Cloud Computing Technology Project Closure Report

Verified

Added on  2023/06/04

|10
|2469
|306
AI Summary
This report discusses the outcome, performance, benefits, and limitations of a cloud computing project. It also covers the project team and lessons learned. The report highlights the advantages of cloud computing, such as cost savings, backup and recovery management, and optimized server capacity. However, it also mentions the limitations, such as internet dependence, data incompatibility, and security risks. Subject: Cloud Computing. Course Code: N/A. Course Name: N/A. College/University: N/A.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Research Project of
Cloud Computing
Technology’
Project Closure Report
EMERGING TECHNOLOGIES AND INNOVATION

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Project Closure Report
Table of Contents
Project Summary.......................................................................................................................................2
Project Team..............................................................................................................................................2
Project Outcome........................................................................................................................................3
Lessons Learned Summary.......................................................................................................................4
Project Performance.................................................................................................................................4
Benefits of the project...............................................................................................................................5
Limitations of the project..........................................................................................................................6
Contract Closure.......................................................................................................................................7
Undertaking Closure Approval................................................................................................................7
Reference....................................................................................................................................................8
Cybersecurity 1
Document Page
Project Closure Report
Project Summary
Cloud computing is a rising data innovation that progressions the way IT design
arrangements. It is another example of business processing, and it can progressively give
registering administrations upheld by cutting edge server farms that ordinarily utilize Virtual
Machine (VM) innovations, (Kodama & Branscomb 2015). A standout amongst the most basic
issues in distributed computing is security. With the advancement of the Internet and Web
innovation and regular multifaceted correspondence, it is vital for individuals to have the
capacity to get to and oversee data in a wide range of dialects. These data assets with a wide
range of dialects are disseminated in Web pages and the databases. Distributed computing gives
data assets to clients in "Cloud" through the Internet. Distributed computing uses substantial
scale virtualized datacenters to oversee such vast volume of assets. Astounding overviews of
specialized arrangements towards better execution and vitality productivity of cloud frameworks
can be found in, and are perspective of important measurements and benchmarks has been given.
Through the course of this endeavor, it has ended up being sure that the line between idly
observed electronic signs and keen stands is by and by clouded to the extent that we think it isn't
any more accommodating to perceive the two. Considerable touch-screen demonstrates are by
and by open, and other instinctive advancements, for instance, watcher region acknowledgment
and joint effort with phones are as of now appearing.
Project Team
Name Representing Title
Joseph Whiter IST Client and
Engineering
Engineering Rep
Carlos Mynic Cloud Computing and
Environment Computing
Data Center
Administrator
Neyman Mrn Retail services New Media Services –
Operations Administrator
Sabith K Arts Cloud
Computing
Senior Cloud
Administrator
Nicholas Maghathi MFCF Communication and
Cybersecurity 2
Document Page
Project Closure Report
Research Alliance Director
Daniels Joh FEDS Information
Technology Director
Emmauella Kil IQC LINUX System
Administrator
Elizabeth Johns School of Computing Research Support,
Technical manager.
Kenn Raymond Web Design Web Design
Administrator
Project Outcome
The following are the outcome of the cloud computing
The cloud computing has helped in reserve funds in both programming permitting and
equipment, and in addition to get rid of the full utilization of the structure of a PC key, and in this
way sparing in the spatial zone and power, and furthermore helps in lessening expenses and
dangers related with the venture refresh, through an adjustment in the arrangement of data
innovation, (Li et al 2010, March).
The cloud computing has exploited the potential outcomes in the internet of the benefits
of distributed computing, as a client explores to the worldwide system to the wide universe of the
internet, and the formation of a bound together place for programs; this framework diminishes
control utilization, keeps the projects from the misfortune, notwithstanding the coherence of
utilization.
The cloud computing has given another option in contrast to the development of the
foundation for the arrangement of data innovation at less expense. Where the specialist
organization of data innovation can assist the association with developing the framework of
Information innovation, particularly PCs and programming, by enabling associations to center
around business.
Cybersecurity 3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Project Closure Report
The cloud computing has Optimized abuse of the limit of servers. The limit of the server
can be upgraded in business applications, in this manner staying away from the need to put
resources into costly equipment and programming, which enables the association to concentrate
on center business, (Fernando, Loke & Rahayu 2013).
The cloud computing gave greater adaptability to work remotely. Cloud processing
empowers clients to work from anyplace as long as they are associated with the web, which
implies arrangement of more noteworthy adaptability in work timetable, and diminishing
pressure.
Associations will be more adaptable with the end goal that they can work all the more
productively, by making it simpler to quick reaction to changing business sector needs, and
inside applications, and access to new advances, and also less demanding arrangement, bring
down upkeep, and trust in the connected arrangements, which are completed under the
supervision of a specialist co-op of data innovation, (Stein 2010).
Lessons Learned Summary
Through the course of this venture, it has turned out to be certain that the line between
latently saw computerized signs and intelligent stands is presently obscured to the degree that we
think it is not any more helpful to recognize the two. Substantial touch-screen shows are
presently accessible, and other intuitive innovations, for example, watcher vicinity recognition
and collaboration with cell phones are currently beginning to show up. Security of client
information is our fundamental concern when planning intuitive advanced signs, (Chen, Paxson
& Katz 2010).
Project Performance
Cloud conditions frequently need to develop or contract rapidly.
Since cloud frameworks are worked to deal with changing outstanding burdens in an
adaptable way, it is vital to express our prerequisites and administration levels so the remaining
tasks at hand can develop without affecting responsiveness, throughput, or accessibility. We
should have a most extreme remaining task at hand level as a top priority, and the connection
Cybersecurity 4
Document Page
Project Closure Report
between handling volumes and framework asset usage must be as straight as could be expected
under the circumstances. Our key execution pointers must have comparing limits that can alarm
us to conceivable issues, (Krutz & Vines 2010).
A few outstanding burdens are more qualified than others to distributed computing.
Those that contain offbeat procedures, for instance, that can be offloaded to different
regions in the cloud condition. The outcomes are then consolidated and the application can
proceed, (Furht & Escalante 2010). An online or elite figuring logical remaining task at hand can
likewise fit great, particularly if there are calculations or calculations that can be offloaded and
executed simultaneously with extraordinary parallel preparing. Outstanding tasks at hand that are
parallel and nuclear exploit this condition without limitations.
The target of observing is to distinguish and address issues before purchasers of the cloud
are influenced.
Checking ought to have dashboards or perspectives for the cloud specialist co-op and its
purchasers. Private and crossover cloud shoppers may likewise be occupied with asset
measurements to check on the off chance that they have to build their interest in cloud limit and
the outer cloud seller's administration characteristics. Tip: utilize verifiable information and keep
away from web based checking for this examination, (Pocatilu Alecu & Vetrici 2010).
Benefits of the project
The Cost
Having set up claim framework and its support framework is absolutely a tedious and
expensive issue. It's past the pocket of new companies and SMBs. Appropriate from the expense
of overwhelming burden servers, the authorized programming, and tremendous upkeep group,
each expense can be spared and spent where vital, (Kondo et al 2009, May). In addition, if
business requests a scaling, the foundation needs proportional high to coordinate the situation.
This sort of overhaul necessity winds up in another buy of either equipment, programming or
both.
Cybersecurity 5
Document Page
Project Closure Report
Alleviation from Backup and Recovery Management
For the businesses, for example, keeping money and fund, cloud benefit is an enormous
gift. Since a miss of single exchange can result in a major news causing punishments or court
cases. Deciding on distributed computing intends to get totally good and gone for a
reinforcement framework. Here, the information stockpiling is dispersed among associated
server rather than one place, (Trimmer et al 2009). Ideal from the information security to
legitimate consistence, everything is cloud specialist co-op's duty. Everything would be
consequently dealt with the best measures.
