SlideShare a Scribd company logo
1 of 10
What cloud computing really means By Eric Knorr, Galen
Gruman Created 2008-04-07 03:00AM Cloud computing is all
the rage. "It's become the phrase du jour," says Gartner senior
analyst Ben Pring, echoing many of his peers. The problem is
that (as with Web 2.0) everyone seems to have a different
definition. As a metaphor for the Internet, "the cloud" is a
familiar cliché, but when combined with "computing," the
meaning gets bigger and fuzzier. Some analysts and vendors
define cloud computing narrowly as an updated version of
utility computing: basically virtual servers [1] available over
the Internet. Others go very broad, arguing anything you
consume outside the firewall is "in the cloud," including
conventional outsourcing. [ Stay on top of the state of the cloud
with InfoWorld's "Cloud Computing Deep Dive [2]" special
report. Download it today! | Also check out our "Private Cloud
Deep Dive [3]," our "Cloud Security Deep Dive [4]," our
"Cloud Storage Deep Dive [5]," and our "Cloud Services Deep
Dive [6]." ] Cloud computing comes into focus only when you
think about what IT always needs: a way to increase capacity or
add capabilities on the fly without investing in new
infrastructure, training new personnel, or licensing new
software. Cloud computing encompasses any subscription-based
or pay-per-use service that, in real time over the Internet,
extends IT's existing capabilities. Cloud computing is at an
early stage, with a motley crew of providers large and small
delivering a slew of cloud-based services, from full-blown
applications to storage services to spam filtering. Yes, utility-
style infrastructure providers are part of the mix, but so are
SaaS (software as a service) [8] providers such as
Salesforce.com. Today, for the most part, IT must plug into
cloud-based services individually, but cloud computing
aggregators and integrators are already emerging. InfoWorld
talked to dozens of vendors, analysts, and IT customers to tease
out the various components of cloud computing. Based on those
discussions, here's a rough breakdown of what cloud computing
is all about: 1. SaaS This type of cloud computing delivers a
single application through the browser to thousands of
customers using a multitenant architecture. On the customer
side, it means no upfront investment in servers or software
licensing; on the provider side, with just one app to maintain,
costs are low compared to conventional hosting. Salesforce.com
is by far the best-known example among enterprise applications,
but SaaS is also common for HR apps and has even worked its
way up the food chain to ERP, with players such as Workday.
And who could have predicted the sudden rise of SaaS
"desktop" applications [9], such as Google Apps and Zoho
Office? 2. Utility computing The idea is not new, but this form
of cloud computing is getting new life from Amazon.com, Sun,
IBM, and others who now offer storage and virtual servers that
IT can access on demand. Early enterprise adopters mainly use
utility computing for supplemental, non-mission-critical needs,
but one day, they may replace parts of the datacenter. Other
providers offer solutions that help IT create virtual datacenters
from commodity servers, such as 3Tera's AppLogic and
Cohesive Flexible Technologies' Elastic Server on Demand.
Liquid Computing's LiquidQ offers similar capabilities,
enabling IT to stitch together memory, I/O, storage, and
computational capacity as a virtualized resource pool available
over the network. 3. Web services in the cloud Closely related
to SaaS, Web service providers offer APIs that enable
developers to exploit functionality over the Internet, rather than
delivering full-blown applications. They range from providers
offering discrete business services -- such as Strike Iron and
Xignite -- to the full range of APIs offered by Google Maps,
ADP payroll processing, the U.S. Postal Service, Bloomberg,
and even conventional credit card processing services. 4.
Platform as a service Another SaaS variation, this form of cloud
computing delivers development environments as a service. You
build your own applications that run on the provider's
infrastructure and are delivered to your users via the Internet
from the provider's servers. Like Legos, these services are
constrained by the vendor's design and capabilities, so you don't
get complete freedom, but you do get predictability and pre-
integration. Prime examples include Salesforce.com's Force.com
[10], Coghead [11] and the new Google App Engine [12]. For
extremely lightweight development, cloud-based mashup
platforms [13] abound, such as Yahoo Pipes [14] or [7]
Dapper.net. 5. MSP (managed service providers) One of the
oldest forms of cloud computing, a managed service is basically
an application exposed to IT rather than to end-users, such as a
virus scanning service for e-mail or an application monitoring
