Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Project 1: Develop Cloud Migration Plan

Project 1: Develop Cloud Migration Plan 
Step 1: Research Cloud Premigration Considerations 

In this step, you will research premigration considerations, such as the analysis of the current workloads that are being served out of BallotOnline’s existing IT infrastructure, and how the 
cloud migration plan will align with business objectives and BallotOnline’s updated IT policies, which includes the cloud addendum you recently wrote.

Take Note

Your supervisor, Sophia, has recommended that you use your Cloud Adoption Policy Addendum from CCS 630: 
Cloud Infrastructure Planning
Design
and Configurations, as you are looking at migration considerations.

There are some factors to consider in understanding the technical and business impacts of any proposed workload migration plan. These include 
premigration assessment
data migration
application migration
API integration or automation, and user migrations.

You should engage in an online conversation with your colleagues to discuss premigration considerations in the Discussion: Data Migration vs. Application Migration Strategies.

After discussing potential data migration vs. application migration strategies in the discussion, you can move to the next step, where you will take a close look at potential tools to evaluate migrating workloads to the cloud.

Project 1: Develop Cloud Migration Plan 
Step 2: Review and Compare Cloud Premigration Assessment Tools 

In this step, you will learn about some of the leading tools available that can aid in the cloud 
premigration assessment and help you identify the technical requirements for each workload to be migrated to the cloud.

Take Note

Your supervisor, Sophia, has asked you to review the following cloud premigration planning and assessment tools, and create a table that will compare each tool and highlight their capabilities:

·
AWS Application Discovery Service

·
NetApp OnCommand Insight

·
Azure Migrate

After reviewing and creating the feature comparison table for the above-listed tools, submit your comparison using the 
Premigration Assessment Tool Comparison Template.

Project 1: Develop Cloud Migration Plan 
Step 3: Explore AWS Application Discovery Service 

Premigration Terminology

Application inventory: List of all the applications.

Application dependencies and baseline system mapping: All the components that an application relies on for its optimal operations are referred to as its dependencies. Initial alignment of IT resources with the applications is referred to as baseline system mapping.

Process performance: Process performance is the performance of each process that an application uses for its optimal operations.

Sophia has asked to learn more about the details with 

AWS Application Discovery Service
 before you deploy it to analyze BallotOnline’s workloads later in the migration planning process.

AWS Application Discovery Service uses either agents or collectors to discover the performance, capacity, and applications running on an individual as well as multiple systems/servers.

The service collects and presents configuration, usage, and behavior data from your servers to help plan migration projects, allowing you to identify application inventory and application dependencies, establish and map a baseline for your system, and determine process performance.

After reviewing the AWS Application Discovery Services website, engage in an online conversation with your colleagues at BallotOnline in the Discussion: Evaluation of AWS Application Discovery Service and then continue to the next step to install a discovery agent.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

computering part 7

The goal of this project is to integrate your various components into polished, professional products. Follow the instructions below to ensure a successful submission: Apply Feedback: Review and incorporate all feedback received from previous submissions (Parts 2-6). Enhance and Improve: Refine any of the three required items (cover letter with

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings this week, 1. Discuss some common strategies and pitfalls you have seen with business continuity. 2. Discuss some common strategies and

sociology

The goal of this project is to integrate your various components into polished, professional products. Follow the instructions below to ensure a successful submission: Apply Feedback: Review and incorporate all feedback received from previous submissions (Parts 2-6). Enhance and Improve: Refine any of the three required items (cover letter with

Python

  Instructions Create a simple Python application (Save as w5_firstname_lastname.py) . Create a Python script that takes two parameters to do the following:- 1) List all files names, size, date created in the given folder 2) Parameter1 = Root Folder name Parameter2= File size >>> to filter file size (

Python

  Instructions:  Describe methods for securing Python code. Pick at least ONE of the methods for securing node and deep dive into what it means and how it is used to secure code.   

Discussion 8 of 459

Follow the attach instruction to complete the work. 1. What is one specific technology you found the most intriguing throughout the course? 2. If you were to be a hacker, which building block vector would you choose to attack your selected technology and why?

WK 4 Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Discussion on access control and physical security. These areas found to be one or more points of weakness in audit 1. Discuss some common points of

Node.js

  Instructions Create a simple Node.js server (Save as w4_firstname_lastname.js) . Create a restful application similar to the one in lesson 4 (ReSTFul Web Services). Document the routing table, and the application you created. Submit your week 4 work in w4_firstname_lastname.txt (Please save the file as a text file and

Computer Science- Python Gurobi assignment

I need the output following these steps: Put all of these files into the same folder, Open the python file, If there is any error, check if any file is missing, It has 105 counties and 4 districts, so it will take a while to finish running. I need it

Research Project

Please follow the instructions attached below:  I have choose the topic from the list is:   PROJECT TITLE Firm RTOS – Balancing Real-Time Performance and Flexibility Please check the abstract from my file and write the research project. 

provide me java based interview question.

Core Java Interview Questions (Basic Level) 1. What is Java? Java is a high-level, object-oriented, platform-independent programming language developed by Sun Microsystems. 2. What are the features of Java?  Object-Oriented  Platform Independent (via JVM)  Secure and Robust  Multithreaded  Architecture Neutral  High Performance (via JIT

Dynamons world Mod APK

 What are the best tips for playing RPG games like Dynamons World? I recently found a great resource at that offers a lot of insights and even MOD APKs for Dynamons World, but I’d love to hear personal strategies and gameplay advice from the community too! ???????? 

459 w7

Follow the attach instructions to complete this work. Questions: 1. What is Generative AI and how is it similar/different to Traditional AI? 2. Do you believe that work created by Generative AI (e.g. ChatGPT) is comparable in quality to human created content?  What challenges and opportunities  does Generative AI pose

Computer Science WK3 Assignment

Please see attachment for instructions ISSC680 Week 3 Homework Assignment Instructions: Please provide a one-page response to the following topic utilizing supporting documentation obtained from the attach books and the Internet. APA format and reference. Topic: Differentiate between the different types of cryptographic algorithms.

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on this weeks readings, 1. Discuss some effective strategies for Security Awareness in your organization or 2. What you would like to see implemented