Monday, January 27, 2020

Cloud Computing Service Level Agreement and Governance

Cloud Computing Service Level Agreement and Governance Service Level Agreement and Governance for Cloud Computing The contractual side of a service level agreement (SLA) and governance for cloud computing Ali Raslan Abstract In the world of information technology (IT), cloud computing has been the futuristic concept of modern computing for the last decade or more. Nevertheless, in the last few years this concept has become the mainstream. However, with the entire buzz and the evolutionary techniques the information technology companies developing and implementing, many overwhelming issues like interoperability, insecurity, and accessibility represents some of the most anticipated questions every decision maker has to consider before signing the contract of a Cloud Service agreement document. In addition to that, one key issue for every organization trying to make the big move to the world of cloud computing, is to provide governance for data that it no longer directly controls. During this research, I will try to illustrate and point the main ideas and practices of the contractual side of a service level agreement (SLA) and governance for cloud computing by trying to highlight a set of guidelines to help and assist organization in defining and constraining the governance plans for data they are willing to move into the cloud. Keywords: cloud computing, SLA, IT, contract, agreement, constraining. Word count: 4000 words. Introduction Cloud computing is the new era of internet evolution, where this term usually refers to everything involves delivering hosted services and data over the internet to companies, individuals and even other computing systems. The idea of cloud computing started in 1950s when large-scale mainframes made available to schools and corporations (James, 2013). Few decades later, this concept started to become more alive by adopting this concept by some of the major technological companies like Google, Amazon and Microsoft where commercial cloud computing started to take place in the market. This new technology developed through a number of phases, this includes Software as a Service (SaaS), Grid and Utility Computing (GaUC), Application Service Provision (ASP) (Arif, 2014). Nevertheless, through the development of this concept, many issues and uncertainties like security, interoperability, vendor lock-in, and compliance were arising against adopting this technology (North Bridge, 2013). These problems are familiar even with the traditional Information Technology Outsourcing (ITO), and these issues usually treated at the agreement level between the service provider and the customer. Cloud Computing Definitions The National Institute Of Standards And Technology NIST Definition of Cloud Computing â€Å"Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.† (Peter Mell, 2011). Moreover, in his book The Big Switch: Rewiring the World from Edison to Google by Nicholas Carr, hundred years from now, the modern era of power grid has begun when corporations started to join the power grid leaving behind the traditional power generator systems every company used to have in order to satisfy the company’s need for electricity. This big transformation at that time is very similar to today’s switching from traditiona l computing and data handling to the cloud. Where with all the unusual concepts and worries about the security, actual data place and the stability of the services provided, companies will soon realize the emerging markets and services Cloud Computing can offer. The main motivation behind Cloud computing mostly represented by the benefits this technology can offer for its clients. Where features like ‘Service on Demand’, usually with a ‘pay as you go’ billing system and factors like the highly abstracted and shared resources, the instantaneous provisioning and scalability makes cloud computing the next power grid transformation. Risks and Issues On the other hand, despite all the mentioned benefits and features cloud computing can offer, it has been realized that there are limits to the acceptance of cloud computing among enterprise companies, because of the level of complexity and dependability these service might become. Moreover, the data governance issues related to this technology represents some of the main difficulties the cloud computing market is facing right now. The European Network and Information Security Agency (ENISA) defines that the client responsibility of data governance is similar to the service provider responsibility in case of any data lose or corruption (Catteddu, 2009). Thus because customer should be aware of the risks that might imply by using this technology, and to encourage these companies to investigate farther in finding a more reliable providers. In addition to that, farther risks might imply to any cloud computing environment, such as hacking attacks or unauthorized access to the actual phys ical data locations. The Journal of Information Technology Management categorized this type of attacks in three main categories: Attacks targets hosted application under a SaaS environment. Attacks through the trusted network connection. This can be done from the customer side to the provider or from the provider side to the customer environment. Attacks targets hosted server under a PaaS or IaaS environment. (Cochran Witman, 2011) Cloud Computing Governance Components In the Information Technology Outsourcing, describing the product or the service specifications to be delivered are usually drafted via a contract is in the form of Service Level Agreement (SLA), this agreement defines the all the important and legal parts of the service between the service provider and the service recipients. The same concept can be implemented with the cloud computing, since most of the main agreement parts involves providing an information technology service. However, cloud computing includes many different ideas and concepts, where in cloud computing agreement the service have to treat different concepts and behaviors like unknown data physical location, rapid scaling, lower IT upfront, and even different way of paying for the service such as monthly or annual subscriptions. In addition to that, in a cloud environment, usually the services are hosted and owned by a separate party. Where in most cases the owner of the application can be different from the owner of the server (Cochran Witman, 2011). Nondisclosure and Confidentiality Agreements These two terms are used in many other areas and through all types in contracts, agreements and forms, but the basic understanding of those two terms refers to the confidentiality of the agreement in general. Therefore, at the level of a service level agreement, a nondisclosure agreement usually means a confidential agreement. Margaret Rouse in her article about Nondisclosure Agreements she defines NDA as â€Å"A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.