service (which Mercury, among others, provides). Managed
security services delivered by SecureWorks, IBM, and Verizon
fall into this category, as do such cloudbased anti-spam services
as Postini, recently acquired by Google. Other offerings include
desktop management services, such as those offered by
CenterBeam or Everdream. 6. Service commerce platforms A
hybrid of SaaS and MSP, this cloud computing service offers a
service hub that users interact with. They're most common in
trading environments, such as expense management systems that
allow users to order travel or secretarial services from a
common platform that then coordinates the service delivery and
pricing within the specifications set by the user. Think of it as
an automated service bureau. Well-known examples include
Rearden Commerce and Ariba. 7. Internet integration The
integration of cloud-based services is in its early days.
OpSource, which mainly concerns itself with serving SaaS
providers, recently introduced the OpSource Services Bus,
which employs in-the-cloud integration technology from a little
startup called Boomi. SaaS provider Workday recently acquired
another player in this space, CapeClear, an ESB (enterprise
service bus) provider that was edging toward b-to-b integration.
Way ahead of its time, Grand Central -- which wanted to be a
universal "bus in the cloud" to connect SaaS providers and
provide integrated solutions to customers -- flamed out in 2005.
Today, with such cloud-based interconnection seldom in
evidence, cloud computing might be more accurately described
as "sky computing," with many isolated clouds of services
which IT customers must plug into individually. On the other
hand, as virtualization and SOA permeate the enterprise, the
idea of loosely coupled services running on an agile, scalable
infrastructure should eventually make every enterprise a node in
the cloud. It's a long-running trend with a farout horizon. Bu
Running head: JUSTIFICATION REPORT PART 2
JUSTIFICATION REPORT PART 2
1Justification Report Part 2
Evaluation of Alternatives
Question 1
Georgia Power, an Atlanta-based company, dealt with racial
discrimination through swift action where they engaged in swift
and decisive action when the racial discrimination allegations
were made. The company did not attempt to downplay the
allegations but admitted the possibility of racial discrimination
in the workplace. The company took swift and decisive action
against the employees who were found harassing others based
on their racial backgrounds. The company expressed sympathy
with those who were victims of racial discrimination, which
averted any feelings of hostility towards the company in terms
of legal action against them (Wooten and James, 2004). This is
an alternative solution to initiating policies against those found
discriminating against other employees.
An alternative to the solution of providing safety procedures
and policies is the example provided by United Airlines 747
near crash. When one of its airplanes blew out the door, the
captain abandoned standard procedures and landed the plane
safely (New Zealand Law Foundation, 2000). Therefore, safety
policies and procedures are not enough. There should be
breathing room for the employees to react according to
circumstances that are novel and not covered by the procedures
and policies.
Question 2 and 3
Under the importance to measure and report, the quick response
to discrimination charges suggested as an alternative works
effectively. It is easy to measure discrimination and report on it
when employees cease to report on discrimination at the
workplace. In allowing for novel circumstances as an alternative
safety measure, this is difficult to measure and report since the
company would not have prior experience with the novel
circumstance that necessitates departure from standard policies
and procedures.
In terms of the scientific acceptability, the first alternative to
discrimination, which is to make sure there is quick and swift
response, the employees could be subjected to surveys to
measure scientifically whether the safety measures at the
company are working. In the alternative to safety, which is
allowance for novel circumstances, there is no possibility of
measuring scientifically the noel circumstances, which would be
new to the organization and demand departing from standard
policies and procedures.
In terms of the feasibility criterion, the first and second
alternatives on discrimination respectively are feasible since
they would be applicable to most organizations. Punishing
employees for discriminatory behavior and adopting safety
mechanisms that allow for novel circumstances are doable for
most organizations.
The usability criterion also validates both discrimination and
safety alternatives offered. The employees can ascertain the
usability of the alternatives since the results would speak for
themselves. The outcomes of the two alternatives are clearly
visible and therefore employees can ascertain their usability.
In the fifth criterion, the competing factor to discrimination,
which is a slower response, is worse than the quick and swift
response and therefore it is a better alternative. In the safety
alternative, allowing for novel circumstances is better than the
competing factor, which is to institute rigid policies and
procedures, which would create indecision when novel safety
situations arise.
Findings and Analysis
Question 4
The major discoveries that emerged from the evaluation of the
discrimination alternative is that the response to the situation is
more important than the actions in place, such as policies and
procedures, to deter discrimination. When Coca Cola was
accused of discrimination at the workplace, the company did not
respond quickly, which created a media problem and a public
relations problem (Unger, 1999). When policies and procedures
are in place, they might help the companies manage its
discrimination problems but when such problems arise, they
should make quick responses in order to avoid negative public
relations consequences.
The major discovery made in the safety alternative is that
policies and procedures might help create a feeling of safety but
they might not cover novel situations where the safety policies
and procedures cannot apply. The organization should therefore
leave room for novel circumstances and continually update their
safety policies and procedures to cover the emergent
circumstances that they might not have foreseen (Baker and
Sinkula, 1999).
Question 5
Figure 1
Criteria
Policies Option
Quick Response option
Importance to Measure and Report
High
High increase
Scientific Acceptability
Moderate
Negligible increase
Feasibility
High
High increase
Usability
High
High increase
Comparison to Competing Factors
High
High increase
TOTAL Feasibility* of Alternatives based on Criteria?
High
High
Figure 2
Criteria
Procedures and Policies
Novel Circumstance Allowance
Importance to Measure and Report
High
Negligible increase
Scientific Acceptability
High
Negligible increase
Feasibility
High
Negligible increase
Usability
High
Negligible increase
Comparison to Competing Factors
High
Negligible increase
TOTAL Feasibility* of Alternatives based on Criteria?
High
Low
References
Baker, W., and Sinkula, J. (1999). The synergistic effect of
market orientation and learning
Orientation on organizational performance. Journal of Academy
of Marketing Science, 27, 411-427.
New Zealand Law Foundation. (2000). Health & Safety at
Work: All practicable steps and the
current state of knowledge. Retrieved May 6, 2015 from
www.webresearch.co.nz/morphfolia/filelistings/healthsafetyatw
ork.pdf
Unger, H. (1999). Discrimination lawsuit: Coca-Cola accused of
companywide patterns. Atlanta
Journal-Constitution, H1.
Wooten, L. and James, E. (2004). When Firms Fail to Learn:
The Perpetuation of Discrimination
in the Workplace. Journal of Management Inquiry, 13(23), 23-
33.
Week 5 questions
"File Compression" Please respond to the following:
· Research the Internet or create your own files which meet the
following criteria:
a) gzip compresses by more than 80 percent
b) gzip compresses by less than 10 percent
c) gets larger when compressed with gzip
Use ls –l to determine the sizes of the files in question. Then,
determine whether or not you can characterize the files in a, b,
and c. Document your personal findings and include your
references if you used any.
· Determine whether or not you would recommend using gzip
over other compression utilities like the Microsoft Windows zip
tool. Justify your response.
"Distributed Software Architecture" Please respond to the
following:
· From the first e-Activity, briefly summarize your chosen
example’s function and design. Next, determine whether or not
you believe the example could function as effectively in a non-
distributed architecture as it had in a distributed architecture.
Justify your response.
· From the second e-Activity, suggest what you believe are the
two (2) most beneficial characteristics of cloud-computing from
an organizational perspective. Further, explain at least one (1)
challenge an organization could potentially face when
implementing an existing in-house application or system into
the cloud. Justify your response.
"Incorporating Graphics Into the Justification Report" Please
respond to the following:
· This week, you are to add a graph to your Justification Report.
Discuss how you'll approach this part of your assignment, and
state the main reasons why you feel that graphs are a necessary
part of a formal report.
· From Part 1 of this discussion, determine the main benefits of
using graphs in the report presentation. Next, explain the matter
in which a creatively constructed graph might help you to better
manage and present your data.

More Related Content

Similar to What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx

SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideMarianne Harness
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideAlaina Carter
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud softwareTCM infosys
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxjasoninnes20
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxclairbycraft
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper Assem mousa
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Cloud computing
Cloud computingCloud computing
Cloud computingleninlal
 
Cloud computing
Cloud computingCloud computing
Cloud computingsfu-kras
 
The cloud primer
The cloud primerThe cloud primer
The cloud primerJoe Orlando
 
The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingMindi Schneider
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxjuliennehar
 

Similar to What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx (20)

SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete Guide
 
What is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete GuideWhat is Cloud Computing? A Complete Guide
What is Cloud Computing? A Complete Guide
 
Ey35869874
Ey35869874Ey35869874
Ey35869874
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docxC11-1 CASE STUDY 11   CLOUD COMPUTING (IN)SECURITY .docx
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docx
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The cloud primer
The cloud primerThe cloud primer
The cloud primer
 
The Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz ManufacturingThe Cloud Computing Strategy Of Xyz Manufacturing
The Cloud Computing Strategy Of Xyz Manufacturing
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 

More from alanfhall8953

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docxalanfhall8953
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxalanfhall8953
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docxalanfhall8953
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docxalanfhall8953
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docxalanfhall8953
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
 

More from alanfhall8953 (20)

With regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docxWith regards to this article, I agree and disagree on certain leve.docx
With regards to this article, I agree and disagree on certain leve.docx
 
WIT Financial Accounting Test Ch.docx
WIT                   Financial Accounting Test                 Ch.docxWIT                   Financial Accounting Test                 Ch.docx
WIT Financial Accounting Test Ch.docx
 
Windows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docxWindows Server Deployment ProposalOverviewEach student will .docx
Windows Server Deployment ProposalOverviewEach student will .docx
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docxWireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
Wireshark Lab IP v6.0Supplement to Computer Networking A Top-D.docx
 
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
Wireshark Lab IP v6.0  Supplement to Computer Networking.docxWireshark Lab IP v6.0  Supplement to Computer Networking.docx
Wireshark Lab IP v6.0 Supplement to Computer Networking.docx
 
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxWillowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docx
 
Wind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docxWind PowerUsed For Millennia Variations in alb.docx
Wind PowerUsed For Millennia Variations in alb.docx
 
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxwinter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docx
 
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docxWinEst As 1. Es2. Tassignment stInfo (Esti.docx
WinEst As 1. Es2. Tassignment stInfo (Esti.docx
 
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxWiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docx
 
Winter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docxWinter 2011 • Morality in Education 35Workplace Bullying .docx
Winter 2011 • Morality in Education 35Workplace Bullying .docx
 
With the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docxWith the competitive advantage that Crocs’ supply chain holds, the.docx
With the competitive advantage that Crocs’ supply chain holds, the.docx
 
Windows Server 2012 R2 Essentials Windows Server 2012.docx
Windows Server 2012 R2 Essentials  Windows Server 2012.docxWindows Server 2012 R2 Essentials  Windows Server 2012.docx
Windows Server 2012 R2 Essentials Windows Server 2012.docx
 
Wind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docxWind power resources on the eastern U.S. continental shelf are est.docx
Wind power resources on the eastern U.S. continental shelf are est.docx
 
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
WilliamStearman_Java301build.xml      Builds, tests, and ru.docxWilliamStearman_Java301build.xml      Builds, tests, and ru.docx
WilliamStearman_Java301build.xml Builds, tests, and ru.docx
 
Wilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docxWilco Corporation has the following account balances at December 3.docx
Wilco Corporation has the following account balances at December 3.docx
 
