SlideShare a Scribd company logo
1 of 16
We are going to explore the Web regarding cloud service level
agreements (SLA).
Topic- cloud services and the SLA
A. Find an article on the Web that is no more than 4 years
old that describes a poor experience with cloud services and
SLAs.
B. Remember the article must contain two (2) elements to be
considered in this assignment, e.g. cloud services and the SLA.
You must use your own words. Do not copy and paste any part
of the article into the discussion.
C. Once you have found an appropriate article, tell the story IN
YOUR OWN WORDS and correlate the pertinent elements to
Erl, 2013, Chapter 3, Section 3.4. Be selective in the article
you choose to explain to the class.
D. Finally, summarize and provide your own recommendation
on how to mitigate the problem(s) you described.
Here are the topics in Erl, 2013 that you must correlate your
article towards.
· Reduced Operational Governance Control
· Limited Portability Between Cloud Providers
· Multi-Regional Compliance and Legal Issues
*Be sure to read Erl, 2013, Chapter 3, Section 3.4 before your
Web search to avoid making a critical mistake in your
discussion.
Keep your story as short as possible. Do not exceed 450
words. Provide a valid link (URL) to your article so that we
may find and read it.
Chapter 3
Section 3.4 (Page no 98- 102)
3.4. Risks and Challenges
Several of the most critical cloud computing challenges
pertaining mostly
to cloud consumers that use IT resources located in public
clouds are
presented and examined.
Increased Security Vulnerabilities
The moving of business data to the cloud means that the
responsibility
over data security becomes shared with the cloud provider. The
remote
usage of IT resources requires an expansion of trust boundaries
by the
cloud consumer to include the external cloud. It can be difficult
to
establish a security architecture that spans such a trust boundary
without introducing vulnerabilities, unless cloud consumers and
cloud
providers happen to support the same or compatible security
frameworks—which is unlikely with public clouds.
Another consequence of overlapping trust boundaries relates to
the
cloud provider’s privileged access to cloud consumer data. The
extent to
which the data is secure is now limited to the security controls
and
policies applied by both the cloud consumer and cloud provider.
Furthermore, there can be overlapping trust boundaries from
different
cloud consumers due to the fact that cloud-based IT resources
are
commonly shared.
The overlapping of trust boundaries and the increased exposure
of data
can provide malicious cloud consumers (human and automated)
with
greater opportunities to attack IT resources and steal or damage
business
data. Figure 3.9 illustrates a scenario whereby two
organizations
accessing the same cloud service are required to extend their
respective
trust boundaries to the cloud, resulting in overlapping trust
boundaries.
It can be challenging for the cloud provider to offer security
mechanisms
that accommodate the security requirements of both cloud
service
consumers.
Figure 3.9. The shaded area with diagonal lines indicates the
overlap of two organizations’
trust boundaries.
Overlapping trust boundaries is a security threat that is
discussed in
more detail in Chapter 6.
Reduced Operational Governance Control
Cloud consumers are usually allotted a level of governance
control that is
lower than that over on-premise IT resources. This can
introduce risks
associated with how the cloud provider operates its cloud, as
well as the
external connections that are required for communication
between the
cloud and the cloud consumer.
Consider the following examples:
• An unreliable cloud provider may not maintain the guarantees
it makes
in the SLAs that were published for its cloud services. This can
jeopardize the quality of the cloud consumer solutions that rely
on these
cloud services.
• Longer geographic distances between the cloud consumer and
cloud
provider can require additional network hops that introduce
fluctuating
latency and potential bandwidth constraints.
The latter scenario is illustrated in Figure 3.10.
Figure 3.10. An unreliable network connection compromises the
quality of
communication between cloud consumer and cloud provider
environments.
Legal contracts, when combined with SLAs, technology
inspections, and
monitoring, can mitigate governance risks and issues. A cloud
governance system is established through SLAs, given the “as-
a-service”
nature of cloud computing. A cloud consumer must keep track
of the
actual service level being offered and the other warranties that
are made
by the cloud provider.
Note that different cloud delivery models offer varying degrees
of
operational control granted to cloud consumers, as further
explained
in Chapter 4.
Limited Portability Between Cloud Providers
Due to a lack of established industry standards within the cloud
computing industry, public clouds are commonly proprietary to
various
extents. For cloud consumers that have custom-built solutions
with
dependencies on these proprietary environments, it can be
challenging
to move from one cloud provider to another.
Portability is a measure used to determine the impact of moving
cloud
consumer IT resources and data between clouds (Figure 3.11).
Figure 3.11. A cloud consumer’s application has a decreased
level of portability when
assessing a potential migration from Cloud A to Cloud B,
because the cloud provider of
Cloud B does not support the same security technologies as
Cloud A.
Multi-Regional Compliance and Legal Issues
Third-party cloud providers will frequently establish data
centers in
affordable or convenient geographical locations. Cloud
consumers will
often not be aware of the physical location of their IT resources
and data
when hosted by public clouds. For some organizations, this can
pose
serious legal concerns pertaining to industry or government
regulations
that specify data privacy and storage policies. For example,
some UK
laws require personal data belonging to UK citizens to be kept
within the
United Kingdom.
Another potential legal issue pertains to the accessibility and
disclosure
of data. Countries have laws that require some types of data to
be
disclosed to certain government agencies or to the subject of the
data.
For example, a European cloud consumer’s data that is located
in the
U.S. can be more easily accessed by government agencies (due
to the U.S.
Patriot Act) when compared to data located in many European
Union
countries.
Most regulatory frameworks recognize that cloud consumer
organizations are ultimately responsible for the security,
integrity, and
storage of their own data, even when it is held by an external
cloud
provider.
Summary of Key Points
• Cloud environments can introduce distinct security challenges,
some of which
pertain to overlapping trust boundaries imposed by a cloud
provider sharing IT
resources with multiple cloud consumers.
• A cloud consumer’s operational governance can be limited
within cloud
environments due to the control exercised by a cloud provider
over its platforms.
• The portability of cloud-based IT resources can be inhibited
by dependencies
upon proprietary characteristics imposed by a cloud.
• The geographical location of data and IT resources can be out
of a cloud
consumer’s control when hosted by a third-party cloud provider.
This can
introduce various legal and regulatory compliance concerns.
UHHS 310
Individual
Assignment: Module 6: Systems of Action
Point Value: 36 points
Format:
- Names on paper
· Course # and date
· Assignment title
· Typed in Times New Roman Font (12 point)
· Double-spaced
· Headings given within the body of the paper (as indicated
below).
· APA format should be used for citations within the paper and
the reference list
Directions:
A. Cumulative Writing: Copy/paste (and revise if needed) your
individual assignment on assignment on ‘Perspective Taking:
Ecological Systems and Life Course Model’ (from Module 3).
Be sure all of the following sections (with headings) are
included:
Definition of Health and Wellbeing
Problem
Alternative Perspectives
Ecological Systems
Life Course Model
Add an additional heading: Systems of Action
B. Systems of Action: Give at least three examples (for each
type of action: technical, communicative and critical) that may
be used to help resolve the problem described in your paper. Be
future oriented: Think about what might be done to help
resolve the problem --- not what actions have already taken
place already.
· Technical actions are those related to completing an
immediate goal or making a product.
· Communicative actions are those focused on achieving
‘deeper’ communication, that is, to achieve shared beliefs,
mutual understanding, transmit culture or traditions.
· Critical actions are those actions and/or ‘deeper’ questions
which help to examine assumptions, beliefs, and attitudes.
NOTE: You may notice that some of these actions do “overlap”
with one another (it is OK if they do). The point is to move
our focus from technical actions only to the consideration of
multiple forms of action that may be taken to best resolve a
problem.
Rubric: Systems of Action
Rating Scale
Criteria
0
1-3
3-6
Rating
I. A. Cumulative Writing - Sections from previous individual
assignments;
· Definition of Health & Wellbeing
· Problem
· Alternative Perspectives
· Ecological Systems
· Life Course Model
6 points
Not included
AND/OR
No corrections made
Some components
AND/OR
Some headings
Some corrections made (if needed)
All components
AND
All headings
All corrections made (if needed)
B. Systems of Action
Technical
6 points
No action given or very unclear or inappropriate
AND/OR
Actions unrelated to the problem
AND/OR
All actions have already been completed (written in past tense)
Identifies limited actions or explanation unclear
AND/OR
Actions somewhat related to the problem
AND/OR
Majority of actions have already been completed (written in
past tense)
Clearly identifies/
explains at least three actions
AND
Actions are related to the problem
AND
Actions are future oriented – actions are yet to be implemented
Communicative
6 points
No action given or very unclear or inappropriate
AND/OR
Actions unrelated to the problem
AND/OR
All actions have already been completed (written in past tense)
Identifies limited actions or explanation unclear
AND/OR
Actions somewhat related to the problem
AND/OR
Majority of actions have already been completed (written in
past tense)
Clearly identifies/
explains at least three actions
AND
Actions are related to the problem
AND
Actions are future oriented – actions are yet to be implemented
Critical
6 points
No action given or very unclear or inappropriate
AND/OR
Actions unrelated to the problem
AND/OR
All actions have already been completed; (written in past tense)
Identifies limited actions or explanation unclear
AND/OR
Actions somewhat related to the problem
AND/OR
Majority of actions have already been completed (written in
past tense)
Clearly identifies/
explains at least three actions
AND
Actions are related to the problem
AND
Actions are future oriented – actions are yet to be implemented
C. Writing
Citations and Reference List
4 points
No citations given with the paper and/or no references listed.
No corrections made (if needed)
Some references identified in list and/or not in APA format.
Some corrections made (if needed)
Identification of all citations within the paper and references
used in correct APA format
All corrections made (if needed)
Writing Process
4 points
5 or more errors in punctuation, capitalization, spelling,
grammar, sentence or paragraph structure
3 – 4 errors in
punctuation, capitalization, spelling, grammar, sentence or
paragraph structure
0-2 errors in punctuation, capitalization, spelling, grammar,
sentence or paragraph structure
Format for the Paper
4 points
5 or more errors
3-4 errors
0-2 errors
Total possible +35
Running Head: HEALTH AND WELLBEING 2
HEALTH AND WELLBEING 2
Health and Wellbeing
Ayaa Mahdi
Definition of Health and Wellbeing
The World Health Organization (WHO) defines health as ‘a
state of complete physical, mental
and social well-being and not merely the absence of disease or
infirmity’ (WHO, 1948). Health is a person’s state of complete
mental, physical, and social wellbeing. It’s the broad aspect of
being psychologically, mentally, and socially fit and the
interaction of all these factors in a person’s real-life situation.
Ideally, they both go beyond the ideal of the absence of illness.
Wellbeing will broadly mean person health and positive
interaction and participation with the society (Thompson, 2020).
Problem-related to health and wellbeing
From the case of Williams and Sarah, we realize that there is a
psychosocial problem. The two couples sharply differ not only
in the way the children should be disciplined but also in the
manner in which they were raised, which to a better extend has
impacted on their social life as grown-ups. While Williams
believes corporal punishment is good in correcting a child’s
behavior, Sarah cannot start it and a conflict ensues. Their
social setting differs and this results in a family that is marred
with conflict about how to discipline their daughter.
The rationale to the problem
The problem seems to be rooted from their different background
from which they were both raised. Williams was raised in a
family that uses slaps and spanks to correct wrong behavior
while Sarah was raised in a family which did not value corporal
punishment. As a result, they cannot tolerate each other. While
Sarah does not have any alternative to corporal punishment as a
way of correcting behavior, she cannot tolerate it as she
believes children raised with it assume violence and
aggressiveness as a way of solving issues but Williams knows a
little spanking is good for correcting child's behavior.
The 2 perspectives
Williams believes in corporal punishment for the correction of a
child's behavior. As many hold, similar beliefs as William-they
belief corporal punishment is effective in correcting behavior.
Researches imply its effectiveness in changing behavior
although it's widely opposed.
Sarah is strongly opposed to corporal punishment. She argues
it's a form of violence and its impact on the children's beliefs of
violence as the only means of solving problems is deleterious.
While many have observed corporal punishment is effective, its
impact is short-lived and may not be applicable for future
applicability. Hence, the need to adopt alternative disciplining
methods (Gershoff, 2018).
Event models
This problem may have been contributed by both psychological
and societal occurrences. First, Willian is said to have spent all
day long at work and he is tired and a bit upset. Their mental
state is not in its fitness. The societal model could have
contributed since the two couples were brought up from
different families with different beliefs and attributes. While
William has been spanked and beaten, Sarah’s family did not
treasure corporal punishment and hence the course of family rift
and conflict.
References
Misselbrook D. (2014). W is for wellbeing and the WHO
definition of health. The British journal of general practice : the
journal of the Royal College of General Practitioners, 64(628),
582. https://doi.org/10.3399/bjgp14X682381
Gershoff, E. T. (2018). Corporal punishment associated with
dating violence. Journal of pediatrics, 198, 322-325.
Thompson, V. L. S. (2020). Moving Beyond Mental Illness to
Mental Health and Wellbeing. Long-Term Care.
We are going to explore the Web regarding cloud service level agre