† (Margaret, 2005). Similarly, David V. Radack in his article Understanding Confidentiality Agreements, he defines confidential agreement as â€Å"Confidentiality agreements, are contracts entered into by two or more parties in which some or all of the parties agree that certain types of information t hat pass from one party to the other or that are created by one of the parties will remain confidential.† (David, 2014). From the two provided definitions, we can see that a confidential or nondisclosure agreement force all participated parties to protect and never disclose any of the information passed between the parties while building the service. Legal location In general, the actual physical location of the server or the data in a Cloud Computing environment is not important from the technical point of view. However, from a legal point of view a Service Level Agreement requires clearly identifying the actual location of the servers handling the data and services. Thus in case of a security breach from the provider side, punishments or penalties could be issued through the provider’s local authority. For that reason, if the breach resulted the data to be moved into an offshores location, the local government regulations might have no effects towards that (Steele 2010). On the other hand, a civil case could be issued in the right of the vendor or attacker in case of such risks. For that reason, defining the legal location is very important in a service level agreement because it represents a legal cover to the actual data that might get stolen or destroyed. The Restrictions of a Software License Software License Restrictions is a very imperative factor in any Software License Agreement because it might affect the main tasks of the whole system in case of storing on an unknown devices or servers. This might occurs because sometimes software license might get violated when stored or hosted via remote hardware infrastructure. This issue might results a side effects like not being able to run the system as a whole or a part because software licenses might have a security features at the level of linking the software to a special machine MAC address or a processor serial number. User based exposures User based exposures might occurs when an end user posts some data in a secure interface or website in the system, after submitting the data to the main data server, the data might get through a third party communication systems or servers. During this stage, a security breach might occurs were data can be lost, stolen or disclosed. At this level, the Service Level Agreement investigates what administrators at this level have access to during the transmission stage. This point might cover different types and techniques for encrypting the data, or include the third party providers in the agreement to insure the security and safety of the data. Communicating With Remote Networks and Services. The system’s integration and incorporation with the cloud software as a service is one the most important factors any cloud based services have to offer for any system. However, integrating these services with the organization’s internal system sometimes means giving these services the possibility to become a part of the internal system. This can be an issue concerning the security the internal system. Mathias Thurman in his article Tightening Up SaaS Security, discusses how these concerns increase when the security of the SaaS is unidentified or unknown. Basically because when integrating the internal system with the SaaS, the SaaS network becomes a part of the internal system, and when reaching this level of integration, any attacks of security failures from the side of the SaaS provider well results the local network to be at risk too (Mathias, 2010). Cloud Service Level Agreement Components Service Level Agreement Template To illustrate the main parts and layout of a Service Level Agreement in a cloud-computing environment, in the following template we can see the main parts, layout, and definitions of the Service Level Agreement content, made by SLATemplate.com. Certainly, a Service Level Agreement can includes hundreds of pages describing every single specification. However, for the sake of illustrating the sample main part of the agreement we have the following template represents the most important parts of an SLA for a Cloud Computing system. Service Level Agreement (SLA) for Customer by Company name Effective Date: 10-08-2010 Version Approval (By signing below, all Approvers agree to all terms and conditions outlined in this Agreement.) Table of Contents 1. Agreement Overview 2. Goals Objectives 3. Stakeholders 4. Periodic Review 5. Service Agreement 1. Agreement Overview This Agreement represents a Service Level Agreement (â€Å"SLA† or â€Å"Agreement†) between Company name. and Customer for the provisioning of IT services required to support and sustain the Product or service. This Agreement remains valid until superseded by a revised agreement mutually endorsed by the stakeholders. This Agreement outlines the parameters of all IT services covered as they are mutually understood by the primary stakeholders. This Agreement does not supersede current processes and procedures unless explicitly stated herein. 2. Goals Objectives The purpose of this Agreement is to ensure that the proper elements and commitments are in place to provide consistent IT service support and delivery to the Customer(s) by the Service Provider(s). The goal of this Agreement is to obtain mutual agreement for IT service provision between the Service Provider(s) and Customer(s). The objectives of this Agreement are to: Provide clear reference to service ownership, accountability, roles and/or responsibilities. Present a clear, concise and measurable description of service provision to the customer. Match perceptions of expected service provision with actual service support delivery. 3. Stakeholders The following Service Provider(s) and Customer(s) will be used as the basis of the Agreement and represent the primary stakeholders associated with this SLA: IT Service Provider(s): Company name. (â€Å"Provider†) IT Customer(s): Customer (â€Å"Customer†) 4. Periodic Review This Agreement is valid from the Effective Date outlined herein and is valid until further notice. This Agreement should be reviewed at a minimum once per fiscal year; however, in lieu of a review during any period specified, the current Agreement will remain in effect. The Business Relationship Manager (â€Å"Document Owner†) is responsible for facilitating regular reviews of this document. Contents of this document may be amended as required, provided mutual agreement is obtained from the primary stakeholders and communicated to all affected parties. The Document Owner will incorporate all subsequent revisions and obtain mutual agreements / approvals as required. Business Relationship Manager: Company name Review Period: Bi-Yearly (6 months) Previous Review Date: 01-08-2010 Next Review Date: 01-12-2011 5. Service Agreement The following detailed service parameters are the responsibility of the Service Provider in the ongoing support of this Agreement. 5.1. Service Scope The following Services are covered by this Agreement; o Manned telephone support o Monitored email support o Remote assistance using Remote Desktop and a Virtual Private Network where available Planned or Emergency Onsite assistance (extra costs apply) Monthly system health check 5.2. Customer Requirements Customer responsibilities and/or requirements in support of this Agreement include: Payment for all support costs at the agreed interval. Reasonable availability of customer representative(s) when resolving a service related incident or request. 5.3. Service Provider Requirements Service Provider responsibilities and/or requirements in support of this Agreement include: Meeting response times associated with service related incidents. Appropriate notification to Customer for all scheduled maintenance. 5.4. Service Assumptions Assumptions related to in-scope services and/or components include: Changes to services will be communicated and documented to all stakeholders. 6. Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components. 6.1. Service Availability Coverage parameters specific to the service(s) covered in this Agreement are as follows: Telephone support : 9:00 A.M. to 5:00 P.M. Monday – Friday Calls received out of office hours will be forwarded to a mobile phone and best efforts will be made to answer / action the call, however there will be a backup answer phone service Email support: Monitored 9:00 A.M. to 5:00 P.M. Monday – Friday Emails received outside of office hours will be collected, however no action can be guaranteed until the next working day Onsite assistance guaranteed within 72 hours during the business week 6.2. Service Requests In support of services outlined in this Agreement, the Service Provider will respond to service related incidents and/or requests submitted by the Customer within the following time frames: 0-8 hours (during business hours) for issues classified as High priority. Within 48 hours for issues classified as Medium priority. Within 5 working days for issues classified as Low priority. Remote assistance will be provided in-line with the above timescales dependent on the priority of the support request. â€Å"(SLA template, 2010) References Carr, N. G., January 2008. The Big Switch: Rewiring the World, from Edison to Google. s.l.:s.n. COCHRAN, M. WITMAN, P. D., 2011. GOVERNANCE AND SERVICE LEVEL AGREEMENT ISSUES IN A CLOUD COMPUTING ENVIRONMENT. Journal of Information Technology Management Volume XXII, Number 2, pp. 41-55. Peter Mell, T. G., 2011. The NIST Definition of Cloud Computing. [Online] Available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf Arif Mohamed, A history of cloud computing. 2014. [ONLINE] Available at: http://www.computerweekly.com/feature/A-history-of-cloud-computing. [Accessed 5 March 2014]. James, A Brief History of Cloud Computing | SoftLayer Blog. 2013. [ONLINE] Available at: http://blog.softlayer.com/2013/virtual-magic-the-cloud. [Accessed 10 March 2014]. North Bridge, 2013 Cloud Computing Survey | North Bridge. 2014. [ONLINE] Available at: http://www.northbridge.com/2013-cloud-computing-survey. [Accessed 11 May 2014]. Peter Mell. The NIST Definition of Cloud Computing 2011. [ONLINE] Available at: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. [Accessed 11 May 2014]. Catteddu, D. and G. Hogben, Cloud Computing Benefits, risks and recommendations for information security 2009, European Network and Information Security Agency: Heraklion, Crete, Greece. 125 pp. Margaret Rouse, What is non-disclosure agreement (NDA)? Definition from WhatIs.com. [ONLINE] Available at: http://searchsecurity.techtarget.com/definition/non-disclosure-agreement. [Accessed 11 May 2014]. David V. Radack, Understanding Confidentiality Agreements. 2014. [ONLINE] Available at: http://www.tms.org/pubs/journals/jom/matters/matters-9405.html. [Accessed 11 May 2014]. Steele, C., City of Monrovia, California, personal communication, 2010. Mathias Thurman, Tightening Up SaaS Security Computerworld. 2010. [ONLINE] Available at: http://www.computerworld.com/s/article/352873/Tightening_Up_SaaS_Security. [Accessed 11 May 2014]. SLATeamplate.com, Service Level Agreement Template (SLA). 2010. [ONLINE] Available at: http://www.slatemplate.com/. [Accessed 11 May 2014].

