Uuis 8000 Global Information System Report 2022
VerifiedAdded on 2022/10/11
|19
|4685
|13
Assignment
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: GUUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
GLOBAL INFORMATION SYSTEMS STRATEGY
Name of the Student
Name of the University
Author Note:
GLOBAL INFORMATION SYSTEMS STRATEGY
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Telelink “As-Is” Environment.........................................................................................2
Underlying technology................................................................................................2
Total cost of ownership inclusive of Labor cost..........................................................3
Governance and Organization.....................................................................................3
Risk Management........................................................................................................4
Evaluate and select appropriate Cloud solution and deployment model.........................4
Critical assumptions and Constraints...............................................................................7
The method to be used for migrating from on premise servers to Cloud........................8
Quantify Cost, Investment and strategic opportunities....................................................9
Validate your business case using the following indicator............................................10
Recommendation...............................................................................................................11
Conclusion.........................................................................................................................13
References..........................................................................................................................14
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Telelink “As-Is” Environment.........................................................................................2
Underlying technology................................................................................................2
Total cost of ownership inclusive of Labor cost..........................................................3
Governance and Organization.....................................................................................3
Risk Management........................................................................................................4
Evaluate and select appropriate Cloud solution and deployment model.........................4
Critical assumptions and Constraints...............................................................................7
The method to be used for migrating from on premise servers to Cloud........................8
Quantify Cost, Investment and strategic opportunities....................................................9
Validate your business case using the following indicator............................................10
Recommendation...............................................................................................................11
Conclusion.........................................................................................................................13
References..........................................................................................................................14
2UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Introduction
The following report is all about suggesting suitable cloud storage adaptation for
Telelink. This is considered to be medium size organization which is based in Auckland.
Telelink aims to conduct a survey, takes in the product, mail information kits along with
providing reception for 0800 services (Ren et al. 2015, pp.317-323). The organization has
expanded itself so that it can become one of the largest contact centres of New Zealand. The
organization aims to provide a certain number of services like database management, lead
generation and retention of their customer. In addition, it offers payment processing and works
with different technologies like email, internet and texting.
In the coming pages of the report an idea has been provided with respect to As-Is
environment along with underlying business objectives. The structure of discussion is around the
following points like underlying technology, cost of ownership inclusive of labor cost,
governance and organization and risk management. After that, an evaluation has been done with
respect to proper cloud solution and deployment model. The next section of the report deals with
assumption and constraints for the business case. The method has been discussed which is
needed for migrating from on-premises to cloud services. In addition, business case for the
following indicator that is return on investment and quality of services.
Discussion
Telelink “As-Is” Environment
Underlying technology
Introduction
The following report is all about suggesting suitable cloud storage adaptation for
Telelink. This is considered to be medium size organization which is based in Auckland.
Telelink aims to conduct a survey, takes in the product, mail information kits along with
providing reception for 0800 services (Ren et al. 2015, pp.317-323). The organization has
expanded itself so that it can become one of the largest contact centres of New Zealand. The
organization aims to provide a certain number of services like database management, lead
generation and retention of their customer. In addition, it offers payment processing and works
with different technologies like email, internet and texting.
In the coming pages of the report an idea has been provided with respect to As-Is
environment along with underlying business objectives. The structure of discussion is around the
following points like underlying technology, cost of ownership inclusive of labor cost,
governance and organization and risk management. After that, an evaluation has been done with
respect to proper cloud solution and deployment model. The next section of the report deals with
assumption and constraints for the business case. The method has been discussed which is
needed for migrating from on-premises to cloud services. In addition, business case for the
following indicator that is return on investment and quality of services.
Discussion
Telelink “As-Is” Environment
Underlying technology
3UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Electronic transmission of information over a large distance is defined as
telecommunication. It has become a virtually inseparable for different computer that is system
and telecommunication which creates value (Yu et al. 2016, pp.767-778). There is mainly two
kind of telecommunication network that can be distinguished for the viewpoint of geographical
scope that is LAN and WAN. Telecommunication links are adopted by making use of different
communication media that corresponds to different characteristics. Channel capacity is the main
medium which is the potential transmission speed for data transmission that is expressed in bits
per second (Arpaci 2016, pp.150-157). Six of the potential media which is needed for
implementing telecommunication links are twisted pair, coaxial cable, fibre optics cable,
Terrestrial cable, satellite transmission and radio transmission.
Total cost of ownership inclusive of Labor cost
Total cost of ownership (TOC) for enterprise software is found to be a summation of
direct and indirect cost which is incurred by that software. It is found to be an important aspect
of ROI calculation (Chang and Wills 2016, pp.56-76). There are many variations in between
hybrid and in between off-shelf and cloud software on a cloud platform or even open source.
There is a certain number of cost involved in the production of new software like software,
hardware, implementation, data migration, user license, training and customization (Li et al.
2016, pp.785-796). The operational cost is mainly inclusive of software maintenance and
support, patches, user license, training and enhancement and using user admin support,
downtime, upgrades and security. The overall retirement cost is inclusive of data export, achieve
system and inactive licenses.
