CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZUREJournal For Research
The growing demand of cloud adoption in the organizations has made IT business to refine their existing strategy. It is important to leverage the existing infrastructure and move the data to cloud which has a competitive edge in terms of operational cost. The adaptability to change is the key and with the agility through cloud, highly scalable and data availability with minimal downtime at enterprise is established. Microsoft Azure is one of the leading cloud vendors in the market and their capabilities in Analytics, Data and Storage services helps the organizations to move their data to cloud with ease. They provide hybrid cloud model with related services which enable flexibility to meet any specific business needs with instant scalability and flexible architectural patterns. There are catalog of services offered by Microsoft Azure to have the data on cloud and build an integrated solution. In this paper, Azure cloud data and storage services are discussed along with other essential capabilities providing value to business.
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZUREJournal For Research
The growing demand of cloud adoption in the organizations has made IT business to refine their existing strategy. It is important to leverage the existing infrastructure and move the data to cloud which has a competitive edge in terms of operational cost. The adaptability to change is the key and with the agility through cloud, highly scalable and data availability with minimal downtime at enterprise is established. Microsoft Azure is one of the leading cloud vendors in the market and their capabilities in Analytics, Data and Storage services helps the organizations to move their data to cloud with ease. They provide hybrid cloud model with related services which enable flexibility to meet any specific business needs with instant scalability and flexible architectural patterns. There are catalog of services offered by Microsoft Azure to have the data on cloud and build an integrated solution. In this paper, Azure cloud data and storage services are discussed along with other essential capabilities providing value to business.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
What is Cloud Computing and, How does the cloud work?
Cloud Computing
This article is intended to discuss cloud computing, cloud computing basics, how does cloud computing work, cloud services, and what is cloud computing? Study of cloud computing and job opportunities after completing cloud computing course.
What is Cloud Computing and, How does the cloud work?
The term “cloud” is used as a substitute for the “internet”. Cloud computing points to any hardware or software like networks, software, analytics, servers, storage, databases, and intelligence provided over the internet (cloud) by any service provider.
Data, software, and source codes are often stored on hard drives, which is quite risky since difficult situations may arise such as hard disk crashes, data corruption, and eventual loss of the entire resources to work with. A cloud computing service provides various server, software, storage, and application services over the Internet so that they should be safe. They can be configured to handle any size of access or traffic and can scale up and down according to the volume and, frequency of requirement. Thus cloud computing is the delivery of different services through the Internet including different servers, software, storage, and applications. In other words, using cloud computing, customers can access software, infrastructure, platforms, devices, and other resources over the internet.
Customers can easily utilize these services available in the cloud without any prior knowledge of how to manage the resources involved.
Large companies such as Google, Amazon, IBM, Sun, Cisco, Dell, HP, Intel, Novell, and Oracle are investing in cloud computing to provide individuals and businesses with a variety of cloud-based solutions.
For example, Google Cloud is a collection of public cloud services provided by Google. All Application development is done on Google hardware. These include Google Compute Engine, App Engine, Google Cloud Storage, and Google Container Engine.
Cloud storage utilizes data centers with massive computer servers that store data and access it online through the internet. The users can remotely upload and store their content and retrieve it whenever they need it.
Advantages of cloud computing.
Businesses around the world are moving away from traditional on-premises services as cloud computing becomes more popular. In recent years, cloud-based services have radically changed the way businesses do business, enabling them to use information technology infrastructures, platforms, software, and applications via the Internet.
Users can devote more time and effort to their main business processes instead of spending their time learning about the resources they need to manage.
Cloud computing allows users to avoid significant capital investments because they can rent physical infrastructure from third-party providers.
Cloud computing infrastructure services leverage shared resources, allowing servers to work efficiently withou
Service Clouds are a key emerging feature of the Future Internet which will provide a basic platform through which it executes virtualized services. For effectively operating a cloud services there is a need to have a monitoring system which provides data on the actual usage and changes in the resources of the cloud and the services running in the cloud. Monitoring and managing cloud is a very different from monitoring and managing the individual servers. This paper will detail the different aspect of the monitoring and the parameters involved in monitoring of the cloud services.
Cloud computing provide us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online.
With cloud computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud Computing is both a combination of software and hardware based computing resources delivered as a network service.
Basic Concepts:
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:
1. Deployment Models
2. Service Models
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Seminar_report on Microsoft Azure ServiceANAND PRAKASH
Executing applications in the clouds offer many advantages over the traditional way of running programs. Firstly, using cloud computing allows rapid service deployment and massive savings upfront because not having to invest in infrastructure. Secondly, cloud computing model allows computing power and storage to scale up with business growth. In addition to this, it’s also easy to dynamically adjust computing power up or down. As a customer, you end up paying for the actual usage of resources. The advantages of using the Azure cloud platform relate to the fact that Microsoft has tried to minimize the changes involved in migrating applications to the cloud. Effort required from developers already familiar with Microsoft’s technologies to utilize the Azure is minimal. In addition to this, upcoming releases of Azure are going to support applications written in languages such as Python and PHP. Another advantage in Microsoft’s solution is that the services provided can be used in a very flexible fashion. Not only are Azure services available to cloud applications, but also traditional on-premises applications are free to exploit them. What’s even better, Microsoft seems to be improving in terms of interoperability. Because all of the services are accessible via industry standard protocols, it is guaranteed exploiting them doesn’t force customers to use Microsoft’s operating systems on-premises. Although there are many advantages in cloud computing, there are also disadvantages that shouldn’t be ignored. The first and most obvious disadvantage is the fact that by running applications in the cloud you have to hand over your private data. Privacy and security concerns are direct consequences of this. Secondly, although cloud computing relieves customers from the burden of infrastructure management, it also takes away the possibility to be in total control of that infrastructure. In addition to loosing control on hardware, using compute clouds also ties the customer very tightly to the cloud service provider. Data, for example, is usually stored in a proprietary format which makes porting applications to competitors’ systems hard. As customers are locked in, they are also at the mercy of that certain service provider’s future pricing strategy.
For this assignment, review the articleAbomhara, M., & Koie.docxsleeperharwell
For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks.
Journal of Cyber Security, 4
, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), in APA format with in-text citation using your own words, by addressing the following:
What did the authors investigate, and in general how did they do so?
Identify the hypothesis or question being tested
Summarize the overall article.
Identify the conclusions of the authors
Indicate whether or not you think the data support their conclusions/hypothesis
Consider alternative explanations for the results
Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
The relevance or importance of the study
The appropriateness of the experimental design
When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.
.
For this assignment, provide your perspective about Privacy versus N.docxsleeperharwell
For this assignment, provide your perspective about Privacy versus National Security
. This is a particularly "hot topic" because of recent actions by the federal government taken against Apple. So, please use information from reliable sources to support your perspective.
This assignment should be 1.5 pages in length, using Times New Roman font (size 12), double spaced on a Word documen
.
More Related Content
Similar to For this assignment, select one social institution from the list b.docx
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
What is Cloud Computing and, How does the cloud work?
Cloud Computing
This article is intended to discuss cloud computing, cloud computing basics, how does cloud computing work, cloud services, and what is cloud computing? Study of cloud computing and job opportunities after completing cloud computing course.
What is Cloud Computing and, How does the cloud work?
The term “cloud” is used as a substitute for the “internet”. Cloud computing points to any hardware or software like networks, software, analytics, servers, storage, databases, and intelligence provided over the internet (cloud) by any service provider.
Data, software, and source codes are often stored on hard drives, which is quite risky since difficult situations may arise such as hard disk crashes, data corruption, and eventual loss of the entire resources to work with. A cloud computing service provides various server, software, storage, and application services over the Internet so that they should be safe. They can be configured to handle any size of access or traffic and can scale up and down according to the volume and, frequency of requirement. Thus cloud computing is the delivery of different services through the Internet including different servers, software, storage, and applications. In other words, using cloud computing, customers can access software, infrastructure, platforms, devices, and other resources over the internet.
Customers can easily utilize these services available in the cloud without any prior knowledge of how to manage the resources involved.
Large companies such as Google, Amazon, IBM, Sun, Cisco, Dell, HP, Intel, Novell, and Oracle are investing in cloud computing to provide individuals and businesses with a variety of cloud-based solutions.
For example, Google Cloud is a collection of public cloud services provided by Google. All Application development is done on Google hardware. These include Google Compute Engine, App Engine, Google Cloud Storage, and Google Container Engine.
Cloud storage utilizes data centers with massive computer servers that store data and access it online through the internet. The users can remotely upload and store their content and retrieve it whenever they need it.
Advantages of cloud computing.
Businesses around the world are moving away from traditional on-premises services as cloud computing becomes more popular. In recent years, cloud-based services have radically changed the way businesses do business, enabling them to use information technology infrastructures, platforms, software, and applications via the Internet.
Users can devote more time and effort to their main business processes instead of spending their time learning about the resources they need to manage.
Cloud computing allows users to avoid significant capital investments because they can rent physical infrastructure from third-party providers.