More Related Content

Similar to We are going to explore the Web regarding cloud service level agre

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
A cloud provisioning contract is the fundamental agr.docx
A cloud provisioning contract is the fundamental agr.docxA cloud provisioning contract is the fundamental agr.docx
A cloud provisioning contract is the fundamental agr.docx
sleeperharwell
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
paperpublications3
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
eSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
eSAT Journals
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
cloudresearcher
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
Vinoth Kanna
 

Similar to We are going to explore the Web regarding cloud service level agre (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
A cloud provisioning contract is the fundamental agr.docx
A cloud provisioning contract is the fundamental agr.docxA cloud provisioning contract is the fundamental agr.docx
A cloud provisioning contract is the fundamental agr.docx
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
CLOUD STORAGE.pptx
CLOUD STORAGE.pptxCLOUD STORAGE.pptx
CLOUD STORAGE.pptx
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Module 2-Cloud Computing Architecture.pptx
Module 2-Cloud Computing Architecture.pptxModule 2-Cloud Computing Architecture.pptx
Module 2-Cloud Computing Architecture.pptx
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 

More from elliotkimberlee

1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
elliotkimberlee
 
1.  What does this pattern indicate  What matches up and defines th.docx
1.  What does this pattern indicate  What matches up and defines th.docx1.  What does this pattern indicate  What matches up and defines th.docx
1.  What does this pattern indicate  What matches up and defines th.docx
elliotkimberlee
 
1.[removed]Political frame[removed.docx
1.[removed]Political frame[removed.docx1.[removed]Political frame[removed.docx
1.[removed]Political frame[removed.docx
elliotkimberlee
 
1.[removed]empowerment.[removed].docx
1.[removed]empowerment.[removed].docx1.[removed]empowerment.[removed].docx
1.[removed]empowerment.[removed].docx
elliotkimberlee
 
1.Which of the following is considered a hybrid organizational for.docx
1.Which of the following is considered a hybrid organizational for.docx1.Which of the following is considered a hybrid organizational for.docx
1.Which of the following is considered a hybrid organizational for.docx
elliotkimberlee
 
1.When should you use a factorial ANOVA rather than a simple A.docx
1.When should you use a factorial ANOVA rather than a simple A.docx1.When should you use a factorial ANOVA rather than a simple A.docx
1.When should you use a factorial ANOVA rather than a simple A.docx
elliotkimberlee
 
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
elliotkimberlee
 

More from elliotkimberlee (20)

1.  One of the basic components of any meta-population model is the .docx
1.  One of the basic components of any meta-population model is the .docx1.  One of the basic components of any meta-population model is the .docx
1.  One of the basic components of any meta-population model is the .docx
 
1.    n,1.What are the principles of ethical decision maki.docx
1.    n,1.What are the principles of ethical decision maki.docx1.    n,1.What are the principles of ethical decision maki.docx
1.    n,1.What are the principles of ethical decision maki.docx
 
1.  Make specific and general discussion comments that define and di.docx
1.  Make specific and general discussion comments that define and di.docx1.  Make specific and general discussion comments that define and di.docx
1.  Make specific and general discussion comments that define and di.docx
 
