Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Proj4-final

Project 4: Postmigration Activities 
Step 1: Postmigration Activities Overview 

Like any software development project, migration projects require careful planning to ensure success. This planning includes the postmigration testing and maintenance phase. Start this project by researching and planning the 
postmigration activities that will be required to get BallotOnline’s migrated workloads in a production-ready state.

Engage in an online conversation with your colleagues to discuss the postmigration approaches and activities in the Discussion: Postmigration Approaches and Activities.

After discussing the approaches, you will move on to the next step, where you will consider prerequisites, the tasks to be completed before monitoring and management. 

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Project 2: Programmatic Cloud Configuration and Deployment 
Step 2: Review and Compare Cloud Deployment Programmatic Tools 

In this step, you will learn about some of the leading cloud deployment programmatic tool sets for application and server management.

Review the 
Information Automation Tools provided by Microsoft Azure.

After reviewing and creating a feature comparison table for four most promising tools, you will submit your comparison using the 
Cloud Deployment Programmatic Tool Set Comparison Guide.

In the next step, you will take a detailed look at 
Azure Resource Manager template.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

Project 4: Postmigration Activities 
Step 3: Compare Monitoring/Management Options in AWS 

Now that you have explored CloudFormation, you will consider resource optimization. Controlling and optimizing the infrastructure can help BallotOnline reduce costs, improve security, and increase performance. The monitoring and management options and tools will help automate IT operations for BallotOnline in the cloud.

You’ve been asked to review two of the leading monitoring and management options available in AWS: 
AWS Trusted Advisor and 
AWS Systems Manager.

After your review, engage in an online conversation with your colleagues at BallotOnline in the Discussion: Evaluation of AWS Monitoring and Management Options.

After your discussion, compare the two options using the 
Cloud Monitoring and Management Comparison Template and submit it via the dropbox below.

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

In the next step, you will work closely with AWS Trusted Advisor.

Project 4: Postmigration Activities 
Step 4: Evaluate and Configure AWS Trusted Advisor 

In the previous step, you compared two maintenance and management tools, AWS Systems Manager and AWS Trusted Advisor, to gain an understanding of the capabilities of both resources. Sophia has asked you to get started by evaluating and configuring 
AWS Trusted Advisor next.

Take Action

Explore 
AWS Trusted Advisor and then go to the 
Trusted Advisor dashboard and check each category with best practices:

1. Cost optimization

2. Fault tolerance

3. Services limits

4. Security

5. Performance

Recommend changes to the settings based on the results of the checks and document the results of each check with screenshots.

Once you’ve evaluated and configured AWS Trusted Advisor, you can proceed to the next step, where you will do the same for AWS Systems Manager.

Project 4: Postmigration Activities 
Step 6: Discuss and Review Final Cutover/Rollback Options 

You’ve evaluated and configured AWS Systems Manager and AWS Trusted Advisor. Now, it’s time to consider plans in case something goes awry and data becomes unavailable when the project goes live. In this step, you will discuss and review final 
cutover strategy and options to roll back the workloads to the original source in an event of any postmigration issues. You will include your cutover options and rollback plan as part of your final Cloud Migration Technical Report.

Before moving on to the next step, engage in an online conversation with your colleagues to discuss the final cutover/rollback options in the Discussion: Final Cutover and Rollback Options.

When you are finished, it’s time for the final step, the report on postmigration.

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Project 4: Postmigration Activities 
Step 7: Write Cloud Postmigration Activity Report 

At this point, you should have a better understanding of the cloud postmigration activities and the services that are available to manage and monitor cloud infrastructure in AWS. In your Postmigration Activity Report, you will provide BallotOnline with postmigration activities options and tool sets that align with BallotOnline’s technical and business requirements.

The 10- to 12-page final document will consolidate the work that you have completed in the steps along with some additional elements (scope, executive summary, etc.) to create a comprehensive postmigration activity report. Sophia will present your work for approval at the executive meeting.

