Featured Post

Organizational Behavior on Henry Ford Essay Example | Topics and Well Written Essays - 750 words

Hierarchical Behavior on Henry Ford - Essay Example This plays on what Gilbreth, a popular mechanical/authoritative clinician, called tim...

Tuesday, May 26, 2020

The Ancient Mesopotamian Urban Community of Ur

The Mesopotamian city of Ur, known as Tell al-Muqayyar and the biblical Ur of the Chaldees), was an important Sumerian city-state between about 2025-1738 BC. Located near the modern town of Nasiriyah in far southern Iraq, on a now-abandoned channel of the Euphrates river, Ur covered about 25 hectares (60 acres), surrounded by a city wall. When British archaeologist Charles Leonard Woolley excavated in the 1920s and 1930s, the city was a tell—a great artificial hill over seven meters (23 feet) high composed of centuries of building and rebuilding mud-brick structures, one stacked on top of another. Chronology of Southern Mesopotamia The following chronology of Southern Mesopotamia is simplified somewhat from that suggested by the School of American Research Advanced Seminar in 2001, based primarily on pottery and other artifact styles and reported in Ur 2010. Old Babylonian (Late Bronze Age, 1800-1600 BC)Isin-Larsa Dynasties (Middle Bronze Age, 2000-1800 BC)Ur III (2100-2000 BC)Akkadian (Early Bronze Age, 2300-2100 BC)Early Dynastic I-III (Sumerian, 3000-2300 BC)Late Uruk (Late Chalcolithic, 3300-3000 BC)Middle Uruk (3800-3300 BC)Early Uruk  (4100-3800 BC)Late Ubaid (4400-4100 BC)Ubaid Period (5900-4400 BC) The earliest known occupations at Ur city date to the Ubaid period of the late 6th millennium BC. By about 3000 BC, Ur covered a total area of 15 ha (37 ac) including early temple sites. Ur reached its maximum size of 22 ha (54 ac) during the Early Dynastic Period of the early 3rd millennium BC  when Ur was one of the most important capitals of the Sumerian civilization. Ur continued as a minor capital for Sumer and succeeding civilizations, but during the 4th century BC, the Euphrates changed course, and the city was abandoned. Living in Sumerian Ur During Urs heyday in the Early Dynastic period, four main residential areas of the city included homes made of baked mud brick foundations arranged along long, narrow, winding streets and alleyways. Typical houses included an open central courtyard with two or more main living rooms in which the families resided. Each house had a domestic chapel where cult structures and the family burial vault was kept. Kitchens, stairways, workrooms, lavatories were all part of the household structures. The houses were packed in very tightly together, with exterior walls of one household immediately abutting the next one. Although the cities appear very closed off, the interior courtyards and wide streets provided light, and the close-set houses protected the exposure of the exterior walls to heating especially during the hot summers. Royal Cemetery Between 1926 and 1931, Woolleys investigations at Ur focused on the Royal Cemetery, where he eventually excavated approximately 2,100 graves, within an area of 70x55 m (230x180 ft): Woolley estimated there were up to three times as many burials originally. Of those, 660 were determined to be dated to the Early Dynastic IIIA (2600-2450 BC)period, and Woolley designated 16 of those as royal tombs. These tombs had a stone-built chamber with multiple rooms, where the principal royal burial was placed. Retainers--people who presumably served the royal personage and were buried with him or her--were found in a pit outside of the chamber or adjacent to it. The largest of these pits, called death pits by Woolley, held the remains of 74 people. Woolley