white paper: the benefits of an outsourced it infrastructure

12
® The Benefits of An Outsourced IT Infrastructure White Paper This white paper will explore the benefits of a hosted IT infrastructure in the context of several key business topics including disaster recovery, cost management and scalability . Prepared by Alexander Saca, CEO Published by SACA Technologies, Inc. | 1260 N. Hancock Street | Suite 102 | Anaheim Hills | CA | 92807 www.sacatech.com

Upload: asaca

Post on 08-Jun-2015

423 views

Category:

Documents


1 download

DESCRIPTION

This white paper will explore the benets of a hosted IT infrastructurein the context of several key business topics including disaster recovery,cost management and scalability .

TRANSCRIPT

Page 1: White Paper: The Benefits of An Outsourced IT Infrastructure

®

The Bene�ts of An Outsourced IT Infrastructure

White Paper

This white paper will explore the bene�ts of a hosted IT infrastructurein the context of several key business topics including disaster recovery,

cost management and scalability .

Prepared by Alexander Saca, CEOPublished by SACA Technologies, Inc. | 1260 N. Hancock Street | Suite 102 | Anaheim Hills | CA | 92807

www.sacatech.com

Page 2: White Paper: The Benefits of An Outsourced IT Infrastructure

Introduction

Access to company applications and the critical data stored within them has become the heart and soul of a successful, strategic business. Companies are making tactical decisions to utilize technologies such as cloud computing and virtualization to become competitive in the marketplace by reducing operating costs, improving internal e�ciency and increasing their IT system availability.

Despite the dramatic shifts stemming from the momentum of an increasingly web-aware economy, the core principle of most businesses is just as dramatically unchanged: Access to the company’s applications, and the data which fuels them. Because of the sheer volume of operations which companies rely on these applications to perform, every second of every day, even incremental improvement in e�ciency can be a strategic advantage. Optimization has always been the heart of any successful business. While a successful modern business need not necessarily be on the cutting edge, it must recognize when a trend has gained su�cient utility and credibility to become the new benchmark. Technologies such as cloud computing and virtualization (synonymous in many respects) characterize the next wave of competitive edge by reducing operating costs, improving internal e�ciency, and increasing IT system availability.

Recently, the City of Los Angeles began utilizing “hosted web applications” to deliver internal desktop applications to its users, an anticipated savings of more than $5 million a year in IT expenses. Similarly IBM began employing cloud computing and is both reducing its IT labor costs by 50% and improving legalization by 75%. (Owen 2010). The growing migration to the “Cloud” model (and virtualization, generally) can be traced to two main branches of thinking:

First, cloud-based computing is a pragmatic alternative with a surprisingly seamless transition from prior systems. Where the nearmythical

“paperless o�ce” remains largely unfeasible given the realities, and comfort levels, of businesses, cloudcomputing/virtualization cloudcomputing/ virtualization is the convenient corollary on solid footing. Despite the imaginative ame, the “Cloud” is actually grounded in familiar technology, but optimized for business functionality. (Lewis, 2010) In fact, some state that cloud computing is simply new jargon for the latest face of time-tested technology. (Lewis, 2010) In short, cloud computing has been around long enough to reach the level of reliability necessaryz to outpace its pure-hardware counterparts, but not long enough to be universal.

www.sacatech.com

Page 3: White Paper: The Benefits of An Outsourced IT Infrastructure

Overview

To the same extent that we rely on the data which fuels our businesses, those business rely on the Information Technology (IT) systems which control that data. Perhaps more signi�cantly, business absolutely depend on an all-important caretaker of these IT systems. As the cornerstone of many businesses, this trinity of (1) data, (2) systems, and (3) IT management must be available every single moment they are needed, in other words, seven days a week. (CDW 2010). In sum, where these three tools (data, systems, IT management) are a company’s lifeblood, those companies need access to them without excuse, and without exception. (CDW 2010).

However, achieving a comfortable level of reliability can be at odds with achieving an a�ordable level of reliability. This is especially a signi�cant hurdle for smaller businesses. The cost of maintaining an IT sta� can be oppressive. The spectrum can range from a single employee to manage all IT needs, to a part-time independent contractor limited to upkeep and problem-solving.