Sunday, January 19, 2020

Solomon Asch Conformity Experiments (1951) Essays -- Social Psychology

In 1951, Solomon Asch carried out several experiments on conformity. The aim of these studies was to investigate conformity in a group environment situation. The purpose of these experiments was to see if an individual would be swayed by public pressure to go along with the incorrect answer. Asch believed that conformity reflects on relatively rational process in which people are pressured to change their behaviour. Asch designed experiments to measure the pressure of a group situation upon an individual judgment. Asch wanted to prove that conformity can really play a big role in disbelieving our own senses. Asch initiated his experiment by making one of the particpants at ease. He asked a serious of elementary questions where the four confederates answered them correctly so the fifth person also answered the question correct. This in sense gave the participant a false interpretation of the actual thinking behind Asch true experiment. The participants were asked to compare, identify and match one of three lines on the right card to the length of the line on the left card. This task was repeated several times to get a true picture of the data collated. Participants were not under any explicit demand to conform, as they received no physical or verbal coercion to do so. The specific hypothesis centered on the idea, â€Å"if group pressure can play influence and effect individuals perception, decision and attitudes†. The independent variable will be â€Å"Procedure†, and the dependent variable is the â€Å"level of conformity did change†. The experiments were quite simple, in that there was a seemingly harmless task to be performed, and the participants were instructed to choose the estimation of the lengths of a line when compared to two ... ...y is decreased. Although Asch conducted many variations on his test of conformity, and he has been criticized as being too simplistic to accurately represent true conformist behaviour his experiment has stood the test of time and examination Works Cited Anderson, M, L, Taylor, H, F. (2008). Sociology. Understanding a Diversity Society. Thomson Higher Education. Belmont. (USA). Fourth Edition. Babbie, E. (2007) The Practice of Social Research. Thomson Higher Education. Belmont. (USA) Eleven Edition. Cardwell, M. Klanagan, C. (2003). Psychology As. Nelson Thornes Limited. Cheltenham. (UK). First Edition. Crisp, R, J. Turner, R, N. (2007). Essential Social Psychology. Sage Publications Limited. London. (UK). First Edition. Macionis. J, J. Plummer, K. (2005). Sociology. A global Introduction. Pearson Education Limited. Essex. (UK) Third Edition.

