Cloud Computing Strategy
Cloud computing is becoming big now, because it is easy to see how this kind of computing can be beneficial to all different types of businesses. Because of the value of cloud computing, the federal government is considering moving much of their information technology workload to the "cloud." In other words, much of the information would be stored in a way that would make access to it - for intended parties - much easier and much faster. This could help with efficiency and reduce the need for a data center, but it is not without its concerns and difficulties. The 25 Point Implementation Plan to Reform Federal Information Technology (Kundra, 2010) institutes a "Cloud First" policy to help accelerate and standardize the adoption of cloud computing solutions across the U.S. Federal government. It will be analyzed here in an effort to better understand what cloud computing can offer to the government and what possible concerns may also be raised by moving potentially vital and sensitive information away from current data servers and into the cloud.
Even though information technology (IT) is wildly popular and has increased productivity and efficiency significantly in the private sector, the federal government has not seen the same levels of productivity and efficiency, despite spending $600 billion over ten years (Kundra, 2010). Often, IT projects are over budget and behind schedule, despite the fact that the government has been focused on adopting best practices. Obstacles always seem to get in the way of what should (and can) be done (Kundra, 2010). In order to create the action plan, Kundra (2010) worked with academics, industry experts, and others. Detailed input and recommendations were provided from all individuals involved in the discussions, and that information was used in order to create the 25 point action plan. These points will not "fix" the issues, but they will help to move toward correcting the more pressing challenges the government is facing.
There are several things the 25 point plan is specifically designed to provide to the federal government. These include:
Gaining efficiency
Data center reduction
Identifying and moving three services to the cloud in 18 months
Portfolio management
Long-term planning
Each one of those issues must be discussed, in order to get a better understanding of what the plan has to offer and the differences it will make when it comes to the federal government and how it handles its computing issues.
As for gaining efficiency, the mindset of the federal government must be shifted to a point where it stops focusing on building custom systems (Kundra, 2010). Custom is nice, but it also takes a long time and costs more money. Because of that, shared solutions and light technologies are what really should be adopted (Kundra, 2010). If these are adopted, the government will be much more likely to focus on the changes that need to be made, instead of spending too much time and money considering custom issues that are really not needed. There are so many options available in the cloud computing sector today that it is not necessary to get something customized, and that is true even with the government. Available options can generally be utilized, and it is not necessary to get custom systems too often anymore, despite the fact that the government will have demands that would not be the same as what would be seen in the private sector (Kundra, 2010).
The reduction of data centers is something else that is indicated by the plan. It will be possible to save a great deal of money by reducing data centers, and over five years that could mean a 50% reduction in the costs associated with IT in the federal government. When agencies focus on reducing their data centers, the price of taking care of business is drastically reduced, and that means that the money saved can...
cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.
Cloud Computing Assessing the Risks of Cloud Computing Despite the many economic advantages of cloud computing, there are just as many risks, both at the information technologies (IT) and strategic level for any enterprise looking to integrate them into their operations. The intent of this analysis is to evaluate three of the top risks of cloud computing and provide prescriptive analysis and insight into how best to manage each. Despite widespread skepticism
This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational
Cloud computing continues to proliferate most of the worlds largest companies, governments, and organization. Its benefits create a compelling value proposition for nearly all stakeholder groups in the form of higher efficiencies, better access to data, and better reliability. Unfortunately these benefits result in a corresponding increase in security vulnerabilities. This document will address these vulnerabilities and how they impact organizations utilizing cloud computing. Emphasis will be place on the
Connect the Dots for Your Company Network and Hardware Section of the Google Strategic Plan The following network and hardware section of the Google strategic plan is predicated on how the Google business model will increasingly concentrate on cloud computing as a core sector of organic new growth. Reducing the overall cost of ownership, increasing reliability and service responsiveness, and increasing the capacity to quickly launch new services is critical to attaining
Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now