Governance and Organization
Electronic transmission of information over a large distance is defined as
telecommunication. It has become a virtually inseparable for different computer that is system
and telecommunication which creates value (Yu et al. 2016, pp.767-778). There is mainly two
kind of telecommunication network that can be distinguished for the viewpoint of geographical
scope that is LAN and WAN. Telecommunication links are adopted by making use of different
communication media that corresponds to different characteristics. Channel capacity is the main
medium which is the potential transmission speed for data transmission that is expressed in bits
per second (Arpaci 2016, pp.150-157). Six of the potential media which is needed for
implementing telecommunication links are twisted pair, coaxial cable, fibre optics cable,
Terrestrial cable, satellite transmission and radio transmission.
Total cost of ownership inclusive of Labor cost
Total cost of ownership (TOC) for enterprise software is found to be a summation of
direct and indirect cost which is incurred by that software. It is found to be an important aspect
of ROI calculation (Chang and Wills 2016, pp.56-76). There are many variations in between
hybrid and in between off-shelf and cloud software on a cloud platform or even open source.
There is a certain number of cost involved in the production of new software like software,
hardware, implementation, data migration, user license, training and customization (Li et al.
2016, pp.785-796). The operational cost is mainly inclusive of software maintenance and
support, patches, user license, training and enhancement and using user admin support,
downtime, upgrades and security. The overall retirement cost is inclusive of data export, achieve
system and inactive licenses.
Governance and Organization
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Telelink makes use of data governance which is promising approach for providing data
quality and maintaining its overall value. The practitioners make use of community which is a
discussing topic in the last few years. Data governance makes use of field of study so that it can
maintain its infancy (Yu et al. 2015), pp.1167-1179). Data governance is a new topic which is
drawing attention which is growing a number of business needs where the organization is
expecting to meet. The telecommunication industry which is working with highlight quality data
which is seen as a competitive advantage. In some cases, an organization is provision for internet
protocol television which is huge scale (Yu, Ren and Wang 2016, pp.1362-1375). It is available
on both consumer data and infrastructure data. False-negative response during the availability
checks which comes into picture as a result of inaccurate data for lost revenue and reduction of
market share.
Risk Management
There are many ongoing risks in telecommunication like
Failure to realize new roles of evolving ecosystem of the industry: At present, the
operator focus on purchasing new vistas for growth opportunity which is opening up for
changing their business model (Li et al. 2016, pp.715-725). A process needs to be adopted for
new roles of a growing number in the whole industry value chain.
Lack of regulatory for uncertainty on new market structure: A combination of certain
number of factors which is inclusive of price deflation which is driven by competition and OTT
providers (Esposito et al. 2015, pp.2348-2362). In addition, the additional market players like
cable firms and unbundlers are completely moving into mobile services.
Telelink makes use of data governance which is promising approach for providing data
quality and maintaining its overall value. The practitioners make use of community which is a
discussing topic in the last few years. Data governance makes use of field of study so that it can
maintain its infancy (Yu et al. 2015), pp.1167-1179). Data governance is a new topic which is
drawing attention which is growing a number of business needs where the organization is
expecting to meet. The telecommunication industry which is working with highlight quality data
which is seen as a competitive advantage. In some cases, an organization is provision for internet
protocol television which is huge scale (Yu, Ren and Wang 2016, pp.1362-1375). It is available
on both consumer data and infrastructure data. False-negative response during the availability
checks which comes into picture as a result of inaccurate data for lost revenue and reduction of
market share.
Risk Management
There are many ongoing risks in telecommunication like
Failure to realize new roles of evolving ecosystem of the industry: At present, the
operator focus on purchasing new vistas for growth opportunity which is opening up for
changing their business model (Li et al. 2016, pp.715-725). A process needs to be adopted for
new roles of a growing number in the whole industry value chain.
Lack of regulatory for uncertainty on new market structure: A combination of certain
number of factors which is inclusive of price deflation which is driven by competition and OTT
providers (Esposito et al. 2015, pp.2348-2362). In addition, the additional market players like
cable firms and unbundlers are completely moving into mobile services.
5UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Ignoring new measures for privacy and security: Considering the negatives headlines
about telecoms and data privacy, the overall level of trust of different service providers are
declining at a rapid rate (Cui et al. 2017, pp.3513-3526). The trust in mobile operator and ISP is
falling at a rapid rate and consumer encounters attitudes towards the ecosystem.
Evaluate and select appropriate Cloud solution and deployment model
AWS comes up with millions of customers each and every month which is important for
business segment in the enterprise. There are mainly five stages of cloud migration like
Preparation of Migration and Business Planning: There is a need of understanding the
right objectives and beginning of idea which will bring different kind of benefits. It will merely
have some foundational experience and implementing the main business case for its migration
process (Xiao et al. 2017, pp.534-544). It need to have considering the objectives into account
along with usage of architecture in the present application and constraints. AWS comes up with
partnership with RSIC network, cloudamize and Apptio which have experience in this field.
Discovery of portfolio: The very next step is all about understanding IT portfolio and
their dependency on the application which gave rise to three kind of migration strategies. People
need to employ business case objectives. By making use of the migration approach, people can
build a complete business case.
Design, migration and validation application: In this step, the focus generally moves to
the portfolio level which is at individual level. It is merely done for migrating, validating of each
of the application. Each of the application has been designed in such a way it can validate some
of the common application strategies (Cui, Liu and Wang 2015, pp.2374-2385). As soon as
people have gained experience about migration to few numbers of application an individual can
Ignoring new measures for privacy and security: Considering the negatives headlines
about telecoms and data privacy, the overall level of trust of different service providers are
declining at a rapid rate (Cui et al. 2017, pp.3513-3526). The trust in mobile operator and ISP is
falling at a rapid rate and consumer encounters attitudes towards the ecosystem.
