Sunday, May 24, 2020
F. Salinger s The Catcher s The Rye - 1614 Words
The novel most commonly found on psychopaths shelves, also the best novel read in class. The Catcher in the Rye is a novel commonly found on psychopathsââ¬â¢ shelves and no one has ever found out why. It is a remarkable novel that has been banned in the past but is also studied today in schools around the world. In Mr. Capilongoââ¬â¢s grade 9 AP English class, three novels were read following the theme of ââ¬Å"The teen experienceâ⬠: To Kill a Mockingbird, by Harper Lee, The Catcher in the Rye by J.D. Salinger, and The Chrysalids, by John Wyndham. The class enjoyed reading all three novels but when asked to think about which of the three novels is the best it became clear that the best novel is The Catcher in the Rye by J.D. Salinger. Out of the threeâ⬠¦show more contentâ⬠¦The way Holden explains the things he finds interesting and uninteresting gives the reader a good sense of his personality (Page 2 ââ¬Å"If thereââ¬â¢s one thing I hate, it is the movies. Do not even mention them to me.â⬠) Holdenââ¬â¢s use of phrasing lets the reader und erstand his changing emotions easily. Another example is in chapter 14: Holden feels depressed after Sunny leaves and thinks about his dead brother Allie. ââ¬Å"It was not that I didnââ¬â¢t used to take him with me when I went somewhere. I did. But that one day, I didnââ¬â¢t.â⬠From this, it is clear that Holden has regrets about things he said or did to his younger brother before he died; thus showing that Holden is not only an angry teenage boy who is flunking school but he can be sweet and has a soft spot for his siblings. It is clear that the author has taken some time to develop Holdenââ¬â¢s personality in depth and to show him feeling a variety of emotions. To further prove this, on page 211, Holden says ââ¬Å"I was sort-of afraid sheââ¬â¢d fall off the goddam horse [â⬠¦] if they want to grab the gold ring, you have to let them do it and not say anything. If they fall off, they fall off.â⬠This shows character growth (from angry at life to a beginni ng of acceptance) which is crucial in this type of novel. J.D. Salinger goes past creating a complex character, he makes the character grow and
Wednesday, May 13, 2020
Persuasive Essay On Juveniles - 961 Words
Hey, do you ever look around your neighborhood and wonder why you see so many Teenagers are on the streets in Gangs, selling drugs, and going to jail? There are many reasons why these teenagers are on the streets and not in school. Maybe it because Many people donââ¬â¢t see teenagerââ¬â¢s as young children no they see them as Adults. In Fact, there is an absolutely argument within the juvenile justice system, on whether or not they ought to place emphasis on supplementary on therapy or punishment on teenagers. Personally, I think that world has given up on these young children instead of trying to help them. Giving a teenager punishment and therapy may not always help I may also cause more of the problem. To resolve the problem of Teen Violenceâ⬠¦show more contentâ⬠¦There are many cases where a teenager has been charged as an adult for minor crimes. For example: A few years ago, a young 16 boy got 15 years in an Adult person for shooting and robbing an ice cream vender. Instead of trying to figure out why the young male did what he did or giving him a chance to go to juvie. The court decided to make an example of the of this young boy and send him right to jail. The court donââ¬â¢t realize that by sending this young boy to an adult is going to mess his life up more it not only going to show him that the court system is not fair but also that thereââ¬â¢s no life for him outside of jail for him. This young man will not be able to get a job when he gets out, His childhood will be basically over and thereââ¬â¢s no future for him and he will be back on the streets robbing again. I personally I say if this court had a heart and listened to this young man and tried to figure out why he robbed the ice cream vender maybe the young man was hungry or maybe he was forced by a gang or something there are many reasons why he did it and maybe if he was sent to juvie he would at least get a chance to at least learn from his mistakes and see that he doesn ââ¬â¢t he donââ¬â¢t want to live a life of criminal and better future. There are now influences that aShow MoreRelatedJuveniles Getting Adult Jail Sentences: A Persuasive Essay1526 Words à |à 6 PagesJuveniles getting Adult Jail Sentences Should juveniles get adult jail sentences? In todays society juvenile offenders are facing the law to full force, in two court systems. Not only are they tried in the juvenile justice system, but also charged as adults. The issue of charging juveniles as adults has stirred various views owing to the violent crimes committed by the young offenders. Politicians comment that the best solution is to lock up juvenile offenders for a long time and ignore rehabilitationRead MoreAnnotated Bibliography On Juvenile Crime And Sentencing1510 Words à |à 7 Pages Skip Hollandsworth candidly explores the subjects of juvenile crime and sentencing in the electronic long form newspaper