Wednesday, September 2, 2020

The Apollo Group, Inc Case Study Example | Topics and Well Written Essays - 1000 words

The Apollo Group, Inc - Case Study Example In contrast to different colleges, UOP is a revenue driven organization. Summary of the Situation The University of Phoenix took into account the working grown-ups who needed to proceed with their instruction. It was one of the principal organizations to focus on this developing business sector. They are viewed as the goliath in the business and as such have earned $2.5 billion in incomes in 2006. While numerous universities utilized full-time employees, UOP recruited working experts as instructors. The accomplishment of the Apollo Group exudes from the way that they had the option to tap an unserved specialty in the market, that is, the working grown-ups. Key Issues The key issues of the case are the developing interest for online instruction in the US as well as in the creating nations, the need to open up new nearby grounds and the need to improve the current innovation that UOP uses. Characterize the Problem The issue introduced for the situation is the means by which to change t he notoriety of UOP from a â€Å"diploma mill† foundation to one which is offers certify degree programs and an establishment that will present new undergrad and advanced education programs that will address the issues of both the grown-up working populace and the customary university advertise. Elective Solutions There are a few arrangements that might be adjusted by UOP in particular: Use the media to give data about projects that they offer, the ability of their employees and the scholastic framework that they use Highlight the minimal effort of educational cost when contrasted with different universities Create tie-ups with enormous companies to urge their representatives to enlist at UOP; limits might be given to enterprises which enlists a specific number of their laborers at UOP Advertise through the web to catch outside business sectors and increment its understudy populace Put accentuation on the idea of offering quality training at plans that are open even to workin g grown-ups Need to contribute more on most recent innovation accessible for instructive organizations particularly concerning on the web instruction Selected Solution to the Problem The chose answer for the issue is a blend of all the elective arrangements introduced previously. UOP can't simply depend on a solitary answer for its issues. It ought to improve its course and program contributions and recruit increasingly skilled employees. It is likewise fundamental that UOP stay up to date with the most recent mechanical progressions in the business. In the wake of enhancing the said angles, it must assign the important assets to concoct a publicizing system that will improve its notoriety by featuring its one of a kind selling point and underlining the nature of its instruction. Usage The arrangements recommended would take a while to execute. The initial step to do is to explore on the most recent innovation accessible for online training. This is of most extreme significance in l ight of the fact that few schools are as of now offering on the web programs and if UOP doesn't adjust the most recent innovation, they probably won't have the option to hold its market authority. The subsequent stage is to amplify its promoting to other creating nations. This ought to be done on the grounds that on the off chance that they lose their authority in the US showcase, the remote market can expand any decrease in enlistment in the neighborhood advertise. Growing abroad is the best approach for online instruction. Inseparably with advertising to the outside market, UOP must enlist new employees to keep up the proportion of understudies to

Saturday, August 22, 2020

Cracker Control Assignment Example | Topics and Well Written Essays - 250 words

Wafer Control - Assignment Example They additionally need a Backtrack Live CD and a good remote connector that joins with CommVIew for Wireless hotspots (Philip, 2008). These instruments empower the remote card to accept a screen mode that helps in catching information parcels. A solid Wi-Fi organize signal likewise empowers the wafer to interface and separate from my system effortlessly. Hydra is another device that performs quick word reference assaults against various conventions in this manner encouraging breaking of frameworks. Various security standards or procedures can address this difficult when viably actualized. These incorporate the foundation of access control systems and End-to-end encryption. In addition, SSID stowing away, MAC ID separating, Static IP tending to, get to control and uprightness controls, and preparing on PC security can address this issue (Federal Trade Commission, 2011). We ought to likewise arrange switch passwords and firewall that forestall Wireless hotspots (Kent and Steiner, 2011). Other security standards incorporate recognizing the sort and motivation behind close to home data put away in documents and on the PC (Federal Trade Commission, 2011). Keeping just the important data and discarding superfluous information in a legitimate way can help in tending to this issue. Also, ensuring put away information and setting up legitimate proportions of reacting to security dangers turn away splitting (Federal Trade Commission, 2011). At last, no one ought to unveil individual info rmation without legitimate approval. These measures can restrict wafers from dealing with my system and

Friday, August 21, 2020

Foundation and Empire 14. The Mutant

The â€Å"hangar† on Kalgan is an organization impossible to miss unto itself, conceived of the requirement for the manner of the immense number of boats got by the guests from abroad, and the concurrent and subsequent huge requirement for living housing for the equivalent. The first splendid one who had thought of the undeniable arrangement had immediately gotten a tycoon. His beneficiaries †by birth or fund †were effectively among the most extravagant on Kalgan. The â€Å"hangar† spreads fatly over square miles of region, and â€Å"hangar† doesn't depict it at all adequately. It is basically a lodging †for ships. The voyager pays ahead of time and his boat is granted a billet from which it can take off into space at any ideal second. The guest at that point lives in his boat as usual. The customary inn administrations, for example, the substitution of nourishment and clinical supplies at extraordinary rates, basic overhauling of the boat itself, unique intra-Kalgan transportation for an ostensible entirety are to be had, obviously. Subsequently, the guest consolidates overhang space and inn bill into one, at a sparing. The proprietors sell impermanent utilization of ground space at plentiful benefits. The administration gathers tremendous charges. Everybody has a fabulous time. No one loses. Basic! The man who advanced down the shadow-outskirts of the wide passages that associated the incalculable wings of the â€Å"hangar† had in the past hypothesized on the curiosity and convenience of the framework depicted above, however these were reflections for inactive minutes †particularly unacceptable at present. The boats hulked in their stature and expansiveness down the long queues of deliberately adjusted cells, and the man disposed of line after line. He was a specialist at what he was doing now and if his starter investigation of the storage library had neglected to give explicit data past the far fetched sign of a particular wing †one containing many boats †his specific information could winnow those hundreds into one. There was the phantom of a murmur in the quiet, as the man halted and blurred down one of the lines; a slithering creepy crawly underneath the notification of the egotistical metal beasts that refreshed there. To a great extent the shining of light from a window would show the nearness of an early returner from the sorted out joys to easier †or progressively private †delights of his own. The man stopped, and would have grinned on the off chance that he at any point grinned. Absolutely the convolutions of his cerebrum played out what could be compared to a grin. The boat he halted at was smooth and clearly quick. The idiosyncrasy of its structure was what he needed. It was anything but a standard model †and nowadays the majority of the boats of this quadrant of the Galaxy either imitated Foundation plan or were worked by Foundation specialists. Be that as it may, this was exceptional. This was a Foundation transport †if simply because of the modest lumps in the skin that were the hubs of the defensive screen that lone a Foundation boat could have. There were different signs, as well. The man felt no faltering. The electronic hindrance hung over the line of the boats as an admission to security with respect to the administration was not in the slightest degree imperative to him. It separated effectively, and without initiating the caution, at the utilization of the exceptionally extraordinary killing power he had available to him. So the primary information inside the boat of the interloper without was the easygoing and practically well disposed sign of the quieted bell in the boat's lounge that was the consequence of a palm set over the little photocell only one side of the fundamental sealed area. And keeping in mind that that fruitful inquiry went on, Toran and Bayta felt just the most problematic security inside the steel dividers of the Bayta. The Mule's jokester who included revealed that inside his thin compass of body he held the noble name of Magnifico Giganticus, sat slouched over the table and ate at the nourishment set before him. His dismal, earthy colored eyes lifted from his meat just to follow Bayta's developments in the consolidated kitchen and larder where he ate. â€Å"The thanks of a powerless one are of yet little value,† he murmured, â€Å"but you have them, for genuinely, in this previous week, little yet scraps have come my direction †and for all my body is little, yet is my craving boorish great.† â€Å"Well, at that point, eat!† said Bayta, with a grin. â€Å"Don't burn through your time on much appreciated. Isn't there a Central Galaxy adage about appreciation that I once heard?† â€Å"Truly there is, my woman. For an astute man, I have been told, once stated, ‘Gratitude is ideal and best when it doesn't vanish itself in void expressions.' But oh dear, my woman, I am nevertheless a mass of void expressions, no doubt. At the point when my vacant expressions satisfied the Mule, it presented to me a court dress, and an excellent name †for, see you, it was initially essentially Bobo, one that satisfies him not †and afterward when my vacant expressions satisfied him not, it would bring upon my poor bones beatings and whippings.† Toran went into from the pilot room, â€Å"Nothing to do now however pause, Bay. I trust the Mule is fit for understanding that a Foundation transport is Foundation territory.† Magnifico Giganticus, once Bobo, opened his eyes wide and shouted, â€Å"How incredible is the Foundation before which even the brutal hirelings of the Mule tremble.† â€Å"Have you knew about the Foundation, too?† asked Bayta, with a little grin. â€Å"And who has not?† Magnifico's voice was a puzzling murmur. â€Å"There are the individuals who state it is a universe of incredible enchantment, of flames that can devour planets, and insider facts of relentless quality. They state that not the most noteworthy respectability of the Galaxy could accomplish the respect and regard considered just the characteristic due of a straightforward man who could state ‘I am a resident of the Foundation,' †were he just a rescue digger of room, or an in no way like myself.† Bayta stated, â€Å"Now, Magnifico, you'll never complete on the off chance that you make addresses. Here, I'll get you a little seasoned milk. It's good.† She put a pitcher of it upon the table and motioned Toran out of the room. â€Å"Torie, what are we going to do now †about him?† and she motioned towards the kitchen. â€Å"How do you mean?† â€Å"If the Mule comes, are we going to give him up?† â€Å"Well, what else, Bay?† He sounded bothered, and the motion with which he pushed back the damp twist upon his brow vouched for that. He proceeded fretfully, â€Å"Before I came here I had a kind of ambiguous thought that all we needed to do was to request the Mule, and afterward get serious †just business, you know nothing, definite.† â€Å"I comprehend what you mean, Torie. I wasn't much wanting to see the Mule myself, yet I thought we could get some firsthand information on the wreckage, and afterward ignore it to individuals who discover somewhat more about this interstellar interest. I'm no storybook spy.† â€Å"You're not behind me, Bay.† He collapsed his arms and glared. â€Å"What a circumstance! You'd never know there was an individual like the Mule, with the exception of this last strange break. Do you guess he'll desire his clown?† Bayta gazed toward him. â€Å"I don't have the foggiest idea about that I need him to. I don't have a clue what to state or do. Do you?† The inward bell sounded with its discontinuous burring clamor. Bayta's lips moved silently, â€Å"The Mule!† Magnifico was in the entryway, eyes wide, his voice a whine, â€Å"The Mule?† Toran mumbled, €Å"i must let them in.† A contact opened the sealed area and the external entryway shut behind the newcomer. The scanner demonstrated just a solitary shadowed figure. â€Å"It's only one person,† said Toran, with open alleviation, and his voice was practically insecure as he bowed toward the sign cylinder, â€Å"Who are you?† €Å"you would be wise to give me access and discover, hadn't you?† The words came meagerly out the beneficiary. â€Å"I'll educate you this is a Foundation transport and thus Foundation domain by global treaty.† â€Å"I know that.† â€Å"Come with your arms free, or I'll shoot. I'm well-armed.† â€Å"Done!† Toran opened the inward entryway and shut contact on his impact gun, thumb drifting over the weight point. There was the sound of strides and afterward the entryway swung open, and Magnifico shouted out, â€Å"It's not the Mule. It's nevertheless a man.† The â€Å"man† bowed to the comedian solemnly, â€Å"Very exact. I'm not the Mule.† He held his hands separated, â€Å"I'm not outfitted, and I please a quiet task. You may unwind and take care of the impact gun. Your hand isn't consistent enough for my tranquility of mind.† â€Å"Who are you?† asked Toran, bluntly. â€Å"I may ask you that,† said the outsider, coolly, â€Å"since you're the one under misrepresentations, not I.† â€Å"How so?† â€Å"You're the person who professes to be a Foundation resident when there's not an approved Trader on the planet.† â€Å"That's not really. How might you know?† â€Å"Because I am a Foundation resident, and have my papers to demonstrate it. Where are yours?† â€Å"I think you would do well to get out.† â€Å"I think not. On the off chance that you know anything about Foundation strategies, and notwithstanding your imposture you may, you'd realize that on the off chance that I don't return alive to my boat at a predefined time, there'll be a sign at the closest Foundation home office so I question if your weapons will have a lot of impact, for all intents and purposes speaking.† There was a faltering quietness and afterward Bayta stated, tranquilly, â€Å"Put the blaster away, Toran, and fully trust him. He seems like the genuine thing.† â€Å"Thank you,† said the outsider. Toran put his weapon on the seat adjacent to him, â€Å"Suppose you clarify this now.† The outsider stayed standing. He was long of bone and huge of appendage. His face comprised of hard level planes and it was someh

Tuesday, May 26, 2020

Gender Relations in Guests of the Sheik - Literature Essay Samples

Gender roles and relationships in Islamic societies are best understood through historical and religious context. This is because social norms and customs that regulate the behaviours of Muslim men and women are rooted in sacred texts and pivotal events, that date back to the formative period of the faith. As a result, complex cultural systems have been established with multiple layers of meaning that make it difficult for foreign scholars to study gender in Islamic countries. Western notions of gender can impede a proper understanding of these societies, even more so if this value system is projected upon Islamic traditions. This why Elizabeth Fernea’s, Guests of the Sheik ‘An Ethnography of an Iraqi Village’, has proven to be a critical resource in the study of gender relations within Islam. Her firsthand observation of a small rural village in Iraq provides unique insights into the personal experiences of local women and the socio-religious principles that fram e their daily lives. In describing a society that is very different from her own, Fernea assists readers in discovering the inner operations of a highly-gendered space. Upon arrival, Fernea struggled with cultural norms that regulated her appearance in public, in addition to her encounters with local men and women. For example, Muslim women wore the traditional abaya and Fernea became self-conscious focused on unwanted stares, due to the reason that she initially refused to wear one. As a non-Muslim, she did not feel the need to dress in the same way as other women and stated â€Å"This is ridiculous, I told myself. Why should I have to wear that ugly thing it’s not my custom.† [1] Here, she was projecting her own values on the gendered dress codes of another culture and had yet to learn that specific clothing was essential for Muslim women, when appearing in public. They abided by this social norm because the Qur’an encouraged them to cover themselves and wearing the abaya helped them avoid any labels of being immoral. Additionally, Fernea would also learn about the strict gender roles that shape domestic life, when Mohammed, a servant of the Sheik and the only male she was permitted to interact with, asked her not to tell anyone that he helped wash dishes. This was because â€Å"†¦he would be shamed among men for doing women’s work.† [2] Islamic societies like Iraq for instance, differentiated between men and women’s appearance, behaviour and duties at home and in the public. Therefore, Fernea soon realized that fear of shame, damaging one’s reputation, or violating religious rules, was of paramount importance in her new society. For non-Muslims, finding meaning in a complex cultural system that dates back in time to ancient and medieval societies, can be difficult. With gender roles recently codified by the emerging Islamic nation states of the twentieth century, it has become especially challenging to understand how Muslim women represent themselves and assert various forms of agency. [3] Yet, having gradually submerged herself within this system, Elizabeth Fernea’s ethnographic study revealed social dynamics of gender, that are often misunderstood by the West. Even though they are profoundly patriarchal and patrilineal societies, women attach significant meaning to the family unit and form strong bonds within them. Fernea describes the shock of local women when they find out that her mother was still in the United States. They felt sorry for her as, â€Å"To be alone without any of one’s womenfolk was clearly the greatest disaster which could befall any girl.† [4] They were also surpri sed that elders did not live with families, while Fernea herself was impressed at the willingness of local women to marry or not marry, based on the interest of their family. As a result, she could uncover how honor not only shapes gender identity and relationship, but serves as a source of self-worth and belonging. Since the actions of individuals reflect the integrity of the entire family, the Qur’an provides Islamic societies with gendered codes of conduct, that help maintain these certain ethics. Consequently, adherence to these rules is adherence to God, or in other words Allah, which in turn provides meaning to the lives of Muslim women, in what can be described as predominately patriarchal communities. Furthermore, the modern country of Iraq is also part of the historical schisms and sectism that has come to shape Islamic history, since the time of the prophet Muhammad and his family. Even though she was in a small rural village, the experiences of local women were still interrelated with the Sunni-Shia divide, the heritage of the Caliphates and Sultans, along with the histories of regional tribes and sheiks. Fernea was also able to observe women who had been influenced by the West and the social change occurring in the capital city of Baghdad. In doing so, her ethnography can go beyond stereotypes and prevalent misconceptions about gender in Islamic society. The image of the isolated and alienated stranger is replaced by religious women, moving within the daily rhythms of their faith. [5] Fernea summarized her observations by stating â€Å"†¦I could tell my friends in America again and again that the veiling and seclusion of Eastern women did not mean necessarily that they w ere forced against their will to live lives of submission and near serfdom.† [6] The West, like Islamic societies, is entrenched into its own culturally relative customs, that can be difficult to understand from an outsider’s perspective. In her case, Fernea could observe the interplay between gender roles, honor and reputation, that is uncommon in places like the United States and Canada for instance, but essential to Islam. The Qur’an provided the image and character traits of the archetypical Muslim man and woman, which gradually evolved into broader societal demands with strong repercussions. Therefore, the women from El Nahra in Iraq, like most Muslim women, are able to find meaning in these well-established traditions and values within their close-knit family relations. This might be tough to observe from a distance, although an ethnographic study like Guests of the Sheik was able to reveal the purpose of a highly-gendered space and the depth that can be extracted from this cultural construct. References Abu-Lughod, Lila. â€Å"Orientalism and Middle East Feminist Studies.† Feminists Studies 27 no. 1 (2001): 101-113. Arabi, Saddeka. â€Å"Gender Anthropology in the Middle East: The Politics of Muslim Women’s Representation.† The American Journal of Islamic Social Sciences 8 no. 1 (1991): 99-108. Fernea, Elizabeth W. Guests of the Sheik: An Ethnography of an Iraqi Village. New York: Doubleday, 1989. [1] Elizabeth W, Fernea. Guests of the Sheik: An Ethnography of an Iraqi Village (New York: Doubleday, 1989), 5. [2] Fernea, Guest of the Sheik, 17. [3] Lila, Abu-Lughod. â€Å"Orientalism and Middle East Feminist Studies.† Feminists Studies 27 no. 1 (2001): 103-105. [4] Fernea, Guests of the Sheik, 36. [5] Saddeka, Arabi. â€Å"Gender Anthropology in the Middle East: The Politics of Muslim Women’s Representation.† The American Journal of Islamic Social Sciences 8 no. 1 (1991): 100. [6] Fernea, Guests of the Sheik, 313.

Saturday, May 16, 2020

Steve Jobs, The Man Who Designed One Of The Greatest...

Steve Jobs, the man who designed one of the greatest technological comebacks in the history of Silicon Valley, continues to prove that he is a modern day Howard Hughes. Unpredictable, passionate, fearless, he was the person who put the smartphone in our pocket. If it was not for Steve Jobs, we would not have had personal computers, Podcasts or smartphones. Steve Jobs had a rough childhood. He was adopted by Paul and Clara Jobs, and his dad was an alcoholic and sometimes also abusive (Isaacson 41). He lived in Santa Clara County, was a quite turbulent child, and did not care about school at all until he reached 4th grade, when his teacher Imogene Hill bribed him into learning. She saw potential in him, gave him candy and money just to get†¦show more content†¦(Isaacson 58). One of the most significant perks of living in Los Altos was that he could go to school in the Cupertino-Sunnyvale School District, which was one of the best and safest school district in the valley. When Steve arrived in high school, Homestead High, he showed an early interest in electronics and enrolled in a popular electronics class. He also met Steve Wozniak there, who was also a computer genius like Steve himself. Steve met Woz in 1969, when Steve was 14 and Woz was 19 (Isaacson 67). Woz was much more knowledgeable of electronics than Steve was at the time, and Woz was already building a little computer called â€Å"The Cream Soda Computer†. Steve and Woz later became very close friends, and soon engaged in various entrepreneurship ventures together (Isaacson 74). One of Steve and Woz’s first entrepreneurship venture were blue boxes, which fooled ATT’s long distance switching equipment, which allowed you to make phone calls for free. It worked by producing various frequencies of tones that caused the telephone system to switch to long-distance calls. Once you made a long distance call, you could switch to operator mode, and you could route your call as you w anted, all for free, and it was also very hard to trace (Schlender 35). It was very popular among various criminal elements. The two stopped selling it because they were almost caught by the police. It

Wednesday, May 6, 2020

Nutrition - 751 Words

Micronutrient and Fast Food Presentation * Recorded micronutrient intake How does your recorded micronutrient intake compare with the recommendations of the dietary reference intake (DRI)? My intake of micronutrients in the last three days does not correlate with the recommendations of the DRI. There aren’t enough vitamins in my diet and too much sodium intake. * Which foods in your recorded daily intake provide specific micronutrients (specific vitamins and minerals)? Discuss the function of these micronutrients. In day one the peanut butter and jelly sandwich I consumed provided me with vitamins E,K and B12. The sandwich also provided me with the following minerals: Sodium, Calcium, Potassium, Magnesium, Iron, Zinc,†¦show more content†¦Fast foods are high in calories. Many people consume many calories and do not burn enough to maintain their weight or lose it. A fast food diet contributes to obesity because of the foods that are high in fats. Malnutrition can occur while eating fast food because some of the foods do not contain enough or any nutrients for the body. What three facts do you find particularly interesting about the excess or lack of micronutrients in a fast-food diet? What is the role of water in promoting health? Drinking water is essential for good health. The body is made of up a great percent of water. Water helps flush toxins and other compounds such as salt. Water helps regulate body temperature. What is the long-term outlook for individuals on a fast-food diet in terms of longevity and quality of life? Why are micronutrients necessary for longevity and quality ofShow MoreRelatedNutrition And Pregnancy : Nutrition1501 Words   |  7 Pages Chapter - 5 Maternal Nutrition in Pregnancy Nutrition and pregnancy refers to the nutrient intake, and dietary planning that is undertaken before, during and after pregnancy. The conception and the subsequent weeks afterwards is the time when it is at its most vulnerable, as it is the time when the organs and systems develop within. The enegy used to create these systems comes from the energy and nutrients in the mother’s circulation, and around the lining of the womb, such is the reason whyRead MoreNutrition : Nutrition And Diet Essay1237 Words   |  5 PagesIn the world’s today, nutrition and diet are essential to create a healthy and happy life. In fact, many companies are now offering healthy food options, healthy product options, and even healthy exercising training service. For the body to function well, there must be enough nutrients in the body to support the body with energy and during emergency time as well. In addition, being in good health reduces the chance of a person of developing diseases and illnesses. To understand and fully gain aRead MoreNutrition For Kids : Nutrition1704 Words   |  7 Pagesbody weight or 2-3 liters per day† (healthyeating.sfgate.com). Good nutrition means getting the right amount of nutrients from healthy foods in the right combinations. Knowing about nutrition and making smart choices about the foods you eat can help you achieve good health. Good health avoids obesity and a great number of illnesses. Nutrition for Kids Nutrition is very important for everyone, but especially for kids. Nutrition is directly linked to all aspects of their growth and development. ItRead MoreNutrition4210 Words   |  17 Pages| Module One : Introduction to Nutrition Hot Sheet |    |    |    |    |    |    | | The following provides you with a Hot Sheet of helpful bullet points that you can refer to for information on this module, as well as suggestions for your journal entry for this module. Remember, working though these journal entries at the end of each module will help you create your Final learning statement at the end of the course. So take a moment to use your journal and write down your thoughts to the questionsRead MoreNutrition : Natural Health And Nutrition Essay2224 Words   |  9 PagesStudent ID 171651 Teacher ID 6789 Senior Project 16 March 2015 Mastering Nutrition Natural health and nutrition is something that is commonly overlooked in today’s American society. Health cannot only change the way a person feels about their body, it can change a person’s outlook on life. Being healthy does not necessarily mean going to the gym, or exercising at all. Something as simple as changing a diet can have a bigger and longer lasting effect on a host of diseases and other conditionsRead MoreNutrition1754 Words   |  8 Pages Nutrition Assignment For all children the provision of good nutrition is of utmost importance. For the majority of children, diet should be a varied and balanced mixture of foods that will provide sufficient energy and nutrients to maintain growth and good health (Holden, C., MacDonald, A., 2000). In order to complete this assignment I will be looking at how the Food and Nutrition Essence of Care Benchmark, is implemented in practice. The health deficit I have chosen is the special dietaryRead MoreNutrition in Plants – Mineral Nutrition3545 Words   |  15 PagesNutrition in Plants – Mineral Nutrition- essential minerals for plant growth MODULE - 2 Forms and Function of Plants and Animals 9 Notes NUTRITION IN PLANTS – MINERAL NUTRITION Sometimes you may observe that a potted plant kept in sunlight and provided with sufficient water does not grow. Its leaves look pale and weak. Plant may not even flower properly. Such a situation is an indication, that the plant may not be getting all that is required for normal growth and development. In most of suchRead MoreNutrition 251, And It Focuses On The Principles Of Nutrition1035 Words   |  5 PagesI have recently been taking a course in college called Nutrition 251, and it focuses on the principles of nutrition. In this class, I had to read a book from Michael Pollan called In the Defense of Food. As I read, I could not help but remember all the things I have eaten. Pollan explains how food changed over the years in the US and goes into great detail in how the industrialization of our food has impacted our ways of eating, poisoning us with refined and processed foods. Reading Pollan’s workRead MoreNutrition Final Exam : Nutrition Essay1638 Words   |  7 Pages Jonathan Barker Dr. Moline Nutrition Final Exam 1. Carbs- carbohydrates are a vital source of our energy within the body. Carbs are the key nutrients that give our brains and red blood cells their energy. These carbs also come in different forms such as Fiber, which is a very important form or nutrient to our bodies. This is because fiber is tremendously important to our bodys digestive system. If someone took in too much fiber within their diet, it could cause terrible diarrhea. On the other handRead MoreNutrition And Nutrition During Pregnancy1912 Words   |  8 Pagesdaily nutritional intake can help prevent disease and promote health. An individual’s needs for nutrients and energy change over the span of one s life. According to ‘Nutrition Through the Life Cycle’, â€Å"One will find it easy to consider that, for good health outcomes, the importance of good nutrition begins in the diet and nutrition during pregnancy, and continues during childhood, adolescence and adulthood to ensure healthy ageing and go od quality of life in the last stages of one’s life (Goldberg