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxWilson Majee Technology Diffusion, S-Curve, and Innovation.docx
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docx
 
WinARM - Simulating Advanced RISC Machine Architecture .docx
WinARM - Simulating Advanced RISC Machine Architecture   .docxWinARM - Simulating Advanced RISC Machine Architecture   .docx
WinARM - Simulating Advanced RISC Machine Architecture .docx
 
William PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docxWilliam PennWhat religion was William PennWilliam Pen was fr.docx
William PennWhat religion was William PennWilliam Pen was fr.docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx

  • 1. What cloud computing really means By Eric Knorr, Galen Gruman Created 2008-04-07 03:00AM Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition. As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers [1] available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing. [ Stay on top of the state of the cloud with InfoWorld's "Cloud Computing Deep Dive [2]" special report. Download it today! | Also check out our "Private Cloud Deep Dive [3]," our "Cloud Security Deep Dive [4]," our "Cloud Storage Deep Dive [5]," and our "Cloud Services Deep Dive [6]." ] Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility- style infrastructure providers are part of the mix, but so are SaaS (software as a service) [8] providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging. InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those
  • 2. discussions, here's a rough breakdown of what cloud computing is all about: 1. SaaS This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications [9], such as Google Apps and Zoho Office? 2. Utility computing The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network. 3. Web services in the cloud Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services. 4. Platform as a service Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet
  • 3. from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre- integration. Prime examples include Salesforce.com's Force.com [10], Coghead [11] and the new Google App Engine [12]. For extremely lightweight development, cloud-based mashup platforms [13] abound, such as Yahoo Pipes [14] or [7] Dapper.net. 5. MSP (managed service providers) One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloudbased anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream. 6. Service commerce platforms A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba. 7. Internet integration The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005. Today, with such cloud-based interconnection seldom in
  • 4. evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a farout horizon. Bu Running head: JUSTIFICATION REPORT PART 2 JUSTIFICATION REPORT PART 2 1Justification Report Part 2 Evaluation of Alternatives Question 1 Georgia Power, an Atlanta-based company, dealt with racial discrimination through swift action where they engaged in swift and decisive action when the racial discrimination allegations were made. The company did not attempt to downplay the allegations but admitted the possibility of racial discrimination in the workplace. The company took swift and decisive action against the employees who were found harassing others based on their racial backgrounds. The company expressed sympathy with those who were victims of racial discrimination, which averted any feelings of hostility towards the company in terms of legal action against them (Wooten and James, 2004). This is an alternative solution to initiating policies against those found discriminating against other employees. An alternative to the solution of providing safety procedures
  • 5. and policies is the example provided by United Airlines 747 near crash. When one of its airplanes blew out the door, the captain abandoned standard procedures and landed the plane safely (New Zealand Law Foundation, 2000). Therefore, safety policies and procedures are not enough. There should be breathing room for the employees to react according to circumstances that are novel and not covered by the procedures and policies. Question 2 and 3 Under the importance to measure and report, the quick response to discrimination charges suggested as an alternative works effectively. It is easy to measure discrimination and report on it when employees cease to report on discrimination at the workplace. In allowing for novel circumstances as an alternative safety measure, this is difficult to measure and report since the company would not have prior experience with the novel circumstance that necessitates departure from standard policies and procedures. In terms of the scientific acceptability, the first alternative to discrimination, which is to make sure there is quick and swift response, the employees could be subjected to surveys to measure scientifically whether the safety measures at the company are working. In the alternative to safety, which is allowance for novel circumstances, there is no possibility of measuring scientifically the noel circumstances, which would be new to the organization and demand departing from standard policies and procedures. In terms of the feasibility criterion, the first and second alternatives on discrimination respectively are feasible since they would be applicable to most organizations. Punishing employees for discriminatory behavior and adopting safety