article, ââ¬Å"The Prisonerâ⬠. The purpose of the essay is to inform the reader about juvenile sentencing and to persuade the audience that there are clear problems with aspects of the U.S. prison system. The article is easily accessible to a large audience because it is online. Hollandsworth takes into accoun t that his audience, mostly consisting of Texas Monthly readers, may alreadyRead MorePersuasive Essay On Obesity1085 Words à |à 5 Pagesself-responsibility from the people themselves. They both have an opinion as to what the cause of obesity in America, but Zinczenko has the better argument. Through the use of real-life examples, refutation, and sound logic/reasoning Zinczenko writes a more persuasive piece than Balko. Zinczenko uses real-life examples to strengthen his argument. He constructs his writings in a way that makes the reader feel for his opinion and credits himself by relating to the topic. His perspective on the topic is feltRead MoreThe Freedom Writers And Romeo And Juliet905 Words à |à 4 PagesCentury Community Charter Middle School and Animo Inglewood High School. Every year in middle school and in High School english would be on my schedule, sometimes even with two different english classes a year. We read different writing pieces, wrote essays, and learned techniques that help us develop our reading and writing skills. In middle school the writing tasks were easier and funner than high school. We read books like the Diary of Anne Frank, The Freedom Writers, and Romeo and Juliet, that IRead MoreSchool Uniform Persuasive Essay by Javairia Haq764 Words à |à 4 PagesSchool Uniform Persuasive Essay At a school, a child wearing a stained ragged-patched up sweat shirt and old tired pants full of disgusting mud stains, she goes to her locker quietly, suddenly after getting out her books, five older students surround her. The oblivious teachers and distracted staff donââ¬â¢t even bother noticing older pupils ridiculing the young girlââ¬â¢s outfit, teasing and tormenting the juvenile girl about her revolting clothes till she criesRead MoreThe Believing Game By Peter Elbow1174 Words à |à 5 PagesBelieving Gameâ⬠In the essay ââ¬Å"The Believing Gameâ⬠by Peter Elbow, he discusses the concepts of taking the emotion out of arguments and using logic by seeing another personââ¬â¢s opinion or ideology through their eyes. Elbow uses ââ¬Å"The Doubting Gameâ⬠as his counter-argument in the essay and speaks of how most humans are naturally conditioned to over-analyze any argument that is presented before them. Elbow, while making some insightful points to the way humans think, presents his essay with too much emotionRead MoreDetroit s Convict Culture Has Shaped The Lives Of Many Young American Men1318 Words à |à 6 PagesIn this essay, I will argue, Detroitââ¬â¢s convict culture has shaped the lives of many young American men in Detroit America. Through using structural power to create systemic interaction among society. By using ideological, economic, political and military power to shape public ideas and values through institutions like Detroitââ¬â¢s detention facility. The detention centre has both positive and negative effects on the convicts, designed to enforced cultural beliefs often different from oneââ¬â¢s own cultureRead MoreShould Vaccines Be Mandatory1492 Words à |à 6 PagesShould Vaccinations be Mandatory? This essay will attempt to investigate the employment of the 23 plus vaccinations used today and how they defend the preventions and spread of diseases. The paper will support the pros and the cons of vaccinations that are supported by research statistics as well as the different symptoms that have been reported for each available vaccine. What is a vaccine? Vaccines have been defined as the development of depleted or killed microscopic organismsRead MorePrison Socialization And The Correctional Institution1188 Words à |à 5 Pagesaction against inmates is usually the primary instrument used by corrections officers to ensure harmony in the prison environment. These actions are vital for correction staff, as this shows the prisoners adaption to the correctional system. This essay will define and distinguish between these two models of imprisonment. Importation Model The term importation model was first coined in the 1960s by Donald Cressey and John Irwin who contested the current indigenous origin/deprivation models by proposingRead MoreAdvertisements For Sales Promotion : An Advertisement2514 Words à |à 11 PagesStudentââ¬â¢s Name: Professorââ¬â¢s Name: Course: Date: Advertisements Introduction Advertising is form of communication that is directly invoked in passing critical messages to the target audience. It is also termed as a promotional mode that has persuasive instincts of swaying buyers to a given direction. Therefore, advertisements for sales promotion are destined to orient the thinking and perception of buyers to a given product. While there are different forms of advertising, the main message expressed
Wednesday, May 6, 2020
Relationship Between Teacher And Students Free Essays