1.  Describe the basic assertions of the Broken Windows” theory.docx
1.  Describe the basic assertions of the Broken Windows” theory.docx1.  Describe the basic assertions of the Broken Windows” theory.docx
1.  Describe the basic assertions of the Broken Windows” theory.docx
 
1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
1.  Based on the reading (C)Donnelly, Burgess, Simonds, explain how .docx
 
1.You must provide a 1-page outline of your paper THE TOPIC .docx
1.You must provide a 1-page outline of your paper THE TOPIC .docx1.You must provide a 1-page outline of your paper THE TOPIC .docx
1.You must provide a 1-page outline of your paper THE TOPIC .docx
 
1.Your textbook discusses the return of the repressed in moder.docx
1.Your textbook discusses the return of the repressed in moder.docx1.Your textbook discusses the return of the repressed in moder.docx
1.Your textbook discusses the return of the repressed in moder.docx
 
1.  What does this pattern indicate  What matches up and defines th.docx
1.  What does this pattern indicate  What matches up and defines th.docx1.  What does this pattern indicate  What matches up and defines th.docx
1.  What does this pattern indicate  What matches up and defines th.docx
 
1.  What is the impact of Centers for Medicare and Medicaid Services.docx
1.  What is the impact of Centers for Medicare and Medicaid Services.docx1.  What is the impact of Centers for Medicare and Medicaid Services.docx
1.  What is the impact of Centers for Medicare and Medicaid Services.docx
 
1.Write a one page paper about the future of nursing. Includ.docx
1.Write a one page paper about the future of nursing. Includ.docx1.Write a one page paper about the future of nursing. Includ.docx
1.Write a one page paper about the future of nursing. Includ.docx
 
1.  Nora lies to her boss.  So, she lies to everyone2.  Alex must .docx
1.  Nora lies to her boss.  So, she lies to everyone2.  Alex must .docx1.  Nora lies to her boss.  So, she lies to everyone2.  Alex must .docx
1.  Nora lies to her boss.  So, she lies to everyone2.  Alex must .docx
 
1.[removed]Political frame[removed.docx
1.[removed]Political frame[removed.docx1.[removed]Political frame[removed.docx
1.[removed]Political frame[removed.docx
 
1.[removed]empowerment.[removed].docx
1.[removed]empowerment.[removed].docx1.[removed]empowerment.[removed].docx
1.[removed]empowerment.[removed].docx
 
1.Which of the following is considered a hybrid organizational for.docx
1.Which of the following is considered a hybrid organizational for.docx1.Which of the following is considered a hybrid organizational for.docx
1.Which of the following is considered a hybrid organizational for.docx
 
1.why do some theologians refer to Judaism, Christianity, and Islam .docx
1.why do some theologians refer to Judaism, Christianity, and Islam .docx1.why do some theologians refer to Judaism, Christianity, and Islam .docx
1.why do some theologians refer to Judaism, Christianity, and Islam .docx
 
1.When should you use a factorial ANOVA rather than a simple A.docx
1.When should you use a factorial ANOVA rather than a simple A.docx1.When should you use a factorial ANOVA rather than a simple A.docx
1.When should you use a factorial ANOVA rather than a simple A.docx
 
1.What processes do MNCs need to establish in order to reduce .docx
1.What processes do MNCs need to establish in order to reduce .docx1.What processes do MNCs need to establish in order to reduce .docx
1.What processes do MNCs need to establish in order to reduce .docx
 
1.What is the main difference between the 3rd Internet revo.docx
1.What is the main difference between the 3rd Internet revo.docx1.What is the main difference between the 3rd Internet revo.docx
1.What is the main difference between the 3rd Internet revo.docx
 
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
1.Watch Programs 2 and 3. Heres a link to the descriptions of.docx
 
1.We have discussed many times the distinctions between fina.docx
1.We have discussed many times the distinctions between fina.docx1.We have discussed many times the distinctions between fina.docx
1.We have discussed many times the distinctions between fina.docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