Evaluate and select appropriate Cloud solution and deployment model
AWS comes up with millions of customers each and every month which is important for
business segment in the enterprise. There are mainly five stages of cloud migration like
Preparation of Migration and Business Planning: There is a need of understanding the
right objectives and beginning of idea which will bring different kind of benefits. It will merely
have some foundational experience and implementing the main business case for its migration
process (Xiao et al. 2017, pp.534-544). It need to have considering the objectives into account
along with usage of architecture in the present application and constraints. AWS comes up with
partnership with RSIC network, cloudamize and Apptio which have experience in this field.
Discovery of portfolio: The very next step is all about understanding IT portfolio and
their dependency on the application which gave rise to three kind of migration strategies. People
need to employ business case objectives. By making use of the migration approach, people can
build a complete business case.
Design, migration and validation application: In this step, the focus generally moves to
the portfolio level which is at individual level. It is merely done for migrating, validating of each
of the application. Each of the application has been designed in such a way it can validate some
of the common application strategies (Cui, Liu and Wang 2015, pp.2374-2385). As soon as
people have gained experience about migration to few numbers of application an individual can
6UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
get just behind it. This is the mere time to accelerating the migration and achieving scale. There
are some partners like cloudvelox and Attunity which can help with AWS and cloudEndure
migration.
Operating: As these applications are migrated one can iterate for new foundation by
turning off the old system and constantly iterating for new operating model. The current
operating model becomes evergreen which comprises of a set of people, process and lastly
technology which aims to migrate much application.
There are mainly ten benefits of using AWS infrastructure like
Zero CapEx : Most of the people accepts that AWS and other similar cloud based
solution are mainly for rich people. AWS is found to be the start-up for high level technologies
and infrastructure which requires Zero CapEx (Liang and Susilo 2015, pp.1981-1992). AWS
marketplace comes up with high-probability which might lose those products in priced model
along with no up-front cost.
No-commitment: At the time of using server hosting for small website that is for content
delivery for network traffic sites which is reliable and scalable email services. AWS aims to offer
everything along with no commitment for the month (Fazio et al. 2015, pp.500-506). All the
services on a server backed are completely charged on an hourly basis.
No kind of Negotiation: AWS is completely focused on minimizing the overall
infrastructure cost for different customer. It has reduced the overall pricing services a lot in the
last few years (Liu et al. 2015, pp.1513-1528). There are certain number of tools like trusted
advisor or even 3rd party like cloudability which will help in optimizing the overall cost in the
present AWS.
get just behind it. This is the mere time to accelerating the migration and achieving scale. There
are some partners like cloudvelox and Attunity which can help with AWS and cloudEndure
migration.
Operating: As these applications are migrated one can iterate for new foundation by
turning off the old system and constantly iterating for new operating model. The current
operating model becomes evergreen which comprises of a set of people, process and lastly
technology which aims to migrate much application.
There are mainly ten benefits of using AWS infrastructure like
Zero CapEx : Most of the people accepts that AWS and other similar cloud based
solution are mainly for rich people. AWS is found to be the start-up for high level technologies
and infrastructure which requires Zero CapEx (Liang and Susilo 2015, pp.1981-1992). AWS
marketplace comes up with high-probability which might lose those products in priced model
along with no up-front cost.
No-commitment: At the time of using server hosting for small website that is for content
delivery for network traffic sites which is reliable and scalable email services. AWS aims to offer
everything along with no commitment for the month (Fazio et al. 2015, pp.500-506). All the
services on a server backed are completely charged on an hourly basis.
No kind of Negotiation: AWS is completely focused on minimizing the overall
infrastructure cost for different customer. It has reduced the overall pricing services a lot in the
last few years (Liu et al. 2015, pp.1513-1528). There are certain number of tools like trusted
advisor or even 3rd party like cloudability which will help in optimizing the overall cost in the
present AWS.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Procurement: A new kind of server can take up time in between several hours to 8-10
days based on the current infrastructure (Wu, Yu and Madhyastha 2015, pp. 543-557). AWS help
in spinning up the new server in the interval of a few minutes where there is no need of buying
any separate license for different operating system and software.
Pay as per usage: Infinite space for backup and achieving need is all about the ability for
launching new server, CDN integration and transcoding media. Unlimited bandwidth and many
other servers based services will be based on the current usage.
Best security: AWS has been built for world class, high secure infrastructure which is
physically over the internet. AWS comes up with some security measures like data-centred
which is staffed on the interval of 24*7 (Wu, Yu and Madhyastha 2015, pp. 543-557). It comes
up with trained security guards for getting authorized access on privileged basis. There is a
certain number of tool which is needed for keeping a track of activities which is done by a
different user.
Critical assumptions and Constraints
Telelink needs to have a structured policy which will help the organization in running
effectively. In addition, it aims to provide the organization members for describing and
understanding the formal structure of this organization. Proper organization policies need to be
applied to each department of this organization (Newcombe et al. 2015, pp.66-73). Telelink will
allow the organization management and staff for creating a proper organization structure policy
for different organization.