Limitations of the project
Internet reliance
Everything at the cloud is open through web as it were. On the off chance that the cloud
server faces a few issues, so will your application. Besides, on the off chance that you utilize a
web access that varies a considerable measure, the distributed computing isn't for you. Indeed,
even the greatest specialist co-ops confront very long downtimes. In specific situations, it's
turned into a vital choice to pick cloud administrations, (Calloway 2012). A champion among the
most fundamental issues in appropriated processing is security. With the progression of the
Internet and Web advancement and consistent multifaceted correspondence, it is imperative for
people to have the ability to get to and supervise information in an extensive variety of lingos.
These information resources with an extensive variety of vernaculars are dispersed in Web pages
and the databases. Conveyed figuring utilizes significant scale virtualized datacenters to manage
such tremendous volume of advantages
Information Incompatibility
Cybersecurity 6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Project Closure Report
This is fluctuated according to various specialist co-ops. Now and then, a merchant
secures in the client by utilizing exclusive rights so a client can't change to another seller. For
instance, quite possibly a merchant doesn't furnish similarity with Google Docs or Google
Sheets. As your clients or representatives are getting to be propelled, your business might be in
urgent requirement for it, (Hashem et al 2015). So guarantee your agreement with the supplier
according to your terms, not them.
Security break dangers
The information exchanges occur through web as it were. In spite of the fact that your
cloud specialist co-op cases to be outstanding amongst other anchored specialist co-ops, it ought
to be your call at last. Since distributed computing history has noted enormous mishaps,
previously. So on the off chance that you claim a business where a solitary miss or debasement
of information isn't at all satisfactory, you should think 100 times previously going for the cloud,
particularly for substantial scale business, (Subashini & Kavitha 2011). However, for
entrepreneurs, the inquiry here is – will you have the capacity to give more security levels to
your applications than a cloud specialist organization does?
Contract Closure
This undertaking had no financial plan or command for acquisition.
Undertaking Closure Approval
Affirmed by: [insert who has investigated and endorsed this current venture's closure]
Endorsement Date: [insert date the conclusion is approved]
This conclusion report was talked about by [insert where this conclusion was discussed]
and recorded at [insert where documentation for conclusion resides]. The above recorded people
consent to the conclusion of this venture.
Prepared by (Project Manager)
Cybersecurity 7
Document Page
Project Closure Report
Reference
Calloway, T. J. (2012). Cloud computing, clickwrap agreements, and limitation on liability
clauses: A perfect storm. Duke L. & Tech. Rev., 11, 163.
Chen, Y., Paxson, V., & Katz, R. H. (2010). What’s new about cloud computing
security. University of California, Berkeley Report No. UCB/EECS-2010-5
January, 20(2010), 2010-5.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future
generation computer systems, 29(1), 84-106.
Furht, B., & Escalante, A. (2010). Handbook of cloud computing, New York: Springer 32(3).
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
Systems, 47, 98-115.
Krutz, R. L., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Kondo, D., Javadi, B., Malecot, P., Cappello, F., & Anderson, D. P. (2009, May). Cost-benefit
analysis of cloud computing versus desktop grids. In IPDPS 23(9), pp. 1-12).
Kodama, F., & Branscomb, L. M. (2015). Emerging patterns of innovation: sources of Japan's
technological edge, Boston: Harvard Business School Press 44(8), pp. 147-184).
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010, March). Fuzzy keyword search
over encrypted data in cloud computing. In Infocom, 2010 proceedings ieee (pp. 1-5).
IEEE.
Cybersecurity 8
Document Page
Project Closure Report
Pocatilu, P., Alecu, F., & Vetrici, M. (2010). Measuring the efficiency of cloud computing for e-
learning systems. Wseas transactions on computers, 9(1), 42-51.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), 1-11.
Stein, L. D. (2010). The case for cloud computing in genome informatics. Genome
biology, 11(5), 207.
Trimmer, D. A., Stager, R. K., Johnston, C. A., & Blaser, R. (2009). U.S. Patent No. 7,069,466.
Washington, DC: U.S. Patent and Trademark Office.
Cybersecurity 9
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]