came to the conclusion that the attendants had willingly drunk some drug and then lay down in rows to go with their master or mistress. The most spectacular royal graves in Urs Royal Cemetery were those of Private Grave 800, belonging to a richly adorned queen identified as Puabi or Pu-abum, approximately 40 years old; and PG 1054 with an unidentified female. The largest death pits were PG 789, called the Kings Grave, and PG 1237, the Great Death Pit. the tomb chamber of 789 had been robbed in antiquity, but its death pit contained the bodies of 63 retainers. PG 1237 held 74 retainers, most of which were four rows of elaborately dressed women arranged around a set of musical instruments. Recent analysis (Baadsgaard and colleagues) of a sample of skulls from several pits at Ur suggests that, rather than being poisoned, the retainers were killed by blunt force trauma, as ritual sacrifices. After they were killed, an attempt was made to preserve the bodies, using a combination of heat treatment and the application of mercury; and then the bodies were dressed in their finery and laid in rows in the pits. Archaeology at the City of Ur Archaeologists associated with Ur included J.E. Taylor, H.C. Rawlinson, Reginald Campbell Thompson, and, most importantly, C. Leonard Woolley. Woolleys investigations of Ur lasted 12 years from 1922 and 1934, including five years focusing on the Royal Cemetery of Ur, including the graves of Queen Puabi and King Meskalamdug. One of his primary assistants was Max Mallowan, then married to mystery writer Agatha Christie, who visited Ur and based her Hercule Poirot novel   Murder in Mesopotamia on the excavations there. Important discoveries at Ur included the Royal Cemetery, where rich Early Dynastic burials were found by Woolley in the 1920s; and thousands of clay tablets impressed with cuneiform writing which describe in detail the lives and thoughts of Urs inhabitants. Sources Baadsgaard A, Monge J, Cox S, and Zettler RL. 2011.  Human sacrifice and intentional corpse preservation in the Royal Cemetery of Ur.  Antiquity 85(327):27-42.Dickson DB. 2006. Public Transcripts Expressed in Theatres of Cruelty: the Royal Graves at Ur in Mesopotamia.  Cambridge Archaeological Journal  16(2):123–144. Jansen M, Aulbach S, Hauptmann A, Hà ¶fer HE, Klein S, Krà ¼ger M, and Zettler RL. 2016. Platinum group placer minerals in ancient gold artifacts – Geochemistry and osmium isotopes of inclusions in Early Bronze Age gold from Ur/Mesopotamia. Journal of Archaeological Science 68:12-23.Kenoyer JM, Price TD, and Burton JH. 2013. A new approach to tracking connections between the Indus Valley and Mesopotamia: initial results of strontium isotope analyses from Harappa and Ur. Journal of Archaeological Science 40(5):2286-2297.Miller NF. 2013. Symbols of Fertility and Abundance in the Royal Cemetery at Ur, Iraq. American Journal of Archaeology 117(1):127- 133. Oates J, McMahon A, Karsgaard P, Al Quntar S, and Ur J. 2007. Early Mesopotamian urbanism: a new view from the north.  Antiquity  81:585-600.Rawcliffe C, Aston M, Lowings A, Sharp MC, and Watkins KG. 2005. Laser Engraving Gulf Pearl Shell--Aiding the Reconstruction of the Lyre of Ur.  Lacona VI.Shepperson M. 2009.  Planning for the sun: urban forms as a Mesopotamian response to the sun.  World Archaeology  41(3):363–378.Tengberg M, Potts DT, and Francfort H-P. 2008.  The golden leaves of Ur.  Antiquity  82:925-936.Ur J. 2014. Households and the emergence of cities in ancient Mesopotamia. Cambridge Archaeological Journal 24(2):249-268.Ur J, Karsgaard P, and Oates J. 2011. The Spatial Dimensions of Early Mesopotamian Urbanism: The Tell Brak Suburban Survey, 2003-2006. Iraq 73:1-19.

Friday, May 15, 2020

Climbing Up A Rock Face - 1053 Words

There are many different climbing styles to choose from when it comes to ascending a mountain. The styles include bouldering, traditional, sport, and the most basic, hiking. Of those climbing styles, two stand out as complete opposites, bouldering and sport climbing. The sport of bouldering is like math and sport climbing is like music. Both of the climbing styles require great skill and practice just as math and music do. The sport of bouldering many consider dangerous, there is no safety equipment, nothing to rely on if you make the wrong move. In sport climbing, the climber uses heavy duty equipment just in case of a slip to prevent falling to the ground. When it comes to bouldering it can be similar to math because both require a lot of thought. When working with math, the questions posed are referred to as problems, in bouldering, routes up a rock face are also called problems. Before climbing up a rock face, the climber exams the routes available to him or her and carefully plans out the best approach. They decide exactly where they will place their feet and what is available for them to grab hold of on the ascent. To get to the top the climber must pick a path that is suitable for them and meets their skill level. Much like when it comes to doing math, one examines the problem in front of them and determines the best approach to solving it. They determine what the ending result they want is and pick a formula that will work best. Solving the math problemShow MoreRelatedClimbing Up A Rock Face1076 Words   |  5 PagesThere are many diverse climbing styles to choose from when it comes to ascending a mountain. The styles include bouldering, traditional, sport, and the most basic, hiking. Of those climbing styles, two stand out as complete opposites, bouldering and sport climbing. The sport of bouldering is like math and sport climbing is like music. Both of these climbing styles require great skill and practice just as math and music do. In the sport of bouldering, an abundant of people consider it dangerousRead MoreSemiotic Analysis of Usmcs Commercial The Climb1577 Words   |  7 Pagesclimb what is shown to be a very large rock. The young man is wearing nothing but a tank top, cargo pants, and climbing shoes. This sign could signify that he is an ordinary, plain guy and no-one special. This also suggests that your ordinary adult male is capable of doing the activity being done and reaching the goal of becoming a U.S. Marine. What should also be noted is that the man doesn’t seem to be wearing any harness or safety gear of any kind while climbing, which is a sign that, in this caseRead MoreEssay on Physics of Rock Climbing1551 Words   |  7 Pages Rock climbing is an exciting, but dangerous, sport. Since the 70s, climbing equipment has become more reliable and more safe. The physical laws behind rock climbing have not changed, but engineers have found ways to make safer and more reliable gear to help prevent a climber from falling. Rock climbing is all about physics. The main aspect of rock climbing is gravity. Gravity is what every rock climber faces every time they scale a wall. There are several forces involving rock climbing andRead MoreDescriptive Essay About Seneca Rocks1285 Words   |  6 PagesHills Among the Blue-Ridge Mountains in West Virginia, Seneca Rocks remains a place that values preservation of nature, its history, a family-oriented environment, and the safety and well-being of those who visit. I have visited Seneca Rocks at least three times in my 18 years and it is a very common place in my hometown, therefore, my personal experience helps me determine its values. â€Å"Seneca Rocks is a bare white sandstone sheet of rocks with sheer cliffs, towering 900 feet above the surroundingRead MoreMount Everest And The Sherpa s1359 Words   |  6 Pagesto rise about one-third of an inch per year. Mount Everest is the most grueling, exhausting, and dangerous peak on the planate. Climbing Mount Everest is not an easy job. On the mountain climbers are losing at winds of up to 200 miles per hour and temperatures as cold as negative 73 degrees Celsius. The avalanches are frequent as are fallings rocks and crevices are broad and profound as the football field. Then there s the biggest danger of them all . The death spot located at 26Read MoreTourism And Outdoor Tourism1487 Words   |  6 Pagesrepurposed in order to bring in more people and money. Visitors to the parks are not only interested in viewing these natural wonders. Recreation is a major part of the National Park Service. Visitors flock to the parks for camping, backpacking, climbing, hiking, watersports, and base jumping among others. Originally, the Organic Act stated that people were to simply be visitors and that the parks should be devoid of human influence. This idea ignored that in areas like Yellowstone, Grand CanyonRead MoreEssay best friends1221 Words   |  5 Pagesoffered to take me rock climbing up at Indian Hills, I was thrilled but timid. Waiting with anticipation I could hear the sound of his car coming, it was distinct in its own way because the muffler was on its last leg. He arrived in style, no not really. The paint of his car was peeling off and the smell of the exhaust filled the air with a horrible aroma. Every time I got in his car I felt embarrassed, but it was all right because he was the only one who could drive. As we started up the 225 HighwayRead MoreMountain Mountains On The Planet1486 Words   |  6 PagesMountain climbing in Alaska When I hear a person talk about the great state of Alaska, I wonder what he or she would say about it. Is it the endless mountain ranges covered with snow, or could it be the frigid temperatures? The state of Alaska has mountains as far as the eye can see. If you have ever climbed to the top of a mountain, you know how exciting it can be once you have reached the top. Especially, when it is your first experience climbing the face of any mountain and you do not know whatRead MoreMy Experience With My Family Trips1120 Words   |  5 Pagestrip planned arose a new level of anxiety. Until this trip, I have never traveled to a place far from society and slept within the pure darkness of the night. The adrenaline rush of hunting to find a safe space for shelter, hanging a bear bag, and climbing the cliffs of Red River Gorge was an experience I did not expect; however, my father, brother, two other family friends, and I conquered this expedition I have only heard stories off, backpacking . My experience backpacking led me to a deeper connectionRead MoreSummary Of I m Crazy 1087 Words   |  5 PagesI m crazy. Lollusuwe said. I m climbing for something that probably doesn t exist. Wow. I almost fell. He said scared. Climbing the most highest mountain in Zaumtia...the boss better be happy. And I hope this project goes well. Nelunwov couldn t exist. A man who is that powerful could have never been alive. Especially, how the stories went. How he caused so much chaos. It s so cold and the temperature is unbearable. Ugh...I should catch my breath. He paused for more energy.

Wednesday, May 6, 2020

Social Exposure And Through Important Life Events

Question 1: Faith inculcation can work in many different ways, but the main two are by social exposure and through important life events. If asked, anyone will say their faith was influenced by either important figures in their life or an event that caused them to look at the world differently. My belief is that there is no one way that someone gains his or her view of faith. It can be influenced by countless conditions in which a single person experiences. Furthermore, when it comes to religion, there are two kinds of people, those who have an overtime transformation of their current faith or a sudden conversion of faith. To begin with, the first type is those who have been accustomed to his or her faith their whole life. For example,†¦show more content†¦Is there a god that will take me in after I die? Does he judge me everyday based on the things I do? This made me rethink my life and why I believe what I do. For others, it may be an event that causes them to become clos er to the god they already believe in. An example is getting married or having a child. These events allow people to praise the god they worship and give thanks for doing something amazing in your life. Augustine (1997) states that, â€Å"My faith, Lord, shall call on Thee, which Thou hast given me, wherewith Thou hast inspired me, through the Incarnation of Thy Son, through the ministry of the Preacher.† This quote shows that the faith in which Augustine has is based solely on God having given it to him. Also, in book one, Augustine states, â€Å"but how shall they call on Him in whom they have not believed? Or how shall they believe without a preacher?† Augustine brings up an interesting point about how can a person call upon God when that person has never believed in him or does not have someone to guide them to God. This reinforces the idea that when faced with a life altering experiences, we as humans search for something bigger to believe in. We all want to belie ve there is something after life. Which has caused many people to turn toward having faith when there is nothing else to turn to. Question 2: As Augustine reflects on his childhood in book one, he explains how he believes in original sin because of how he has seen children envy Social Exposure And Through Important Life Events Question 1: Faith inculcation can work in a variety of different ways, but the main two are by social exposure and through important life events. If asked, anyone will say their faith was influenced by either major figures in their life or an event that caused them to look at the world differently. My belief is that there is no one way that someone gains his or her view of faith. It can be influenced by countless conditions in which a single person experiences. Furthermore, when it comes to religion, there are two kinds of people, those who have an overtime transformation of their current faith or a sudden conversion of faith. To begin with, the first type is those who have been accustomed to his or her faith their whole life. For†¦show more content†¦Is there a god that will take me in after I die? Does he judge me everyday based on my actions? This event forced me to think more critically about the faith that I wanted to be associated with. For others, it may be an event that causes them to become closer to the god they already believe in. An example is getting married or having a child. These events allow people to praise the god they worship and give thanks for doing something amazing in their life. Augustine (1997) states that, â€Å"My faith, Lord, shall call on Thee, which Thou hast given me, wherewith Thou hast inspired me, through the Incarnation of Thy Son, through the ministry of the Preacher.† This quote shows that the faith in which Augustine has is based solely on God having given it to him. Also, in book one, Augustine states, â€Å"but how shall they call on Him in whom they have not believed? Or how shall they believe without a preacher?† Augustine brings up an interesting point about how can a person call upon God when that person has never believed in him or does not have someone to guide them to God. This reinforces the idea that when faced with a life altering experiences, we as humans search for something bigger to believe in. We all want to believe there is something after life. Which has caused people to turn toward having faith when there is nothing else to turn to. Question 2: As Augustine reflects on his childhood in book one, he explains how he believes in original sin because of how

Tuesday, May 5, 2020

Service Delivery Models of Cloud Computing †MyAssignmenthelp.com

Question: Discuss about the Service Delivery Models of Cloud Computing. Answer: Introduction: In the process of evaluating the implementation of the project on the migration of critical IT apps and sources of data to an external cloud in Aztec, the comparison will be made between different service providers and through negotiating, issues relating the law will be resolved. The standard regular act of cloud computing is to choose service provider available in the market by the offers they are given. IT does not support the negotiating philosophy. This contract will be open to cloud computing system prospective customers. Cloud computing has a nature that that opens a way for additional reviewing to ensure standard contract which is unique from the conventional internet service system (Martson et.al, 2011). The customers present in the contract direct particular attention to their legal duties and rights in the presence of any breach in the service system (George Kumar, 2015). The cloud is a powerful media to facilitate the outsourcing of the infrastructure that is vital too. Interruption to the infrastructure can result in broad-ranging effects which is the reason why allocations of the liability should be taken in light of standard limitations for the stakeholders with responsibility. The service providers and the customers should go through the contract terms regarding the security risks till any issue happens about particular security related to the cloud system (Gangwar Date, 2016). Aztec is a re-known established financial service organization which deals with millions of dollar transactions and thus is therefore exposed to numerous risks that are common to conservative groups. The organization takes great care of the protection of the integrity and integration as well ensuring availability of its information data (Kousalya, Balakrishnan Raj, 2017). The organization (Aztek) has an intention to migrate its critical IT operations and data sources to an external cloud hosting solutions. Since it is an enterprise, cost saving is seen as a highly important driving factor behind the idea of the Aztek movement of its critical operations to the cloud. But migrating the project requires being evaluated critically for risks and vulnerabilities associated with the cloud computing in the line of legal, market picture and complying frameworks of Australia. The data handled by Aztec is highly sensitive and confidential since the company is a financial services firm. There s hould be an extensive thought process undertaken in each stage a decision is made by the management of Aztec specifically if the decision is focusing an IT project that can involve working or exposing sensitive information. This type of decisions can expose the company to high risks and vulnerabilities. A single mistake in the data security can cost Aztec huge problems regarding money, reputation, compliance and can impend penalties from the government regulators (Kshetri, Fredriksson Torres, 2017). Despite the Australian government encouraging the movement of the IT assets of corporate or non-corporate companies to cloud specifically for purposes of cost saving, the case study (Aztec) need to conduct a review on the migration of cloud computing project thoroughly via the following lines: In the basis of the Commonwealth procurement rules, would the suggested cloud shifting be of value for the organization's money? Will the project be in line with the rules as they are in the protective security frameworks? Do all the apps need to be shifted to the cloud? Through means of cloud computing, companies are enabled to access convenient access to a network that presents a range of computing assets like networks, services, storage services and many others which can fast be provision are availed once required. The key features of the cloud-based infrastructure include: Self-provision of services according to customers' demands. Use of services is monitored based on pay per use model and is transparent to the client. The services offered are available on the internet and can be accessed from across many places. Cloud computing based resources can be concentrated in one area and shared to many users The cloud services are provided through three types of service models which are PaaS, SaaS, and Iaas. Aztek will be provided with the possibility to use software applications from the external hosting party, which is executed based on the infrastructure of the cloud, for instance, a web-based e-mail (El-Gazzar, Hustad Olsen, 2016). The external provider manages the infrastructure and Aztek will be charged according to the usage of the services. Current IT practices at Aztek Corporation At present, Aztek maintains all of its IT applications and on its own internally, which openly shows its security posture as being within a closed perimeter. To access information on the organization resources is a must that one should have a connection to the company's network which is managed and run by Aztek IT specialists internally (Mann Shah, 2017). Also for the organization's staff who work remotely, or for customers who want to access resources from the company, authentication mechanisms are highly employed to ensure that the people who access the information and company's resources are legalized. The process gives Aztek a huge boost in ensuring its resources are more secure since the security framework will be run through the company's own will (Khajeh-Hosseini, Greenwood Sommerville, 2010). However, this type of safety posture has some dangers but presents the organization with surety that their data will be secure in their own hands rather than other parties. Aztek being a financial service provider to a large number of customers should tread carefully about the safety of the information that they hold and if it would be reasonable migrating their IT applications to an outside provider (Adamatzky, 2017). In case Aztek opts to migrate its IT information assets like apps and database, the type of threshold that the cloud migration will experience on the company's security posture will highly rely on the kind of service model and the model deployment that Aztek will decide to embrace in its operations (Buzin, Fournier Arcushin, 2013). Going to a public cloud model and community cloud model implementation will expound on the security perimeter of the company to the cloud infrastructure provider because they will be overseeing the infrastructure and thus the organization will also incorporate the resources of the service provider in its operations. Migrating critical IT applications and resources at Aztek will increase the company's obligations and thus should take all this into account before the adoption of the project. The duties will involve, reporting, SLAs, arrangements, networking security among many others which will be communicated to Aztek during the period of contract of cloud migrating project (Subashini Kavitha, 2011). The company will now involve more parties in its operations when deciding on issues and this can drag the process of decision-making within the organization (Sturm, Pollard Craig, 2017). By taking the critical information technology applications to an external provider, the organization will be laying practical customers information to a third party which breaches it and pose threats to confidential data. The responsibilities to maintain security in this project should be deliberated and shared between the hosting party (provider) and the customer who is Aztek Corporation. Hosting critical information such as payroll data of staff or clients' account details and personal information on the external cloud can put the organization in great danger of data theft and attacks. The security responsibility sharing agreement between the organization and the provider becomes vital on this occasion so that each party can act at maximum security in its area of delegation. The public can be the likely choice if Aztek wants to move information which should be availed for public use and bears lower risks. Public cloud infrastructures are well equipped with adequate security measures compared to others, and this information in it has small risks. Therefore, this project may improve the security measures related to infrastructure when compared to the current security posture of the organization (Ramgo vind, Eloff Smith, 2010). A community-based cloud can have chances for applications that have a medium level of risks since it has features similar to those of a public cloud while upgrading the security requisitions. Systems that handle high-risk information for instance customer account information cannot be safe in the hands of a public or a community cloud because it can easily result in loss of control over the organization information security and infrastructure (Ward et.al, 2010). Thus, the anticipated migration of cloud computing and other critical IT applications at Aztek can be at high risk to company's management because the underlying security risks which can lead to loss of customers' data and tarnish the organization's picture. A private cloud remains the best option for the company because the level of sensitivity of the information dealt with aids reduces the security risks and challenges at the same time opposing the effects of the existing security posture. Benefits of cloud computing in security terms When taken to a larger scale, all types of security measures starting from the minimum size to the larger one become less expensive and therefore, similar investments result to an improved quality of security level. Preventive measures such as management of patch, tightening of virtual machines and hypervisors, as well as filtering, are put into consideration too with some locations, edge networks that make the content to be processed of conveyed to the final point nearer to it and within less time which is all scale benefits. A standardized and opened interface is of benefit to managed security service. This interface is provided by a high number of external and private providers of cloud computing systems (Jamshidi, Ahmad Pahl, 2013). It plays a key role in the creation of a more open market in the perspective of secure services availability. Reallocation ability for resources used in authentication, shaping, traffic, filtering, and encrypting dynamically specifically for issues such as DDoS attack is surely a merit for the resilience of the moving cloud computing applications (Williams, 2010). A devoted, pay per use representations of a virtual machine can be availed by the cloud computing service provider which also adopts the virtualization philosophy is done through a taking a forensic analysis of the infrastructure online. The cloud computing system comes with a low-cost method of logging with no compromises to the level of quality of the service offered by the cloud. Threats, vulnerabilities and consequences Risk assessment is evaluating the possibility of disaster phenomenon which is measured against the adverse effect (Mather, Kumaraswamy Latif, 2009). The adverse effect is also estimated. The threshold of every incidence and its impact on an organization can be given by skilled human resources in that field and is important for an organization or cloud provider designing a given cloud model. The assessment of the risks likely to be faced by Aztek in the anticipated project is given on a scale of 0 to 8. The scale implies; In a cloud system, the clients always make an effort of gaining control from the CP or the hosting party regarding some problems that can adversely impact the cloud computing security system (Mohapatra Lokhande, 2014). However, the SLAs at other times are unable to avail the same for the provider. This is where a change in security breaching of defense system occurs. The probability of the risk occurring is very high as well as the risk. Security posture impact Very high in SaaS Low in SaaS Effect Very high Vulnerabilities v Insufficient standards of solutions and technologies v Poor role of divisions and adoption v Difficulties in measuring up to the set or promised obligations externally to cloud computing v Numerous data centers in many places hence low transparency v Ownership of resources become hard to decide. Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Failure as a result of migration of resources Cloud computing systems are identified through their ability to share as well as the ability to hold many parties together. The risk associated with this is highly linked with failure occurring in the cache, separation system, routing, storage and relation between many tenants which is also referred to as guest hopping attack (Gatewood, 2009). The risk is high. Probability of risk occurring Low in a private cloud Medium in a public cloud Impact Very high Vulnerabilities v VMs hypervisor vulnerabilities v An organization cannot change its reputational isolation v Possible attacks on cloud networks due to hacking posed by the high number of people within the network Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Agreement of management interface The implementation of the project brings a compromise on the customer interfaces and management within a cloud which open and has broad access to resources via the internet. Here, the risk is accumulated if dangers of remote access and web browser are merged (Aceto et.al, 2013). The risk under this is medium. Probability of risk occurring Medium Impact Very high Vulnerabilities v Giving management console remote access v Poor management of system patches and problems with the migrated cloud applications Consequences v Possible loss of staff personal information v Low service delivery v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data Risk Medium Possible malicious nature within the cloud It is among the top threats for cloud computing, and thus the providers or cloud designers should take the role of designing the cloud in a manner that system administration and security management service is well functioning. It is possible for clients to shift the risks involved here to the cloud provider. The risk possibility is high in this threat. Probability of risk occurring Medium Impact Very High Vulnerabilities v Lack of proper implementation and definition of roles v No appropriate processes for handling physical and information security v Data processing is not encrypted v Main security officers have no separate application to monitor the cloud system Consequences v Low service delivery v Loss of customer trust v Possible loss of staff personal information v Bad picture of Aztek in the market due to loss of customer data Risk High Risky and partial deletion of data The risk here occurs when a request to delete data from the cloud is made because the deletion made through the cloud does not truly delete the data from the system (Sripanidkulchai et.al, 2010). Fast data deletion is unachievable and undesirable for a customer because the time needed for the action through the cloud cannot be accessible and thus there may be difficulties in freeing up space. This risk is medium in cloud computing. Probability of risk occurring Medium Impact Very high Vulnerabilities v Cloud system is not able to conduct a sensitive cleaning of media and devices. Consequences v Possible loss of personal critical information Risk Medium Difficult in protection of data Both the customer (Aztek) and the external cloud provider faces numerous risks for data protection. The problem becomes bigger if an organization or customer is also a data controller in checking and providing a means of handling the data legally. The risks are most prevalent when data is routed by several transfer methods such as clouds (Carroll, Van Der Merwe Kotze, 2011). To reduce this, some cloud providers give their policies and procedure to be followed when handling data. The risk involved here is high, and so is the impact they cause. Probability of risk occurring High Impact High Vulnerabilities v Lack of transparency in data center sited in some jurisdictions in their information Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Data security From the view of the risks assessed in the preceding part above, it can be suggested that with the knowledge of the possible risks related to data security, migration of critical IT services and applications at Aztek should be outsourced to three differing cloud service providers. Each of the providers should avail a unique model of service and host some different type of apps (Boampong Wahsheh, 2012). It will help reduce concentrating data in a sole provider and therefore the risk of losing data will be significantly reduced. When this is implemented, services can be joined through a way of federated management identity solution. This type of model is referred to as the federated cloud. Through this model, the cloud provider will give the cloud infrastructure as SaaS model which will be used for apps like email systems, desktop applications, and message. The centers of the data will be located in different areas across the globe to enable access to data from a wide range to the organization's customers. The other provider will be providing services like availing PaaS model that will involve housing the development and launching of custom apps. These apps will be used by the organization to improve on the means of providing services in the financial sector with the long-term goal being the increasing quality of services and productivity (Mohapatra Lokhande, 2014). The last service provider will provide cloud infrastructure for supporting apps and source of data like human resource CRM, finance, accounting among others through IaaS model. At the start, the company would be liable for controlling the devices of danger recovery, and continuity of an enterprise for the apps moved to PaaS and IaaS models through the means of current infrastructure. For the apps moved by use of SaaS model, the external provider will be answerable for continuity of the company and support of data and services for a specified period. The medium and long-term disaster is recovering, and backup services can be purchased for the cloud providers in each model. Conclusion Aztec is likely to witness an efficient, scalable and reliable management solution in its operations if it migrates its critical IT applications and services to the three service providers. The organization has a high chance to achieving its objectives and expounding its services to more marginalize locations. For management purposes, and the internal direct solution may not be a good choice for the organization since it will add on to the responsibilities within it. The company should go a solution that would provide one sign on or off a unison of all directory services, which only one app and interface of any kind that the management requires. The application should help establish a safe managing of encrypted signs and keys and push for the right access to control policies. A solution that presents users of cloud computing systems including the customers, employees, etc. and be in line with requisitions and security policies of Aztek would be needed in future. References Aceto, G., Botta, A., De Donato, W., Pescap, A. (2013). Cloud monitoring: A survey.Computer Networks,57(9), 2093-2115. Adamatzky, A., Akl, S., Burgin, M., Calude, C. S., Costa, J. F., Dehshibi, M. M.. Margenstern, M. (2017). East-West paths to unconventional computing.Progress in Biophysics and Molecular Biology. Boampong, P. A., Wahsheh, L. A. (2012, March). Different facets of security in the cloud. InProceedings of the 15th Communications and Networking Simulation Symposium(p. 5). Society for Computer Simulation International. Buzin, M. S., Fournier, F., Arcushin, S. (2013). FIspace Design and Release Plan. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011(pp. 1-9). IEEE. El-Gazzar, R., Hustad, E., Olsen, D. H. (2016). Understanding cloud computing adoption issues: A Delphi study approach.Journal of Systems and Software,118, 64-84. Gangwar, H., Date, H. (2016). Critical Factors of Cloud Computing Adoption in Organizations: An Empirical Study.Global Business Review,17(4), 886-904. Gatewood, B. (2009). Clouds on the information horizon: how to avoid the storm: cloud-based solutions, such as web-based e-mail, have many advantages. But organizations must be aware of the compliance issues related to storing their information outside of their own control.Information Management Journal,43(4), 32-37. George, J., Kumar, V., Kumar, S. (2015). Data Warehouse Design Considerations for a Healthcare Business Intelligence System. InWorld Congress on Engineering. Jamshidi, P., Ahmad, A., Pahl, C. (2013). Cloud migration research: a systematic review.IEEE Transactions on Cloud Computing,1(2), 142-157. Khajeh-Hosseini, A., Greenwood, D., Sommerville, I. (2010, July). Cloud migration: A case study of migrating an enterprise it system to iaas. InCloud Computing (CLOUD), 2010 IEEE 3rd International Conference on(pp. 450-457). IEEE. Kousalya, G., Balakrishnan, P., Raj, C. P. (2017). The Hybrid IT, the Characteristics and Capabilities. InAutomated Workflow Scheduling in Self-Adaptive Clouds(pp. 199-221). Springer International Publishing. Kshetri, N., Fredriksson, T., Torres, D. C. R. (2017).Big Data and Cloud Computing for Development: Lessons from Key Industries and Economies in the Global South. Taylor Francis. Mann, A., Shah, P. J. (2017). Framework for Analyzing Security Issues in Business Intelligence and Analytics in Cloud. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. (2011). Cloud computingThe business perspective.Decision support systems,51(1), 176-189. Mather, T., Kumaraswamy, S., Latif, S. (2009).Cloud security and privacy: an enterprise perspective on risks and compliance. " O' Reilly Media, Inc.". Mohapatra, S., Lokhande, L. (2014). Cloud Computing and Social Commerce. InCloud Computing and ROI(pp. 41-65). Springer International Publishing. Ramgovind, S., Eloff, M. M., Smith, E. (2010, August). The management of security in cloud computing. InInformation Security for South Africa (ISSA), 2010(pp. 1-7). IEEE. Sripanidkulchai, K., Sahu, S., Ruan, Y., Shaikh, A., Dorai, C. (2010). Are clouds ready for large distributed applications?ACM SIGOPS Operating Systems Review,44(2), 18-23. Sturm, R., Pollard, C., Craig, J. (2017).Application Performance Management (APM) in the Digital Enterprise: Managing Applications for Cloud, Mobile, IoT and eBusiness. Morgan Kaufmann. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Ward, C., Aravamudan, N., Bhattacharya, K., Cheng, K., Filepp, R., Kearney, R.... Young, C. C. (2010, July). Workload migration into clouds challenges, experiences, opportunities. InCloud Computing (CLOUD), 2010 IEEE 3rd International Conference on(pp. 164-171). IEEE. Williams, M. I. (2010).A quick start guide to cloud computing: moving your business into the cloud. Kogan Page Publishers.