Concepts of virtualization based on the business

Assignment Help Management Information Sys
Reference no: EM133468422

Assignment:

In this milestone, you will explain the concepts of virtualization based on the business scenario provided. This milestone will prepare you for your Project One that is due in Module Five. If you have questions or want to share ideas about this project, please post them to the General Questions discussion.

Scenario

The company you work for, Packages Plus Delivery (PPD), currently houses its physical computing environments on site. Packages Plus Delivery is growing, including the number of packages delivered and the number of employees hired each quarter. As a result of this growth and to better meet the needs of the clients, organizational leadership recently made the decision to virtualize all computing environments.

Leadership is deciding between internal virtualization and the use of an external vendor. They are also considering a move to cloud-based architecture but want to know more about the risks and cost benefits of moving to a cloud environment.

As a virtual solutions analyst at Packages Plus Delivery, you serve on the Virtualization Transition Committee. This group has been asked to create a presentation that emphasizes how the decision to move to virtualization will improve business strategy, and what the options are if the company considers moving the infrastructure to a cloud environment. Your presentation will ensure that leadership makes an informed decision.

Prompt

You have been asked to create a presentation that supports the company's decision to move to virtualization. Within the presentation, you must address each of the following critical elements:

Describe how the company's decision to move to a virtual computing environment will impact its business strategy. If you use sources, be sure to provide a citation.

You must include:

1. The benefits of your company's decision to move to a virtual computing environment

2. The constraints of the decision to move to a virtual computing environment

3. An explanation of how moving to virtualization will impact the scalability of the business

  • The costs of moving to virtualization
  • The hardware and software, and other technologies involved

In order to provide the most detailed information, you need to compare the implications of the organization moving to a virtual environment using its hardware servers in-house with the implications of using a third-party vendor to virtualize. You may create a visual (such as a Venn diagram) or write a passage to explain these concepts. You will need to compare the following factors and describe the advantages, disadvantages, and risks associated with each:

  • Cost: equipment such as hardware and software, maintenance (e.g., upgrades and backups), licensing, security (e.g., shared responsibility, on premises)
  • Capacity
  • Agility
  • Service availability

Reference no: EM133468422

Questions Cloud

Describe proper communication techniques : Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts.
Types of external physical security : Name two types of external physical security and two types of internal physical security that must exist in an organization.
Example of a social way of communicating risk : Provide an example of a social way of communicating risk and provide an example of an antisocial way of communicating risk.
How do i restore my window 11 pc to an earlier day : How do I restore my window 11 PC to an earlier day. for example to a day one week from today. can you please send me the steps on how to do that?
Concepts of virtualization based on the business : They are also considering a move to cloud-based architecture but want to know more about the risks and cost benefits of moving to a cloud environment.
Identify the value of information systems : Also, for each competitive strategy you identify, give an IT technology example that can apply to support that strategy.
Which restrictive cyber regulations eu versus us cyber law : We now have new foreign threat actors that we have to prepare for which includes more restrictive cyber regulations from the EU versus US cyber law.
What is the role of artificial intelligence in detecting : Biometric Spoofing: What is the role of machine learning and artificial intelligence in detecting and preventing biometric spoofing attacks?
Discuss how they failed to operate ethically : There are a few important elements to be considered prior to planning, such as explicitly stating ethical, entrepreneurial, and philosophical perspectives.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evolution of the purchasing and supply management profession

Detailed Explanation to Supply Chain Management - What are the salient factors that have contributed to the evolution of the Purchasing and Supply Management profession?

  Evaluate your current personal computer

Evaluate your current personal computer and distinguish among its hardware components, operating systems, programs, and applications.

  Develop a plan for an imagined online payment company

Develop a plan for an imagined "online payment company" to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard.

  Describe the elements of lewins force field analysis model

Compare and contrast four strategies for merging organizational cultures. List and describe four categories of artifacts through which corporate culture is deciphered. Discuss the reasons people resist organizational change and how change agents shou..

  Address the steps the employee can take to ensure assistance

Address the steps the employee can take to ensure assistance is received on a continual basis from the manager to promote workplace self-development.

  Supply chain and inventory strategyputting together a

supply chain and inventory strategyputting together a syllabus for my course starting in january.cases produce a two-to

  Give a presentation on software development models

The chief information officer (CIO) has asked you to give a presentation on software development models to the new hires.

  Case study on smart irrigation technology

Prepare a case study on Smart Irrigation Technology - Case Problem: Problems associated with the use of smart wireless sensor smart irrigation

  What safeguards would your take to protect your login data

Assume you are an It professional at your place of employment.your account ha very high level access,and should it be compromised.

  Find the average codeword length and the variance

Find the average codeword length and the variance of the average codeword length over the ensemble of letters.

  What are skills required to effectively manage a project

What are the skills required to effectively manage such a project within an organization? Explain each skill and why it is important.

  Describe what hacking of memory or hacking of ram

Write two to three(3) page paper in which you: Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd