Works Across Countries Like Timor Leste Essay


How to Works across Countries like Timor Leste?



The report reflects on the organization “SoftArc Engineering” that works across countries like Timor-Leste, Indonesia, Australia as well as Papua New Guinea. The organization aims to close the data centre of Brisbane in order to move the data centre to Sydney rather replacing the older infrastructure. The organization also plans to move their Web Services to cloud infrastructure for enhancing both flexibility as well as availability of data.

The assignment discusses cloud architecture that is employed for SoftArc Engineering, risks that are associated with hybrid cloud strategy and general information security steps as well as controls for securing hybrid cloud. The paper also elaborates the recommendations for the adoption of hybrid cloud strategy as well requirements that is required by the organization for server administration, resource management as well as SLA management.

Description of the cloud architecture that is employed for assisting the SoftArc Engineering in order to meet the Board’s Strategy

SaaS (Software as a Service) is considered as the most appropriate cloud architecture that is employed by SoftArc Engineering for meeting the Board’s strategy.

Description of the architecture that is used along with the reason of deploying it

Software as a Service is the model that is considered as the most appropriate cloud architecture for SoftArc Engineering. Software as a Service is defined as a software licensing as well as delivering model in which appropriate software is licensed on a proper subscription basis and it is centrally hosted(Dinh et al., 2013).

The main reason behind the cloud architecture deployment is that SaaS architecture can be implemented in a much less time. The cloud service provider is very much responsible for both upgrading as well as maintaining the software as well as the system in order to main proper customization (Ercolani, 2013). SaaS model is also considered appropriate or the organization as it is very much flexible in meeting all the needs of the organization. It also is provided proper flexibility in order to integrate with different software interfaces. With the help of SaaS model, important information as well as data can be accessed from anywhere at any time.

Benefits as well as issues which would be the result of the deployment of these architectures

The benefits include:

Less internal responsibility: The SaaS architecture is considered appropriate for the organization SoftArc Engineering as the cloud service provider helps in maintaining the software as well as assists in upgrading the system properly in order to maintain customization through proper upgrades (Almorsy, Grundy & Muller, 2016).

The SaaS architecture can be properly scaled ip and down in order to maintain various needs of the customer.

Access: SaaS model only needs a browser as well as appropriate internet access for proper connection. This helps in making the access of both data as well as information easier (Sanaei et al., 2014).

The challenges include:

Security problems: One of the main challenges that SoftArc Engineering can face after adopting SaaS architecture is security problems. Proper privacy of the information as well as data is required.

Performance: It is analyzed that an application, which is dependent on the browser and access with the help of appropriate internet connection is not as well as much advantageous as compared to other software that generally run on local machine (Wei et al., 2014).

Description of the risks that are associated with new Hybrid Cloud Strategy along with possible control measures

The risks as well as control measures that are associated with Hybrid Cloud architecture along with proper control measures include:

Lack of proper data redundancy: It is analyzed that well-publicized outages helps in highlighting the risks, which are generally running the applications in a specific data centre (Almorsy, Grundy & Muller, 2016).

Solution: The problem can be resolved by implementing redundancy with the help of proper data centers with the help of single provider.

Improper security management: Security control such as authorization, authentication as well as identity management requires both private as well as public cloud (Sanaei et al., 2014).

Solution: For integrating the hybrid cloud, it is analyzed that there are two options, which include replicating control or keeping proper data synchronization, which helps in providing single service to the system.

Poor Compliance: Hybrid cloud needs much more diligence in context to compliance (Wei et al., 2014). It is analyzed that maintenance as well as demonstration of compliance is very much difficult with the hybrid model.

Solution: The clouds must helps in meeting proper industry standards for proper data security while handling proper sensitive data.

Description of the general information security steps as well as controls that is recommended to the board for securing the Hybrid Cloud

The general security steps include:

Adequate security risk assessment: The problem can be resolved by utilizing proper rigorous risk prevention as well as assessment (Assun?ao et al., 2015). It can also provided with the help of log monitoring. This helps in mitigating the challenges that occur due to prevention of network administration from determining intrusion.

Proper security Management: Proper security management is provided by replicating the control to both the clouds as well as by maintaining the in-house data storage for sensitive data (Tao et al., 2014). This helps in resolving the problems that arises due to improper security management.

Proper data Redundancy: The redundancy must be implemented by using multiple data centers in order to resolve the risk that generally rises due to lack of redundancy (Toosi et al., 2014). It also helps in mitigating the proper that occurs due to outrage in one of the data centers.

Recommendation for adoption in SoftArc Engineering’s BCP because of their adoption of a Hybrid Cloud approach

The recommendations for adoption of hybrid cloud approach include:

Application of resilience: Application of resilience is the ability that helps in resuming normal execution after errors in various distributed environments. This feature is also absent in Web infrastructures.

Backup: The data can be back up with the help of hybrid cloud strategy, which is considered as one of the main advantage (Avram, 2014). The organization can backup any data they they have deleted. The facility of backup data is very much advantageous.

Disaster Recovery: With the adoption of hybrid cloud approach the organization can recover data very easily (Lian, Yen and Wang, 2014). Earlier with the help of web infrastructure, it is impossible for the organization to recover those data that they have lost. However, with the adoption of hybrid data they can recover each and every information.

Discussion of the requirements that SoftArc Engineering needs to consider

The requirements of SoftArc Engineering in order to conduct the following in context to PaaS and IaaS instances include:

Remote Server administration: The requirements that are needed for conducting remote sensor administration include analyzing the system appropriate, proper understanding of system as well as proper administration (Botta et al., 2016). The remote server administration helps in setting up the system very fast, easier maintenance and it does not put much strain on budgets. The tool of remote sensor administration assists in managing features, roles as well as role services.

Resource management: The requirements that the organization needs in order to consider the resource management in context to proposed IaaS and PaaS include ensuring proper availability of resources, optimizing time, effort as well as money, responding to the changes of the project and tracking resource utilization properly (Kern, 2014). Proper resource management with the help of proposed IaaS and PaaS include fast access to information, simple use experience as well as helps in providing current information to the SoftArc Engineering company.

SLA management: The requirement that SoftArc Engineering have to consider while conducting service level agreement includes responsibilities of SP as well as customer, service pricing as well as discounting strategies, reporting to the customer, information about service description as well as Qos Commitments (Oliveira, Thomas & Espadanal, 2014). It is analyzed that all this information are useful for conducting SLA management in the organization as it help in providing proper alignment between IT investments as well as business goals which is helpful in improving both revenues as well as profit margins.

Move of SharePoint instance to AWS cloud

Discussion of the steps that is included in the plan for migrating the services

The steps that are required for migration of the SharePoint instance and the SQL server database to AWS cloud include:

Proper plan for migration: Proper planning must be made before migrating both the SharePoint as well as SQL server (Botta et al., 2014). This includes defining scope of the project with proper timelines as well as resources.

Creating proper information architecture plan: Proper information architecture plan must be created which includes appropriate features like customization, permission as well as taxonomy with other LOB applications.

Understanding customization as well as integration: Customization as well as integration with other systems plays a great role in migrating the plan, as these are the two approaches that require much time as well as effort (Sultan, 2014).

Creating migration test plan: Proper migration test plan must be created by incorporating the variables that include custom code, custom list templates, custom site templates, custom web parts as well as feature mapping.

Migrating the Content: Both the SharePoint content as well as the content of the SQL server must be migrated as per the target as well as source. It is analyzed that the outputs as well as analysis and planning phase become inputs for the phase of migration execution (Avram, 2014).

Microsoft Upgrade approach: This step helps in allowing the databases to be attached to a newly SharePoint for upgrading it in the new environment.

Migration with the help of third party products: The organization needs freedom for migrating the content for migrating the content at a granular level (Lian, Yen and Wang, 2014). The migration approaches must investigate the possibility by utilizing third party for the SQL migration as well as SharePoint.

Migration verification: Once migration is completed, then the migration procedure is verified with the content of the new environment.Discussion of the critical points as well as issues with explanation that can see occurring at each of the steps

The issues include:

Plan for migration: The identified task in the planning phase is analyzed for complexities as well as dependencies, which are mainly executed in the migration phase (Avram, 2014). This is considered as one of the important issue.

Creating information architecture plan: Sometimes the information architecture plan is not planned properly and as a result, key areas are not handled properly.

Understanding customization and integration: It is quite important to understand both integration as well as customization as it causes problems in transforming data during migration procedure.

Creating migration test: If the test is not conducted properly then number of risks related with the new environment arises (Kern, 2014). It does not also allow individuals to test the migrated data before it is accepted as production data.

Migrating content: If the content is not migrated properly, then it causes problems number of problems or risks which include rebranding, improper migration, inappropriate validation and more.

Microsoft attaches upgrade approach: It raises problems, which leads to ineffective migration within that specific database (Botta et al., 2014).

Migration verification: If the verification procedure is not conducted appropriately then it is very much difficult to migrate content in the new environment.


It can be concluded that implementation of cloud computing is very much advantageous for SoftArc Engineering company. Due to the adoption of cloud infrastructure, the organization is able to close the data centre of Brisbane rather replacing the older infrastructure. It also helps in enhancing both flexibility as well as availability of data within the organization. It is analyzed that cloud adoption also have several challenges which must be resolved properly so that the company can be easily achieve its goals and objectives.


Almorsy, M., Grundy, J., & M?ller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Assun??o, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., & Buyya, R. (2015). Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, 3-15.

Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.

Botta, A., De Donato, W., Persico, V., & Pescap?, A. (2014, August). On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 23-30). IEEE.

Botta, A., De Donato, W., Persico, V., & Pescap?, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.

Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.

Ercolani, G. (2013). Cloud Computing Services Potential Analysis. An integrated model for evaluating Software as a Service. Cloud Computing, 77-80.

Kern, R. (2014). Introduction. In Dynamic Quality Management for Cloud Labor Services (pp. 3-7). Springer International Publishing.

Lian, J.W., Yen, D.C. and Wang, Y.T., 2014. An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. International Journal of Information Management, 34(1), pp.28-36.

Oliveira, T., Thomas, M., & Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors. Information & Management, 51(5), 497-510.

Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.

Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management, 34(2), 177-184.

Tao, F., Cheng, Y., Da Xu, L., Zhang, L., & Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 10(2), 1435-1442.

Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), 7.

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.

How to cite this essay: