Skip to content
Halrobotics NetFree custom papers
  • College research paper
  • Sample Page

MilleniAds’ IT Solution

May 17, 2020

MILLENIADS’ IT SOLUTION 9

MilleniAds’IT Solution

MilleniAds’IT Solution

MilleniAdsrequires a simple, interactive, and user-friendly system that willallow employees and management to share information. Millennials areconsidered as technological savvy and prefer flexibility in the useof technologies anywhere they operate. Since some employees will workremotely, there is need to facilitate communication to ensure smoothoperations. The workplace is changing with employees having a greaterinterest in telecommuting. I will recommend adoption of efficient andcost-effective cloud computing solution through a virtual privatenetwork that allows all employees even those working remotely toaccess and shares files and applications from any place at any timeusing their device.

Benefitsof Cloud Computing

Cloudcomputing provides a client-server model as opposed to thetraditional mainframe computing. Different applications will run on asingle system allowing shared resources to be utilized as anaggregated virtual computer. Hardware, software, and networkselection will aim to reduce cost as resources are obtained whenrequired and paid for when utilized. Secondly, it increases employeeproductivity as they concentrate on delivering as opposed tomaintaining software and hardware (Erl,2013).Additionally, cloud computing provides for robust scalability withoutlasting commitments. Other benefits include enhanced security,intelligent monitoring, and increased transparency. Besides, the firmwill be able to meet its disaster recovery and business continuityneeds. Additionally, it will support the remote employees by offeringa secure way to access business data (Rittinghouse,2016).

Thecloud-hosted desktop enhances security against malicious attacks.Besides, the manager will monitor the employees’ performance inreal-time despite the BYOD policy. Additionally, personal andbusiness phone numbers will be integrated to enhance communication,control, and visibility. The cloud service will enhance web meetings,business SMS, online faxing, online printing, and audio conferencingto enhance collaboration, efficiency, and productivity. The cloudservice will be supported by a mobile app and a powerful corporatephone system that links to a smartphone, desk phone, tablet, andpersonal computer.

HostedVirtual Desktop (inHVD)

Thehosted virtual desktop (HVD) or the Desktop as a Service (DaaS) willallow employees access and share their whole digital workspace fromany device either a desktop, mobile phone, tablet, or laptop. Dataand application will be hosted on a very secure virtual private datacenter platform. The flexible solution will also be compatible withAndroid, Chrome, Apple, Linux, and Windows operating systems.

Thefeatures will support seamless experiences as employees access theirdigital workspace from many devices simultaneously. The stringentsecurity measures will be considered to protect the firm’s datainclusive of data encryption, daily snapshots that are saved for tendays, and in-built infrastructure redundancy (Rittinghouse,2016).

CloudNetworking

Thesystem will use the Wide Area Networking (WAN) to access networkingresources.

Source:(Rittinghouse,2016)

EnhancedInternet access, as well as more dependable WAN bandwidth, hasdirected additional networking management functions into the cloud. The WAN connection will be used in the creation and managing a secureprivate network. Management, connectivity, control, and security willbe pushed to the cloud and provided as a service. Several accessdevices and networking switches will be organized as shared, virtualresources over a wide area through Cloud WAN/Software DefinedNetworking (SDN) technology/ Software-Defined WAN (SD-WAN).

CloudInformation Security

The cloud solution will also integrate a Cloud Private NetworkConnection (CPNC) to offer fast, secure, reliable, and efficientaccess to the cloud services anywhere the employees operate. Thesecure, seamless, and high-speed cloud connectivity will bypasspublic Internet to access the firm’s cloud service (Erl, 2013).Ensuring private connectivity will enhance network throughput,superior end-user experience, as well as persistent networkperformance as opposed to the Internet-based connections. The CNPCwill be used to directly route traffic in the network by using theprivate connect (virtual port) or direct connect (physical port) toconnect the cloud network.

CloudComputing Infrastructure (Hardware and Software)

Theselection of cloud computing infrastructure will consider the budgetconstraints without compromising quality. State-of-the-art softwareand hardware will be used to manage the cloud platform besides, itwill be entirely orchestrated and automated through purpose-builtsoftware. The cloud solution will include virtualization technology,operating system software, WAN optimization elements, and an internetnetwork (Rittinghouse,2016). The hardware components will include front-end platform (mobiledevice and tablets), a network (internet, inter-cloud, and intranet),a cloud-based delivery, backend platforms (storage, servers). Otherperipheral hardware will also be considered.

Thecloud infrastructure will include storage devices, platformvirtualization, deployment software, servers, cloud managementsoftware, and network. Given the budgetary constraints, the firm’scloud solution will adopt the Infrastructure as a Service (IaaS) asthe main software I recommend either the Apple iCloud or IBM®Cloud. The firm will control the operating system, networkcomponents, deployment applications, and storage. Besides, the firmwill adopt a private cloud formation where the cloud solution willexist within the firm’s firewall and managed internally.

Userswill be given access privileges on certain data depending on theirrole and position in the company. Such privileges will limit whochanges data, copy, or deletes files in the cloud system. Eachemployee will have his or her account on the cloud service. Insteadof passwords, the system will use SSH Key authentication to enhancesecurity. SSH keys are usually two cryptographic keys utilized tovalidate access to a server. The system creates a public and privatekey pair before verification. The public key can openly be sharedwhile the private key is kept confidential. The naming conventionwill ensure that the file provides a content preview besides, fileswill be chronologically organized, convey the work history, andidentifies the responsible person (Rittinghouse,2016).

Iwould recommend the following hardware that will support the cloudcomputing functions: desktop computers, laptops, smartphones,tablets, memory, routers, servers, switches, end node, gateways, hub,and switch ports, switch indicator lights, CSU/DSU, and networkcards. Others include cables connecting switches and hubs, as well asrack mount, stackable, and freestanding devices (Erl, 2013). Lastly,the wireless access points (WAPs), modems, external hard drivesnetwork interface cards (NICs), system area network cards, and ISDNadapters.

Conclusion

Asdiscussed, I am confident that adoption of efficient andcost-effective cloud computing solution through a virtual privatenetwork will allow all employees even those working remotely toaccess and shares files and applications from any place at any timeusing their device.

References

Erl,T., Puttini, R., &amp Mahmood, Z. (2013).&nbspCloudcomputing: concepts, technology &amp architecture.Pearson Education.

Rittinghouse,J. W., &amp Ransome, J. F. (2016).&nbspCloudcomputing: implementation, management, and security.CRC press.

No related posts.

Recent Posts

  • ProjectID
  • Indoor Air Pollution Prevention
  • Biodiversity
  • Prejudice and Discrimination
  • Report on the Geology of San Francisco as Viewed in Corona Heights
  • Mock Public Address Speech Write-up

Copyright Halrobotics Net 2021 | Theme by ThemeinProgress | Proudly powered by WordPress