Finances: An organization need to implement a proper financial policy which will help
in guiding the organization in having some defined objectives. Financial policy needs to be
Procurement: A new kind of server can take up time in between several hours to 8-10
days based on the current infrastructure (Wu, Yu and Madhyastha 2015, pp. 543-557). AWS help
in spinning up the new server in the interval of a few minutes where there is no need of buying
any separate license for different operating system and software.
Pay as per usage: Infinite space for backup and achieving need is all about the ability for
launching new server, CDN integration and transcoding media. Unlimited bandwidth and many
other servers based services will be based on the current usage.
Best security: AWS has been built for world class, high secure infrastructure which is
physically over the internet. AWS comes up with some security measures like data-centred
which is staffed on the interval of 24*7 (Wu, Yu and Madhyastha 2015, pp. 543-557). It comes
up with trained security guards for getting authorized access on privileged basis. There is a
certain number of tool which is needed for keeping a track of activities which is done by a
different user.
Critical assumptions and Constraints
Telelink needs to have a structured policy which will help the organization in running
effectively. In addition, it aims to provide the organization members for describing and
understanding the formal structure of this organization. Proper organization policies need to be
applied to each department of this organization (Newcombe et al. 2015, pp.66-73). Telelink will
allow the organization management and staff for creating a proper organization structure policy
for different organization.
Finances: An organization need to implement a proper financial policy which will help
in guiding the organization in having some defined objectives. Financial policy needs to be
8UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
clarify the process members of the organization (Wittig and Wittig 2015). Financial policy needs
to be monitored along with control expenditure which is needed for keeping a track of financial
transactions.
Staff survey: For effectively applying new organizational policies, Telelink needs to
make their whole staff as an important part of change. Application new kind of policies is
generally applied for survey for staff members which states the key issues that affect the
organization structure.
Evaluation of organization performance: Prior to adaptation of new organizational
structure policies, it needs to have an idea about day to day performance and how the
organization will make use of new policies which affect day to day operation (Narula and Jain
2015, pp. 501-505). Organization can easily evaluate by considering the specific roles of present
staff monitoring where the staff makes use of time. It is all about analyzing the specific roles of
the organization by analyzing the past performance of the organization.
Impact on organization: A firm cannot evaluate the overall impact of new policies after
the implementation of new policies. It is all about evaluation of entails for comparing mission
and vision statement (Basha, Jilan and Arun 2016, pp.84-89). In addition, there is need for
strategic objective which is needed for analyzing the organization goals both before and after the
after the changes in structured organization policy.
The method to be used for migrating from on premise servers to Cloud
There is a list of step for migrating from an on-premises server to cloud-like
Establishing migration architecture role: Prior to beginning of cloud migration, there is
need of establishing a migration architecture which leads to effort. Migration architecture is a
clarify the process members of the organization (Wittig and Wittig 2015). Financial policy needs
to be monitored along with control expenditure which is needed for keeping a track of financial
transactions.
Staff survey: For effectively applying new organizational policies, Telelink needs to
make their whole staff as an important part of change. Application new kind of policies is
generally applied for survey for staff members which states the key issues that affect the
organization structure.
Evaluation of organization performance: Prior to adaptation of new organizational
structure policies, it needs to have an idea about day to day performance and how the
organization will make use of new policies which affect day to day operation (Narula and Jain
2015, pp. 501-505). Organization can easily evaluate by considering the specific roles of present
staff monitoring where the staff makes use of time. It is all about analyzing the specific roles of
the organization by analyzing the past performance of the organization.
Impact on organization: A firm cannot evaluate the overall impact of new policies after
the implementation of new policies. It is all about evaluation of entails for comparing mission
and vision statement (Basha, Jilan and Arun 2016, pp.84-89). In addition, there is need for
strategic objective which is needed for analyzing the organization goals both before and after the
after the changes in structured organization policy.
The method to be used for migrating from on premise servers to Cloud
There is a list of step for migrating from an on-premises server to cloud-like
Establishing migration architecture role: Prior to beginning of cloud migration, there is
need of establishing a migration architecture which leads to effort. Migration architecture is a
9UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
well system architecture which is positioned responsible for planning by completing different
aspect of migration (Bates et al. 2017, pp. 887-895). The main responsibility is all about defining
the required refactoring which is needed for making the migration completely successful in
nature. It defines certain number of strategies which is needed for data migration by defining
cloud based solution. It is all about determining the migration priority and mechanism of
production. At the time of migration of large project, there are many decision and technical
aspects which have made the migration architecture.
Making a choice of level of cloud migration: At the time of moving on-premises data to
cloud there are mainly two methods like shallow and deep cloud integration. On-premises
application to cloud will not make any kind to changes to the server. Any application making
changes is enough for running through the new environment (Villamizar et al. 2015, pp. 583-
590). Shallow cloud deployment model is also known as a lift-shift model as the application is
moved to as-is moved or even moved to cloud intact. It is all about making use of computing
capabilities like AWS lambda which is a part of application. This requires the involvement of
cloud data specific store like Amazon S3.
Making a choice in between single cloud and multi-cloud: There is a need for this
application for working over the cloud providers which is very much simple in nature.
Development teams need to have a cloud API for application so that they can make advantage of
cloud provider offers (Smith and Linden 2017, pp.12-18). This particular approach comes up
with downside that is vendor lock-in. A single cloud provider can have an impact over the ability
of negotiation with respect to important terms like pricing and SLA with the provider.