string(121) " the acquisition procedure when they internally build cognition by interacting with the environment \( Yilmaz, 2008 \) \." Similarly harmonizing to Moloi et Al. ( as cited in Mtika A ; Gates, 2010 ) , group work is one of the schemes that can be utile in student-centered attacks. It does non merely assist pupils to discourse and portion thoughts with each other, but it besides helps to better pupils ââ¬Ë apprehension of some constructs and develop their communicating accomplishments. We will write a custom essay sample on Relationship Between Teacher And Students or any similar topic only for you Order Now In the student-centered schoolroom, the instructor has to believe of pupils ââ¬Ë demands and the schoolroom is considered as a topographic point where pupils work together, in groups and as persons by promoting them to take portion in the acquisition procedure all the clip ( Jones, 2007 ) . In the student-centered schoolroom, the instructor should cognize about their pupils ââ¬Ë background. Teachers should see what they may cognize or make non cognize about their pupils because it helps to make the schoolroom conditions that are antiphonal to the larning demands of the pupils ( Hodson, 2002 ) . Furthermore, in societal constructivist classrooms the relationship between instructor and pupils are much more dynamically involved, so that the instructor ââ¬Ës function is much more demanding to let and actively promote acknowledgment, rating, and Reconstruction ( Gunstone and Northfield every bit cited in Hand et al. , 1997 ) . A A A A A The size for effectual student-centered schoolrooms can be organized into big group ( category with 25-30 pupils ) , average size ( 5-8 pupils ) , little group ( 3-5 pupils ) , pair group ( 2 pupils ) and a instructor and a pupil ( merely in particular status ) ( MoEYS, 2002a ) . Furthermore, schoolroom agreements, particularly classroom infinite and resources like chairs and tabular arraies for big group activities are besides of import because appropriate resources helps to back up the effectivity and efficiency of direction to the pupils. 2. 4 Definition of the Student-Centered Approaches to Learning A A A A A A The footings ââ¬Å" student-centered attacks â⬠A and ââ¬Å" learner-centered attacks â⬠A to larning are the same and whilst some articles used the term student-centered attacks and other articles used the term learner-centered attacks, the two footings were used interchangeably. Both footings focus on the demands of pupils who as scholars are actively involved in the acquisition procedure ( Utecht, 2003 ) . The term ââ¬Å" student-centered attacks â⬠is used in this survey because this term is officially applied in Kampuchean course of study and ministry educational literature. Furthermore, the student-centered attacks are broader for illustration, a pupil can be defined as scholar, but a scholar may non be defined as pupil. For illustration, a adult male wants to cognize about the educational jurisprudence in Cambodia, so the adult male can travel to library or seek in the MoEYS web site to read and larn about the jurisprudence. The adult male therefo re is non a pupil, but he is a scholar. A A A A A A The student-centered attacks to larning are defined as learning methodological analysiss associated with an attack to larning where pupils are the chief characters in the acquisition procedure, and actively larn in a socially synergistic manner ( Brush A ; Saye, 2000 ) . The student-centered attacks are designed to help pupils to larn best from meaningful life experiences, societal interactions, and scientific experimentation ( Pedersen A ; Liu, 2003 ) . A A A A A A The student-centered attacks to larning focal point on single pupil ââ¬Ës demands and growing, because these attacks are intended to develop the potency of every single pupil and promote their personal growing and involvements ( Morris, 1996 ) . The student-centered attacks are besides considered effectual options to the traditional teacher-centered attacks. Similarly harmonizing to Courtney ( 2008 ) , it looks really different from the traditional didactic instruction methods that are widely applied in Cambodia. These traditional instruction methods depend on the direct direction of the instructor and verbal and written repeat with small accent on understanding but strong accent on memory and callback. Kember ( as cited in Oââ¬â¢Neill A ; McMahon, 2005 ) and Hirumi ( 2002 ) stated the student-centered attacks are in contrast to the traditional teacher-centered attacks. In the teacher-centered attacks, instructors are at the centre of the acquisition and learning p rocedure and supply direction to pupils ; the pupils are the empty vass into which the instructor pours their cognition. This position contrasts aggressively to that of constructivist theory where we see that pupils are cardinal to the acquisition procedure, they are non viewed as empty vass but instead actively take part in doing cognition by believing and work outing jobs for themselves, and developing their self-pride that is indispensable for larning and decision-making throughout life ( American Psychological Association, 1993 ; Hirumi, 2002 ; MoEYS, 2005 ) . A A A A A A The nucleus rule of the student-centered acquisition attacks is that pupils have different abilities, demands, and involvements for how they learn, and they construct cognition and significance and learn in different ways ( Brady, 2006 ; Murdoch A ; Wilson, 2008 ; Hirumi, 2002 ) . The American Psychological Association ( 1993 ) stated that pupils have assorted capablenesss and involvements for acquisition. ââ¬Å" Persons are born with and develop alone capablenesss and endowments and have acquired through acquisition and societal socialization different penchants for how they like to larn and the gait at which they learn â⬠( American Psychological Association, 1993, p. 9 ) . Harmonizing to Meyer A ; Jones ( as cited in Hirumi, 2002 ) , in the category pupils talk, listen, write, read, and reflect on content, thoughts, issues, and concerns in order to build their ain significance. ââ¬Å" In student-centered environments, scholars are given direct entree to the kn owledge-base and work separately and in little groups to work out reliable jobs ( Hirumi, 2002, p. 506 ) . Similarly, harmonizing to Jones ( 2007 ) , a student-centered category is a topographic point where pupils ââ¬Ë demands are considered, as a group and as persons, and pupils are encouraged to take part in the acquisition procedure all the clip. At different times, pupils may work entirely, in braces, or in groups. A A A A A A As a theory of epistemology, constructivism proposes that pupils bring their existing experiences and beliefs, every bit good as universe positions and their cultural histories, into the acquisition procedure when they internally build cognition by interacting with the environment ( Yilmaz, 2008 ) . You read "Relationship Between Teacher And Students" in category "Essay examples" Constructivism is considered as a procedure that pupils actively construct their cognition upon cognition that they already have ( Motschnig-Pitrik A ; Holzinger, 2002 ) . Social constructivist, Vygotsky believed that ââ¬Å" acquisition is a societal procedure in which scholars developed understanding through interaction with the environment around them â⬠( Brush A ; Saye, 2000, p. 5 ) . Harmonizing to Jonassen ; Duffy A ; Jonassen ( as cited in Brush A ; Saye, 2000 ) , the demand for more student-centered acquisition activities have been promoted by the protagonists of the constructiv ist epistemology of acquisition. A A A A A A In short, the cardinal features of the student-centered attacks to larning stress studentsââ¬â¢A anterior cognition and experience, developing Bloom Taxonomy believing accomplishments, particularly critical thought and job resolution, researching single acquisition demands and involvements, advancing active pupil engagement, and developing motive for life-long acquisition ( American Psychological Association, 1993 ; Brush A ; Saye, 2000 ; Hirumi, 2002 ; Mtika A ; Gates, 2010 ) . However, there is no individual scheme that helps pupils to hold effectual larning all the clip and there is no learning scheme that is better than others in every circumstance. Each learning scheme has its strength and failing, so instructors need to do determinations and chose instruction schemes that help their pupils to accomplish the acquisition results ( Killen, 2003 ) . Similarly harmonizing to Hab A ; Em ( 2003 ) , to take and efficaciously use a instruction scheme the instructor has to judge many times because choosing an appropriate instruction scheme is based on the determination whether we provide knowledge to pupils through direct direction ( teacher-centered attacks ) or indirect facilitation ( student-centered attacks ) . 2. 5 Student-Centered Learning as Adopted by the Kampuchean Ministry of Education A A A A A A 2.5.1 Vision of acquisition and instruction A A A A A A Learning has many manners such as acquisition by seeing, listening, composing, reading, watching telecasting, self-experiment, pattern, believing, playing games, analyze circuits and so on. These manners of larning supply cognition to the scholars. However different larning can hold different consequence. Learners may bring forth different larning results with a different acquisition manner to another pupil ( MoEYS, 2002b ) . For illustration, those who learn by listening will bury all or retrieve a small after several yearss. Those who merely stand and see people swimming can non swim, but if they learn to swim themselves, they can swim efficaciously. Peoples hence can make something when they involve themselves. Harmonizing to Confucianism, it is believed that ââ¬Å" If you tell me, I will bury. If you show me, I may retrieve. But if you involve me, I can make and understand â⬠( MoEYS, 2008 ) . A A A A A A The Kampuchean authorities ââ¬Ës vision of the intents for acquisition and instruction functions has bit by bit changed between societies and from one a period of clip to another ( MoEYS, 2002a ) . Previous learning methods considered effectual and appropriate was when instructors were considered to be the cognition suppliers. Teachers provided cognition and told pupils, and pupils listened to instructors and followed instructors without developing their ain thoughts or understanding. In this