Use the 
Cloud Postmigration Report Guide to make sure that you have included all the elements. Submit your work after reading the instructions below.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 9.1: Develop a plan for cloud implementation / migration.

· 9.5: Design virtualized network infrastructure to meet business needs.

· 9.6: Design cloud storage infrastructure to meet business needs.

· 10.2: Create and deploy virtual machines.

· 10.3: Configure cloud management tools and software.

· 10.4: Configure cloud orchestration and automation software.

· 10.7: Configure a public cloud infrastructure using industry leading provider(s).

· 11.1: Perform system auditing.

· 11.5: Perform system maintenance.

· 11.6: Troubleshoot system problems.

· 11.8: Prepare contingency plans when changing cloud providers or closing down a cloud architecture.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science Wk 2 assignment

Please see attachment for instructions provide a one-page response to the following topic below utilizing supporting documentation obtained from your textbooks and the Internet.  Be sure to include an APA Reference Page Topic: Assess the various Access Control methods.

Discussion and Replies

Please see attachment for instructions.       In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings for chapter 3 Information Security Fundamentals and chapter 3&4 Information Security: Design, Implementation, Measurement, and Compliance, Discuss the following. 1. What are

How can businesses benefit from incorporating AI Integration Services into their digital transformation strategies?

[url= Integration Services[/url] are transforming businesses by streamlining operations, enhancing customer experiences, and enabling data-driven decisions. By automating repetitive tasks, AI frees up resources for more strategic activities, improving productivity. AI tools like chatbots and recommendation engines offer personalized solutions, fostering customer loyalty. AI also helps businesses analyze large datasets

OSINT Project 2

 Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work. 

OSINT Project

Instructions Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your

D 6 of 459

Follow the attach instructions to complete this work Questions: 1. How is technology increasingly used in healthcare beyond electronic health records (HER)?  Give some examples. 2. Would you personally participate in robot assisted/telesurgery as a patient or a medical professional?  Why or why not? Resources 20 Examples Of IoT Wearables

D 5 of 459

Follow the attach instructions to complete the work. Questions: 1. What are service robots and how are they used and categorized?  Give examples of each. 2. How would you leverage service robots to improve the availability, confidentiality, and integrity of a large (20MW+) data center? Resources Robots as a Platform

ITS 10 Help

Ethical Hacking help Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 10: Web Pentesting 2. NDG Ethical Hacking Lab 11: Client Side Exploitations After

InfSec

 Blockchain technology will revolutionize cybersecurity

ITS 12 Help

Ethical HAcking Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 08: Password Cracking with JTR and Hashcat 2. NDG Ethical Hacking Lab 17: Creating

ITS 13 Help

Ethical Hacking  Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 06: Network Analysis 2. NDG Ethical Hacking Lab 07: Evading IDS Submit Your Lab

Replies

please see attachment for instructions   In 400 word total, replying to the 2 post below. Each reply must be 200 word.      N.B Post #1 Hello classmates,   I am active duty in the military and currently on Eastern Standard Time. I have 4 kids, I’ve been in

channing 4.25 r studio work

follow the insrtuction Group Project Mostafa Rezaei Big Data (Introduction to Data Science) General information The group project gives you the opportunity to practice many of the skills we learned in the class. It includes 5 steps: Step 1: Find and describe a data set Find a publicly available data

Computer Science English Homework

● Assignment to do For this assignment, research different tools that cloud storage service providers use to manage the vast arrays of drives in their environments. Also, research the current performance and trends of the types of hard drives in use: magnetic vs. SSD. Summarize your research in a 2-3

SQL Help13

Statements and query For the final project, you will be working with a Guitar Shop.  You will need the MySQL server and MySQL workbench installed, just as it has been throughout the class. You will also need the following file: Project Requirements: 1. Execute the attached create_my_guitar_shop.sql to create the

Computer Science WK1 Assignment

Please see attachment for instructions and PDF book     W1 Assignment Instructions:   In 2 pages, answer the questions below with 5 evidence base scholarly articles in APA format.  Recommend and expand upon Information Security & Risk Management. 1. What are some internal and external security threats when dealing