Quantify Cost, Investment and strategic opportunities
well system architecture which is positioned responsible for planning by completing different
aspect of migration (Bates et al. 2017, pp. 887-895). The main responsibility is all about defining
the required refactoring which is needed for making the migration completely successful in
nature. It defines certain number of strategies which is needed for data migration by defining
cloud based solution. It is all about determining the migration priority and mechanism of
production. At the time of migration of large project, there are many decision and technical
aspects which have made the migration architecture.
Making a choice of level of cloud migration: At the time of moving on-premises data to
cloud there are mainly two methods like shallow and deep cloud integration. On-premises
application to cloud will not make any kind to changes to the server. Any application making
changes is enough for running through the new environment (Villamizar et al. 2015, pp. 583-
590). Shallow cloud deployment model is also known as a lift-shift model as the application is
moved to as-is moved or even moved to cloud intact. It is all about making use of computing
capabilities like AWS lambda which is a part of application. This requires the involvement of
cloud data specific store like Amazon S3.
Making a choice in between single cloud and multi-cloud: There is a need for this
application for working over the cloud providers which is very much simple in nature.
Development teams need to have a cloud API for application so that they can make advantage of
cloud provider offers (Smith and Linden 2017, pp.12-18). This particular approach comes up
with downside that is vendor lock-in. A single cloud provider can have an impact over the ability
of negotiation with respect to important terms like pricing and SLA with the provider.
Quantify Cost, Investment and strategic opportunities
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Cost of managing Cloud environment: At the time of setting price, cloud providers aims
to check the expense the maintaining the network. It is started by calculating the cost of network
hardware, maintaining infrastructure and labor (Ren et al. 2015, pp.317-323). The overall
expense is completely added by dividing the number of the number of rack units for business in
IaaS cloud. Each of the virtual servers will require to have a server which requires to provider to
make an investment in network hardware. There is included cost like network infrastructure
maintenance which is inclusive of security tools like firewalls, LAN switching, routing and
uplink for infrastructure. This is mainly done so that they can keep the network to run in smooth
in a way. In addition, there is additional cost of maintaining, managing, monitoring and
troubleshooting of cloud computing infrastructure (Yu et al. 2016, pp.767-778). The staff needs
to provide 24*7 basis for ensuring that there is uptime of cloud environment.
Upgrading your data Security framework to protect data: Digital technologies are
considered to be key aspect for the globalization of business. It mainly improves the overall
ability to communicate, storing and lastly sharing of information. New technologies like cloud
storage aims to provide better capabilities and enhanced risk of authorization (Arpaci 2016,
pp.150-157). The mere focus is all about providing increase in a number of regulator for
increasing constraints of data privacy.
Validate your business case using the following indicator
Return on Investment: Most of the organization like Telelink have encountered the
growing trends for driving cost reduction and IT service providers. Most of industry and leading
IT suppliers make use of software, hardware service which focuses on addressing the need of
consumer (Chang and Wills 2016, pp.56-76). ROI is proportional to increasing the value of an
Cost of managing Cloud environment: At the time of setting price, cloud providers aims
to check the expense the maintaining the network. It is started by calculating the cost of network
hardware, maintaining infrastructure and labor (Ren et al. 2015, pp.317-323). The overall
expense is completely added by dividing the number of the number of rack units for business in
IaaS cloud. Each of the virtual servers will require to have a server which requires to provider to
make an investment in network hardware. There is included cost like network infrastructure
maintenance which is inclusive of security tools like firewalls, LAN switching, routing and
uplink for infrastructure. This is mainly done so that they can keep the network to run in smooth
in a way. In addition, there is additional cost of maintaining, managing, monitoring and
troubleshooting of cloud computing infrastructure (Yu et al. 2016, pp.767-778). The staff needs
to provide 24*7 basis for ensuring that there is uptime of cloud environment.
Upgrading your data Security framework to protect data: Digital technologies are
considered to be key aspect for the globalization of business. It mainly improves the overall
ability to communicate, storing and lastly sharing of information. New technologies like cloud
storage aims to provide better capabilities and enhanced risk of authorization (Arpaci 2016,
pp.150-157). The mere focus is all about providing increase in a number of regulator for
increasing constraints of data privacy.
Validate your business case using the following indicator
Return on Investment: Most of the organization like Telelink have encountered the
growing trends for driving cost reduction and IT service providers. Most of industry and leading
IT suppliers make use of software, hardware service which focuses on addressing the need of
consumer (Chang and Wills 2016, pp.56-76). ROI is proportional to increasing the value of an
11UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
overall investment in the last few years. Utilization curve of AWS makes use of cloud computing
which is quote in most of the cases. In the figure given below, a curve is there for illustrating the
main idea for utility based services which is achieved by demand for meeting the actual usage.
Fig 1: Capacity VS Utilization Curve of AWS
(Source: Li et al. 2016, pp.786)
Quality of service: It is defined as an important factor which helps the technology and
another enterprise provider to deliver consistent and primary storage performance. Considering
the different workloads which comes up with minimum number of limited sources. It mere helps
in getting control about the fact that how different resources are shared that prevents the noisiest
application for any kind of performance disruption (Yu et al. 2015, pp.1167-1179). Without
proper storage of QOS, most of the active data will be used for storage performance that can
overall investment in the last few years. Utilization curve of AWS makes use of cloud computing
which is quote in most of the cases. In the figure given below, a curve is there for illustrating the
main idea for utility based services which is achieved by demand for meeting the actual usage.