context instructors had the power because they had the cognition that pupils needed to be able to come on through the instruction system. This vision was later officially abandoned because the acquisition results were considered unsuitable to both the demands of the state for skilled minds and they compared ill to the wider international educational context. A A A A A A In the undermentioned period, another new learning method was integrated called ââ¬Ëquestion and reply ââ¬Ë method. The instructor raised inquiries and the pupils answered. This method was adopted in the belief that it would convey better consequences for pupils. The inquiry and reply method was subsequently changed and reformed to what was known as the ââ¬Ëactive method ââ¬Ëbecause this method required much relationship between instructor and pupils. For the last vision, it was believed that creative activity merely relationship between instructor and pupils was non plenty. To hold better consequence for pupils, relationship between pupils and pupils must be created in the instruction and acquisition procedure. Teachers have to fix pupils to work in groups, so pupils can interchange their thoughts, work hand in glove, and assist each other in larning. This last vision is a really of import portion of student-centered attacks ( Hab A ; Em, 2003 ; Inspector, 2 002 ; Ung, 2008 ) . These attacks to larning and learning shifted the power repositing of the instructor from one who held all the cognition to a more equal one where instructors spouse with, sometimes lead, their pupils into new understanding and cognition. A A A A A A 2.5.2 Principle and theory A A A A A A Theories that are applied and relevant to learning and larning in the current Kampuchean school system are: Learning is making new cognition Learning is interchanging experience ( Inspector, 2002 ) A A A A A A The theories of larning above are besides clearly identifiable as constructs of constructivism. Although constructivism is non a theory of acquisition, the rules have been applied by many pedagogues in instruction and acquisition, particularly, but non merely, in scientific discipline instruction ( Han et al. , 1997 ; Yilmaz, 2008 ) . Constructivism emphasizes that cognition and significance are constructed by the human head ; in consequence scholars create links between their bing cognition and new experience and do new cognition constructions and significance ( Yilmaz, 2008 ) . A A A A A A The function of instructors and pupils are changed by the acceptance of the student-centered attacks to larning. Students are given greater duty for their acquisition and the instructors ââ¬Ë functions change where they become more coordinators or facilitators of the acquisition experiences. Students are encouraged to research the cognition by themselves and with other scholars and the instructors help the acquisition procedure by demoing pupils waies of cognition. In this new function in the schoolroom, the instructors become portion of the acquisition procedure and acts as a usher and a resource for the pupils ( Utecht, 2003 ) . Furthermore, the importance of school is to supply multiple chances to pupils to make cognition and understanding by themselves through research, existent experience and work outing jobs. How to cite Relationship Between Teacher And Students, Essay examples
Monday, May 4, 2020
Cloud Computing Details and Recommendations
Question: Discuss the requirement for remote administration, resource management and SLA management. Answer: 1.0 Introduction The IT resources in the cloud, that are shared between the end users are needed to be managed and allocated in a manner such that every user can get their required resources whenever they need and in a cost efficient manner. Now to configure, maintain and monitor the resources. All this management issues in cloud systems are maintained by using different mechanisms, such as resource management system, remote administration system, management system of SLA and payment management system. 2.0 Cloud Computing: Details and Recommendations 2.1 SaaS model In the cloud computing there are three models IaaS, SaaS, PaaS. The SaaS is the abbreviation of the software as a service. These solutions include the email management solutions, ERP solutions, or the customer relationship management solutions. As the services provided to the client organization through the internet, user or the client does not have to install any package in their local system. In this model the as the services from the provider is accessed remotely from the organization in the similar way the remote access also facilitates the administrator to control the access ,usage and other administrating monitoring tasks. As an example we can take the case of ACL realtys case study of implementing the SaaS models using the Google cloud services for managing its CRM and the email services. Google provides its own encryption and decryption methodologies to provide a extra layer of security to its cloud services .The Google provides the data store dashboard as a remote administration tool to its clients. Where the console need to have a valid user name and password to login and use the provided services. The administrator can view the data related to the applications provided by the Google cloud services. Also the statistics of composite and built in indexes can be checked from the provided data store dashboard. 2.2 Remote administration In the remote administration of the clouds, this mechanism provides tools like interfaces that are used by both the internal and external administrator to configure and administrate the services of the cloud. The administrative tasks are implemented on the leased resources. There are some typical tasks are to be realized or completed by using the remote administrator interface or the console (Beloglazov et al., 2012). Managing the cloud usage and the costs related to that. Configuring and setting up the services of the cloud according to the business needs o the organization. Managing the corporate users, credentials related to security, authentication. Monitoring the service level agreements and the quality of the services. Tacking the services or the usage by the external or internal clients. Monitoring the capacity of the cloud. 2.3 Remote administration using VPN In case of remote administration of the cloud services using a VPN, it requires networks that can handle dual channels. Because using a VPN channel the normal user data can be sent or received and using the another channel the administrative Packets can be transmitted. The VPN helps the administrators of the corporate organizations to connect the remote branches to the headquarters or the main office in secure, economic way. The main advantage in using the VPN in the remote administration is that, although the data channel can have a problem but the administrator can use the administrative channel can reach the desired machine and work on solving the problem. The administrations through the VPN have some problems and difficulties too. Like if some the machines are local and some of them are remote then there would be no administrator to solve the problems (Alfano et al., 2014). 2.4 Resource management in cloud services In the cloud services, the resource allocation process has a very vital role that ensures the success of the total cloud services. There are different strategies adopted by the provider to manage the resources in the most efficient way. Some of those methods are as follows: Linear scheduling strategy: In this strategy, the algorithm mainly targets to maximize the selected quality of service parameters. The resources are allocated among the users to maximize the QoS parameters. In this strategy, the parameter is cost function (Wu et al., 2013). Pre copy approach: In this approach, the copies of the memory are repeatedly copied from the source machine to the destination host machine. The main drawback of this approach is, it causes delay to the experience of the user (Nguyen et al.,2013). Matchmaking and scheduling: In this approach the method of allocating the job are obtained from the resource pool and in the next step it is determined that how the requested resources will be allocated to the different processes or jobs (Erdil, 2013). Just in time resource allocation: In this resource management technique, it is tried to minimize the idle time for any resources. To do this the time intervals are set to the resources and altering the resources with the change of workload on the clouds (Rasmi Vivek , 2013). 2.5 SLA The SLA is the abbreviation is the service level agreement. It is a contract between the cloud service provider (both internal and external) and the client. It defines the expected services that a user will get from its cloud provider. There are some guidelines that each SLA should maintain to provide the quality services to its clients. 2.6 The business cases that should map to SLA In the organization the IT resources helps in the automation. Therefore, a misaligned SLA can cause problem in the automation process of the client organization. This can also lead to the unreasonable deviation in the provider guaranties. Scope of SLA: The scope of the SLA should be understood both by the provider and by the client organization. Since the cloud services are provided by integrating many layers so it is important to know that to which extent the guarantee applies. Scope of the SLA monitoring: Also in case of monitoring, the agreement should ensure that where the monitoring should be done and where the performance will be measured. Defining penalties or compensation: In case of the provider, fails to maintain the quality of service of the cloud then the provider should compensate the client. This issue also needs to be documented on the SLA. Securing the non measurable requirements: Some client requirements cannot be measured in the usual performance metrics. Like the privacy and the data security issues. When a client is adopting a provider then the provider should maintain a level of privacy security of the data. 2.7 Archiving the SLA data The data acquired by monitoring the SLA should be archived. So that this data can be presented in future for reporting purpose. For the Amazon web services the service level agreement is a policy