Neither presents the ideal solution as there is too

often a compromise of either reliability or a�ordability. Many enterprises are given the unenviable decision of not hiring the internal, skilled IT sta� that can manage and repair a robust computing system, or hiring an expensive full-time employee to keep their systems up and running.

Cloud-computing and virtualization are at the heart of an outsourced IT infrastructure that can provide the solution to this perennial business dilemma. We will consider outsourced IT and its e�ect on cost control, hosted applications, data virtualization management, scalability, and disaster recovery, when considered against more a more traditional IT infrastructure.

Wile the trustworthiness of cloud-computing and virtualization as legitimate business tool is half of the argument, the speci�c applications, advantages, and bene�ts form the second branch of reasoning for its use; and the primary thrust of this paper.

Hence, outsourcing Microsoft Exchange Server can be a more cost-e�ective and more reliable solution than an in-house server. This scenario is illustrative of one of the many bene�ts of outsourced applications.

www.sacatech.com

Page 4: White Paper: The Benefits of An Outsourced IT Infrastructure

often a compromise of either reliability or a�ordability. Many enterprises are given the unenviable decision of not hiring the internal, skilled IT sta� that can manage and repair a robust computing system, or hiring an expensive full-time employee to keep their systems up and running.

Cloud-computing and virtualization are at the heart of an outsourced IT infrastructure that can provide the solution to this perennial business dilemma. We will consider outsourced IT and its e�ect on cost control, hosted applications, data virtualization management, scalability, and disaster recovery, when considered against more a more traditional IT infrastructure.

Wile the trustworthiness of cloud-computing and virtualization as legitimate business tool is half of the argument, the speci�c applications, advantages, and bene�ts form the second branch of reasoning for its use; and the primary thrust of this paper.

Hence, outsourcing Microsoft Exchange Server can be a more cost-e�ective and more reliable solution than an in-house server. This scenario is illustrative of one of the many bene�ts of outsourced applications.

Hosted Applications

To the same extent that Microsoft Exchange Server is an application whose e�cacy and cost can be improved by outsourcing, so too there are a myriad of desktop and server applications which can similarly be hosted. While a locally installed program is limited to the physical computer is it installed on, a hosted application is accessible wherever the internet is.

Hosted applications have attracted the interest of a growing number of business owners because they are not limited to a single endpoint device as they would be in a traditional local application installation. A hosted application can be used from anywhere with internet access: the home, co�ee shops, other businesses, or essentially anywhere with a notebook computer with a wireless card. With just a basic internet connection, employees can access the application globally.

What is more, in addition to this invaluable and unmatched level of �exibility, users of hosted applications can expect greater uptime, performance and product support as compared with traditional application installations. This is because hosted application providers have teams of dedicated IT professionals updating/upgrading the software applications, and of course, maintaining the systems

that run them. As with email, business owners can control costs by limiting their computing Szexpenses to a regular monthly service fee.

Predictable IT costs provide businesses the ability to predetermine annual costs and maintain a set budget negotiated at the inception of service. However, by the same token, entering into a contract with a hosted service provider is a commitment. The requisite due diligence calls for ample research of the prospective hosting provider. The heart of building a symbiotic relationship is aligning the company’s business objectives with those of the hosting provider. In doing this, Entrepreneur magazine recommends some of the following points of inquiry:

1. Understand the process of getting your data in and out of a hosted provider's solution;

Research hosted services providers to determine their stability; this could involve how long they have been in business, what their level of expertise is, and what their levels of service (SLA’s) are;

www.sacatech.com

Page 5: White Paper: The Benefits of An Outsourced IT Infrastructure

Cost Control

Hosted Email As A Paradigm for Cost Reduction through Outsourced IT

It is self-evident that businesses succeed in the marketplace by managing costs and focusing resources on satisfying consumers. Companies which outsource their business IT infrastructure increas-ingly are able to focus internal e�orts to improving customer experience, or other activities with a direct impact on sales of goods and services.