Fig 1: Capacity VS Utilization Curve of AWS
(Source: Li et al. 2016, pp.786)
Quality of service: It is defined as an important factor which helps the technology and
another enterprise provider to deliver consistent and primary storage performance. Considering
the different workloads which comes up with minimum number of limited sources. It mere helps
in getting control about the fact that how different resources are shared that prevents the noisiest
application for any kind of performance disruption (Yu et al. 2015, pp.1167-1179). Without
proper storage of QOS, most of the active data will be used for storage performance that can
12UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
starve for addition resources. Storage architecture itself cannot accepts the legacy of storage
system which is not designed for handling.
Recommendation
Security: Considering the security aspect, cloud service providers aim to invest their
whole idea of providing a high level of security for their customer. This is mainly done as the
business Telelink completely depends on them.
Price: Cloud based software is considered as operational expenses as they are treated on
monthly basis. It comes up charges which are considered to be a part of operating expense.
Cloud software comes up with monthly and annual subscription On-premises software and
hardware are considered like capital expense. In on-premises, there is need of paying only one-
time perpetual license fees.
Service: Resource are deployed in-house and in the enterprise IT infrastructure. In
general, an enterprise model is completely responsible for maintaining solution and its related
process. There are many service of cloud computing like public, cloud and hybrid cloud.
Transformation Impact On-premises Cloud storage
Government Policy It needs to follow
government policy
It needs to follow both data
privacy policy and
government policy.
Optimizing of Application Optimization of software is
done by user
It is totally depended on
vendor that are implementing
changes.
Compliance It easily integrates with other No possibility of integration
starve for addition resources. Storage architecture itself cannot accepts the legacy of storage
system which is not designed for handling.
Recommendation
Security: Considering the security aspect, cloud service providers aim to invest their
whole idea of providing a high level of security for their customer. This is mainly done as the
business Telelink completely depends on them.
Price: Cloud based software is considered as operational expenses as they are treated on
monthly basis. It comes up charges which are considered to be a part of operating expense.
Cloud software comes up with monthly and annual subscription On-premises software and
hardware are considered like capital expense. In on-premises, there is need of paying only one-
time perpetual license fees.
Service: Resource are deployed in-house and in the enterprise IT infrastructure. In
general, an enterprise model is completely responsible for maintaining solution and its related
process. There are many service of cloud computing like public, cloud and hybrid cloud.
Transformation Impact On-premises Cloud storage
Government Policy It needs to follow
government policy
It needs to follow both data
privacy policy and
government policy.
Optimizing of Application Optimization of software is
done by user
It is totally depended on
vendor that are implementing
changes.
Compliance It easily integrates with other No possibility of integration
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
systems like network
management
with system.
Business alignment Easy to deploy for any
business purpose
The deployment is bit
complex for any business.
Security It is totally managed
internally
It is totally managed
externally.
On-demand Based on compatibility May be limited.
Operational Integration User can make choice of
integrating with network
management, remote control
software
Dependency on SLA with
vendor.
Conclusion
The above pages help us in concluding the fact that this report is all about Telelink which
is a medium-size organization that is based on Auckland. The organization take up survey and
take product orders and provide reception and 0800 services. the organization has established
itself as one largest contact center of New Zealand. In addition, the organization aims to provide
certain services like database management, generating leads, retention of customer and
processing of payment. Cloud service provider or even cloud hosting organization aims to
provide fixed size server space to client which makes use of stored data. Here the client owns the
stored data for the hosting organization owner and maintains the hardware. Cloud host aims to
offer proper access to non-stop accessibility to client data. It is all about providing secure access
to designated by clients. Data may be stored in one of the cloud across the server that is
systems like network
management
with system.
Business alignment Easy to deploy for any
business purpose
The deployment is bit
complex for any business.
Security It is totally managed
internally
It is totally managed
externally.
On-demand Based on compatibility May be limited.
Operational Integration User can make choice of
integrating with network
management, remote control
software
Dependency on SLA with
vendor.
Conclusion
The above pages help us in concluding the fact that this report is all about Telelink which
is a medium-size organization that is based on Auckland. The organization take up survey and
take product orders and provide reception and 0800 services. the organization has established
itself as one largest contact center of New Zealand. In addition, the organization aims to provide
certain services like database management, generating leads, retention of customer and
processing of payment. Cloud service provider or even cloud hosting organization aims to
provide fixed size server space to client which makes use of stored data. Here the client owns the
stored data for the hosting organization owner and maintains the hardware. Cloud host aims to
offer proper access to non-stop accessibility to client data. It is all about providing secure access
to designated by clients. Data may be stored in one of the cloud across the server that is
14UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
configured by cloud hosting organization. At present, Telelink aims to analyze the present
landscape for the long term business objectives. In the above pages of the report, an evaluation
has been done with respect to a cloud solution and deployment model. All the critical assumption
and constraints has been discussed in brief. A discussion has been carried out on the method used
for migrating from on-premises to cloud.
configured by cloud hosting organization. At present, Telelink aims to analyze the present
landscape for the long term business objectives. In the above pages of the report, an evaluation
has been done with respect to a cloud solution and deployment model. All the critical assumption
and constraints has been discussed in brief. A discussion has been carried out on the method used
for migrating from on-premises to cloud.
15UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
References
Arpaci, I., 2016. Understanding and predicting students' intention to use mobile cloud storage
services. Computers in Human Behavior, 58, pp.150-157.
Basha, S.N., Jilani, S.A.K. and Arun, M.S., 2016. An Intelligent Door System using Raspberry
Pi and Amazon Web Services IoT. International Journal of Engineering Trends and Technology
(IJETT), 33(2), pp.84-89.
Bates, A., Hassan, W.U., Butler, K., Dobra, A., Reaves, B., Cable, P., Moyer, T. and Schear, N.,
2017, April. Transparent web service auditing via network provenance functions. In Proceedings
of the 26th International Conference on World Wide Web (pp. 887-895). International World
Wide Web Conferences Steering Committee.
Chang, V. and Wills, G., 2016. A model to compare cloud and non-cloud storage of Big
Data. Future Generation Computer Systems, 57, pp.56-76.
Cui, B., Liu, Z. and Wang, L., 2015. Key-aggregate searchable encryption (KASE) for group
data sharing via cloud storage. IEEE Transactions on computers, 65(8), pp.2374-2385.
Cui, Y., Lai, Z., Wang, X. and Dai, N., 2017. QuickSync: Improving synchronization efficiency
for mobile cloud storage services. IEEE Transactions on Mobile Computing, 16(12), pp.3513-
3526.
Esposito, C., Ficco, M., Palmieri, F. and Castiglione, A., 2015. Smart cloud storage service
selection based on fuzzy logic, theory of evidence and game theory. IEEE Transactions on
computers, 65(8), pp.2348-2362.
References
Arpaci, I., 2016. Understanding and predicting students' intention to use mobile cloud storage
services. Computers in Human Behavior, 58, pp.150-157.
Basha, S.N., Jilani, S.A.K. and Arun, M.S., 2016. An Intelligent Door System using Raspberry
Pi and Amazon Web Services IoT. International Journal of Engineering Trends and Technology
(IJETT), 33(2), pp.84-89.
Bates, A., Hassan, W.U., Butler, K., Dobra, A., Reaves, B., Cable, P., Moyer, T. and Schear, N.,
2017, April. Transparent web service auditing via network provenance functions. In Proceedings
of the 26th International Conference on World Wide Web (pp. 887-895). International World
Wide Web Conferences Steering Committee.
Chang, V. and Wills, G., 2016. A model to compare cloud and non-cloud storage of Big
Data. Future Generation Computer Systems, 57, pp.56-76.
Cui, B., Liu, Z. and Wang, L., 2015. Key-aggregate searchable encryption (KASE) for group
data sharing via cloud storage. IEEE Transactions on computers, 65(8), pp.2374-2385.
Cui, Y., Lai, Z., Wang, X. and Dai, N., 2017. QuickSync: Improving synchronization efficiency
for mobile cloud storage services. IEEE Transactions on Mobile Computing, 16(12), pp.3513-
3526.
Esposito, C., Ficco, M., Palmieri, F. and Castiglione, A., 2015. Smart cloud storage service
selection based on fuzzy logic, theory of evidence and game theory. IEEE Transactions on
computers, 65(8), pp.2348-2362.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Fazio, M., Celesti, A., Puliafito, A. and Villari, M., 2015. Big data storage in the cloud for smart
environment monitoring. Procedia Computer Science, 52, pp.500-506.
Li, J., Lin, X., Zhang, Y. and Han, J., 2016. KSF-OABE: outsourced attribute-based encryption
with keyword search function for cloud storage. IEEE Transactions on Services
Computing, 10(5), pp.715-725.
Li, J., Yao, W., Zhang, Y., Qian, H. and Han, J., 2016. Flexible and fine-grained attribute-based
data storage in cloud computing. IEEE Transactions on Services Computing, 10(5), pp.785-796.
Liang, K. and Susilo, W., 2015. Searchable attribute-based mechanism with efficient data
sharing for secure cloud storage. IEEE Transactions on Information Forensics and
Security, 10(9), pp.1981-1992.
Liu, J., Huang, K., Rong, H., Wang, H. and Xian, M., 2015. Privacy-preserving public auditing
for regenerating-code-based cloud storage. IEEE transactions on information forensics and
security, 10(7), pp.1513-1528.
Narula, S. and Jain, A., 2015, February. Cloud computing security: Amazon web service.
In 2015 Fifth International Conference on Advanced Computing & Communication
Technologies (pp. 501-505). IEEE.
Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M. and Deardeuff, M., 2015. How
Amazon web services uses formal methods. Communications of the ACM, 58(4), pp.66-73.
Ren, Y.J., Shen, J., Wang, J., Han, J. and Lee, S.Y., 2015. Mutual verifiable provable data
auditing in public cloud storage. 網網網網網網網網, 16(2), pp.317-323.
Fazio, M., Celesti, A., Puliafito, A. and Villari, M., 2015. Big data storage in the cloud for smart
environment monitoring. Procedia Computer Science, 52, pp.500-506.
Li, J., Lin, X., Zhang, Y. and Han, J., 2016. KSF-OABE: outsourced attribute-based encryption
with keyword search function for cloud storage. IEEE Transactions on Services
Computing, 10(5), pp.715-725.
Li, J., Yao, W., Zhang, Y., Qian, H. and Han, J., 2016. Flexible and fine-grained attribute-based
data storage in cloud computing. IEEE Transactions on Services Computing, 10(5), pp.785-796.
Liang, K. and Susilo, W., 2015. Searchable attribute-based mechanism with efficient data
sharing for secure cloud storage. IEEE Transactions on Information Forensics and
Security, 10(9), pp.1981-1992.
Liu, J., Huang, K., Rong, H., Wang, H. and Xian, M., 2015. Privacy-preserving public auditing
for regenerating-code-based cloud storage. IEEE transactions on information forensics and
security, 10(7), pp.1513-1528.
Narula, S. and Jain, A., 2015, February. Cloud computing security: Amazon web service.
In 2015 Fifth International Conference on Advanced Computing & Communication
Technologies (pp. 501-505). IEEE.
Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M. and Deardeuff, M., 2015. How
Amazon web services uses formal methods. Communications of the ACM, 58(4), pp.66-73.
Ren, Y.J., Shen, J., Wang, J., Han, J. and Lee, S.Y., 2015. Mutual verifiable provable data
auditing in public cloud storage. 網網網網網網網網, 16(2), pp.317-323.
17UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Smith, B. and Linden, G., 2017. Two decades of recommender systems at Amazon. com. Ieee
internet computing, 21(3), pp.12-18.
Villamizar, M., Garcés, O., Castro, H., Verano, M., Salamanca, L., Casallas, R. and Gil, S.,
2015, September. Evaluating the monolithic and the microservice architecture pattern to deploy
web applications in the cloud. In 2015 10th Computing Colombian Conference (10CCC) (pp.
583-590). IEEE.
Wittig, A. and Wittig, M., 2015. Amazon web services in action. Manning Publications Co..
Wu, Z., Yu, C. and Madhyastha, H.V., 2015. Costlo: Cost-effective redundancy for lower
latency variance on cloud storage services. In 12th {USENIX} Symposium on Networked Systems
Design and Implementation ({NSDI} 15) (pp. 543-557).
Wu, Z., Yu, C. and Madhyastha, H.V., 2015. Costlo: Cost-effective redundancy for lower
latency variance on cloud storage services. In 12th {USENIX} Symposium on Networked Systems
Design and Implementation ({NSDI} 15) (pp. 543-557).
Xiao, L., Xu, D., Xie, C., Mandayam, N.B. and Poor, H.V., 2017. Cloud storage defense against
advanced persistent threats: A prospect theoretic study. IEEE Journal on Selected Areas in
Communications, 35(3), pp.534-544.
Yu, J., Ren, K. and Wang, C., 2016. Enabling cloud storage auditing with verifiable outsourcing
of key updates. IEEE transactions on information forensics and security, 11(6), pp.1362-1375.
Yu, J., Ren, K., Wang, C. and Varadharajan, V., 2015. Enabling cloud storage auditing with key-
exposure resistance. IEEE Transactions on Information forensics and security, 10(6), pp.1167-
1179.
Smith, B. and Linden, G., 2017. Two decades of recommender systems at Amazon. com. Ieee
internet computing, 21(3), pp.12-18.
Villamizar, M., Garcés, O., Castro, H., Verano, M., Salamanca, L., Casallas, R. and Gil, S.,
2015, September. Evaluating the monolithic and the microservice architecture pattern to deploy
web applications in the cloud. In 2015 10th Computing Colombian Conference (10CCC) (pp.
583-590). IEEE.
Wittig, A. and Wittig, M., 2015. Amazon web services in action. Manning Publications Co..
Wu, Z., Yu, C. and Madhyastha, H.V., 2015. Costlo: Cost-effective redundancy for lower
latency variance on cloud storage services. In 12th {USENIX} Symposium on Networked Systems
Design and Implementation ({NSDI} 15) (pp. 543-557).
Wu, Z., Yu, C. and Madhyastha, H.V., 2015. Costlo: Cost-effective redundancy for lower
latency variance on cloud storage services. In 12th {USENIX} Symposium on Networked Systems
Design and Implementation ({NSDI} 15) (pp. 543-557).
Xiao, L., Xu, D., Xie, C., Mandayam, N.B. and Poor, H.V., 2017. Cloud storage defense against
advanced persistent threats: A prospect theoretic study. IEEE Journal on Selected Areas in
Communications, 35(3), pp.534-544.
Yu, J., Ren, K. and Wang, C., 2016. Enabling cloud storage auditing with verifiable outsourcing
of key updates. IEEE transactions on information forensics and security, 11(6), pp.1362-1375.
Yu, J., Ren, K., Wang, C. and Varadharajan, V., 2015. Enabling cloud storage auditing with key-
exposure resistance. IEEE Transactions on Information forensics and security, 10(6), pp.1167-
1179.
18UUIS 8000 GLOBAL INFORMATION SYSTEMS STRATEGY
Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y. and Min, G., 2016. Identity-
based remote data integrity checking with perfect data privacy preserving for cloud
storage. IEEE Transactions on Information Forensics and Security, 12(4), pp.767-778.
Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y. and Min, G., 2016. Identity-
based remote data integrity checking with perfect data privacy preserving for cloud
storage. IEEE Transactions on Information Forensics and Security, 12(4), pp.767-778.
1 out of 19
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.