IT Implementation Plan for Cloud Computing Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Opportunities

The massive transition in the technological sector has prompted organizations as well as government agencies to inculcate new information and technology innovations in order to remain competitive in the present market. An example of such changes is the cloud computing; it allows internet users to use computing resources like software and hardware over the internet.

This product is widely classified as public, partner, and private. In addition, this system has forms under which it offer its services to the clientele, some of them include Software as a Service (SAAS), Platform as a Service (PAAS), Infrastructure as a Service (IAAS), Storage as a Service(STAAS), and Security as a Service (SECAAS). In SAAS, offer users different software over the internet; for instance, Gmail, which users subscribe and pay in order to use (Mitchell, 2012).

On the other hand, PAAS enables users to develop their own applications and maintain them on the internet at a reduced cost. IAAS make it possible for the users to use invisible hardware, which are maintained by the cloud users. The name, cloud, comes from the structure of the system (cloud) as it has many forms of services.

  • This system allows businesses to communicate and store their data at a cheap cost. For instance, the centralization of data enables information upgrading without installation of new software. As a result, the system reduces organizations’ IT operational cost hence aiding growth.
  • The implementation of this computer application/resource is, really, beneficial to users and requires a detailed IT implementation plan to ensure that the intended success is realized.
  • A constant use of cloud computing services will not only improve efficiency in organizations but also improve reliability thus making it suitable for continuity of business.

Statement of work and Scope

  • The implementation of this system will ease the cost of acquiring hardware, software, data storage, and management. For example, the use of STAAS and IAAS cloud computing products.
  • Cloud computing will help in providing recovery and back-up systems and information. This method is simpler than the traditional methods that were used for data storage.
  • It will improve the management system and reduces cost of acquiring facilities, without which the organization will remain uncompetitive in the entire market.
  • On the other hand, there are security threats to data stored in this system, as it is accessible to all people. This system, in the end, should change completely the entire operational methods in an organization.
  • It should not go over board; for instance, completely monopolizing other systems to avert program clash. Therefore, it should have limits of operation in the organization.
  • Duration: The period of implementation will be one year, 20th June 2010 to 20th June 2011. During this time, pretests and recommendations will be done to improve the system.
  • Business Scope:
  • The new system should:
  • Minimize on storage space.
  • Increase the reliability and efficiency in obtaining data.
  • Reduce the cost of obtaining hardware and upgraded software.
  • Improve the security of the data.
  • Assessment of market requirements:
  • Here, the service provider, the broker, and the organization must study the features of cloud computing to instill trust among them and on the new product.
  • The roles of the sponsors and broker will be outlined. The connection among the participants will also be outlined.

Assumptions

The following assumptions are made:

  • The project has the approval of the entire organization requiring its implementation.
  • Participating stakeholders and donors will continue supporting the implementation of the system to the end.
  • The roles of all the staffs shall clearly be outlined during the implementation period.

Risks and Constraints

Some of the risks involved in implementing this new IT system include the following factors:

  • Technical challenges – Here, cases of unstable internet may limit accessibility to the servers at a given time. Additionally, issues of system variation in performance level may arise.
  • Security issues: Some third parties can un-authentically gain access to these pieces of information and even go ahead to block the messages from further access. This information vulnerability makes it a necessity to set up controls that can help guard the reports. For instance, illegal access to information in a website do not require forceful intrusion and the hacker must not be close the owners to break into their infrastructural system.
  • Prone to attacks: There is prone to hacking by cyber criminals. This can result to information alteration or damage. Additionally, cases of network control and malicious logic infection can easily arise. However, the interlinking of cloud computing among different networks helps to minimize such risks. Obviously, all technological inventions have certain dysfunctions that hinder their normal operation.
  • The duration of implementation, which can be around one year, coupled with a huge budget can delay the progress of other activities.
  • Organizations’ policies on upgrading or accepting a new system are different. The bureaucracy involved in approving such activities may delay the entire cloud computing inclusion.

Implementation steps

Initiation

  • At this stage, system’s needs analysis is carried out. For instance, an organization that stores most of its data in devices like flash disks, memory cards, and compact disks can decide to use the new system of data storage that is efficient and reliable.
  • The organization may need to keep their data safely at a cheaper cost than the previous method (Mitchell, 2012). A project management team will be deployed to analyze the whole project and pass it to the next stage.

System Concept Development

  • At this stage, a deep analysis/look into what is needed occurs. Varied reports like feasibility study, cost-benefit analysis, system boundary, and risk management will be drafted and be presented for approval.
  • Inclusive decision-making is needed at this point to ensure to avert any scenario of internal opposition (Mitchell, 2012).