Saturday, January 11, 2020

A Rose for Emily and Society in the Eyes of William Faulkner Essay

William Faulkner is truly a remarkable writer. By writing a very short story about a spinster, he shows how society’s moral fiber can hinder the progress of a community. In â€Å"A Rose for Emily,† the author chooses to reveal the growth of a town by using strong characterization, vivid settings and plot development.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Faulkner’s protagonist, Emily Grierson, is the ideal symbol of how the moral fiber of a person can stunt growth. Brought up believing that she was part of high society, Miss Emily’s character showed, through her perspectives, that she is not one to partake in its progress. She did not renovate her house which used to be stylish in its own decade and was very out of place among the â€Å"garages and cotton gins† (Faulkner par. 2) that signified community progress. She refused to put the metal number and mailbox when the postal service was upgraded – also a symbol that she refused to be a part of the society where she belonged. She also gave china-painting lessons, an art form that had long been considered a part of history and very traditional. Faulkner also brilliantly shows that aside from being stubborn about accepting modernization, Miss Emily’s refusal to move on symbolizes the way people can hinder societal growth with their beliefs or behavior. Her refusal to accept her father’s death even after three days when the man passed away shows how her character clings desperately to the past for sanity and stability. The way she had poisoned Homer Barron is symbolic of how holding on to the past can be fatal to progress. She knew that her sweetheart was going to leave her and if this happens, she would not only lose the love she desperately wanted but also the pride that she upheld as a â€Å"Grierson.† Murdering Homer, also considerably a symbol of modernization because of his job as a foreman for a construction company killed Emily’s chances of developing into a better person. Although the author prefers to focus the story on Miss Emily’s character, he also shows how other people’s attitudes toward each other can slacken the pace of progress. William Faulkner enhances this theme well by using other characters in the story to show how the moral fiber of the town slows down its development.   Judge Stevens stuck to his gentlemanly ways when neighbors complained about the foul smell coming from Emily’s house. His reply, â€Å"will you accuse a lady to her face of smelling bad?† (Faulkner 24) showed that he would rather keep his ethical beliefs than solve a crisis in the community. Col. Sartoris, Emily’s reason for not paying taxes, symbolizes how the past can block any attempt in financial development as well. The silence of the Negro housekeeper Emily relied on for years also strengthens the contention that one’s moral beliefs can hinder the truth from coming out for too long.   The Negro is a symbol of moral oppression because of the way that society used to treat his race. Because the community would not listen to a black man, he chose to be silent and this caused a great delay in the revelation of what was true. Faulkner’s Narrator also voices out the different perspectives of people about Miss Emily.   Believing that she should not behave in certain ways kept them from realizing what was truly happening to the woman. By making Emily the center of gossip and many misinterpretations, the community did not fully develop and did not learn of the truth until it was too late.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   By using descriptions of many other items to contrast progress and decay, the author masterfully develops the theme. Aside from the houses, the clothes that the town people wore in Miss Emily’s funeral were considered traditional despite the fact that they were already living in the lap of modern society. The â€Å"yellow-wheeled buggy† (Faulkner 30) on which Emily and Homer drove around the neighborhood also symbolizes how she had almost let go of her morals because of her love for the man. The buggy was colored yellow, a strikingly vibrant color compared to the blacks and whites associated in almost every description of Miss Emily. Her shortened hair after her father’s burial also signifies that her life had been cut   by her failure to accept that life needs to move on. The description of how she was discovered dead with her â€Å"head propped on a pillow yellow and moldy with age† (Faulkner par. 54) again reiterates that she had let the future slip away by clinging on to her memories instead of moving on.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   More items and descriptions included in the setting also prove to strengthen Faulkner’s theme about progress. Miss Emily’s depiction as an old fat lady â€Å"bloated like a body long submerged in motionless water, and of that pallid hue,† supports the idea that her character had already died emotionally and spiritually because she did not move on with her life. The â€Å"invisible watch ticking† (Faulkner par. 7) symbolizes how time can only delay the revelation of the truth but cannot completely hide it from coming out. The foul smell of Homer’s body being secretly kept also supports the concept that decay cannot be withheld despite the proud front that Emily was showing the public.   The skeleton on the bed that had already stuck to the sheets further intensifies the theme that the holding on to the past can be fatal.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Faulkner’s plot development shines through a unique style of narration that not only shows his creativity but also helps support the theme of slow progress development.   The author uses a distinctive way of telling the story by going back and forth from the past to the present and in between events.   By doing so, Faulkner shows that the past keeps meddling with the present events. Instead of letting readers understand the story as it develops based on a flowing timeline, he uses past incidents and thoughts propping up in every part of the story to explain how Miss Emily’s character decayed with her stubbornness to cling to her yesteryears and beliefs. This style is symbolic of how handing on to memories can slacken the pace of knowing the truth and attaining full development.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   William Faulkner is a very brilliant writer who maximizes every detail of a short story to impose a theme on his audience. The behavior of the strong characters relays his message concretely.   The settings of the story provide many symbolic items that move the readers to understand the plot and theme very well.   Above all, his narrative style of retelling a story is exceptional and unifies the theme to all the other elements of his writing.   Miss Emily truly deserves a rose but William Faulkner merits the applause.

