Nt1330 Unit 3 Assignment 1

Brilliant Essays
INTRODUCTION
Midland Insulation Products (MIP) is a Carlow based manufacturing company who specialized in the manufacturing and distribution of insulation products that are employed for building. MIP has implemented Information Systems that handle Manufacturing, Warehousing & Distributions, Finances, Electronic Data Interchange (EDI), Marketing & Sales, Payroll, Customer Relation Management (CRM) & Human Resources (HR). All MIP servers are hosted, on premise and located in one of the two data centres. The CEO of MIP believes that data centres are too expensive to run and would like to work for cloud because cloud offers the best long term solution for hosting MIP servers and applications.
As IT Manager, I have been asked to produce a report
…show more content…
The Nist Definition of Cloud Computing. . 2015. . [ONLINE] Available at: http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf. [Accessed 17 October 2015]
What is Cloud Computing? - Salesforce Europe. 2015. What is Cloud Computing? - Salesforce Europe. [ONLINE] Available at: http://www.salesforce.com/eu/cloudcomputing/. [Accessed 17 October 2015]
What is cloud computing? - Cloud lounge. 2015. What is cloud computing? - Cloud lounge. [ONLINE] Available at: http://www.cloud-lounge.org/EN/what-is-cloud-computing.html. [Accessed 16 October 2015].
Types of Cloud Computing: Private, Public and Hybrid Clouds - Appcore. 2015. Types of Cloud Computing: Private, Public and Hybrid Clouds - Appcore. [ONLINE] Available at: http://www.appcore.com/types-cloud-computing-private-public-hybrid-clouds/. [Accessed 17 October 2015].
6 Types of Cloud Computing. 2015. 6 Types of Cloud Computing. [ONLINE] Available at: http://www.unitiv.com/it-solutions-blog/bid/77277/6-Types-of-Cloud-Computing. [Accessed 17 October 2015].
5 Ways to Mitigate Cloud Computing Risks - HardBoiled. 2015. 5 Ways to Mitigate Cloud Computing Risks - HardBoiled. [ONLINE] Available at: http://blog.neweggbusiness.com/over-easy/5-ways-mitigate-cloud-computing-risks/. [Accessed 18 October

Related Documents

  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    10. Private Cloud This is a type of cloud computing that similar to a public cloud, but a private cloud is dedicated to one…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    • Consistent with a risk-management approach for in-house services, outsourced cloud services should be surveyed against an association's risk criteria with the aim of distinguishing basic resources, analyzing potential vulnerabilities and threats to those assets, and building up an appropriate risk-mitigation technique. • Lack of physical control of framework, as happens when the environment is outsourced to an third-party CSP, renders an intensive risk-management process. • In customary situations, the physical area of sensitive data can be confined to dedicated systems, encouraging the distinguishing proof and execution of successful risk-mitigation controls. • Traditional security approaches that construct security controls "around"…

    • 147 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Hubstor Case Summary

    • 613 Words
    • 3 Pages

    FOR IMMEDIATE RELEASE (Kanata, ON) HubStor (http://www.hubstor.net) proudly announces they have been named one of the 20 most promising Azure storage providers by CIO Reviews. Data terabytes continue to increasing at amazing rates, thus concerns about security threats are also mounting. This leads to more companies adopting cloud storage their data is protected and archived. The first hybrid cloud storage solution that is data-aware, HubStor brings disenfranchised IT leaders back to the cloud, as it resolves many of the issues seen with this data storage and archiving option and simplifies data growth management.…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    How much does childcare cost? Retrieved September 28, 2016 from http://www.babycenter.com/0_how-much-youll-spend-on-childcare_1199776.bc Gillis, C. (2008). Why you won 't get daycare: workers want on-site daycare, so why don 't more firms offer it?. Maclean 's, (40). 72.…

    • 1180 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Pros and Cons of moving enterprise-wide applications to the Cloud Cloud Technology Cloud is nothing but internet. Cloud computing is the delivery of all the on-demand computing services over the internet on a pay as you go basis. Benefits of Cloud: The setup cost is less or zero: Cloud is based on Software as a Service (SAAS). Set up cost is low or nearly zero as we don’t have to setup heavy hardware machinery or develop any software to use cloud solutions.…

    • 964 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    2.8 Plan and Timeline Phase I research will require only the resources supplied by UMBC and RLM Communications. Additional resources will be required in Phase II and those will need to be secured ahead of our Phase II timeline. In Phase I, the following timeline will be required to secure the stated resources: 3 The Innovation (1-3 Pages) 3.1 Description A detailed description of our innovation is provided in the Technical Discussion and R&D Plan.…

    • 898 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Akamai Technologies Established Year: 1998 CEO: F. Thomson Leighton Founders: Jonathan Seelig, Randall Kaplan, F. Thomson Leighton, Daniel Lewin Headquarters: Cambridge, Massachusetts, United States Country: United States Website: www.akamai.com Building up AKAMAI Technologies: With a wide variety of internet users throughout the globe, it becomes a challenging task for the internet providers to provide speedy service for the optimum web performance. The company that aimed at the new ways of delivering internet content to its users that came into existence in the year 1998 was Akamai technologies.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    B D E C O S Y S T E M 2 0 1 5 Petersohn, D. ; Spencer, M. ; Fratila, A. ; Chi-RenShyu Present a novel method by using an in-memory computing environment database for all mammals in Ensembl release 80 for identifying, extracting, and indexing palindromes in a searchable. [27] Rathore, M.Mazhar ; Ahmad, Awais ; Paul, Anand ; Daniel, Alfred Proposes a set of requirements for obtaining pervasive, integrated information system of EOS and associated services like real-time and offline data processing. [28] Ling Cen ; Ruta, D. ; Ng, Jason. Proposed a method for Big Data analytics to improve the students' learning and maximise their knowledge retention.…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    TABLE OF CONTENTS NETFLIX, INC. 1 Company Images Montage 1 INTRODUCTION 2 Purpose Statement 2 Company Profile: Netflix, Inc. 3 Industry Profile: Video Tape and Disc Rental 4 INTERNAL ENVIRONMENT ANALYSIS 8 Resources 8 Capabilities 11 Core Competencies and Distinctive Competencies 14…

    • 7315 Words
    • 30 Pages
    Improved Essays
  • Improved Essays

    avoiding such attacks such as Intrusion Detection System (IDS) which is the most popular method of defense [29]. A defense federation is used in [29] for guarding against such attacks. Under this technique each cloud is loaded with separate IDS. The different intrusion detection systems work on the basis of information that is exchange between these systems.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    1.1 INTRODUCTION TO CLOUD COMPUTING The running generation of world, cloud computing has become the most powerful, chief and also lightning technology. The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN.…

    • 910 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Cloud Computing Attacks

    • 1811 Words
    • 8 Pages

    In its beginning, the Internet was much slower than it is today, requiring companies to host their own networks in order to interconnect their computer systems. As the Internet continues to evolve and become faster with each passing year, the ability has emerged for companies to cut costs by offloading their networks to companies who host these services over the Internet. This practice has widely come to be known as Cloud Computing. The benefits of such a service are many, but it does come with its own risks. Those who take advantage of such services are exposed to various attacks utilizing the Internet.…

    • 1811 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    For example, Pacejet Cloud Shipping integrate with FedEx shipping service to reduce cost and increase efficiency of their work (FedEx, n.d.). Pacejet transfer the Enterprise Resources Planning (ERP) integration to the users without costly software. With cloud computing software, FedEx customer can take advantage of tracking their package shipment without duplicate data…

    • 944 Words
    • 4 Pages
    Improved Essays