chang, Kuo & Ramachandran 2016). This solution is referred to as one of the three major
types of cloud, apart from platform as a service and infrastructure as a service. SaaS is closely
associated to the application service provider as well as on-demand computing software
delivery models. There could be few distinctive issues that can occur for this particular
solution of cloud computing and these issues are as follows:
i) Ethical: The first ethical issue that could occur for the solution of software as a
service is security and privacy (Jiang et al. 2014). There might be issues in maintaining
confidentiality and privacy of the stored data for the remote servers and not only on the
organizational computer systems. One of the most significant goals would be protecting the
confidentiality of information that is contained within the files and hence there could be
problems in data availability and backups. The entire data flow is needed to be maintained,
however SaaS does not provide a shield to the confidential data and thus data often gets lost.
The business organization could eventually verify the properties for evaluation of interactions
within the services of SaaS and workstations to check whether the flow of data is
substantially protected or not with the help of protocols like IPSec and TLS or SSL (Sultan
2014). Furthermore, SaaS cloud computing solution does not even provide scope for data
availability and backups, hence arising an issue of data loss.
ii) Governance: The second type of issue that occurs for the cloud solution of
software as a service is related to governance. The major governance issue for this particular
solution is lack of transparency. Although, SaaS is responsible for providing numerous
significant advantages to their clients, it does not provide transparent solutions and there
exists subsequent ethical violation in the business (Hsu, Ray & Li-Hsieh 2014). Furthermore,
there even exists issues related to accountability and oversight and could even increase
complexities related to high costs. Lack of efficiency is also observed in this case and legal
Document Page
15
CLOUD AND BEYOND
frameworks are not being present in the organization. Responsiveness is also absent for this
particular cloud solution.
iii) Maintenance: This is yet another common and significant issue or problem that is
extremely common for SaaS. Being a cloud solution, periodical maintenance is highly
recommended for the solution. However, there exists subsequent issues related to compliance
if services are not maintained periodically. The overall performances are being analysed on a
priority basis and there could be lack of resources and expertise in the respective solution
(Yannuzzi et al. 2014). Furthermore, there could even be major maintenance issues related to
controlling of the business and even checking for better cost management and containment.
Building a private cloud with this SaaS solution could be extremely vulnerable for the
organization of Atlassian Corporation PLC and hence they might face complexities related to
management of multiple clouds. Apart from these issues, the performances of the entire cloud
gets deteriorated to a high level. Hence, these maintenance issues could eventually bring out
problems related to data security and data loss. As maintenance could not be involved
properly in the business, there exist a high chance of data getting completely lost without any
kind of safety and security.
iv) Security: The fourth distinctive and vital type of issue that is needed to be taken
into consideration is security. SaaS is prone to the attacks of distributed denial of services and
eve shared cloud computing service attacks (Barbarossa, Sardellitti & Di Lorenzo 2014). As a
result, in spite of having high security and privacy in the application, the confidential data or
information could eventually get lost completely and the customer would not get any idea
about such issues. There could even exists problems related to employee negligence or loss of
data and insufficient data backups. The other attacks of social engineering and phishing are
also common in SaaS and there could even exist major system related vulnerabilities. These
distinctive issues of security could even increase employee negligence in the business.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16
CLOUD AND BEYOND
6. Implementation of the Proposed Cloud Computing Solution
These clouds might be limited to any one organization or enterprise cloud or even
could be made accessible to various distinct models like public cloud (Gangwar, Date &
Ramaswamy 2015). The entire technology is solely dependent on sharing of resources for the
core purpose of achieving economies of scale or coherence. The cloud providers utilize a
pay-as-you-go model that could lead to the most unexpected operating expense, only when
the administrator is not familiarized with every model of cloud pricing.
The higher accessibility of the better capacity network, storage devices and low cost
systems or even the widespread acceptance of hardware virtualizations, autonomic utility and
SOA has eventually led to high growth and development of cloud. The most effective and
suitable example of cloud SaaS for the organization of Atlassian Corporation PLC would be
Salesforce.com (Oliveira, Thomas & Espadanal 2014). There are eight distinctive steps that
are needed to be followed while successfully implementing Salesforce in the respective
business and these 8 steps are as follows:
i) Understanding Business Requirements: This is the first and the most significant
step that is to be followed while implementing SaaS in the business. It is required to
understand the various requirements of the business and need for implementing SaaS
solution. It is extremely vital for identifying objectives at the earliest stage and thus setting of
directives and goals is being done efficiently (Jula, Sundararajan & Othman 2014). The
respective application should be able to respond to the scalability, security and failover
issues.
ii) Identification of the Team: Since, Atlassian Corporate PLC will be implementing
Salesforce.com in their business, it would be extremely vital for them to identify the
Document Page
17
CLOUD AND BEYOND
respective team for taking on the task (See Appendix). The technology and concepts are
required to be implemented and thus this concept of SaaS could be executed.
iii) Designing of a Scalable Infrastructure: The next distinctive step in
implementation process of Salesforce.com would be designing of a scalable infrastructure
(Sadiku, Musa & Momoh 2014). When the team comprises of the complete understanding of
the business requirements, all types of components like network infrastructure, hardware,
data centre, disaster recovery are being considered in this step.
iv) Finalizing Bandwidth Requirement and Hosting Facility: Another distinctive
step in this deployment process of Salesforce.com would be finalizing bandwidth
requirements as well as hosting facilities. It is vital that the respective infrastructure is being
hosted in the facility that comprises of a public connection and maintenance of consistency in
making sure that a positive user experience is present in the business.
v) Procurement of Infrastructure Components: The various components of
infrastructure could be eventually procured without much complexity and as soon as
infrastructure design gets completed, Atlassian would require to utilize these components that
could have better functionalities and reliability (Almorsy, Grundy & MĆ¼ller 2016). High
availability is also ensured with this specific step in business.
vi) Planning for Disaster Recovery: Disaster recovery should be planned before data
is being transferred on Salesforce.com and thus application continuity is to be ensured in a
better manner.
vii) Integration of a Monitoring Solution: The monitoring solution should be
integrated in this particular step for ensuring timely intervention in the most effective manner.
Hence, CPU and memory usages are reduced to a high level.
Document Page
18
CLOUD AND BEYOND
viii) Preparation of Service Level Agreement: Finally, a SLA is to be prepared by
Atlassian so that the response time and turnaround time are well defined for Salesforce.com
(Rittinghouse & Ransome 2017). As soon as the SLA is being prepared, it is needed to
document the entire infrastructure as well as its components for handling all types of
exceptional behaviour of the application.
7. Conclusion
Therefore, conclusion could be drawn that cloud computing is a generalized term,
which could involve delivering hosted service over the Internet connectivity. The major
services of this technology are being broadly sub-divided into 3 distinctive categories, which
are IaaS, PaaS and SaaS. This cloud computing is eventually inspired by the symbol of cloud
that is often being utilized for representing the respective Internet connection via diagrams
and flowcharts. Any specific cloud service consists of 3 distinct features, which can
differentiate it from this traditional web-hosting. It could be sold according to demands and is
elastic in nature. The user could also have excess or less of the services and is completely
controlled by the respective provider.
A cloud could either be public or be private and a public cloud could sell off the
services to any one over the Internet connection such as AWS. A private cloud, on the other
hand, is a proprietary network for data centre, which can supply hosted services to a specific
number of people. The major goal of this technology of cloud computing is eventually
providing easier and scalable accessibility to every computing resource or IT service. The
various deployment models of cloud involve private, public, hybrid and community clouds.
Such models are needed for obtaining versatility and convenience of the cloud and helps in
preservation of management, security and control of the local data centres.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
19
CLOUD AND BEYOND
Cloud computing is responsible for boasting various attractive advantages in
businesses and even for the end users. The first and the foremost advantage of this technology
is self service provisioning, so that the users can spin-up in computing resource for several
workloads as per demands. It eradicates traditional requirements for an IT administrator to
provision and control computing resource. The second benefit is elasticity that allow scaling
up of incrementing computing needs and decrementing demands. The requirement of massive
investments within the local infrastructure for remaining active. It even allows agility in
migration so that the organizations could move workloads to and from the cloud for effective
cost savings. The above provided report has outlined a detailed analysis of cloud computing
implementation for the popular organization of Atlassian Corporation PLC with details
regarding cloud computing issues and solutions.
Document Page
20
CLOUD AND BEYOND
References
Aazam, M. & Huh, E.N., 2014, August. Fog computing and smart gateway based
communication for cloud of things. In 2014 International Conference on Future Internet of
Things and Cloud (pp. 464-470). IEEE.
Aazam, M., Khan, I., Alsaffar, A.A. & Huh, E.N., 2014, January. Cloud of Things:
Integrating Internet of Things and cloud computing and the issues involved. In Proceedings
of 2014 11th International Bhurban Conference on Applied Sciences & Technology
(IBCAST) Islamabad, Pakistan, 14th-18th January, 2014 (pp. 414-419). IEEE.
Ali, M., Khan, S.U. & Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Almorsy, M., Grundy, J. & MĆ¼ller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Atlassian.com. 2019. Viewed 15 September 2019. https://www.atlassian.com/
Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an
enterprise perspective. Procedia Technology, 12, pp.529-534.
Barbarossa, S., Sardellitti, S. & Di Lorenzo, P., 2014. Communicating while computing:
Distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal
Processing Magazine, 31(6), pp.45-55.
Bera, S., Misra, S. & Rodrigues, J.J., 2014. Cloud computing applications for smart grid: A
survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), pp.1477-1494.
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P. & Zomaya, A.Y., 2015. Energy-efficient
data replication in cloud computing datacenters. Cluster computing, 18(1), pp.385-402.
Botta, A., De Donato, W., Persico, V. & PescapƩ, A., 2014, August. On the integration of
cloud computing and internet of things. In 2014 International Conference on Future Internet
of Things and Cloud (pp. 23-30). IEEE.
Botta, A., De Donato, W., Persico, V. & PescapƩ, A., 2016. Integration of cloud computing
and internet of things: a survey. Future generation computer systems, 56, pp.684-700.
Chang, V., Kuo, Y.H. & Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Chen, X., 2014. Decentralized computation offloading game for mobile cloud
computing. IEEE Transactions on Parallel and Distributed Systems, 26(4), pp.974-983.
Chen, X., Jiao, L., Li, W. & Fu, X., 2015. Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), pp.2795-
2808.
Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Fehling, C., Leymann, F., Retter, R., Schupeck, W. & Arbitter, P., 2014. Cloud computing
patterns: fundamentals to design, build, and manage cloud applications. Springer Science &
Business Media.
Document Page
21
CLOUD AND BEYOND
Gai, K., Qiu, M., Zhao, H., Tao, L. & Zong, Z., 2016. Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, pp.46-54.
Gangwar, H., Date, H. & Ramaswamy, R., 2015. Understanding determinants of cloud
computing adoption using an integrated TAM-TOE model. Journal of Enterprise
Information Management, 28(1), pp.107-130.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. & Khan, S.U., 2015. The rise
of ā€œbig dataā€ on cloud computing: Review and open research issues. Information systems, 47,
pp.98-115.
Hsu, P.F., Ray, S. and Li-Hsieh, Y.Y., 2014. Examining cloud computing adoption intention,
pricing mechanism, and deployment model. International Journal of Information
Management, 34(4), pp.474-488.
Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F. & Xu, B., 2014. An IoT-oriented data storage
framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2),
pp.1443-1451.
Jula, A., Sundararajan, E. & Othman, Z., 2014. Cloud computing service composition: A
systematic literature review. Expert systems with applications, 41(8), pp.3809-3824.
Khalil, I., Khreishah, A. & Azeem, M., 2014. Cloud computing security: A
survey. Computers, 3(1), pp.1-35.
Lian, J.W., Yen, D.C. & Wang, Y.T., 2014. An exploratory study to understand the critical
factors affecting the decision to adopt cloud computing in Taiwan hospital. International
Journal of Information Management, 34(1), pp.28-36.
Manvi, S.S. & Shyam, G.K., 2014. Resource management for Infrastructure as a Service
(IaaS) in cloud computing: A survey. Journal of network and computer applications, 41,
pp.424-440.
Marinescu, D.C., 2017. Cloud computing: theory and practice. Morgan Kaufmann.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J.M. & Vasilakos, A.V., 2015.
Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), p.33.
Oliveira, T., Thomas, M. & Espadanal, M., 2014. Assessing the determinants of cloud
computing adoption: An analysis of the manufacturing and services sectors. Information &
Management, 51(5), pp.497-510.
Rahimi, M.R., Ren, J., Liu, C.H., Vasilakos, A.V. & Venkatasubramanian, N., 2014. Mobile
cloud computing: A survey, state of art and future directions. Mobile Networks and
Applications, 19(2), pp.133-143.
Rittinghouse, J.W. & Ransome, J.F., 2017. Cloud computing: implementation, management,
and security. CRC press.
Sadiku, M.N., Musa, S.M. & Momoh, O.D., 2014. Cloud computing: opportunities and
challenges. IEEE potentials, 33(1), pp.34-36.
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology:
Concepts, Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Shi, W. & Dustdar, S., 2016. The promise of edge computing. Computer, 49(5), pp.78-81.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
22
CLOUD AND BEYOND
Stergiou, C., Psannis, K.E., Kim, B.G. & Gupta, B., 2018. Secure integration of IoT and
cloud computing. Future Generation Computer Systems, 78, pp.964-975.
Sultan, N., 2014. Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), pp.177-184.
Tao, F., Cheng, Y., Da Xu, L., Zhang, L. & Li, B.H., 2014. CCIoT-CMfg: cloud computing
and internet of things-based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, 10(2), pp.1435-1442.
Toosi, A.N., Calheiros, R.N. & Buyya, R., 2014. Interconnected cloud computing
environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1),
p.7.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. & Vasilakos, A.V., 2014. Security and
privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-
386.
Whaiduzzaman, M., Sookhak, M., Gani, A. & Buyya, R., 2014. A survey on vehicular cloud
computing. Journal of Network and Computer applications, 40, pp.325-344.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X. & Ren, K., 2016. A privacy-preserving and
copy-deterrence content-based image retrieval scheme in cloud computing. IEEE
Transactions on Information Forensics and Security, 11(11), pp.2594-2608.
Yannuzzi, M., Milito, R., Serral-GraciĆ , R., Montero, D. & Nemirovsky, M., 2014,
December. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more
Fog Computing. In 2014 IEEE 19th International Workshop on Computer Aided Modeling
and Design of Communication Links and Networks (CAMAD) (pp. 325-329). IEEE.
Document Page
23
CLOUD AND BEYOND
Appendix
Salesforce.com
1 out of 24
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]