Tuesday, May 5, 2020

Emerging Issues and Challenges in Cloud Computing

Question: Describe about the Emerging Issues and Challenges in Cloud Computing? Answer: Aim of the Research Deployment of cloud computing within the infrastructure of enterprise bring significant concerns related to security. Successfully implementing the cloud computing in the enterprise need appropriate understanding and planning related to the emergence of vulnerabilities, threats, risks and possible counter- measures (Viega, 2009). Enterprises should be analyzing the threats, risks and available countermeasures with respect to security in the organization before the adoption of technology. In this research, discussion will be created on the risks of security and concerns related to cloud computing. It will be enlightening the steps that can be taken up by the enterprise for the reduction of risks related to security and the protection of resources. This research will also be explaining the weaknesses, benefits and areas with applicability in the management of information risk. The research methodologies used for the final presentation of this research involved three different phases. The first phase involved the presentation of a systematic review on the literature with appropriate analysis. The second phase is the methodology of research used for the collection of data in a significant manner in order to ensure accurate results and discussions. For the purpose of the collection of data, surveys and interviews had been conducted at the level of the entire industry. The narrative analysis of this data collected by conducting interviews will be done in a significant manner. The third phase will be involving a comparative analysis for answering the research questions stated above. Systematic literature review is an important source for the identification, evaluation and interpretation of all of the related available research important for the completion of this specific research and phenomena of interest. Background of the Research Since a long duration of time, organizations have been experiencing and will continuously be experiencing in this era of cloud computing related to losses in a number of systems. These have been having and will have a direct influence over the asset that is most valuable, information, and hence, it is extremely important for protecting each and every organization. With the continuous evolution of cloud computing, there are a number of major providers of cloud computing like Yahoo, Microsoft, Google, Amazon and a number of others where there is provision of these types of services like Storage as a service, Platform as a Service (PaaS), Software as a Service (SaaS) and IaaS (Infrastructure as a Service) (Kaleeswaran, 2012). Enterprises have started to look into the technology of cloud computing, as a way of cutting down the amount of costs, and increasing the level of profitability, as across each and every industry, CIOs have been continuously been under pressure for the reduction of head counts,tal assets, and supporting costs. For all these purposes, cloud systems provide them a way for meeting these goals (Vaikuntanathan, 2011). There are a number of definition formulated for cloud computing and these will be discussed further ahead in the review of literature. Cloud computing, as a whole, combines a number of different and important technologies that have matured and evolved with the passage of time. The cloud computing of present day has evolved in a number of ways that includes infrastructure, computing, storage and open APIs in combination. Cloud computing cannot be considered as being attractive only for the large scale enterprises, but also the startups, small enterprises, medium enterprises a nd entrepreneurs who would be availing huge benefits for their business by cloud computing. Literature Review Defining Cloud Computing The term cloud computing involves a number of different services through web, networking, distributed computing and virtualization. It is a way to offer services to the users by assisting them for tapping within extreme pool related to sharing of computing resources like network, storage and servers. Users can utilize services by simply plugging within the cloud and making payment for what is being used by him or her only (Viega, 2009). All of these features contribute in making cloud computing highly advantageous and beneficial, so there is huge demand for it. This type of model of computing helps in consolidating the side of server and results in the reduction of costs by considering the economies of scale as being highly advantageous. The cloud promises for the free users from often complicated and tedious tasks for the management and provision of resources related to computing for running the respective application. The cloud also contributes in bringing a number of benefits that include 1) a model pay-as-you-go cost, 2) applications being deployed at a faster and easier rate, 3) elastic and dynamic ways for the provision of resources, 4) infrastructure with more robustness and security (Curran, 2011). Each and every single benefit is provided to the user by the cloud in no additional amount of costs, while at the same point of time, there is provision of these with a high degree of flexibility in the computing resources being used and provided. The resources can be related to the service of storage, computing and other related specifications. There can is accessibility of the applications and data of the users from any location with the help of a single device, having two main requirements (Fernandez, 2013). These two main requirements are system of cloud computing and internet connection interface software over their device that can be extremely simple as that of web browser. Even though cloud computing has a number of beneficial features, but the concerns of security in the cloud has consistently been the greatest inhibitors in order to adopt cloud computing. One of the key concern related to cloud computing is the security for the data of users. The environment of cloud contributes in providing sharing of resources, so it appears as being highly risky for the movement of data within the hands of the one providing cloud (Viega, 2009). Data being stored at the cloud is a part of the shared environment, so the hacking becomes extremely simply either because of accidental factors or malicious hackers. Security Issues of Cloud Computing Issues of security in cloud computing has been identified as a significant obstacle involved in adopting it. The grouping of cloud computing can be done into multiple tenancy issues, account control, management of console security, malicious insiders, accountability, recovery, exploitation of bug, privacy, segregation of data, and sensitive accessibility of data (ENISA, 2009). There are a number of other risks and challenges involved in the cloud computing that result in the compromise of security that has to be considered for building trusting amongst the base of customers with respect to the technology of cloud computing. Very common and crucial challenges of security had been described by Akhil Behl. There are a number of threats related to security which comes from within and beyond the environment of consumer or cloud providers (Gobi, 2013). These have been classified within the insider threats. However, outsider threats include loss of data, issues regarding multiple tenancy, malicious attacks, disruption of service and loss of control as well. There is a need for adopting the feature of security within the environment of cloud for the protection of the virtual infrastructure of the cloud. According to the seven issues of cloud identified of Gartner, it is extremely important for addressing certain attacks of leakage in data such as the attacks on Denial of Service (Gkay, 2010). Successfully implementing the cloud computing in the enterprise need appropriate understanding and planning related to the emergence of vulnerabilities, threats, risks and possible counter- measures. Enterprises should be analyzing the threats, risks and available countermeasures with respect to security in the organization before the adoption of technology. Cloud computing contributes in providing efficiency, flexibility and cost effectiveness within the services. However, there is no 100 per cent guarantee for the security it provides. The most significant concerns with respect to cloud computing are security and privacy. There are a number of issues related to security in cloud computing. Out of a number of issues related to security, security of data has been identified as a major obstacle in adapting the services of cloud computing (Hashizume and Fernandez, 2013). Security of data in cloud computing is extremely important for ensuring that there has been no accessibility of the data under the presence of an unauthorized individual. The most important issues related to the security of data will be discussed further ahead in this section of the report. A. Integrity of Data It has been identified as one of the most crucial issues in the security of cloud. Integrity of data contributes in describing the completeness or wholeness of the data. The achievement of this can be easily done in the system that stands along by utilizing the properties of ACID. But it cannot be considered as being easy for achieving the integrity of data in the environment of cloud as the management of transaction is amongst the biggest issues in the services of web (Hocenski, 2010). Even though there is availability of standards such as WS- Transaction and WS- Reliability towards managing the integrity of data with the services of web, but these are still in the period of maturation (Kaleeswaran, 2012). Damage being caused to the data that has been stored within the cloud may take place in the duration of transaction with respect to the absence of control in integrity of the cloud. As a solution for this particular issue, the protocol of Byzantine fault- tolerant replication has been suggested as being highly significant. B. Location of Data Data is stored by consumers on cloud without the knowledge of as to where the data is being stored. Locality of data is highly important as majority of the enterprises do not show willingness towards the storage of data within the location beyond the nation. In such a case, an agreement is presented, approved and signed between the provider of cloud and the customer who is showing willingness for the storage of data at a specific server or location (Khanna and Jaiswal, 2013). Model of cloud should be ensuring reliability and security of the data being located. Location of data for the storage of data over the cloud has been identified as a major issue from the perspective of gaining the trust of clients and securing the data. Location for the storage of data within the cloud can be given priority in accordance with the requirements or wish of the users (Meinel, 2010). User will be defining as to which data of the user is non- sensitive and which one is sensitive in nature. There is a need for providing an interface to the users in the duration of storing data that consists of checking the level at which data is sensitive and data has to be stored in accordance with the wish of the users for the sensitivity of data. C. Confidentiality of Data Cloud computing contributes in providing an environment to the users where the data can be hosted by them. Unauthorized ability for the accessibility of crucial data of the enterprise can result in causing major disaster (Owens, 2010). Therefore, it is the responsibility of the cloud providers for guaranteeing that the accessibility of the data will only be in the hands of the legitimate users. Achievement of confidentiality in data can be done by the encryption. The provider of cloud should be implementing authentication with high suitability and the mechanism of accounting for the achievement of confidentiality and should be assuring the user of cloud that there is confidentiality and safety of the data (Viega, 2009). A solution for the confidentiality of data had been proposed that has been termed as Silver line. This is a combination technology that is in consideration of data from the end- to- end encryption by the organization or the owner and the users or the customers. D. Leakage of Data Even though the adoption of cloud computing is focused on the provision of significant advantages to the enterprises, but due to the fear of leakage in data, majority of them hold back to adopt these. Leakage of data has been becoming one of the most significant concern from the point- of- view of security (Liu and Meng, 2011). Cloud has been identified as an external party where there is hosting the data of customer, and has the potentiality of accessing the data of customer. The environment of cloud contributes in providing sharing of resources, so it appears as being highly risky for the movement of data within the hands of the one providing cloud. Data being stored at the cloud is a part of the shared environment, so the hacking becomes extremely simply either because of accidental factors or malicious hackers. The cloud computing of present day has evolved in a number of ways that includes infrastructure, computing, storage and open APIs in combination (Mell, 2010). Cloud comput ing cannot be considered as being attractive only for the large scale enterprises, but also the startups, small enterprises, medium enterprises and entrepreneurs who would be availing huge benefits for their business by cloud computing. E. Availability of Data Another significant concern related to cloud computing has been identified as services being available. Availability of data is referred to as a term utilized by certain manufacturers of computer storage and providers of storage service for describing the services and products that help in ensuring that there is continuous availability of data at the needed level for initiation of activities in certain situations that range from being normal to disastrous in nature (Pendse, 2010). In general context, the achievement for the availability of data is done by the involvement of redundancy where there is storage of data and how it can be assessed in a safe and secure way. The data being unavailable may result in the outages of services. These types of incidents have been experienced by Gmail and Amazon S3 (Rahman, 2011). Therefore, it can be stated that policies for the strong recovery of data are an extremely important requirement. Two extremely important approaches for the provision of making data available are the network of storage area (SAN) and storage attached to the network (NAS). F. Backup Provider of cloud must be focused on ensuring that the data of each and every client is being backed up in a number of different servers in a number of different copies on regular basis for the provision of recovery within the situations of disaster such as failure of hardware (Rosenblum, 2005). For the prevention of accidental leakage in the data that has been backed up, there can be a utilization of strong schemes of encryption. Some techniques for the recovery and back- up of data include replacement strategy of hot and cold back- up services (CBSRS), Technique of parity cloud service (PCS), and technology of High Security Rake and Distribution (HS-DRT) (Schiffman, 2010). The development of all of these techniques has been done under the domain of cloud. Strategies for the Security of Cloud Data There is a need for providing an interface to the users in the duration of storing data that consists of checking the level at which data is sensitive and data has to be stored in accordance with the wish of the users for the sensitivity of data. Damage being caused to the data that has been stored within the cloud may take place in the duration of transaction with respect to the absence of control in integrity of the cloud (Viega, 2009). As a solution for this particular issue, the protocol of Byzantine fault- tolerant replication has been suggested as being highly significant. A solution for the confidentiality of data had been proposed that has been termed as Silver line. This is a combination technology that is in consideration of data from the end- to- end encryption by the organization or the owner and the users or the customers. It can be stated that policies for the strong recovery of data are an extremely important requirement. Two extremely important approaches for the provision of making data available are the network of storage area (SAN) and storage attached to the network (NAS) (Vaikuntanathan, 2011). Some techniques for the recovery and back- up of data include replacement strategy of hot and cold back- up services (CBSRS), Technique of parity cloud service (PCS), and technology of High Security Rake and Distribution (HS-DRT). The development of all of these techniques has been done under the domain of cloud. Research Questions What are the major risks of security in Cloud Computing for the users? How can these risks and issues be avoided in a significant manner? What are the techniques available for this concern? To what limit can the risks of security impact the users of Cloud Computing? Research Problem The problem of research helps in identifying the concern which requires further investigation within the research. In this paper of research, the problem of research is focused on identifying the major issues of security being encountered by the providers or the users of cloud computing. Cloud computing involves an external system for the storage of data and relying upon the public internet that is focused on the enhancement of risks that have been threatening the security of the providers or users. Research Methodology The research methodologies used for the final presentation of this research involved three different phases. The first phase involved the presentation of a systematic review on the literature with appropriate analysis. The second phase is the methodology of research used for the collection of data in a significant manner in order to ensure accurate results and discussions. For the purpose of the collection of data, surveys and interviews had been conducted at the level of the entire industry. The narrative analysis of this data collected by conducting interviews will be done in a significant manner. The third phase will be involving a comparative analysis for answering the research questions stated above. Systematic literature review is an important source for the identification, evaluation and interpretation of all of the related available research important for the completion of this specific research and phenomena of interest (Schiffman, 2010). In this particular part of the research, there will be collection of data with the help of appropriate methods for ensuring there is high accuracy of the final results and discussions for understanding the challenges and issues with the technology of cloud computing from the perspective of practitioners. For the purpose of collecting the data, there has been the utilization of quantitative method that includes the conduction of interviews that have been structured in a well manner. Collection of Data There has been conduction of 8 interviews in- depth that have been semi- structured with the individuals of a number of different roles and team in two different companies within the industry. Both the companies are based in Canada that have been specializing in the cloud computing as the technology that is still emerging. The first set of interviewees has been selected in a collaborative manner by the liaisons and researchers within the organizations. Then for selecting the set of next groups for conducting the interviews, there had been utilization of snowball sampling. This method of sampling uses suggestions and comments from the interviewees for guiding the process of selection related to the interviewees. In general sense, the interviewees had first been asked questions for describing the roles played by them as an individual of the organization and the responsibilities held by their team. Then, these interviewees were asked questions regarding how they define cloud computing from the technical point- of- view, what motivates them behind the adoption of cloud, the benefits of being significantly involved with the emergence of cloud computing, and the challenges and issues faced by them or their customers with respect to the utilization of cloud. The interviews lasted for a duration of 20 to 30 minutes each. These interviews had been transcribed and audio- taped. The phase for the collection of data had been stopped when there had been no involvement of new and different insights related to the research. This resulted in saving a large duration of time for the interviews. Analysis of Data For the completion of this particular research, there been an inclusion of analysis for the data collected by conducting the interviews. The data that had been collected was analysis by the iteration of codes that had been assigned. These codes had been refined further ahead as there was an increased need for coding more data. By the end of this phase, there had been utilization of approximately 30 different codes in total for tagging the data that had been collected in a significant manner. These particular contributed in providing an effective reflection of the challenges and issues related to cloud computing that is highly important for this particular research. These had been divided into three different categories that included security, portability and performance. However, the identification of these codes had been done before the identification of categories related to the challenges identified and stated in the review of literature. In the next step of this particular phase, there had been classification of 20 different codesunder, the category that had been established in the review of literature. In case, the already present categories had not been suitable in accordance with the issue identified, new codes for classification had been established (Srinivasan, 2008). The theme for the classification and categorization of data had been done with an intension of comparing the finding with each and every part of the research, with identifying and studying the differences and similarities. Results and Discussions APIs have been identified as the interface being used by the customers for interacting with the services of cloud in both the organizations. In order to secure the function of processing, it has been identified that there is a need for having access control, mechanisms of encryption and verification of security, particularly when third parties begin to be built on these as a base (Stocker, 2011). For the analysis of this content, there had been a need for analyzing the model of security over the interfaces of cloud provider, ensuring access controls and strong authentication are being implemented within the performance with the transmission of encryption (Viega, 2009). In addition to this, there had been an increased need for understanding the level at which the chain related to the API is being dependent upon. Hence, it has been found that cloud computing, as a whole, combines a number of different and important technologies that have matured and evolved with the passage of time. Th e cloud computing of present day has evolved in a number of ways that includes infrastructure, computing, storage and open APIs in combination. Further ahead, the issue that had been the most significant in the case of company 1 was related to the loss of data (Subashini and Kavitha, 2011). This took place when data was deleted in the absence of any backup or encoding the key unauthorized or loss access, data always ended up in being in danger as it simply ended up being stolen or lost. Hence, it can be stated that provider of cloud must be focused on ensuring that the data of each and every client is being backed up in a number of different servers in a number of different copies on regular basis for the provision of recovery within the situations of disaster such as failure of hardware (Sudha and Monica, 2010). For the prevention of accidental leakage in the data that has been backed up, there can be a utilization of strong schemes of encryption. For providing solution related to this problem, there had been a need for implementing the fault free access control of API, mechanism utilized for protection and encryption of data being secured, analysis for the protection of data done at both events, designing and running out of time. There had also been an increased need for considering the strategies of preservation and provider back up, and the way in which these had been defined (Vaikuntanathan, 2011). Hence, it can be stated that both of these issues is a highly significant threat to both the organizations, in addition to the other risks of security identified in the review of literature. Cloud computing contributes in providing efficiency, flexibility and cost effectiveness within the services. However, there is no 100 per cent guarantee for the security it provides. The most significant concerns with respect to cloud computing are security and privacy (Tarakji, 2011). There are a number of issues related to security in cloud computing. Out of a number of issues related to security, security of data has been identified as a major obstacle in adapting the services of cloud computing. But still, the providers of cloud service face a number of problems such as full information for securing the user, so these type of system must be in existence for securing the information in a significant manner all across the industry. Potential Outcomes and Limitations Even though the review on literature had been presented in a systematic manner, there are a number of factors that might have contributed in increasing the level of subjectivity with respect to the finding. Firstly, the choice being made for the string of search could have been excluding the papers, creating discussion on challenges and issues but in the absence of necessarily statin that in an explicit manner within the title. Utilizing the title within the search helped in the reduction of noise in a significant manner, as otherwise, any specific paper that included the term issue and the term cloud, for an instance might end up being returned that results in providing approximately 25000 research papers, and majority of these had been irrelevant. In the similar manner, considering the interviews conducted, classification and coding are both the processes related to subjectivity. An attempt had been made for the mitigation of this issue by the involvement of a number of researchers within these types of activities. This review on literature had also been restricted in the fact that it does not take into consideration data related to the last few month of the year 2014. This might have resulted in affecting the accuracy of results that leads towards an incomplete view related to the latest trends. Conclusion The cloud computing of present day has evolved in a number of ways that includes infrastructure, computing, storage and open APIs in combination. Cloud computing cannot be considered as being attractive only for the large scale enterprises, but also the startups, small enterprises, medium enterprises and entrepreneurs who would be availing huge benefits for their business by cloud computing (Townsend, 2009). Issues of security in cloud computing has been identified as a significant obstacle involved in adopting it. The grouping of cloud computing can be done into multiple tenancy issues, account control, management of console security, malicious insiders, accountability, recovery, exploitation of bug, privacy, segregation of data, and sensitive accessibility of data. There are a number of other risks and challenges involved in the cloud computing that result in the compromise of security that has to be considered for building trusting amongst the base of customers with respect to the technology of cloud computing (Vaikuntanathan, 2011). There has been conduction of 8 interviews in- depth that have been semi- structured with the individuals of a number of different roles and team in two different companies within the industry. Both the companies are based in Canada that have been specializing in the cloud computing as the technology that is still emerging. Another significant concern related to cloud computing has been identified as services being available. Availability of data is referred to as a term utilized by certain manufacturers of computer storage and providers of storage service for describing the services and products that help in ensuring that there is continuous availability of data at the needed level for initiation of activities in certain situations that range from being normal to disastrous in nature (Valdez, 2009). In general context, the achievement for the availability of data is done by the involvement of redundancy where there is storage of data and how it can be assessed in a safe and secure way. References Curran, K. (2011). Cloud Computing Security. International Journal of Ambient Computing and Intelligence, 3(1), pp. 3846. ENISA, (2009). Cloud Computing: benefits, risks and recommendations for information Security. Fernandez, E. (2013). Three misuse patterns for Cloud Computing, In: Rosado DG, Mellado D, Fernandez-Medina E, Piattini M (ed) Security engineering for Cloud Computing: approaches and Tools. IGI Global, Pennsylvania, United States, pp 3653 Gobi, M. (2013). An Approach for Secure Data Storage in Cloud Environment.IJCCE, pp.206-209. Gkay, S. (2010). Security challenges in Cloud Computing, In: Proceedings of the 2010 International conference on Security and Management SAM10. CSREA Press, Las Vegas, US, pp 3642 Hashizume, K. and Fernandez, E. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications, [online] 4(5), pp.1-13. Available at: https://www.jisajournal.com/content/4/1/5 [Accessed 22 Dec. 2014]. Hocenski, Z. (2010). Cloud Computing Security issues and challenges, In: Proceedings of the 33rd International convention MIPRO. IEEE Computer Society Washington DC, USA, pp. 344349. Kaleeswaran, S. (2012). On covert channels between virtual machines. Journal in Computer Virology Springer, 8, pp. 8597. Khalid, A. (2010). Cloud Computing: applying issues in Small Business, In: International Conference on Signal Acquisition and Processing (ICSAP10), pp 278281. Khanna, L. and Jaiswal, A. (2013). Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them.International Journal of Advanced Research in Computer Science and Software Engineering, 3(3), pp. 279-283. Liu, S. and Meng, X. (2011). Towards High Maturity in SaaS Applications Based on Virtualization.International Journal of Information Systems in the Service Sector, 3(4), pp.39-53. Meinel, C. (2010). Infrastructure as a service security: Challenges and solutions, In: the 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany. IEEE Computer Society, Washington, DC, USA, pp 18 Mell, P. (2010). State of Security readiness. Crossroads 16(3), pp. 2325. Mller, I. (2010). An analysis of the Cloud Computing Security problem, In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia. Ning, P. (2009). Managing Security of virtual machine images in a Cloud environment, In: Proceedings of the 2009 ACM workshop on Cloud Computing Security. ACM New York, NY, USA, pp. 9196 Onwubiko, C. (2010). Security issues to Cloud Computing, In: Antonopoulos N, Gillam L (ed) Cloud Computing: principles, systems applications. 2010, Springer-Verlag Owens, D. (2010). Securing Elasticity in the Cloud.Queue, 8(5), p.10. Pendse, R. (2010). Security in multi-tenancy cloud, In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA. IEEE Computer Society, Washington, DC, USA, pp 3541. Rahman, S. (2011). An overview of the Security concerns in Enterprise Cloud Computing. International Journal of Network Security Its Applications (IJNSA), 3(1), pp. 3045. Rosenblum, M. (2005). When virtual is harder than real: Security challenges in virtual machine based computing environments, In: Proceedings of the 10th conference on Hot Topics in Operating Systems, Santa Fe, NM. Vol. 10. USENIX Association Berkeley, CA, USA, pp 227229 Schiffman, J. (2010). Outlook: cloudy with a chance of Security challenges and improvements. IEEE Security Privacy, 8(1), pp. 7780. Srinivasan, D. (2008). TVDc: managing Security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev., 42(1), pp. 4047. Stocker E (2011). Understanding Cloud Computing vulnerabilities. IEEE Security Privacy, 9(2), pp. 5057. Subashini, S. and Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of Network and Computer Applications, 34(1), pp.1-11. Sudha, M., and Monica, M. (2010). A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment.International Journal of Computer Applications, 12(8), pp.19-23. Tarakji, A. B. (2011). A survey of risks, threats and vulnerabilities in Cloud Computing, In: Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. Amman, Jordan, pp 16. Townsend, M. (2009). Managing a security program in a cloud computing environment, In: Information Security Curriculum Development Conference, Kennesaw, Georgia. ACM New York, NY, USA, pp. 128133. Vaikuntanathan, V. (2011). Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM workshop on Cloud Computing Security workshop. ACM New York, NY, USA, pp 113124. Valdez, E. (2009). Security for the Cloud infrastructure: trusted virtual data center implementation. IBM J Res Dev 53(4), pp. 560571 Viega, J. (2009). Cloud Computing and the common Man. Computer, 42(8), pp. 106108.