We are going to explore the Web regarding cloud service level agre

  • 1. We are going to explore the Web regarding cloud service level agreements (SLA). Topic- cloud services and the SLA A. Find an article on the Web that is no more than 4 years old that describes a poor experience with cloud services and SLAs. B. Remember the article must contain two (2) elements to be considered in this assignment, e.g. cloud services and the SLA. You must use your own words. Do not copy and paste any part of the article into the discussion. C. Once you have found an appropriate article, tell the story IN YOUR OWN WORDS and correlate the pertinent elements to Erl, 2013, Chapter 3, Section 3.4. Be selective in the article you choose to explain to the class. D. Finally, summarize and provide your own recommendation on how to mitigate the problem(s) you described. Here are the topics in Erl, 2013 that you must correlate your article towards. · Reduced Operational Governance Control · Limited Portability Between Cloud Providers · Multi-Regional Compliance and Legal Issues *Be sure to read Erl, 2013, Chapter 3, Section 3.4 before your Web search to avoid making a critical mistake in your discussion. Keep your story as short as possible. Do not exceed 450 words. Provide a valid link (URL) to your article so that we may find and read it. Chapter 3 Section 3.4 (Page no 98- 102) 3.4. Risks and Challenges
  • 2. Several of the most critical cloud computing challenges pertaining mostly to cloud consumers that use IT resources located in public clouds are presented and examined. Increased Security Vulnerabilities The moving of business data to the cloud means that the responsibility over data security becomes shared with the cloud provider. The remote usage of IT resources requires an expansion of trust boundaries by the cloud consumer to include the external cloud. It can be difficult to establish a security architecture that spans such a trust boundary without introducing vulnerabilities, unless cloud consumers and cloud providers happen to support the same or compatible security frameworks—which is unlikely with public clouds. Another consequence of overlapping trust boundaries relates to the cloud provider’s privileged access to cloud consumer data. The extent to which the data is secure is now limited to the security controls and policies applied by both the cloud consumer and cloud provider. Furthermore, there can be overlapping trust boundaries from different cloud consumers due to the fact that cloud-based IT resources are commonly shared. The overlapping of trust boundaries and the increased exposure of data can provide malicious cloud consumers (human and automated) with greater opportunities to attack IT resources and steal or damage
  • 3. business data. Figure 3.9 illustrates a scenario whereby two organizations accessing the same cloud service are required to extend their respective trust boundaries to the cloud, resulting in overlapping trust boundaries. It can be challenging for the cloud provider to offer security mechanisms that accommodate the security requirements of both cloud service consumers. Figure 3.9. The shaded area with diagonal lines indicates the overlap of two organizations’ trust boundaries. Overlapping trust boundaries is a security threat that is discussed in more detail in Chapter 6. Reduced Operational Governance Control Cloud consumers are usually allotted a level of governance control that is lower than that over on-premise IT resources. This can introduce risks associated with how the cloud provider operates its cloud, as well as the external connections that are required for communication between the cloud and the cloud consumer. Consider the following examples: • An unreliable cloud provider may not maintain the guarantees it makes in the SLAs that were published for its cloud services. This can jeopardize the quality of the cloud consumer solutions that rely on these cloud services. • Longer geographic distances between the cloud consumer and
  • 4. cloud provider can require additional network hops that introduce fluctuating latency and potential bandwidth constraints. The latter scenario is illustrated in Figure 3.10. Figure 3.10. An unreliable network connection compromises the quality of communication between cloud consumer and cloud provider environments. Legal contracts, when combined with SLAs, technology inspections, and monitoring, can mitigate governance risks and issues. A cloud governance system is established through SLAs, given the “as- a-service” nature of cloud computing. A cloud consumer must keep track of the actual service level being offered and the other warranties that are made by the cloud provider. Note that different cloud delivery models offer varying degrees of operational control granted to cloud consumers, as further explained in Chapter 4. Limited Portability Between Cloud Providers Due to a lack of established industry standards within the cloud computing industry, public clouds are commonly proprietary to various extents. For cloud consumers that have custom-built solutions with dependencies on these proprietary environments, it can be challenging to move from one cloud provider to another. Portability is a measure used to determine the impact of moving cloud consumer IT resources and data between clouds (Figure 3.11).