Cloud computing infrastructure services leverage shared resources, allowing servers to work efficiently withou
Service Clouds are a key emerging feature of the Future Internet which will provide a basic platform through which it executes virtualized services. For effectively operating a cloud services there is a need to have a monitoring system which provides data on the actual usage and changes in the resources of the cloud and the services running in the cloud. Monitoring and managing cloud is a very different from monitoring and managing the individual servers. This paper will detail the different aspect of the monitoring and the parameters involved in monitoring of the cloud services.
Cloud computing provide us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online.
With cloud computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud Computing is both a combination of software and hardware based computing resources delivered as a network service.
Basic Concepts:
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:
1. Deployment Models
2. Service Models
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Seminar_report on Microsoft Azure ServiceANAND PRAKASH
Executing applications in the clouds offer many advantages over the traditional way of running programs. Firstly, using cloud computing allows rapid service deployment and massive savings upfront because not having to invest in infrastructure. Secondly, cloud computing model allows computing power and storage to scale up with business growth. In addition to this, it’s also easy to dynamically adjust computing power up or down. As a customer, you end up paying for the actual usage of resources. The advantages of using the Azure cloud platform relate to the fact that Microsoft has tried to minimize the changes involved in migrating applications to the cloud. Effort required from developers already familiar with Microsoft’s technologies to utilize the Azure is minimal. In addition to this, upcoming releases of Azure are going to support applications written in languages such as Python and PHP. Another advantage in Microsoft’s solution is that the services provided can be used in a very flexible fashion. Not only are Azure services available to cloud applications, but also traditional on-premises applications are free to exploit them. What’s even better, Microsoft seems to be improving in terms of interoperability. Because all of the services are accessible via industry standard protocols, it is guaranteed exploiting them doesn’t force customers to use Microsoft’s operating systems on-premises. Although there are many advantages in cloud computing, there are also disadvantages that shouldn’t be ignored. The first and most obvious disadvantage is the fact that by running applications in the cloud you have to hand over your private data. Privacy and security concerns are direct consequences of this. Secondly, although cloud computing relieves customers from the burden of infrastructure management, it also takes away the possibility to be in total control of that infrastructure. In addition to loosing control on hardware, using compute clouds also ties the customer very tightly to the cloud service provider. Data, for example, is usually stored in a proprietary format which makes porting applications to competitors’ systems hard. As customers are locked in, they are also at the mercy of that certain service provider’s future pricing strategy.
Similar to For this assignment, select one social institution from the list b.docx (20)
For this assignment, review the articleAbomhara, M., & Koie.docxsleeperharwell
For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks.
Journal of Cyber Security, 4
, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), in APA format with in-text citation using your own words, by addressing the following:
What did the authors investigate, and in general how did they do so?
Identify the hypothesis or question being tested
Summarize the overall article.
Identify the conclusions of the authors
Indicate whether or not you think the data support their conclusions/hypothesis
Consider alternative explanations for the results
Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
The relevance or importance of the study
The appropriateness of the experimental design
When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.
.
For this assignment, provide your perspective about Privacy versus N.docxsleeperharwell
For this assignment, provide your perspective about Privacy versus National Security
. This is a particularly "hot topic" because of recent actions by the federal government taken against Apple. So, please use information from reliable sources to support your perspective.
This assignment should be 1.5 pages in length, using Times New Roman font (size 12), double spaced on a Word documen
.
For this assignment, provide your perspective about Privacy vers.docxsleeperharwell
For this assignment, provide your perspective about Privacy versus National Security
. This is a particularly "hot topic" because of recent actions by the federal government taken against Apple. So, please use information from reliable sources to support your perspective.
This assignment should be 1.5 pages in length, using Times New Roman font (size 12), double spaced on a Word document.
.
For this Assignment, read the case study for Claudia and find two to.docxsleeperharwell
For this Assignment, read the case study for Claudia and find two to three scholarly articles on social issues surrounding immigrant families.
In a 2- to 4-page paper, explain how the literature informs you about Claudia and her family when assessing her situation.
Describe two social issues related to the course-specific case study for Claudia that inform a culturally competent social worker.
Describe culturally competent strategies you might use to assess the needs of children.
Describe the types of data you would collect from Claudia and her family in order to best serve them.
Identify other resources that may offer you further information about Claudia’s case.
Create an eco-map to represent Claudia’s situation. Describe how the ecological perspective of assessment influenced how the social worker interacted with Claudia.
Describe how the social worker in the case used a strengths perspective and multiple tools in her assessment of Claudia. Explain how those factors contributed to the therapeutic relationship with Claudia and her family.
.
For this assignment, please start by doing research regarding the se.docxsleeperharwell
For this assignment, please start by doing research regarding the severity of prejudicial aggression/violence from the past. After you do this, research the severity of prejudicial aggression/violence that has gone on in the past decade. Target the same specific groups that have been the aggressor and victim in both your historical group and your present-day group. For instance, if you choose "black vs. white" in the 1950s, you must use the same group for your present-day group. Once you do this, discuss various ways that it is the same, as well as why it is different between the time periods. What influences have changed? Why is it better now, or worse now than in the past? Please discuss how the advancements in media (news, entertainment, and social media) have had on this issue, along with whatever you come up with outside of media influence. Make sure you back your information up with citations from your sources.
.
For this assignment, please discuss the following questionsWh.docxsleeperharwell
For this assignment, please discuss the following questions?
What was the name of the first computer network?
Who created this network
When did this network got established?
Explain one of the major disadvantages of this network at its initial stage
What is TCP?
Who created TCP?
What is IP?
When did it got implemented
How did the implementation of TCP/IP revolutionize communication technology?
Requirements:
You must write a minimum of two paragraphs, with two different citations, and every paragraph should have at least four complete sentences for each question. Every question should have a subtitle (Bold and Centered). You must also respond to at least two of your classmates’ posts with at least 100 words each before the due date. You need to use the discussion board header provided in the getting started folder. Please proofread your work before posting your assignment.
.
For this assignment, locate a news article about an organization.docxsleeperharwell
For this assignment, locate a news article about an organization who experienced an ethical issue related to communication. In 1,200 to 1,550 words, complete the following:
Discuss the circumstances of the incident, the organization’s decision making process, and the public and media reaction to the organization’s decision.
Presume you have been hired by that organization to help strengthen their communication efforts. Outline at least
four strategies
you would recommend the organization follow in the future to enhance the ethics of their communication.
.
For this assignment, it requires you Identifies the historic conte.docxsleeperharwell
For this assignment, it requires you Identifies the historic context of ideas and cultural traditions outside the U.S., and how they have influenced American culture.
Topic for this paper:
The history of ramen (technically started in China, moved and developed in Japan) now a pop culture cuisine in the U.S.
The paper should be in APA format and two full pages with double-spaced. Also, since you are researching and writing about new information, be sure cite your source (website name, address, date you visited it) at the end of the two pages, so I know where you got your information.
.
For this assignment, create a framework from which an international .docxsleeperharwell
For this assignment, create a framework from which an international human resource management function can address cultural challenges. Within your framework, devise a model that includes due diligence steps, merger steps, and post-merger steps that specifically address cultural acclimation and environmental acclimation, as well as bringing two workforces together.
Supported by a minimum of two academic sources.
.
For this assignment, create a 15-20 slide digital presentation in tw.docxsleeperharwell
For this assignment, create a 15-20 slide digital presentation in two parts to educate your colleagues about meeting the needs of specific ELLs and making connections between school and family.
Part 1
In the first part of your presentation, provide your colleagues with useful information about unique factors that affect language acquisition among LTELs, RAELs, and SIFEs.
This part of the presentation should include:
A description of the characteristics of LTELs, RAELs, and SIFEs
An explanation of the cultural, sociocultural, psychological, or political factors that affect the language acquisition of LTELs, RAELs, and SIFEs
A discussion of factors that affect the language acquisition of refugee, migrant, immigrant and Native American ELLs and how each of these ELLs may relate to LTELs, RAEL, or SIFEs
A discussion of additional factors that affect the language acquisition of grades K-12 LTELs, RAEL, and SIFEs
Part 2
In the second part of the presentation, recommend culturally inclusive practices within curriculum and instruction. Provide useful resources that would empower the family members of ELLs.
This part of the presentation should include:
Examples of curriculum and materials, including technology, that promote a culturally inclusive classroom environment.
Examples of strategies that support culturally inclusive practices.
A brief description of how home and school partnerships facilitate learning.
At least two resources for families of ELLs that would empower them to become partners in their child’s academic achievement.
Presenter’s notes, title, and reference slides that contain 3-5 scholarly resources.
.
For this assignment, you are to complete aclinical case - narrat.docxsleeperharwell
For this assignment, you are to complete a
clinical case - narrated PowerPoint report
that will follow the SOAP note example provided below. The case report will be based on the clinical case scenario list below.
You are to approach this clinical scenario as if it is a real patient in the clinical setting.
Instructions:
Step 1
- Read the assigned clinical scenario and using your clinical reasoning skills, decide on the diagnoses. This step informs your next steps.
Step 2
- Document the given information in the case scenario under the appropriate sections, headings, and subheadings of the SOAP note.
Step 3
- Document all the classic symptoms typically associated with the diagnoses in Step 1. This information may NOT be given in the scenario; you are to obtain this information from your textbooks. Include APA citations.
Example of Steps 1 - 3:
You decided on Angina after reading the clinical case scenario (Step 1)
Review of Symptoms (list of classic symptoms):
CV: sweating, squeezing, pressure, heaviness, tightening, burning across the chest starting behind the breastbone
GI: indigestion, heartburn, nausea, cramping
Pain: pain to the neck, jaw, arms, shoulders, throat, back, and teeth
Resp: shortness of breath
Musculo: weakness
Step 4
– Document the abnormal physical exam findings typically associated with the acute and chronic diagnoses decided on in Step 1. Again, this information may NOT be given. Cull this information from the textbooks. Include APA citations.
Example of Step 4:
You determined the patient has Angina in Step 1
Physical Examination (list of classic exam findings):
CV: RRR, murmur grade 1/4
Resp: diminished breath sounds left lower lobe
Step 5
- Document the diagnoses in the appropriate sections, including the ICD-10 codes, from Step 1. Include three differential diagnoses. Define each diagnosis and support each differential diagnosis with pertinent positives and negatives and what makes these choices plausible. This information may come from your textbooks. Remember to cite using APA.
Step 6
- Develop a treatment plan for the diagnoses.
Only
use National Clinical Guidelines to develop your treatment plans. This information will not come from your textbooks. Use your research skills to locate appropriate guidelines. The treatment plan
must
address the following:
a) Medications (include the dosage in mg/kg, frequency, route, and the number of days)
b) Laboratory tests ordered (include why ordered and what the results of the test may indicate)
c) Diagnostic tests ordered (include why ordered and what the results of the test may indicate)
d) Vaccines administered this visit & vaccine administration forms given,
e) Non-pharmacological treatments
f) Patient/Family education including preventive care
g) Anticipatory guidance for the visit (be sure to include exactly what you discussed during the visit; review Bright Futures website for this section)
h) Follow-up appointment with a.
For this assignment, you are to complete aclinical case - narr.docxsleeperharwell
For this assignment, you are to complete a
clinical case - narrated PowerPoint report
that will follow the SOAP note example provided below. The case report will be based on the clinical case scenario list below.
You are to approach this clinical scenario as if it is a real patient in the clinical setting.
Instructions:
Step 1
- Read the assigned clinical scenario and using your clinical reasoning skills, decide on the diagnoses. This step informs your next steps.
Step 2
- Document the given information in the case scenario under the appropriate sections, headings, and subheadings of the SOAP note.
Step 3
- Document all the classic symptoms typically associated with the diagnoses in Step 1. This information may NOT be given in the scenario; you are to obtain this information from your textbooks. Include APA citations.
Example of Steps 1 - 3:
You decided on Angina after reading the clinical case scenario (Step 1)
Review of Symptoms (list of classic symptoms):
CV: sweating, squeezing, pressure, heaviness, tightening, burning across the chest starting behind the breastbone
GI: indigestion, heartburn, nausea, cramping
Pain: pain to the neck, jaw, arms, shoulders, throat, back, and teeth
Resp: shortness of breath
Musculo: weakness
Step 4
– Document the abnormal physical exam findings typically associated with the acute and chronic diagnoses decided on in Step 1. Again, this information may NOT be given. Cull this information from the textbooks. Include APA citations.
Example of Step 4:
You determined the patient has Angina in Step 1
Physical Examination (list of classic exam findings):
CV: RRR, murmur grade 1/4
Resp: diminished breath sounds left lower lobe
Step 5
- Document the diagnoses in the appropriate sections, including the ICD-10 codes, from Step 1. Include three differential diagnoses. Define each diagnosis and support each differential diagnosis with pertinent positives and negatives and what makes these choices plausible. This information may come from your textbooks. Remember to cite using APA.
Step 6
- Develop a treatment plan for the diagnoses.
Only
use National Clinical Guidelines to develop your treatment plans. This information will not come from your textbooks. Use your research skills to locate appropriate guidelines. The treatment plan
must
address the following:
a) Medications (include the dosage in mg/kg, frequency, route, and the number of days)
b) Laboratory tests ordered (include why ordered and what the results of the test may indicate)
c) Diagnostic tests ordered (include why ordered and what the results of the test may indicate)
d) Vaccines administered this visit & vaccine administration forms given,
e) Non-pharmacological treatments
f) Patient/Family education including preventive care
g) Anticipatory guidance for the visit (be sure to include exactly what you discussed during the visit; review Bright Futures website for this section)
h) Follow-up appointment wit.
For this assignment, you are provided with four video case studies (.docxsleeperharwell
For this assignment, you are provided with four video case studies (linked in the Resources). Review the cases of Julio and Kimi, and choose either Reese or Daneer for the third case. Review these two videos: •The Case of Julio: Julio is a 36-year-old single gay male. He is of Cuban descent. He was born and raised in Florida by his parents with his two sisters. He attended community college but did not follow through with his plan to obtain a four-year degree, because his poor test taking skills created barriers. He currently works for a sales promotion company, where he is tasked with creating ads for local businesses. He enjoys the more social aspects of his job, but tracking the details is challenging and has caused him to lose jobs in the past. He has been dating his partner, Justin, for five years. Justin feels it is time for them to commit and build a future. Justin is frustrated that Julio refuses to plan the wedding and tends to blame Julio’s family. While Julio’s parents hold some traditional religious values, they would welcome Justin into the family but are respectfully waiting for Julio to make his plans known. Justin is as overwhelmed by the details at home as he is at work. •The Case of Kimi: Kimi is a 48-year-old female currently separated from her husband, Robert, of 16 years. They have no children, which was consistent with Kimi’s desire to focus on her career as a sales manager. She told Robert a pregnancy would wreck her efforts to maintain her body. His desire to have a family was a goal he decided he needed to pursue with someone else. He left Kimi six months ago for a much younger woman and filed for divorce. Kimi began having issues with food during high school when she was on the dance team and felt self-conscious wearing the form-fitting uniform. During college, she sought treatment because her roommate became alarmed by her issues around eating. She never told her parents about this and felt it was behind her. Her parents are Danish and value privacy. They always expected Kimi to be independent. Her lack of communication about her private life did not concern them. They are troubled by Robert’s behavior and consider his conspicuous infidelity as a poor reflection upon their family. Kimi has moved in with her parents while she and Robert are selling the house, which has upended the balance in their relationship. For a third case, choose one of these videos: •The Case of Reese: -Reese is a 44-year-old married African American female. Her parents live in another state, and she is their only child. Her father is a retired Marine Lieutenant Colonel who was stationed both in the United States and overseas while Reese was growing up. She entered the Air Force as soon as she graduated high school at age 17 and has achieved the rank of Chief Master Sergeant. She has been married 15 years to John, and they recently discovered she is pregnant. The unexpected pregnancy has been quite disorienting for someone who has planned.
For this assignment, you are going to tell a story, but not just.docxsleeperharwell
For this assignment, you are going to tell a story, but not just any story. It will be a First Nations story, and it will be your version of it.
Choose one of the two stories at the end of this unit, either "Why the Flint-Rock Cannot Fight Back"
You can write of yourself telling one of the stories.
In telling your story, here is what you will need to consider:
Clarity of speech
Intonation
Pacing and pauses
You will also have to work out how to make this telling of the story yours. You might want to read it aloud with point form notes for a prompt or to memorize it. Perhaps you want to rewrite it so that it sounds more like your words. Maybe you will change names and place-names to those you are familiar with. If you are making a video or performing this live, you should practice facial and hand gestures as well as stance and body language. The purpose of all of this is to bring your own meaning to the story.
HERE IS THE STORY
Why the Flint-Rock Cannot Fight Back
Sto-Way’-Na—Flint—was rich and powerful. His lodge was toward the sunrise. It was guarded by Squr-hein— Crane. He was the watcher. He watched from the top of a lone tree. When anybody approached, Crane would call out and warn Flint, and Flint would come out of his lodge and meet the visitor.
There was an open flat in front of the lodge. Flint met all his visitors there. Warriors and hunters came and bought flint for arrow-points and spear-heads. They paid Flint big prices for the privilege of chipping off the hard stone. Some who needed flint for their weapons were poor and could not buy. These poor persons Flint turned away.
Coyote heard about Flint and, as he wanted some arrow-points, he asked his squas-tenk’ to help him. Squas-tenk’ refused.
“Hurry, do what I ask, or I will throw you away and let the rain wash you— wash you cold,” said Coyote, and then the power gave him three rocks that were harder than the flint-rock. It also gave him a little dog that had only one ear. But this ear was sharp, like a knife; it was a knife- ear.
Then to his wife, Mole, Coyote said: “Go and make your underground trails in the flat where Sto-way’-na lives. When you have finished and see me talking with him, show yourself so we can see you.”
Then Coyote set out for Flint’s lodge. As he got near it, he had his power make a fog to cover the land, and thick fog spread over everything. Crane, the watcher, up in the lone tree, could not see Coyote. He did not know that Coyote was around.
Coyote climbed the tree and took Crane from his high perch and broke his neck. Crane had no time to cry out. Then Coyote went on to Flint’s lodge. He was almost there when Flint’s dog, Grizzly Bear, jumped out of the lodge and ran toward him.
Coyote was not scared, and he yelled at Flint: “Stop your grizzly bear dog! Stop him, or my dog will kill him.”
That amused Flint, who was looking through the doorway. He saw that Coyote’s one-eared dog was very small, hardly a mouthful for Grizzly Bear. Fli.
For this assignment, you are asked to prepare a Reflection Paper. Af.docxsleeperharwell
For this assignment, you are asked to prepare a Reflection Paper. After you finish the reading assignment, reflect on the concepts and write about it. What do you understand completely? What did not quite make sense? The purpose of this assignment is to provide you with the opportunity to reflect on the material you finished reading and to expand upon those thoughts
A Reflection Paper is an opportunity for you to express your thoughts about the material by writing about them.
The writing you submit must meet the following requirements:
be at least two pages;
include your thoughts about the main topics
APA Stlye
.
For this assignment, you are asked to prepare a Reflection Paper. .docxsleeperharwell
For this assignment, you are asked to prepare a Reflection Paper. After you finish the reading assignment, reflect on the concepts and write about it. What do you understand completely? What did not quite make sense? The purpose of this assignment is to provide you with the opportunity to reflect on the material you finished reading and to expand upon those thoughts. If you are unclear about a concept, either read it again, or ask your professor. Can you apply the concepts toward your career? How?
This is not a summary. A Reflection Paper is an opportunity for you to express your thoughts about the material by writing about them.
The writing you submit must meet the following requirements:
be at least two pages;
include your thoughts about the main topics; and
include financial performance, quality performance, and personnel performance.
Format the Reflection Paper in your own words using APA style, and include citations and references as needed to avoid instances of plagiarism.
The reading assignment that you are to reflect on is Chapter 11, in the text. My written lecture for this Unit is basically a reflection on Chapter 11. Find an interesting part or two of the chapter and tell me what you got out of it. It's not a hard assignment. If you read my lecture, you will see the part of Chapter 11 that intrigued me the most was the subject of codetermination on page 367. Anything that intrigues you in Chapter 11 is fine with me.
Written Lecture
Does the ringisei decision-making process by consensus, which is used by the Japanese, reach the same conclusion as the top-down methods, which are used by American management? Some might label the Japanese decision-making system as simply procrastination. Others appreciate the method and expect productive outcomes. One major challenge is to build an organizational culture to adopt the practice of ringisei. If only half of an organization uses ringisei, it is likely to cause miscommunication and result in frustration.
The ringisei is based on the theory that the employee is an important part of the overall success of an enterprise. It is common to hear a lot about
empowering the employees
. Is creativity and innovation rewarded, ignored, or punished for the lower level employee in America?
Could the Japanese system of decision making have led to the controversy of what Toyota knew about unintended acceleration problems? This may be the best example of the use of silence in the Japanese culture frustrating Americans as a nation. This is not an explicit accusation of Toyota or of Japanese culture. Rather, it is inserted here to demonstrate potential consequences of management methods, processes, systems, and decision making. Read pages 106-108 of Luthans and Doh (2012) concerning this topic. The cause of the unintended acceleration problem announced by the United States government was due to bad floor mats or driver error. Initially, electronic problems were not mentioned.
The March 2011 Fuku.
For this assignment, you are asked to conduct some Internet research.docxsleeperharwell
For this assignment, you are asked to conduct some Internet research on any malware, virus or DOS attack. Summarize your findings in 3-4 paragraphs and be sure to include a link to your reference source. Explain this occurrence in your own words (do not just copy and paste what you find on the Internet).
Include the following information:
1. Name of the Malware or Virus
2. When this incident occurred (date)
3. Impact it had or explanation of the damage it caused
4. How it was detected
5. Reference source citation
.
For this assignment, you are a professor teaching a graduate-level p.docxsleeperharwell
For this assignment, you are a professor teaching a graduate-level public administration administrative law course at a traditional state university. Your task is to develop a formal presentation providing an overview of administrative law—specifically by comparing and contrasting the key defining aspects of administrative law within the American three-branch federal government structure, explaining how these functions are overseen/regulated, and ultimately, interpreting how they serve the common good of the public-at-large.
Your presentation must include the following with specific examples:
Articulate an understanding of how federal agencies enforce their regulations.
Explain the fundamental role that agency rulemaking plays in regulating society-at-large.
Compare both formal rulemaking and informal rulemaking.
Articulate the similarities and differences between rulemaking and adjudication.
Analyze the various methods of oversight exercised by the judicial, legislative, and executive branches of the federal government over administrative agencies.
Articulate how special interest groups (to include the media) can influence and/or shape public opinion about administrative agencies and place a spotlight on individual policies.
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each slide. The speaker notes may be comprised of brief paragraphs or bulleted lists and should cite material appropriately. Add audio to each slide using the
Media
section of the
Insert
tab in the top menu bar for each slide.
Support your presentation with at least seven scholarly resources
.
In addition to these specified resources, other appropriate scholarly resources may be included.
Length: 15 slides (with a separate reference slide)
Notes Length: 200-350 words for
each slide
Be sure to include citations for quotations and paraphrases with references in APA format and style where appropriate.
.
For this assignment, we will be visiting the PBS website,Race .docxsleeperharwell
For this assignment, we will be visiting the PBS website,
Race: The Power of Illusion
. Click on the "Learn More" link, and proceed to visit these links:
What is Race? (View All)
Sorting People (Complete both "Begin Sorting" and "Explore Traits")
Race Timeline (View All)
Human Diversity (Complete both the Quiz and "Explore Diversity")
Me, My Race & I (View Slideshow Menu)
Where Race Lives (View All)
Given the
enormous
amount of information presented in this website, discuss what was most interesting and surprising to you in
EAC
H of the links.
Post your 200 word assignment.
Discussion Board Activity:
Now that you have learned that the race is a social concept rather than a biological truth respond to TWO fellow students with your thoughts on prejudice and discrimination pertaining to deviance, social class, and race.
(I'll send you two replies)
Due November 3rd
.
For this assignment, the student starts the project by identifying a.docxsleeperharwell
For this assignment, the student starts the project by identifying a clinical population of interest. Then, the student is to locate (10) nursing research articles from peer-reviewed nursing journals that reflect the clinical population of their interest. From the articles, the student identifies what has been researched and is currently known about their clinical population. The student is to write a summary of each article in a tabular format and submit a single summary table of all articles that provides a review of current knowledge on the selected population ( example and form will be provided ).
.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2. Manav Rachna International Institute of Research and Studies
Faridabad, India
[email protected], [email protected], [email protected],
[email protected]
Abstract—Windows Azure is the Microsoft's conveyed
registering contraption. In this paper, we will learn about the
prelude to the Azure framework. The scattered enlisting stage
outfits clients with assets and associations for an affiliation. We
would in like way talk about azure associations: Register,
structuring, Stockpile, Fabric Controller Mesh, Cellphone,
Holder, Index, Problem-Solving, A.I + M.L, I.O.T,
Combination,
Identity, Safety, DevOps, Migrate and The executive's aids.
Microsoft’s Azure is the standard circled figuring stage which
draws in the client to send and work assets with speed of
adaptability. Our basic work in this paper is to go up against
recognizing confirmation and face attestation utilizing "Face
API" where we will use our own one of a kind codes, for
example, to perceive and see the powers of the all-inclusive
community.
Keywords— Windows Azure, Resources, Services,
Deployment, Cloud Computing, Face Detection, Face API
I. INTRODUCTION
Conveyed registering is an unused headway. It is the update
of parallel figuring, dispersed enrolling system arranging, and
is the blend and advancement of Virtualization, Utility
dealing with, Software-as-a-Service (SaaS), Infrastructure-as-
a-Service (IaaS) and Platform-as-a-Service (PaaS). In the
method for the most current couple of years, apportioned
enlisting viewpoint has seen a to an incredible degree
extraordinary pass closer to its social occasion and it has
3. changed into a precedent in the quantifiable improvement
district as it ensures fundamental cost decreases and new
fitting undertaking reachable to its purchasers and
providers.[10] Scattered enlisting is a creation manual for
dessert on and continue programming and is being gotten by
the business, for instance, Google, IBM, Microsoft, and
Amazon. A couple of mannequin purposes and stages, for
instance, the IBM ―Azure Cloud structure, the Google App
Engine, the Amazon Cloud, and the Elastic Computing
Platform. Dissipated making prepared is viewed as the
running with an upgrade that will influence distinctive leveled
affiliations and how they manage their IT establishments. The
progress and organization that cloud connection and
association models offer are a key territory of research.
Appropriated processing uses Azure as a phase for its
distinctive organizations, for instance, Analytics, AI, Machine
Learning, IOT, Face API, etc. and engages customers to send
and work resources with the speed of versatility.
Azure is a foundation for fleeing data in the cloud. Instead of
giving programming that Microsoft customers can present and
run themselves in solitude PCs. Nowadays, Azure is an
association: Customers utilize it to sprint apps and stockpile
facts & figures on web-accessible devices rued by Microsoft
Corporation. Associations are being offered to the
relationships, customers or both by these applications, Azure
Platform is a web-based distributed technology. Extremely
systematic, changeable and compatible capacity can be
utilized to amass unused apps to remain constant for the cloud
or revive live apps with cloud-based cutoff administrations.
Azure is a Distributed framework that gives progress, for
empowering the Microsoft’s Azure Platform.
Azure proceeds running in Microsoft on machine server
farms. The target of Windows to equip engineers with on-ask
for figure & restrain arrange to have, scale, and regulate web
or cloud applications. The arrange itself surrenders and keeps
4. it exceptionally possess a duplicate of Windows. Designers
based exclusively on making applications that proceed
running on Windows. Windows backings a solid headway
episode by compromising with its IDE. Windows is an open
organize that underpins both Microsoft and non-Microsoft
tongues and conditions. [2] Azure invites outcast disobedient
and vernaculars, for an occasion, Obscure, python, ruby, and
php. Azure gives a Windows-based figuring and constraint
condition within the distributor. Escaping information within
the distributor is a proper choice for some conditions. The
differing bit of Azure collaborates to form this conceivable.
Microsoft’s Azure Tables provide adaptable, accessible, and
firmly collected as collecting tables. A clear interface to
fixing the tables are granted by Microsoft’s Azure. The tables
are versatile to many of the pieces of stuff and terabytes of
realities may separate transversely named records adjacent
metadata. Solid constrain and development of messages for an
application and are the foremost for the most part seen
clarification behind Web and Laborer portion correspondence
are granted by Microsoft’s Azure [3].
In this paper, we are going conversation around the Azure
Components, Cloud Benefit Suppliers, Cloud Architecture,
Azure Cloud Storage Model and Demystifying the Use of
Face API in Windows Azure. By overcoming with the ideas
of Azure Cognitive Services in this paper, we will build up
software in our next paper in which we will put together our
model to identify n number of appearances precisely.
130
II. WINDOWS AZURE COMPONENTS [3]
5. i. Computer: Windows procedure can run a gathering of
vocations. Whatever an application does, regardless, it needs
to be done as no short of what one occupation. Azure at that
factor typically runs a variety of examples of each movement,
utilizing worked in load changing as per spread needs
crosswise over them.
ii. Storage: The 2nd stage in Azure is a limit. We have three
journalists perfect here – Blobs, that take after records,
Tables, which are entered and well-shaped limit, and lines,
which let Web Parts and Specialist Parts, provide for one
another.
iii. Fabric Controller: The 3rd sort out in Azure is the
connect controller or App connect. It handles articulations and
association – between Microsoft Windows Azure
applications, and in development from the servers. Ready to
express that we got the opportunity to have that expansive
SQL Server or Database structure and enabling access to an
Azure app, & we will not permit customers of an app in our
framework.
CLOUD ARCHITECTURE:
Dispersed considering can be separated along with two
regions, the client and the distributor. By and huge, the client
is associated with the distributor by the methodology for the
net It is additionally productive for a relationship to own an
individual conveyance where a client associates with an
intranet. Regardless, the two conditions are dim other than the
usage of an individual and unbolted framework or
distribution. The customer sends asking the distributor and the
distributor gives the association. Inside the distributor, a focal
server oversees administering the composition and from
different perspectives fills in as the working redirection
organize of the specific distribution orchestrate.
6. III.TOOLS AVAILABLE EVERY COMPANY BASED ON
CLOUD:
Distributing merchants are passing on the plague of unused
instruments to help adventure IT produce, buy, supervise,
screen, change and track cloud organizations. These gadgets
are proposed to help IT officials free up their budgetary plans
and their staff so both can be used towards progressively key,
a rule of business adventures.
1. Cloud ability: Cloud ability is a money related
administration device for checking and dissecting all cloud
costs over an association.
2. Cloudyn: These instruments are intended to help corporate
IT from over-purchasing Amazon cloud assets.
3. AtomSphere: AtomSphere is a cloud-based programming
Platform as a Service utilized by clients that need to
incorporate their different cloud-based applications with one
another and with on-commence applications.
4. Enstratius: Enstratius gives cross-stage cloud framework
administration for open, private and crossover mists that can
be firmly lined up with an endeavor’s administration and
security prerequisites.
5. Cloud Hub: Conveyed as a bundled incorporation
experience, Cloud Hub and Mule ESB are based on open
source innovation to give brisk, dependable application joining
without seller secure.
AZURE CLOUD STORAGE MODEL:
Azure ability "gives chose, monotonous limit inside the
distributor". Microsoft will likely make amassing that is solid
and secure, flexible and helpful. Azure ability awards us to
keep facts for whenever assignment and to save any level of
bits of awareness. [4] Data can be saved in Windows Azure in
7. 4 unique ways i.e.: Queues, SQL Azure Database, Tables,
Blobs.
Blobs: These are handed-down for coordinated estimations
and take after records on our troublesome drive.
Tables: To draw in support to work with a fact in a much
increasingly basic fine-grained method, Azure storing offers
tables. A table has no described graph or perhaps, properties
can have forms.
Queues: This amassing is used to trade messages between
squares of code.
Figure 1: Windows Azure components [1]
Fig 2. Cloud Architecture [10]
131
SQL Azure Database: We are capable make utilization of
SQL Azure Databases when we require social storing and use
the negotiate-SQL code we are starting at by and by have.
SQL Azure offers a basic subset of SQL Server's
accommodation, which fuses counting, as an administered
cloud advantage.
CLOUD DEPLOYMENT MODEL:
Inside the distributing association show up, sorting out,
orchestrate, storing, and programming foundation is given as
associations that go up or down surprising upon the
captivated. The distributing demonstrate has four guideline
sending models which are:
8. i. Private Cloud: Private cloud is another term that a few
dealers have begun late used to portray duties that emulate
passed on enrolling on private structures. It is set up inside an
alliance's inward parts wind datacenter. [12] For E.g.
Eucalyptus Frameworks.
ii. Public Cloud: Open cloud depicts dissipated enlisting inside
the customary standard sense, whereby resources are
continuously provisioned on a fine-grained, self-advantage
present over the Web, by construes of web applications/web
relationship, from an off-site page removed provider who
offers resources and bills on a fine-grained utility dealing with
the introduction. [13] For E.g. Microsoft Azure & Google
App Motor
iii. Crossover Cloud: Crossover cloud other than known as
Crossbreed cloud could be an individual merchant identified
with at scarcest one outside circulating affiliations, for the
most part coordinated, provisioned as a specific unit, and
included by a tied down a structure. [14] It gives virtual IT
strategies through a blend of both open and private veils of
mist.
CLOUD COMPUTING SERVICES:
Platform As A service: Platform as a service [4] (PaaS) is a
sending & advancement condition inside the cloud that
conveys straightforward cloud-based applications to complex,
cloud-empowered applications. PaaS is intended to help the
total web application lifecycle of the building, testing,
conveying, overseeing, and refreshing. PaaS incorporates a
total foundation of servers, stockpiles, organizing, and
middleware improvement apparatuses like business
knowledge administrations (BI), database administration
9. frameworks, and so forth [4].
i. Software As A Service: Software as a service [4] (SaaS)
allows clients to associate with and make use of cloud-based
applications over the Internet. Basic models are email,
calendaring and office instruments, (for example, Microsoft
Office 365). SaaS gives a whole programming association
which you buy on a compensation as-you-go premise from a
cloud specialist co-op.
ii. Infrastructure As A Service: Infrastructure as a service [4]
(IaaS), a moment figuring foundation, provisioned and
oversaw over the Internet. Rapidly scale here and there with
the request and pay simply for what you utilize. IaaS reasons
you to preserve away from the fee and multifaceted nature of
buying and dealing with your personal bodily servers and
another data center framework [4].
iii.
DEMYSTIFYING THE USE OF FACE API IN
WINDOWS AZURE:
The Face API Service, a cloud-based organization that gives
the most dynamic face computations. It is a biometric
programming application arranged to do especially perceiving
or checking a man by differentiating and examining structures
subject to the person's facial structures.
Fig3. Windows Azure Cloud Storage Model [3]
Fig 4. Cloud Deployment Model [4]
10. Fig 5. Microsoft Cloud Computing Architecture (Source
Microsoft) [4]
Fig 6. Face API in Azure [7]
132
FACE DETECTION:
It perceives some places around one human faces in a
photograph and get returned go up against rectangular shapes
for where inside the photograph the appearances are, close-by
defy characteristics which join M.L-ground needs for gesture
highlights. The defy property features accessible are Age,
Feeling, Sexual introduction, Posture, Grin and Facial Hair
adjacent 27 markers for each stands up to inside the image.
[7] The Face API sees up to 64 personal appearances with
higher accuracy oppose an area in a picture. In like manner,
the picture can be appeared by the record in bytes or huge
URL. Face square shape (left, best, width, and stature)
exhibiting the face district in the picture is returned adjacent
each perceived face. On the other hand, defy area expels a
movement of face-related properties, for instance, present,
sex, age, head present, facial hair, and glasses.
For Example:
Detection result [16]:
JSON:
[
{
16. "x": 423.2,
"y": 321.7
}
}
}
]
FACE/EMOTION RECOGNITION:
Face affirmation is extensively used in various circumstances
including security, regular UI, picture content examination
and organization, convenient applications, and apply self-rule.
Four face affirmation limits are given: defy affirmation,
finding equivalent appearances, stand up to the social event,
and individual recognizing proof [7] .
The Face API as of now additionally organizes feeling
affirmation, reestablishing the sureness over a relationship of
affections for each face in the image, for instance, shock,
disdain, irritate, fear, euphoria, neutral, pain and surprise.
These feelings are grasped to be differently and all around
talked with exact outward appearances.
For Example:
Detection result [16]:
1 face detected
JSON:
[
{
"faceRectangle": {
"top": 56,
"left": 123,
"width": 59,
"height": 59
17. },
"scores": {
"anger": 6.932031E-08,
"contempt": 1.34474765E-09,
"disgust": 9.843048E-08,
"fear": 1.65876812E-10,
"happiness": 0.9999997,
"neutral": 4.23310347E-08,
"sadness": 2.851677E-10,
"surprise": 1.01985542E-07
}
}
]
1. Face Verification: Face API affirmation plays out a
check against two distinguished appearances or approval
from one perceived face to one individual question [7].
2. Finding Similar Faces: Given a goal recognized face and
a game plan of cheerful appearances to look for with, the
organization finds a little course of action of
countenances that look most like the objective face [7].
3. Face Grouping: Given one course of action of cloud
faces, defy gathering API normally parcels them into a
couple of social affairs considering closeness. [7] Each
get-together is a mixed-up suitable subset of the main
darken confront set and contains relative faces. Also, all
Fig 8. Example of Face Recognition [16]
134
18. the appearances in a comparable get-together can be
considered to have a place with a comparative individual
inquiry [7].
4. Face Identification: Face API can be used to perceive
people in perspective of a recognized face and a people
database (portrayed as a Large Person Group/Person
Group). Make this database early, which can be adjusted
after [7].
IV. CONCLUSION
Scattered figuring a massive change to web age; it felt the
invigorating impact from the upstream of the industry to
clients. Windows Azure gives an Aperture figuring and
control condition inside the cloud. In this paper, we find that
how they go up against request/perceiving insistence get
into the universe of current advancement. By and large the
upsides of the usage of going up against API inside the
Microsoft Azure that how it makes things present day.
Microsoft's Windows Azure make with its foundation and
stages affiliations will help & steer the improvement culture
move from on-begin application makers to cloud engineers.
Azure gives an orchestrating and constraint condition inside
the distributor. SQL Azure gives a social DBMS inside the
cloud, adjoining sorting out and information
synchronization.
The Windows Azure programming show can be obliging for
anyone who should make less unpredictable to immediate,
increasingly accessible, and progressively flexible
applications.
As Microsoft Azure gives a phase to develop any of its
organizations. Henceforth in the wake of inquisitive about
on Azure, we will furthermore get significant into the
emotional organizations i.e. Face Application Program
19. Interface (API) Service. It is furthermore isolated into Face
Detection with properties, Face Recognition and Face
Storage. Face Detection attributes are Emotion Recognition,
Face Identification, Similar Face Search and Face Grouping.
We are intending to use these Face API's to develop an
application in which the participation of the whole class can
be taken by just clicking a social event picture.
ACKNOWLEGEMENT
We might want to truly convey our caring gratefulness to Dr.
Prateek Jain, Accendere Information Administration
organizations for having any kind of effect and guiding us in
this paper course of action.
REFERENCES
[1] “Windows Azure Platform: An Era for Cloud Computing”,
Madhurima et al, / (IJCSIT) International Journal of Computer
Science and Information Technologies, Vol. 2 (2), 2011, 621-
623.
[2] Dong Xu, “Cloud Computing: An Emerging Technology”,
International Conference on Computer Design and Applications
(ICCDA 2010), Volume-1, Pgs (100-104).
[3] “Cloud Computing: Windows Azure Platform”, Volume 3,
No. 1,
January 2012, Journal of Global Research in Computer Science.
20. [4] “Windows Azure Paas Cloud: An Overview”, International
Journal of Computer Application Issue2, Volume 1 (February
2012), Issn: 2250-1797.
[5] Rimal, B., Choi, E., and Lumb, I. (2009). A Taxonomy and
Survey of Cloud Computing Systems. In Fifth International
Joint
Conference on INC, IMS and IDC, pages 44–51. IEEE.
[6] [6] Sujay. R, “Hybrid Cloud: A New Era”, International
Journal of
Computer Science and Technology, Vol. 2, Issue 2, June 2011.
[7] Windows Azure platform:
http://www.microsoft.com/windowsazure/
[8] David Chappell, A white paper on “Introducing The Azure
Services Platform: An Early Look at Windows Azure, .Net
Services, Sql Services, And Live Services”, Oct 2008.
[9] Moother, J.; Bhatt, V. (2009): A cloud computing solution
for
universities: Virtual computing lab: case study of North
Carolina
state university, www.google search engine.
[10] “Cloud Computing: Overview & Current Research
Challenges”,
IOSR Journal of Computer Engineering (IOSR-JCE), ISSN:
2278-
0661, ISBN: 2278-8727Volume 8, Issue 1 (Nov. - Dec. 2012),
PP
14-22,
[11] S. Zhang, S. F. Zhang, X. B. Chen, and X. Z. Huo, “The
21. Comparison between Cloud Computing and Grid Computing,”
2010 International Conference on Computer Application and
System Modelling (ICCASM), pp. V11-72 - V11-75, DOI= 22-
24
Oct. 2010.
[12] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security
Issuesǁ, In Proceedings of IEEE International Conference on
Services Computing, pp. 517-520, 2009.
[13] A Platform Computing Whitepaper. ―Enterprise Cloud
Computing: Transforming IT.ǁ Platform Computing, pp6, 2010.
[14] Global Netoptex Incorporated. ―Demystifying the cloud.
Important opportunities, crucial choices.ǁ pp4-14. Available:
http://www.gni.com [Dec. 13, 2009].
[15] Vaquero, L.M.; Radero-Merino, L.; Linder, M. (2009): A
break in
clouds towards a cloud definition, SIGCOMM Comput.
Communication Rev. 39, pp.50-55.
[16] Face Application Programming Interface:
https://goo.gl/images/HDtBHJ/smiling_human_faces_image
[17] SQL Azure: http://www.microsoft.com/en-
us/sqlazure/default.aspx
[18] T. Zou, R. Bras, M. Salles, A. Demers and J. Gehrke,
“ClouDiA: a
deployment advisor for public clouds”, Proceedings of the 39th
International Conference on, Very Large Data Bases, pp. 121-
132,
2012.
[19] P. Kalagiakos “Cloud Computing Learning,” 2011 5th
23. a distant data center. Many organizations have already
started implementing these technologies to further reduce
costs through improved resource utilization. Cloud
Computing and virtualization enable users to use
applications on internet and intranet. In Cloud computing
many of the services relies heavily on virtualized
hardware. Because of this, we carefully reviewed existing
virtual hardware services in order to both understand how
the process works and to find the service that is best suited
to Cloud computing and virtualization in different
situations.
Keywords—Cloud Computing; Virtualization; Virtual Machine;
Resource Utilisation; Data Center.
I. INTRODUCTION
In Cloud computing, virtualization is the basis of
delivering Infrastructure as a Service (IaaS) that separates
data, network, applications and machines from hardware
constraints. Cloud computing is becoming popular among IT
businesses due to its agile,flexible and cost effective services
being offered at Software, Platform and In-frastructure level.
Software as a Service (SaaS) allows users to access
applications hosted by different vendors on Cloud via internet.
Platform as a Service (PaaS) enables developers to code, test
and deploy their applications on IaaS. In infrastructure as a
Service (IaaS) model, Cloud provider’s offer services such as
computing, network, storage and databases via internet. IaaS is
the base of all Cloud services with PaaS and SaaS both built
upon it. The primary features of IaaS are elasticity and
virtualization. Virtualization enables a single system to
concurrently run multiple isolated virtual machines (VMs),
operating systems or multiple instances of a single operating
system (OS) [1].
24. Cloud Suite relies heavily on virtualized hardware.
Because of this, we carefully reviewed existing virtual
hardware services in order to both understand how the process
works and to find the service that is best suited to Cloud Suite.
Virtualization is one of the oldest areas of interest in
computer science. One of the most successful examples of
virtualization is the Java Virtual Machine (J V M) [3]. Using
the J V M allows the Java programming language to produce
identical results regardless of the instruction set architecture
(ISA) that is used by the hardware platform. This is because,
for all intents and purposes, the compiled Java code is running
on the same machine hyphen albeit in a virtual setting. As
long as a system has a J V M installed that can translate Java
byte code into the appropriate ISA, then the results will be
identical.
The Java virtual machine allows one piece of virtual
hardware to be present on multiple discrete systems. Software
like V M Ware allows multiple virtual hardware systems to be
present on a single piece of physical hardware. Creating
multiple virtualized hardware images on a single piece of
physical hardware is one of the cornerstones of cloud
computing. These concurrent virtual images are made possible
by a hypervisor. Various types of virtualization exists such as
Client virtualization, Storage virtualization and Server
virtualization in cloud computing.