For example, email, a staple of inter-o�ce and external communication, can be representative of how a shift to an outsourced IT infrastructure can bene�t businesses by allowing them to focus their energies where it counts.

An organization utilizing the popular Microsoft Exchange Server® will incur a number of costs by hosting this email server internally. These costs include hardware, software, maintenance of both, and unanticipated repairs. In particular, like any heavily utilized machine, regular proactive maintenance of a server is crucial to ensuring and maximizing “uptime.” These are core IT systems and activities that lend themselves to an outsourced solution, with the bene�t of corresponding lower costs.

Further, to the same extent as death and taxes, a system failure of some magnitude is an inevitability. While such failures are an unpredictable burden for small businesses, the ability to reduce the frequency, magnitude, and downtime from system failures can dictate overall productivity and product/service o�erings.

In contrast to an in-house server, a hosted Microsoft Exchange email server environment allows email costs and availability to be �xed and increasingly predictable. By outsourcing the Microsoft Exchange email services to a third-party, businesses typically pay a lower cost for a higher level of service and availability. In other words, outsourced email hostingcan deliver “enterprise-level” infrastructure to smaller business.

Part of the basis behind the higher expectations and lower costs outsourced IT email can deliver is that the hosting provider can distribute server resources, and associated costs, amongst multiple clients. While the absolute costs of a server, infrastructure, maintenance, antivirus software, spam software, and client access license costs do not change, sharing such costs is what allows hosted email services to be a viable solution for many small businesses. (Chen, Tu & Lin, “Global IT/IS outsourcing: expectations, considerations and implications”).

www.sacatech.com

Page 6: White Paper: The Benefits of An Outsourced IT Infrastructure

Further, to the same extent as death and taxes, a system failure of some magnitude is an inevitability. While such failures are an unpredictable burden for small businesses, the ability to reduce the frequency, magnitude, and downtime from system failures can dictate overall productivity and product/service o�erings.

In contrast to an in-house server, a hosted Microsoft Exchange email server environment allows email costs and availability to be �xed and increasingly predictable. By outsourcing the Microsoft Exchange email services to a third-party, businesses typically pay a lower cost for a higher level of service and availability. In other words, outsourced email hostingcan deliver “enterprise-level” infrastructure to smaller business.

Part of the basis behind the higher expectations and lower costs outsourced IT email can deliver is that the hosting provider can distribute server resources, and associated costs, amongst multiple clients. While the absolute costs of a server, infrastructure, maintenance, antivirus software, spam software, and client access license costs do not change, sharing such costs is what allows hosted email services to be a viable solution for many small businesses. (Chen, Tu & Lin, “Global IT/IS outsourcing: expectations, considerations and implications”).

Determine how compatible the service provider’s options are with your business objectives. Do your goals align with the services o�ered by the hosting provider?

What have other customers experienced in dealing with the particular posted service provider? You can learn from their experiences as their experiences are likely to be similar to your experience with the particular hosted ssservices provider.

A reputable hosted services provider will answer these, and other inquiries promptly and succinctly. They should be able to explain how their services work and in what ways the provider operates the hosted IT company. Additionally, a hosted IT provider should be able to provide information about virtualization. Regardless, having a functional understanding of virtualization will allow for more meaningful discourse. Virtualization Generally

At its essence (hardware) virtualization involves presenting users with a workable platform for their needs, while the physical characteristics of the operating system exist elsewhere. The software that controls the process ensures that the various users’ individual virtualized operating systems, can seamlessly share the virtualized community hardware resources - - this is the essence of virtualization.

This ability to harness collective computing power is why virtual machines are more than just a piece of the puzzle, they are the principle component of a hosted IT provider’s core technologies. VMWare, Citrix and Microsoft have built the three leading virtualization technology software platforms available on the market. Their respective platforms are designed with server consolidation, performance enhancements and disaster recovery as their core ingredients.

These items are a key bene�t to a hosted infrastructure provider because, among other things, an IT infrastructure needs to be able to scale, perform, and rapidly respond to system failures.