  • 6. mechanisms that allow for novel circumstances are doable for most organizations. The usability criterion also validates both discrimination and safety alternatives offered. The employees can ascertain the usability of the alternatives since the results would speak for themselves. The outcomes of the two alternatives are clearly visible and therefore employees can ascertain their usability. In the fifth criterion, the competing factor to discrimination, which is a slower response, is worse than the quick and swift response and therefore it is a better alternative. In the safety alternative, allowing for novel circumstances is better than the competing factor, which is to institute rigid policies and procedures, which would create indecision when novel safety situations arise. Findings and Analysis Question 4 The major discoveries that emerged from the evaluation of the discrimination alternative is that the response to the situation is more important than the actions in place, such as policies and procedures, to deter discrimination. When Coca Cola was accused of discrimination at the workplace, the company did not respond quickly, which created a media problem and a public relations problem (Unger, 1999). When policies and procedures are in place, they might help the companies manage its discrimination problems but when such problems arise, they should make quick responses in order to avoid negative public relations consequences. The major discovery made in the safety alternative is that policies and procedures might help create a feeling of safety but they might not cover novel situations where the safety policies
  • 7. and procedures cannot apply. The organization should therefore leave room for novel circumstances and continually update their safety policies and procedures to cover the emergent circumstances that they might not have foreseen (Baker and Sinkula, 1999). Question 5 Figure 1 Criteria Policies Option Quick Response option Importance to Measure and Report High High increase Scientific Acceptability Moderate Negligible increase Feasibility High High increase Usability High High increase Comparison to Competing Factors High High increase TOTAL Feasibility* of Alternatives based on Criteria? High High Figure 2 Criteria Procedures and Policies Novel Circumstance Allowance Importance to Measure and Report High Negligible increase Scientific Acceptability
  • 8. High Negligible increase Feasibility High Negligible increase Usability High Negligible increase Comparison to Competing Factors High Negligible increase TOTAL Feasibility* of Alternatives based on Criteria? High Low References Baker, W., and Sinkula, J. (1999). The synergistic effect of market orientation and learning Orientation on organizational performance. Journal of Academy of Marketing Science, 27, 411-427. New Zealand Law Foundation. (2000). Health & Safety at Work: All practicable steps and the current state of knowledge. Retrieved May 6, 2015 from www.webresearch.co.nz/morphfolia/filelistings/healthsafetyatw ork.pdf Unger, H. (1999). Discrimination lawsuit: Coca-Cola accused of companywide patterns. Atlanta Journal-Constitution, H1. Wooten, L. and James, E. (2004). When Firms Fail to Learn: The Perpetuation of Discrimination in the Workplace. Journal of Management Inquiry, 13(23), 23- 33. Week 5 questions "File Compression" Please respond to the following:
  • 9. · Research the Internet or create your own files which meet the following criteria: a) gzip compresses by more than 80 percent b) gzip compresses by less than 10 percent c) gets larger when compressed with gzip Use ls –l to determine the sizes of the files in question. Then, determine whether or not you can characterize the files in a, b, and c. Document your personal findings and include your references if you used any. · Determine whether or not you would recommend using gzip over other compression utilities like the Microsoft Windows zip tool. Justify your response. "Distributed Software Architecture" Please respond to the following: · From the first e-Activity, briefly summarize your chosen example’s function and design. Next, determine whether or not you believe the example could function as effectively in a non- distributed architecture as it had in a distributed architecture. Justify your response. · From the second e-Activity, suggest what you believe are the two (2) most beneficial characteristics of cloud-computing from an organizational perspective. Further, explain at least one (1) challenge an organization could potentially face when implementing an existing in-house application or system into the cloud. Justify your response. "Incorporating Graphics Into the Justification Report" Please respond to the following: · This week, you are to add a graph to your Justification Report.
  • 10. Discuss how you'll approach this part of your assignment, and state the main reasons why you feel that graphs are a necessary part of a formal report. · From Part 1 of this discussion, determine the main benefits of using graphs in the report presentation. Next, explain the matter in which a creatively constructed graph might help you to better manage and present your data.