II. NEED, BENEFITS AND CONS OF VM MIGRATION
VM Migration is at the core of cloud computing. The
needs and benefits of virtualization are as follows [2]:
Multiple Systems: With virtualization we can run
25. multiple applications even on different operating
system on the same physical hardware.
Power Management: We can improve the power
utilization.
Improve Resource Utilization: The resource utilization
is increased with the virtualization.
Load Balancing: Load can be distributed on available
resources.
Maintenance and Servicing.
It improves system availability.
It is scalable, as per the requirement with time.
Security is provided by running multiple servers in
isolation.
The major hurdle with the virtualization is that the network
load during the migration increases which results in the
increase of communication cost. One side effect of this is that
performance of application running on virtual machine
degraded.
III. VIRTUAL MACHINE PLACEMENT TECHNIQUES
The various algorithms implemented earlier for VM
Placement in data centers are First Fit, Next Fit, Random Fit,
International Conference on Advances in Computing,
Communication Control and Networking (ICACCCN2018)
26. 65
Least full First, Most Full First, First Fit Decreasing (Single
Dimension), First Fit Decreasing Product, First Fit Decreasing
Sum, Dot Product, Minimizing Angle. First fit, next fit and
random fit algorithms are simple algorithms. These algorithms
do not consider the resource capacities needed for placing
virtual machine and not consider the resource consumptions in
physical machines. Least full first, most full first, first fit
decreasing (single dimension) algorithms are designed based
on CPU capacity. First fit decreasing product, first fit
decreasing sum and dot product algorithms are designed for
multi dimensional resources. In these algorithms,
physical/virtual machines’ resource volumes are calculated
using all resources capacities. In minimizing angle algorithm
all resources are involved directly for placing virtual
machines. In this algorithm different resource consumptions
are balanced so that physical machines are minimized. This
algorithm concentrates on balancing resources instead of
maximizing resource usage of physical machines in each
dimension. After all these Virtual Machine Placement
algorithms, Modification of the Best Fit Decreasing (BFD)
algorithm is implemented in cloud data centers for placement
of Virtual Machines.
IV. SOME MAJOR CLOUD AND VIRTUALIZATION
SERVICE PROVIDER
Google (Google App Engine)
Google App is great for all types of applications such as
Business, Consumer, Marketing, Mobile, and Website [4].
27. Easy to Build: By using the familiar development
tool it will allow the user to buildup and get started
app quickly
Easy to Scale: It can serve any number of users and
automatically responds to data traffic change.
Easy to Manage: Administer app through the
centralize app web console always actives and
works, can’t need software installation, server or
backup etc.
Easy to Storage: GAE advanced storage
infrastructure gives benefits to companies to store
and access their data
Highly Scalable.
Flexible Security and sharing.
Fast data access.
Reliable Storage Access.
Table 1: Comparison of service providers over various matrices
Google [4] Amazon [6] Microsoft [5]
Cloud
Provider Google App Engine Amazon EC2 Azure
Service
Mode PaaS /SaaS Provider PaaS/ SaaS Provider and IaaS PaaS/
SaaS Provider and IaaS
Develop
Support Web service
Web service;
28. Windows console application;
Virtual Instance
Virtual machine
Feature Easy to build; Easy to scale; Easy to manage,
inexpensive.
Elastic; Completely Controlled;
Flexible; Designed for use with
other Amazon Web Services
Reliable; Secure; Easy to Start.
Always up. Always on; Open;
Unlimited servers. Unlimited
storage. Powerful Capabilities.
Compute
model[65]
Predefined application structure and
framework; programmer-provided
“handlers” written in Python, all
persistent state stored in MegaStore
(outside Python code);
Automatic scaling up and down of
computation and storage; network
and server failover; all consistent
with 3-tier Web app structure
x86 Instruction Set Architecture
29. (ISA) via Xeon VM; Computation
elasticity allows scalability, but
developer must build the machinery,
or third party VAR such as Right
Scale must provide it
Microsoft Common Language
Runtime (CLR) VM; common
intermediate form executed in
managed environment;
Machines are provisioned based
on declarative
descriptions (e.g. which “roles”
can be replicated); automatic load
balancing
Storage MegaStore/BigTable
DynamoDB;SimpleDB;Rel ational
Database Service (RDS);
ElastiCache
Azure storage service
Support
SQL Cloud SQL
-
SQL Azure
Availability 100% 99.97% 99.95%
30. Free Usage Limitation usage in 1 GAE unite Micro-Linux-
instance 3 month for free
Table 1 shows comparison of these service providers over
various matrices.
International Conference on Advances in Computing,
Communication Control and Networking (ICACCCN2018)
66
Microsoft (Windows Azure)
Microsoft windows azure is an open cloud platform
which enable user to build deploy and manage applications
across global network of Microsoft datacenters. The user can
build applications by using any kind of language, tool or
framework.net, node.js, java, php, it give facility to its
customer that whatever language you want to install you can
install and use it [5].
Always up and always on: Microsoft window azure
claim that its deliver services 99.95% to its users and
enable its users to build and run highly available
application without focusing on its infrastructure.
Open: MWA is open source, it give facilities to its
customer for using any kind of language, framework,
or tool to build their applications.
Unlimited Server and Unlimited Storage: MWA
31. enable its customer to easily scale their applications
to any size. Window Azure is available on multiple
datacenters around the world, which enable its users
to deploy their application near to their customers.
Powerful Capabilities: MWA can deliver flexible
cloud computing platform which can assure any
application need. Its distributed caching and CDN
service allow user to minimize latency and deliver
great application performance anywhere in world [5].
Amazon EC2(aws.amazon.com)
Compute: Amazon is scale to meet user application
demands whether it’s one server or large cluster [6].
Amazon Elastic Compute Cloud (EC2).
AEC is web service which provides resizable
compute capacity in cloud. Amazon EC2 web service
allows users to obtain and build up with minimal
friction. Amazon EC2 provides complete control to
their users for computing resources and let them run
on Amazons computing environment.
Networking: In networking Amazon customize and
control user network resources, both inside and
outside the cloud [6].
V. VIRTUAL LABS
Creating a cloud based ad hoc laboratory system, such as
Cloud Suite, requires a variety of different technologies. The
primary technology that is necessary for Cloud lab is hardware
virtualization. Fortunately there are numerous examples
available to us. We will perform an examination of hardware
32. virtualization services in general and a specific exploration of
the services offered by Amazon.com. In addition to
virtualization we will also explore: existing virtual lab
environments, templating systems, remote storage solutions,
and finally, A P Is and Frame Works [7].
i. Amazon.com Elastic Compute Cloud
On August 25, 2006, Jeff Bezos announced the limited
beta of Amazon Elastic Compute Cloud [8], referred to as
Amazon E C 2. Amazon E C 2 is a service that allows users
to, essentially, rent computational resources on an as needed
basis. This type of service is made possible by using the Xen
hypervisor, Xen allows Amazon E C 2 to create Virtual
Private Servers as demand requires. These virtual servers
make use of operating systems that have been optimized for
paravirtualization. Once the end user has customized the
virtual machine to their liking they are then able to save it as
an Amazon Machine Image, or A M I.
An A M I is a system image that has been created to be
used with E C 2. Users may customize these A M Is with their
own software packages allowing an A M I to be tailored for
any task. The Amazon Simple Storage Service (S 3) [9] is
used extensively in the code written for Cloud Suite. S 3
allows a user to upload and download files using H T T P
requests. Amazon Simple Storage Service, like the rest of
Amazon Web Services, is not free semicolon however at the
time of writing, Amazon offers a free tier of service available
for the one year [9].
Amazon, and various 3rd parties, provide S D Ks that
allow developers to interact with Amazon Web Services. The
framework for Cloud Suite is written using S D Ks for P H P,
Python (Boto) and Unix forward slash Linux command line.
33. However S D Ks exists for multiple platforms and languages.
The provided S D Ks greatly ease interaction with the cloud
services provided by Amazon.
ii. Google Compute Engine
Amazon is far from the only available option for cloud
services. Google recently announced ‘Google Compute
Engine’ [10] , a service similar to Amazon E C 2, in addition
to the long standing Google App Engine. In the next section
we will take a closer look at cloud services offered by
providers other than Amazon.com.
iii. Heroku
Heroku {11] deservers special consideration because it is
one of the best examples of a platform for executing arbitrary
programs in the cloud. Heroku allows the end user to develop
an application and leave the running of that application up to
Heroku. The developer pushes code to Heroku using the Git
version control system. Once the code is present, Heroku
relies upon H T T P requests to interface with the client
application.
iv. Google App Engine
Google App Engine (G A E) [12] is another service similar
to Heroku semicolon however, Google App Engine places a
number of restrictions on what code developers may use.
Unlike an Infrastructure as a Service provider, G A E places
limits on what code may be executed as well as only allowing
the proprietary Google Query Language as a data store.
v. Eucalyptus
Extensive research on cloud technology has been
34. performed at University of California, Santa Barbara (U C S
B). Two of the most well known products of that research are
Eucalyptus and App Scale.
Eucalyptus is an open source emulator for Amazon E C 2
that can be run on local clusters square [13] . Since the initial
release of Eucalyptus, it has grown to become a commercial
success, and is included in the Ubuntu operating system.
vi. App Scale
International Conference on Advances in Computing,
Communication Control and Networking (ICACCCN2018)
67
AppScale is an open source implementation of several
cloud A P Is, including Google App Engine. App Scale can be
deployed over Amazon E C 2, Eucalyptus, or an Ubuntu
image. App Scale uses virtualization to provide a uniform
experience across multiple cloud platforms.
vii. Coursera - Online Education
With the growth of high speed internet access to distance
learning has become increasingly more accessible. In addition
to universities supplementing their courses with online
offerings, many universities are also making classes available
online for free. Coursera is a central location where those
seeking to improve their education may participate in free
online classes from sixteen universities including: Caltech,
Stanford, and Princeton. Additionally many universities have
35. begun offering free classes online for no credit. One such
offering from University of California, Berkley made use of
Heroku to allow students to publish a web based application
and see results in real time. The Massachusetts Institute of
Technology also offers free online courses. It is important to
note that these online courses typically do not confer any sort
of degree or certificate, Coursera being notable in that some of
it ‘courses do offer an electronic certificate of completion
[14]. Courses offered online could make great use of a service
like Cloud Suite to provide their students with an interactive
lab component.
viii. Khan Academy
Khan Academy is a not for profit online educational
resource. Khan Academy offers videos explaining a variety of
topics. In addition to videos Khan Academy also offers a web
based set of tools for developing mathematical proficiency. In
late 2012 Khan Academy introduced Computer Science
curriculum that offers programming instruction and
demonstration. The programing curriculum is based on the
Java Script language and is overseen by John Resig [15]. The
program is designed to demonstrate the fundamentals of
computer science to someone with little to no experience.
ix. University of Hawaii Virtual Lab
In 2007 the Department of Educational Technology at the
University of Hawaii at Mano published a paper detailing an
experiment where an online biology class made use of a C D
hyphen ROM based virtual wet lab. The study compared the
use of a virtual lab to what the study referred to as a ‘face to
face’ lab. The data analysis showed that, while students found
the virtual labs to be useful, face – to -face lab time was more
valuable to the overall learning experience than a purely
computer-based lab. The study was primarily focused on the
36. effectiveness of the virtual lab and did not give great detail on
the technology [16].
x. Navy Virtual Lab
The Naval Postgraduate School (N P S) [17] has developed
a distance learning solution that allows non - resident students
to perform signal processing laboratory assignments. The
Electrical and Computer Engineering department has
developed an innovative mix of hardware and software to
allow students to access lab equipment regardless of their
location. The collection of signal generators and field
programmable gate arrays allow students to perform
experiments in real time.
VI. CONCLUSION
Cloud computing is basically a framework that allows us
to access applications that actually reside at a location other
than your computer. Virtualization is a technique to provide
abstraction between the hardware and software of a computer
system. In virtualization we create a virtual version of a
resource (generally computer system or application running on
it). The virtualization and cloud computing makes the
resources available to a remote location. Some resources are
shared between multiple users and accessed at the same time.
The technique uses the resource sharing and increase the
system utilization.
The Computer is virtualized in a clustered computing
environment controlled by Cloud computing to fully utilize
the computing and storage. The cloud will provide dynamic
resource allocation to ensure effective system utilization
through carefully monitoring of resource workload and
available physical resources, and providing managed solutions
on a continual basis. The most important aspect of
37. virtualization is to develop a platform that students can access
remotely without time and location constraints. The Cloud
provides a segregated virtual environment without affecting
any system outside of the cloud as well as other virtual
systems within the cloud.
REFERENCES
[1] Security Aspects of Virtualization in Cloud Computing.
Available from:
https://www.researchgate.net/publication/273950406_Security_
Aspects_
of_Virtualization_in_Cloud_Computing
[2] R M Sharma The impact of Virtualization in Cloud
Computing
International Journal of Recent Development in Engineering and
Technology Website: www.ijrdet.com (ISSN 2347-6435(Online)
Volume 3, Issue 1, July 2014).
[3] Oracle “The Structure of the Java Virtual Machine” http: //
docs .oracle
.com / javase / jvms / se7 / html / jvms - 2.html
[4] “Google cloud services – App Engine”. [Online]. Available:
http://www.google.com/enterprise/cloud/appengine/.
[5] “Windows Azure: Cloud Computing, Cloud Services , Cloud
Application Development”. [Online]. Available:
http://www.windowsazure.com/en-us/.
[6] “Amazon Web Services”. [Online]. Available:
http://aws.amazon.com/.
[7] Drew Alex C, Cloud Suite- Ad Hoc Laboratories Using
Cloud Resource,
38. California State University, Channel Island.
[8] EGI “European Grid Infrastructure” n.d. Web. http://
www.egi.eu/about/
[9] Amazon Web Services “Amazon S3 Pricing”
http://aws.amazon.com/s3/
[10] Google Cloud Platform “Google Compute Engine” http
cloud.google.com/products /compute - engine .html.
[11] Robinson, Tom. “Re: How does Heroku Work”
http://www.quora.com/Scalability/.
[12] Google Developers “Google App Engine General
Questions” https://
developers .google .com / appengine / kb / general.
[13] Eucalyptus “Why Eucalyptus” http:// www.eucalyptus.com
/ why –
eucalyptus.
[14] Coursera, “Support Center” http:// help.coursera.org/
customer/ portal/
articles / 557884 - will-each-class-that-i-complete – 02.
[15] Kahn Academy. “Talks and Interviews” http://
www.khanacademy.org/talks-and-interviews/v/khan-academy-
computer-science-launch.
[16] Stuckey - Mickell, Tracey, Stuckey - Danner, Bridget,
Taylor, Brandon.
“ Virtual Labs in the Online Perceptions and Implications for
Policy and
Practice “ , TCC 2007 Proceedings<http: / / etec.hawaii.edu /
proceedings / 2007 / stuckey.pdf greater than sign.
[17] Cristi, Roberto. “ EC3400 Digital Signal Processing
39. FFPGA Laboratory
“ http: / / faculty.nps.edu / dl / eo3404 dl lab / n.d.
Discuss the benefits of virtualization software, as described in
the text. Do you agree/disagree with these benefits, or can you
think of additional benefits not already presented? Also discuss
the security concerns highlighted by server sprawl and how you
would propose to solve those in your (real or hypothetical)
organization.
Please make your initial post and two response posts
substantive. A substantive post will do at least TWO of the
following:
· Ask an interesting, thoughtful question pertaining to the topic
· Answer a question (in detail) posted by another student or the
instructor
· Provide extensive additional information on the topic
· Explain, define, or analyze the topic in detail
· Share an applicable personal experience
· Provide an outside source (for example, an article from the UC
Library) that applies to the topic, along with additional
information about the topic or the source (please cite properly
in APA)
· Make an argument concerning the topic.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
· At least two scholarly sources should be used in the initial
discussion thread. Be sure to use information from your
readings; sources from the UC Library, or other professional
venues. Use proper citations and one APA style reference list in
your posts. Your APA reference list should be placed
immediately at the end of your response to the Discussion
Question; this reference list includes all citations made - both in
40. response to the Discussion Question and for citations in your
replies to classmate's posts.
· Reply to the posts of at least two of your classmates. All three
of these replies must be included in one thread and
posted/submitted No Later Than (NLT) midnight Sunday of the
week it is due.
· To receive full credit, Discussion posts must reflect at least
two proper APA citations and a matching APA style reference
list.
You have read about server virtualization and cloud computing
in chapter 6 of your textbook. For your written assignment this
week, complete a case study of the organization you work for
(use a hypothetical or “other” organization if more applicable)
that will address the following prompts:
· Describe the organization’s environment, and evaluate its
preparedness for virtualization.
· Explain Microsoft (or another product) licensing for
virtualized environments.
· Recommend a configuration for shared storage; make sure to
discuss the need for high availability and redundancy for
virtualization for the organization.
· Explain Windows Azure capabilities for virtual machines and
managing a hybrid cloud, including Windows Azure’s Internet
as a Service (IaaS) and storage capabilities
· Make a recommendation for cloud computer usage in the
organization, including a justification for your
recommendations.
· Submit your research paper as a single document. Your paper
should meet the following requirements:
· Be approximately 3-5 pages in length, not including the
required cover page and reference page.
· Follow APA6 guidelines. Your paper should include an
introduction, a body with fully developed content, and a
41. conclusion.
· Support your answers with the readings from the course and at
least two scholarly journal articles to support your positions,
claims, and observations, in addition to your textbook. The UC
Library is a great place to find resources.
· Be clearly and well-written, concise, and logical, using
excellent grammar and style techniques. You are being graded
in part on the quality of your writing.
Ref: http://www.youtube.com/watch?v=p11lJOnALS4
Ref: http://www.youtube.com/watch?v=Lva62h3q_tY
Must be at least 5 pages.