Nt1330 Unit 3 Assignment 1

Brilliant Essays
INTRODUCTION
Midland Insulation Products (MIP) is a Carlow based manufacturing company who specialized in the manufacturing and distribution of insulation products that are employed for building. MIP has implemented Information Systems that handle Manufacturing, Warehousing & Distributions, Finances, Electronic Data Interchange (EDI), Marketing & Sales, Payroll, Customer Relation Management (CRM) & Human Resources (HR). All MIP servers are hosted, on premise and located in one of the two data centres. The CEO of MIP believes that data centres are too expensive to run and would like to work for cloud because cloud offers the best long term solution for hosting MIP servers and applications.
As IT Manager, I have been asked to produce a report
…show more content…
The Nist Definition of Cloud Computing. . 2015. . [ONLINE] Available at: http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf. [Accessed 17 October 2015]
What is Cloud Computing? - Salesforce Europe. 2015. What is Cloud Computing? - Salesforce Europe. [ONLINE] Available at: http://www.salesforce.com/eu/cloudcomputing/. [Accessed 17 October 2015]
What is cloud computing? - Cloud lounge. 2015. What is cloud computing? - Cloud lounge. [ONLINE] Available at: http://www.cloud-lounge.org/EN/what-is-cloud-computing.html. [Accessed 16 October 2015].
Types of Cloud Computing: Private, Public and Hybrid Clouds - Appcore. 2015. Types of Cloud Computing: Private, Public and Hybrid Clouds - Appcore. [ONLINE] Available at: http://www.appcore.com/types-cloud-computing-private-public-hybrid-clouds/. [Accessed 17 October 2015].
6 Types of Cloud Computing. 2015. 6 Types of Cloud Computing. [ONLINE] Available at: http://www.unitiv.com/it-solutions-blog/bid/77277/6-Types-of-Cloud-Computing. [Accessed 17 October 2015].
5 Ways to Mitigate Cloud Computing Risks - HardBoiled. 2015. 5 Ways to Mitigate Cloud Computing Risks - HardBoiled. [ONLINE] Available at: http://blog.neweggbusiness.com/over-easy/5-ways-mitigate-cloud-computing-risks/. [Accessed 18 October

Related Documents

  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    • Consistent with a risk-management approach for in-house services, outsourced cloud services should be surveyed against an association's risk criteria with the aim of distinguishing basic resources, analyzing potential vulnerabilities and threats to those assets, and building up an appropriate risk-mitigation technique. • Lack of physical control of framework, as happens when the environment is outsourced to an third-party CSP, renders an intensive risk-management process. • In customary situations, the physical area of sensitive data can be confined to dedicated systems, encouraging the distinguishing proof and execution of successful risk-mitigation controls. • Traditional security approaches that construct security controls "around"…

    • 147 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hubstor Case Summary

    • 613 Words
    • 3 Pages

    FOR IMMEDIATE RELEASE (Kanata, ON) HubStor (http://www.hubstor.net) proudly announces they have been named one of the 20 most promising Azure storage providers by CIO Reviews. Data terabytes continue to increasing at amazing rates, thus concerns about security threats are also mounting. This leads to more companies adopting cloud storage their data is protected and archived. The first hybrid cloud storage solution that is data-aware, HubStor brings disenfranchised IT leaders back to the cloud, as it resolves many of the issues seen with this data storage and archiving option and simplifies data growth management.…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    How much does childcare cost? Retrieved September 28, 2016 from http://www.babycenter.com/0_how-much-youll-spend-on-childcare_1199776.bc Gillis, C. (2008). Why you won 't get daycare: workers want on-site daycare, so why don 't more firms offer it?. Maclean 's, (40). 72.…

    • 1180 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Pros and Cons of moving enterprise-wide applications to the Cloud Cloud Technology Cloud is nothing but internet. Cloud computing is the delivery of all the on-demand computing services over the internet on a pay as you go basis. Benefits of Cloud: The setup cost is less or zero: Cloud is based on Software as a Service (SAAS). Set up cost is low or nearly zero as we don’t have to setup heavy hardware machinery or develop any software to use cloud solutions.…

    • 964 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.8 Plan and Timeline Phase I research will require only the resources supplied by UMBC and RLM Communications. Additional resources will be required in Phase II and those will need to be secured ahead of our Phase II timeline. In Phase I, the following timeline will be required to secure the stated resources: 3 The Innovation (1-3 Pages) 3.1 Description A detailed description of our innovation is provided in the Technical Discussion and R&D Plan.…

    • 898 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Akamai Technologies Established Year: 1998 CEO: F. Thomson Leighton Founders: Jonathan Seelig, Randall Kaplan, F. Thomson Leighton, Daniel Lewin Headquarters: Cambridge, Massachusetts, United States Country: United States Website: www.akamai.com Building up AKAMAI Technologies: With a wide variety of internet users throughout the globe, it becomes a challenging task for the internet providers to provide speedy service for the optimum web performance. The company that aimed at the new ways of delivering internet content to its users that came into existence in the year 1998 was Akamai technologies.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    TABLE OF CONTENTS NETFLIX, INC. 1 Company Images Montage 1 INTRODUCTION 2 Purpose Statement 2 Company Profile: Netflix, Inc. 3 Industry Profile: Video Tape and Disc Rental 4 INTERNAL ENVIRONMENT ANALYSIS 8 Resources 8 Capabilities 11 Core Competencies and Distinctive Competencies 14…

    • 7315 Words
    • 30 Pages
    Improved Essays
  • Improved Essays

    B D E C O S Y S T E M 2 0 1 5 Petersohn, D. ; Spencer, M. ; Fratila, A. ; Chi-RenShyu Present a novel method by using an in-memory computing environment database for all mammals in Ensembl release 80 for identifying, extracting, and indexing palindromes in a searchable. [27] Rathore, M.Mazhar ; Ahmad, Awais ; Paul, Anand ; Daniel, Alfred Proposes a set of requirements for obtaining pervasive, integrated information system of EOS and associated services like real-time and offline data processing. [28] Ling Cen ; Ruta, D. ; Ng, Jason. Proposed a method for Big Data analytics to improve the students' learning and maximise their knowledge retention.…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    avoiding such attacks such as Intrusion Detection System (IDS) which is the most popular method of defense [29]. A defense federation is used in [29] for guarding against such attacks. Under this technique each cloud is loaded with separate IDS. The different intrusion detection systems work on the basis of information that is exchange between these systems.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    1.1 INTRODUCTION TO CLOUD COMPUTING The running generation of world, cloud computing has become the most powerful, chief and also lightning technology. The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.…

    • 910 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Cloud Computing Attacks

    • 1811 Words
    • 8 Pages

    In its beginning, the Internet was much slower than it is today, requiring companies to host their own networks in order to interconnect their computer systems. As the Internet continues to evolve and become faster with each passing year, the ability has emerged for companies to cut costs by offloading their networks to companies who host these services over the Internet. This practice has widely come to be known as Cloud Computing. The benefits of such a service are many, but it does come with its own risks. Those who take advantage of such services are exposed to various attacks utilizing the Internet.…

    • 1811 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    For example, Pacejet Cloud Shipping integrate with FedEx shipping service to reduce cost and increase efficiency of their work (FedEx, n.d.). Pacejet transfer the Enterprise Resources Planning (ERP) integration to the users without costly software. With cloud computing software, FedEx customer can take advantage of tracking their package shipment without duplicate data…

    • 944 Words
    • 4 Pages
    Improved Essays