Virtualization

As It Relates to Data Recovery

In making the decision to utilize such virtualization technologies, Microsoft points out some important points to consider and understand regarding a virtu-alized infrastructure.

1. How do I protect data in the virtualized infrastructure?

2. How do I limit my risk to my virtual servers assuming they are compromised?

Every business considering virtualization should be able to answer these questions on their own or through the services of a third party provider. (Microsoft Corp, 2009).

A reputable outsourced IT organization considers these inquiries when designing and building a data center (so that the small business owner does not have to); they will have a structured system for protecting your data in case of a system failure.

Disaster recovery is a advantage of virtualization over traditional systems. Particularly since, despite its criti-cal importance to businesses, disaster recovery plans are often an afterthought due to equal parts cost, and wishful thinking. Virtualization, manifested

www.sacatech.com

Page 7: White Paper: The Benefits of An Outsourced IT Infrastructure

through a reputable hosted IT provider's services, automates the process to the extent that the burden to foresee, plan, and have a data recovery strategy in place is e�ortlessly shouldered by the underlying virtual system.

Hosted IT providers and their virtual systems utilize several techniques to abolish the adverse impacts of system failures.Take, for instance, the typical Microsoft SQL Server an accounting department may use to manage business-critical �nancial data for an organization - - clearly a priority for high-level protection. A hosted IT provider can virtualize the SQL Server infrastructure so that it runs on two di�erent physical computers and all data is stored on a separate storage area network (SAN).

By deploying the SQL Server in a virtual platform, multiple physical servers can host the application data simultaneously. If one fails, the other instantaneously services the users the other would normally handle.

Compare, a single server model that leaves users/customers un-served after a crash. A scenario that is always unexpected, always inconvenient, and in the worst cases can be potentially crippling if the timing is bad. A virtualized system, on the other hand, can immediately transition to accomodate users/customers from the failed system, without them even knowing any crash occurred.(Microsoft Corp., 2008).

The simple crashes described above occur frequently enough during a server lifespan that they should be addressed. Crashes in any system are a near-inevitability, they are in many ways unpreventable and can result in not only the data loss business owners dread, but also temporary interruptions of service. Because such crashes are not completely preventable, it is paramount to minimize their impact, a principle aim of virtualization.

In fact, while virtualization can minimize the impact of potential losses of service, it can e�ectively eviscerate the aforementioned dread of data loss though its data management.

Virtualization

Data Recovery and Failover Systems

As stated earlier, data fuels a company's applications. It is the often the key resource for a business regardless of size. Thus there is a concomitant duty for whoever manages a company's data to zealously safeguard it.

To meet this need virtualization rapidly restores data from backups. For example, consider backing up email. Symantec and Gardner found that 75% of a company's intellectual property resides in e-mail and other messaging applications. Traditionally, businesses safeguard and back up their data onsite through tape backup or other procedures performed by local IT sta�. Some small businesses even attempt

www.sacatech.com

Page 8: White Paper: The Benefits of An Outsourced IT Infrastructure

to have one or two employees with limited IT experience perform this function. Traditional disaster recovery involved restoration of data from tape backup or similar media. This involved laboriously reinstalling all system software so the server could function and begin serving clients again.

In a hosted environment data backup and recovery is orchestrated by a highly trained administrator. Using virtualization technologies the administrator automates the backup process. to a virtual backup system. Tapes or other physical backup media are not necessary. In a virtualized environment outsourced IT providers can o�er independent data storage.