  • 5. Figure 3.11. A cloud consumer’s application has a decreased level of portability when assessing a potential migration from Cloud A to Cloud B, because the cloud provider of Cloud B does not support the same security technologies as Cloud A. Multi-Regional Compliance and Legal Issues Third-party cloud providers will frequently establish data centers in affordable or convenient geographical locations. Cloud consumers will often not be aware of the physical location of their IT resources and data when hosted by public clouds. For some organizations, this can pose serious legal concerns pertaining to industry or government regulations that specify data privacy and storage policies. For example, some UK laws require personal data belonging to UK citizens to be kept within the United Kingdom. Another potential legal issue pertains to the accessibility and disclosure of data. Countries have laws that require some types of data to be disclosed to certain government agencies or to the subject of the data. For example, a European cloud consumer’s data that is located in the U.S. can be more easily accessed by government agencies (due to the U.S. Patriot Act) when compared to data located in many European Union countries. Most regulatory frameworks recognize that cloud consumer
  • 6. organizations are ultimately responsible for the security, integrity, and storage of their own data, even when it is held by an external cloud provider. Summary of Key Points • Cloud environments can introduce distinct security challenges, some of which pertain to overlapping trust boundaries imposed by a cloud provider sharing IT resources with multiple cloud consumers. • A cloud consumer’s operational governance can be limited within cloud environments due to the control exercised by a cloud provider over its platforms. • The portability of cloud-based IT resources can be inhibited by dependencies upon proprietary characteristics imposed by a cloud. • The geographical location of data and IT resources can be out of a cloud consumer’s control when hosted by a third-party cloud provider. This can introduce various legal and regulatory compliance concerns. UHHS 310 Individual Assignment: Module 6: Systems of Action Point Value: 36 points Format: - Names on paper · Course # and date
  • 7. · Assignment title · Typed in Times New Roman Font (12 point) · Double-spaced · Headings given within the body of the paper (as indicated below). · APA format should be used for citations within the paper and the reference list Directions: A. Cumulative Writing: Copy/paste (and revise if needed) your individual assignment on assignment on ‘Perspective Taking: Ecological Systems and Life Course Model’ (from Module 3). Be sure all of the following sections (with headings) are included: Definition of Health and Wellbeing Problem Alternative Perspectives Ecological Systems Life Course Model Add an additional heading: Systems of Action B. Systems of Action: Give at least three examples (for each type of action: technical, communicative and critical) that may be used to help resolve the problem described in your paper. Be future oriented: Think about what might be done to help resolve the problem --- not what actions have already taken place already. · Technical actions are those related to completing an immediate goal or making a product.
  • 8. · Communicative actions are those focused on achieving ‘deeper’ communication, that is, to achieve shared beliefs, mutual understanding, transmit culture or traditions. · Critical actions are those actions and/or ‘deeper’ questions which help to examine assumptions, beliefs, and attitudes. NOTE: You may notice that some of these actions do “overlap” with one another (it is OK if they do). The point is to move our focus from technical actions only to the consideration of multiple forms of action that may be taken to best resolve a problem. Rubric: Systems of Action Rating Scale Criteria 0 1-3 3-6 Rating I. A. Cumulative Writing - Sections from previous individual assignments; · Definition of Health & Wellbeing · Problem · Alternative Perspectives · Ecological Systems · Life Course Model 6 points Not included AND/OR No corrections made
  • 9. Some components AND/OR Some headings Some corrections made (if needed) All components AND All headings All corrections made (if needed) B. Systems of Action Technical 6 points No action given or very unclear or inappropriate AND/OR Actions unrelated to the problem AND/OR All actions have already been completed (written in past tense) Identifies limited actions or explanation unclear AND/OR
  • 10. Actions somewhat related to the problem AND/OR Majority of actions have already been completed (written in past tense) Clearly identifies/ explains at least three actions AND Actions are related to the problem AND Actions are future oriented – actions are yet to be implemented Communicative 6 points No action given or very unclear or inappropriate AND/OR Actions unrelated to the problem AND/OR All actions have already been completed (written in past tense) Identifies limited actions or explanation unclear AND/OR Actions somewhat related to the problem
  • 11. AND/OR Majority of actions have already been completed (written in past tense) Clearly identifies/ explains at least three actions AND Actions are related to the problem AND Actions are future oriented – actions are yet to be implemented Critical 6 points No action given or very unclear or inappropriate AND/OR Actions unrelated to the problem AND/OR All actions have already been completed; (written in past tense) Identifies limited actions or explanation unclear AND/OR Actions somewhat related to the problem AND/OR Majority of actions have already been completed (written in
  • 12. past tense) Clearly identifies/ explains at least three actions AND Actions are related to the problem AND Actions are future oriented – actions are yet to be implemented C. Writing Citations and Reference List 4 points No citations given with the paper and/or no references listed. No corrections made (if needed) Some references identified in list and/or not in APA format. Some corrections made (if needed) Identification of all citations within the paper and references used in correct APA format All corrections made (if needed) Writing Process 4 points 5 or more errors in punctuation, capitalization, spelling, grammar, sentence or paragraph structure
  • 13. 3 – 4 errors in punctuation, capitalization, spelling, grammar, sentence or paragraph structure 0-2 errors in punctuation, capitalization, spelling, grammar, sentence or paragraph structure Format for the Paper 4 points 5 or more errors 3-4 errors 0-2 errors Total possible +35 Running Head: HEALTH AND WELLBEING 2 HEALTH AND WELLBEING 2
  • 14. Health and Wellbeing Ayaa Mahdi Definition of Health and Wellbeing The World Health Organization (WHO) defines health as ‘a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity’ (WHO, 1948). Health is a person’s state of complete mental, physical, and social wellbeing. It’s the broad aspect of being psychologically, mentally, and socially fit and the interaction of all these factors in a person’s real-life situation. Ideally, they both go beyond the ideal of the absence of illness. Wellbeing will broadly mean person health and positive interaction and participation with the society (Thompson, 2020). Problem-related to health and wellbeing From the case of Williams and Sarah, we realize that there is a psychosocial problem. The two couples sharply differ not only in the way the children should be disciplined but also in the manner in which they were raised, which to a better extend has impacted on their social life as grown-ups. While Williams believes corporal punishment is good in correcting a child’s behavior, Sarah cannot start it and a conflict ensues. Their social setting differs and this results in a family that is marred with conflict about how to discipline their daughter. The rationale to the problem The problem seems to be rooted from their different background from which they were both raised. Williams was raised in a family that uses slaps and spanks to correct wrong behavior while Sarah was raised in a family which did not value corporal punishment. As a result, they cannot tolerate each other. While Sarah does not have any alternative to corporal punishment as a way of correcting behavior, she cannot tolerate it as she believes children raised with it assume violence and aggressiveness as a way of solving issues but Williams knows a little spanking is good for correcting child's behavior.
  • 15. The 2 perspectives Williams believes in corporal punishment for the correction of a child's behavior. As many hold, similar beliefs as William-they belief corporal punishment is effective in correcting behavior. Researches imply its effectiveness in changing behavior although it's widely opposed. Sarah is strongly opposed to corporal punishment. She argues it's a form of violence and its impact on the children's beliefs of violence as the only means of solving problems is deleterious. While many have observed corporal punishment is effective, its impact is short-lived and may not be applicable for future applicability. Hence, the need to adopt alternative disciplining methods (Gershoff, 2018). Event models This problem may have been contributed by both psychological and societal occurrences. First, Willian is said to have spent all day long at work and he is tired and a bit upset. Their mental state is not in its fitness. The societal model could have contributed since the two couples were brought up from different families with different beliefs and attributes. While William has been spanked and beaten, Sarah’s family did not treasure corporal punishment and hence the course of family rift and conflict. References Misselbrook D. (2014). W is for wellbeing and the WHO definition of health. The British journal of general practice : the journal of the Royal College of General Practitioners, 64(628), 582. https://doi.org/10.3399/bjgp14X682381 Gershoff, E. T. (2018). Corporal punishment associated with dating violence. Journal of pediatrics, 198, 322-325. Thompson, V. L. S. (2020). Moving Beyond Mental Illness to Mental Health and Wellbeing. Long-Term Care.