Downloads: 106 | Views: 358
Research Paper | Computer Science & Engineering | Sudan | Volume 5 Issue 12, December 2016 | Popularity: 6.4 / 10
Cloud Computing Strategy in Sudan
Yousif Eltahir Sharaf Eldin Ahmed
Abstract: Cloud Computing is a radically new approach to the delivery of ICT services which promises anywhere access to shared computing resources, freedom from capital expenditure on back-end computing equipment and software, the ability to provision computing services very quickly and cheaper than traditional models, and the ability to pay for such services on some form of metered or per-use basis. [1] As Cloud Computing is evolving, there are still considerable challenges pertaining to, between, security, legalities, jurisdiction, availability and reliability, and pricing models that provide definitive and sustained value. Accordingly, the move to Cloud Computing will take time. [1] This Strategy is based on extensive engagement, research and trials with the ICT field. Notwithstanding the challenges, this Strategy places Cloud Computing at the heart of our ICT Strategy, sets a course for centralizing and implementing our common ICT needs as a set of shared services, commits to reducing the number of our computer and data centers from potentially hundreds to approximately a few primary facilities, establishes our aim to use external service providers as much as possible in the fulfilment of this approach and to maximize competition in this regard by establishing multi-vendor procurement frameworks, details and timelines lists of ICT activities that we will migrate to Cloud Computing and shared services over a number of phases, and highlights our need to consider a new ICT organizational structure and new ICT funding and governance arrangements over time. [1] Finally, it makes it clear that the implementation of the measures set out in this Strategy must provide tangible cost savings before they will be advanced [1]
Keywords: Cloud Computing, Strategy, Service models, deployment models, characteristics
Edition: Volume 5 Issue 12, December 2016
Pages: 1653 - 1660
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 1229 - 1231Big Data in Healthcare
Pratiksha Patil
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 672 - 675Increasing the Trust Factor in Cognitive Radio Networks Driven by Software Defined Radio
Shashank Dhananjaya, Yuvaraju B N
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Morocco, Volume 11 Issue 9, September 2022
Pages: 971 - 975Towards a QoS - Aware ODP Computational Viewpoint
Oussama Mohamed REDA
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019
Pages: 2057 - 2069Building Data Replication System Replication System IPFS Nodes Cluster
Ohm Patel