This type of storage is often o�ered through a storage area network (SAN) which uses computers operating separately from web and/or �le servers. The SAN thereby does not succumb to the same crash that a�ected the web and/or �le servers. In other words, separate data storage preserves the data in the virtualized environment when the primary operating system fails. In this environment recovery of the server can be accomplished by cloning the server to a backup, thereby creating a new virtual server. The clone can be immediately reconnected to data on the SAN, allowing for rapid recovery from the crash. (CDW, 2008)

The virtual environment has added advantage of various redundancies, and exponentially quicker recovery. CDW notes that simplifying the server in order to make it easier to recover after a disaster is a principal goal of application server virtualization and consolidation. (CDW Business Continuity Reference Guide). In fact, server virtualization is now the leading technology used for disaster recovery. (CDW Business Continuity Reference Guide). This is, in part, due to the elimination of unpredictable recovery time. A good outsourced IT provider will typically provide maximum downtime guarantees up-front for various contingencies. For example, being able to depend on a maximum of four hours downtime and a twelve hour recovery time, allows a business to passthose time-frames on to a �ckle client base that would consider taking their business elsewhere, rather than dealing with the unknown or unpredictable.

Virtualized systems also o�er the additional bene�t of replication; a use which can go beyond recovery. With several simple commands, an administrator can replicate an entire data center, backed up in online storage, at will. Such virtualized systems are accessi-ble at any time. (Microsoft Corporation, 2009).

Virtualization also o�ers a “failover” or redundant/standby system that can seamlessly switch over if there is some manner of abnormal termination of an application or network. This is just another nuance of virtualization that facilitates “business as usual” despite computer problems as usual.

www.sacatech.com

Page 9: White Paper: The Benefits of An Outsourced IT Infrastructure

The virtual environment has added advantage of various redundancies, and exponentially quicker recovery. CDW notes that simplifying the server in order to make it easier to recover after a disaster is a principal goal of application server virtualization and consolidation. (CDW Business Continuity Reference Guide). In fact, server virtualization is now the leading technology used for disaster recovery. (CDW Business Continuity Reference Guide). This is, in part, due to the elimination of unpredictable recovery time. A good outsourced IT provider will typically provide maximum downtime guarantees up-front for various contingencies. For example, being able to depend on a maximum of four hours downtime and a twelve hour recovery time, allows a business to passthose time-frames on to a �ckle client base that would consider taking their business elsewhere, rather than dealing with the unknown or unpredictable.

Virtualized systems also o�er the additional bene�t of replication; a use which can go beyond recovery. With several simple commands, an administrator can replicate an entire data center, backed up in online storage, at will. Such virtualized systems are accessi-ble at any time. (Microsoft Corporation, 2009).

Virtualization also o�ers a “failover” or redundant/standby system that can seamlessly switch over if there is some manner of abnormal termination of an application or network. This is just another nuance of virtualization that facilitates “business as usual” despite computer problems as usual.

Data Management& Security

An equally unfortunate reality of business computing is the threat of malicious in�ltration. While many small businesses cannot a�ord to hire the individuals necessary to combat everpresent security threats of various severity, all businesses require some level of security. A US Department of Justice study estimated the cost of information theft during 2004 to be roughly $250 billion. (JupiterMedia, 2004). Cyber security threats range from nuisance adware to Trojan Horse (“a man in the browser”) attacks in which a hostile program attaches itself to a web application and maliciously uses credentials from the application to gain access to a computer. The risk of con�dential data being compromised is immense. Business that cannot maintain their own IT security sta� can address these problems by outsourcing.

Hosted IT service providers are typically well equipped to handle data security and employ various advanced techniques, such as active directory rights management, to promote date integrity. Active Directory allows users to enjoy secure access to

permissions within a domain reducing the likelihood of access by an unauthorized user. (Microsoft Corporation, How Windows Server 2008 Delivers Value).

IT professionals will establish broad performance parameters of the computing systems which will be automatically monitored. The performance parameters de�ne rules su�cient to detect an intrusion when violated. Administrators can inspect these violations to prevent or discover intruders. (CDW Corporation, Business Continuity and Reference Guide).

As with its other services, because outsourced IT providers employ specialized network security professionals to monitor and protect the virtual environment as a whole, the various businesses utilizing their services enjoy enterprise-level security administration for a fraction of the cost.

The value of having con�dence in the security of one’s system cannot be understated. Neither can the uninterrupted upgrading of systems to meet a greater need, a particularly unique feature that only outsourced IT providers can provide through virtualization.

www.sacatech.com

Page 10: White Paper: The Benefits of An Outsourced IT Infrastructure

Scalability

The bene�ts of business growth are counterbalanced by increasing burdens on resources, including com-puting resources. This need must be met by scaling capacity to accommodate a greater number of customers. (Microsoft Corp., 2009).

Scaling necessarily presents a hurdle for a small business because of the cost of upgrading hardware. To put it simply, it is expensive to upgrade computers. In fact, the cost is often comparable to the purchase price of the initial, startup system, essentially forcing businesses to pay twice - - an unintended penalty forgrowing the business.

Consider this concept in the context of a company that utilizes sales software integrated into a website to allow customers to purchase products and services. The company’s system may reach a capped capacity that prevents customers, past a certain number, from gaining access. In short, these custom-ers are turned away by a shortfall in computing power. Traditionally the company could rectify this bypurchasing multiple load balanced servers to provide the additional capacity. These computers would then operate in clusters to facilitate the addition and removal of computers in proportion to the needs of the business.

Conversely, in a virtualized environment the company can create the various servers in software without the addition and removal of physical computing systems. This up-scaling is possible because the software is not tied to physical hardware itself. In fact the creation of a new computing system can be as simple as the click of the mouse to duplicate an existing system. (Microsoft Corp., 2009) The ability to increase capacity, and achieve an enterprisequality software environment, on an as-needed basis, is a luxury that virtualization a�ords and businesses are increasingly exploiting to their advantage.

Another relevant scalability advantage of virtualization is load-balancing. As a business grows, the data load of a heavily tra�cked application may need to be spread among di�erent servers. While a traditional system would require additional hardware to juggle clients/users to prevent one server from being overburdened disproportionately, not so with virtual load-balancing. In a virtual environment, load-balancing is achieved without resorting to purchasing additional hardware, the hosted IT provider’s systems handle the necessary directing behind the scenes. (Microsoft Corp, 2009).

Scalability in a virtual environment simply makes sense because of . . . an economy of scale. Rather than each business purchasing additional hardware, the hosted IT solutions provider purchases the necessary hardware, and distributes a smaller proportionate cost, with an added bonus of increased e�ciency. Customers of small to medium-size businesses can enjoy the same level of service as that enjoyed by large enterprise corporations.

www.sacatech.com

Page 11: White Paper: The Benefits of An Outsourced IT Infrastructure

Conversely, in a virtualized environment the company can create the various servers in software without the addition and removal of physical computing systems. This up-scaling is possible because the software is not tied to physical hardware itself. In fact the creation of a new computing system can be as simple as the click of the mouse to duplicate an existing system. (Microsoft Corp., 2009) The ability to increase capacity, and achieve an enterprisequality software environment, on an as-needed basis, is a luxury that virtualization a�ords and businesses are increasingly exploiting to their advantage.

Another relevant scalability advantage of virtualization is load-balancing. As a business grows, the data load of a heavily tra�cked application may need to be spread among di�erent servers. While a traditional system would require additional hardware to juggle clients/users to prevent one server from being overburdened disproportionately, not so with virtual load-balancing. In a virtual environment, load-balancing is achieved without resorting to purchasing additional hardware, the hosted IT provider’s systems handle the necessary directing behind the scenes. (Microsoft Corp, 2009).

Scalability in a virtual environment simply makes sense because of . . . an economy of scale. Rather than each business purchasing additional hardware, the hosted IT solutions provider purchases the necessary hardware, and distributes a smaller proportionate cost, with an added bonus of increased e�ciency. Customers of small to medium-size businesses can enjoy the same level of service as that enjoyed by large enterprise corporations.

Bene�ts Summary

Major companies have recognized the numerous bene�ts of virtualization. Yet ironically, the primary bene�ts of virtualization best lend themselves to the small business.

To a small business, achieving competent, reliable, and a�ordable IT systems can be a daunting task, let alone achieving enterpriselevel computing. Outsourcing to a hosted IT environment is a functional alternative that provides a rare combination of a�ordability with expertise. By turning over IT hurdles to a hosted provider, a problem can potentially be turned into a strength, while at the same time freeing up a company's precious resources to the running of their business. Companies not in the computing business �nd that their time is not well-spent building computing systems to service their needs.