Friday, January 3, 2020

Italian Double Negatives How to Conjugate and Use Them

Your grade school English teacher probably told you repeatedly that you couldnt use more than one negative word in the same sentence. In Italian, though, the double negative is the acceptable format, and even three negative words can be used together in a sentence: Non viene nessuno. (No one is coming.)Non vogliamo niente/nulla. (We dont want anything.)Non ho mai visto nessuno in quella stanza. (I didnt see anyone in that room.) In fact, there is a whole host of phrases made up of double (and triple) negatives. The following table includes most of them. Double and Triple Negative ​Phrases non...nessuno no one, nobody non... niente nothing non...nulla nothing non...n...n neither...nor non...mai never non...ancora not yet non...pi no longer non...affatto not at all non...mica not at all (in the least) non...punto not at all non...neanche not even non...nemmeno not even non...neppure not even non...che only Here are some examples of how these phrases may be used in Italian: Non ha mai letto niente. (She read nothing.)Non ho visto nessuna carta stradale. (I didnt see any street signs.)Non abbiamo trovato nà © le chiavi nà © il portafoglio. (We found neither the keys nor the wallet.) Note that in the case of the negative expressions non...nessuno, non...niente, non...nà ©...nà ©, and non...che, they always follow the past participle. Observe the following examples: Non ho trovato nessuno. (I havent found anyone.)Non abbiamo detto niente. (We havent said anything.)Non ha letto che due libri. (She has read only two books.)Non ho visto niente di interessante al cinema. (I didnt see anything of interest at the cinema.) When using the combinations non...mica and non...punto, mica and punto always come between the auxiliary verb and the past participle: Non avete mica parlato. (They havent spoken at all.)Non à ¨ punto arrivata. (She hasnt arrived at all.) When using the expressions non...affatto (not at all), non...ancora (not yet), and non...pià ¹ (no more, no longer), the words affatto, ancora, or pià ¹ can be placed either between the auxiliary verb and the past participle or after the past participle: Non era affatto vero. Non era vero affatto. (It wasnt true at all.)Non mi sono svegliato ancora. Non mi sono ancora svegliato. (I hadnt woken yet.)Non ho letto pià ¹. Non ho pià ¹ letto. (I no longer read.)