Table of Contents
Table of Contents 1
1. Introduction 2
2. About Azure 3
2.1 History 3
2.2 Competitors 3
2.3 Privacy 4
3. Case Studies 5
3.1 Case Study1: 343 Industries (Halo 4) 5
3.2.1 Benefits of Azure for 343 Industries 5
4. Using Azure 7
4.1 Websites 7
4.2 Virtual Machines 7
Figures 8
References 9
1. Introduction
For this Cloud Services and Distributed Computing CA we have been asked to conduct a detailed assessment of Microsoft Azure Cloud solution for use in an Information Technology company. The following report will give some background into Microsoft Azure from its development and competition to its impact on the cloud services industry as well as show the results of that assessment through research and use of the
…show more content…
It is virtual operating system hosted in the cloud and it can be configured to suit the needs of a specific user. With an Azure VM a user can create it as any operating system you wish, as well as connect a multitude of Virtual Machines together to share the load of work between them, so as to spare once using all of it resources. A Virtual Machine is Scalable and easily figured, using cmdlets in PowerShell allows you to manage the Virtual Machine or even delete and recreate one if it is not to the users liking. A Virtual Machine is invaluable to an organization as it allows them to have a multitude of machines without having to physically buy and store them. This leads to a cut down in premises costs and because Azure uses an open approach it would be wise for an organization to utilize a Virtual Machine sourced from Azure as it will allow the installation of most virtual images. Creating a Virtual Machine within Azure is fairly easy. Simply open up the management portal and select Virtual Machine from the list of options. The user will be prompted for the DNS name, Image, Size, a username and password to access the machine and also the geo region. After filling in the required information the machine will enter a provisional running mode for a few minutes and then the user will have full access to configure the machine if need be. The user now has the ability to monitor all the information such as the CPU percentage in