The brave new world of virtualization provides businesses long-term savings, �exibile access regardless of location, as-needed computing power to make their applications �ourish, secures the functioning, integrity, and privacy of their precious data, and allows their computer systems to grow organically, and symbiotically, with the rest of their business.

* **************

This white paper was drafted by SACA Technologies, Inc., a leading provider of managed and hosted IT solutions. We hope that it has helped you to understand the bene�ts of hosted IT solutions. If your company is interested in learning more about hosted IT solutions of any scale, please contact us. We will be happy to help you evaluate whether our products can further your company's goals.

ReferencesChen, Tu, & Lin (2002) “Global IT/IS outsourcing: expectations, considerations and implications” Entrepreneur Magazine,http://www.entrepreneur.com/tradejournals/article/89491193_1.htmlCDW Corporation (2010) “Business Continuity and Disaster Recovery Reference Guide, Keep resources secure and available in today’s nonstop business environment,”CDW Corporation Publications, http://webobjects.cdw.com/webobjects/media/pdf/cdw-business-continuity-reference-guide.pdf.

Department of Justice (2004) “DRM in the Enterprise”JupiterMedia.

Dunlap, Charlotte (2010) “Hybrid Clouds Hit Data Centers, Forbes Magazine, Merging public and private cloud computing infrastructures.” ht t p : / / w w w. fo r b e s. co m / 2 0 1 0 / 0 3 / 0 8 / c l o u d - computing-security-technology-virtualization10-...8/10/2010.

Garrett, Owen (2010) “Keeping Cloud Costs Grounded, How to �nd the best cloud computing services for your business.” Forbes Magazine, http://www.forbes.com/2010/06/02/internet-software-zeus-technology-cloud-computing-1.

Lewis, Margaret (2010) “Cloud Computing: Hype Vs. Reality.” Forbes Magazine, http://www.forbes.com/ 2010/08/03/open source virtualization technology cloud computing.html

Microsoft Corporation (2009) “Adopting Server Virtualization for Business Continuity and Disaster Recovery, CA ARCserve® Backup and CA XOsoftÔ Replication and High Availability Software with Hyper-VÔ Technology — A Powerful Combination” Microsoft Corporation Publications.

Microsoft Corporation (2008) “How Windows Server 2008 Delivers Business Value,”Microsoft Corporation Publications.

10®

www.sacatech.com

Page 12: White Paper: The Benefits of An Outsourced IT Infrastructure

Posey, Brian M. (Unpublished) “Should You Outsource Your Email?” Rackspace Website, http://broadcast.ra ckspace.com/downloads/pdfs/OutsourceEmail.pdf.

Ray, Ramon (2008) “Cutting the Cord, Weigh all the options when choosing between traditional and online software solutions,”Entrepreneur Magazine, http://www.entrepreneur.com/techadvisor/article195348.html

Zawacki, Chris (2008) “Are Hosted Applications a Wise Investment, With lower costs and higher levels of versatility, fee-based software subscriptions can be a great alternative to traditional IT solutions” EntrepreneurMagazine, http://www.entrepreneur. com/ techadvisor/article 198862.html.© 2010, Saca Technologies. All rights reserved. Saca Technologies and its Logo are Trademarks of Saca Technologies, Inc.Saca Technologies gives its permission to download, print out, or send a copy of this text to others as long as each copy includes the Saca Technologies copyright notice and duplication is not for bulk or commercial use.For special copyright permission for other uses, write to Saca Technologies Inc., 1260 N. Hancock St. Suite 102, Anaheim Hills, CA 92807; or call 1-888-603-9030.

The Microsoft trademark is the property of the Microsoft Corporation, and Microsoft is not a�liated with Saca Technologies Inc. The Microsoft Exchange Server logo and trademark are also the property of Microsoft and is not used to suggest any a�liation or association with Microsoft.

11®

www.sacatech.com