Conceptual planning

  • Enhancement of the cloud computing system is done. Its feasibilities, risks and varied project- planning strategies are outlined.
  • The roles and responsibilities of the Asset Manager, System Development Agent (SDA), Sponsor’s Representative, System Support Agent (SSA), and other stakeholders are assigned to respective persons. Significantly, the collection and definition of supportive and training facilities is carried out. These materials may include servers and internet hosting.

Design

  • The materials from the prior step are converted to detailed and inclusive designs. Notably, a correlation between the functional needs, like reliability and efficiency, and the introduction of cloud computing is done.
  • Preliminary designs highlighting all the functional features are laid out (Mitchell, 2012), followed by a detailed specification on the functions.

Development and Testing

  • At this phase, the system is put under a pre-test to verify if all the requirements have been met. The design specifications are followed to the performance and system acceptance.
  • All the components and documentation are also tested amid participation of all stakeholders in order to meet the business requirements.

Implementation phase

  • The host service provider is identified.
  • During this stage, all participants are informed of the planned training on the systems operation and management. The training requirements for the implementation group are outlined.
  • Detailed analysis on how the new system will fit into the existing infrastructure.
  • Upon migrating to cloud computing, all data are converted and a pre-evaluation follows.
  • Description of other functionalities like constant internet connection of high speed are identified
  • How cloud computing functions have generally meet the intended workgroup specified needs.
  • At this time in point, problem identification is also done in order to help in adjusting the operations involved in cloud computing.

Operations and Maintenance

This is the operational phase.

  • Systems management and upgrading is mandatory alongside continuous training of the users on the current developments on the system.
  • Additionally, there is continuous supply of user support to resolve future reported problems (Mitchell, 2012).

Budget Overview

The funds will be sourced from the organization, the sponsors, and entire staff.

Estimated budget for the fiscal year is as below:

Budget Amount $2010/2011 fiscal yearFunded?YesNo

The budget will require the approval of the project manager and the project owners. The budget management team must document all progress and changes on the budget.

Project Team

  • It will comprise of the sponsors, the project owners, the project manager, the project workgroup, Implementation Team, Survey Team, and Service requirements Team.
  • Their roles are outlined in the implementation program to avoid role sharing. Notably, the project manager controls all the team members.

Project Schedule

  • It shows the estimated time, the groups responsible for a given task, and the key project tasks.
  • The entire team approves this schedule and the entire cloud computing implementation process.
  • Issues that may arise are reported to the project manager for further action.

Below is a tabulated summary of the plan of action.

Tasks% completedStatusDay StartedDay to be CompletedActual Completion dateTask AssignmentPriorityMilestoneNotes

Conclusion

Cloud computing as a new technology has merits and demerits. For example, it lowers the cost of storage and acquisition of hardware. On the other hand, the system lacks standardization.

The latter scenario causes mistrust among business people on the quality of services they receive from cloud computing. Again, the service provider monitors all data of a company. Although management issues are transferred to the service provider, the company losses autonomy of its own data and privacy is highly violated (Mitchell, 2012). Positively, all risks are manageable.

Therefore, organizations that resort to adopting cloud computing should be ready to mitigate the risks that come with the new system. In this situation, other activities will proceed smoothly thus leading to great benefits to the organization using the system. The benefits may be affordable high-end data processing for small businesses and easy scalability, since no legal requirement is needed to authorize use of any software. Organizations will enjoy such expansions at a lower cost.

Reference

Mitchell, K. F. (2012). Cloud Computing – White Paper. CSIA, 459, 1-16.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, December 11). IT Implementation Plan for Cloud Computing. https://ivypanda.com/essays/it-implementation-plan-for-cloud-computing/

Work Cited

"IT Implementation Plan for Cloud Computing." IvyPanda, 11 Dec. 2018, ivypanda.com/essays/it-implementation-plan-for-cloud-computing/.

References

IvyPanda. (2018) 'IT Implementation Plan for Cloud Computing'. 11 December.

References

IvyPanda. 2018. "IT Implementation Plan for Cloud Computing." December 11, 2018. https://ivypanda.com/essays/it-implementation-plan-for-cloud-computing/.

1. IvyPanda. "IT Implementation Plan for Cloud Computing." December 11, 2018. https://ivypanda.com/essays/it-implementation-plan-for-cloud-computing/.


Bibliography


IvyPanda. "IT Implementation Plan for Cloud Computing." December 11, 2018. https://ivypanda.com/essays/it-implementation-plan-for-cloud-computing/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1