that governs the use of its cloud services by the client under the terms of its customer agreements. As stated in its site the company tries to make the services available to the users with the uptime of 99.95% monthly. If the provider fails to meet the commitment then the client is eligible for the service credit depending upon some conditions that are stated by the AWS. The uptime in the service is defined by the time amount in which the cloud services provided by the provider is accessible the client or the end user. 2.8 Data backup in the cloud services As the cloud, service providers provide a huge storage space to its clients with the higher computation power. This leads the users to store the data to the clouds, to have the access remote locations. This storage has the problems too. Like if the user data gets destroyed or disappears from cloud by some administrative mistake. To avoid the loss of the data there are different backup and disaster recovery techniques are adopted by the providers. There are several techniques are available for the backup and disaster recovery. Some of them are as follows: 2.9 High security distribution and rake technology This technique utilizes the mechanism process of distributed data transferring under the encryption technology. Three components are mainly used in this method, data centers, supervisory servers and client nodes. The backup sequence and the recovery sequence. When there is a need of back up then the data centers encrypts, scrambles, duplicates the data, and sends Meta data to the supervisory servers (Thomas et al., 2013). In the recovery, sequence the supervisory servers collects the encrypted, fragmented data using the rake reception procedure and then they are merged, decrypted, and as well as descrambled. 2.10 Efficient routing grounded on taxonomy In our research, this technique is not a data backup technique but a data retrieval technique. This technique is completely dependent on the semantic comparison in service requests and descriptions. The ERGOT (AH et al., 2014) use three components i) SON (semantic overlay network) ,ii) DHT(data hash table) ,iii) measure of semantic similarity of the service request and description. 2.11 Cold and hot backup service replacement strategy This recovery process is activated whenever it detects the failure of the services. This technique returns the service compositions dynamically. At the time of implementation of the services, the backup services remains in the active state. 2.12 Shared backup router resources This technique focuses on the cost reduction in the back up of the data. This technique uses the IP address that is unchanged even after the failure of the router. This technique uses the network management system to backup the data (Weiyan et al., 2014). 3.0 Conclusion Due to different security and the implementation flaw the cloud services provided by different providers is exposed to different security as well as loss of data threats. To avoid the loss of data due to this threats and flaws the provider as well as end user or client should be aware. By implementing the proper SLA, use of different backup and recovery techniques can this shortcomings can be avoided, and help the organization grow by properly using the advantages of the IT enabled business services or cloud services. References AH, N. H., Shu, G., Malek, A. G., Zi-Long, J. (2013). An optimal semantic network-based approach for web service composition with qos.TELKOMNIKA Indonesian Journal of Electrical Engineering,11(8), 4505-4511. Alfano, M., Prete, D. D., Michelino, D., Pardi, S., Vela, R., Russo, G. (2014, December). Network Management in Cloud Computing for Public Administration: A Practical Use Case. InProceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing(pp. 768-773). IEEE Computer Society. Beloglazov, A., Abawajy, J., Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), 755-768. da Cunha Rodrigues, G., Calheiros, R. N., de Carvalho, M. B., dos Santos, C. R. P., Granville, L. Z., Tarouco, L., Buyya, R. (2015, July). The interplay between timeliness and scalability in cloud monitoring systems. In2015 IEEE Symposium on Computers and Communication (ISCC)(pp. 776-781). IEEE. Erdil, D. C. (2013). Autonomic cloud resource sharing for intercloud federations.Future Generation Computer Systems,29(7), 1700-1708. Nguyen, H., Shen, Z., Gu, X., Subbiah, S., Wilkes, J. (2013, June). Agile: Elastic distributed resource scaling for infrastructure-as-a-service. InProc. of the USENIX International Conference on Automated Computing (ICAC13). San Jose, CA. Rasmi, K., Vivek, V. (2013). Resource management techniques in cloud Environment-A Brief Survey. Thomas, G., Jose, V., Afsar, P. (2013). Cloud computing security using encryption technique.arXiv preprint arXiv:1310.8392. Weiyan, X., Dong, L., Ming, L., Pengfei, J. (2014). Autonomous Recovery Technique of Software Bus Based on VxWorks Operating System. InProceedings of the World Congress on Engineering(Vol. 1). Wu, Z., Liu, X., Ni, Z., Yuan, D., Yang, Y. (2013). A market-oriented hierarchical scheduling strategy in cloud workflow systems.The Journal of Supercomputing,63(1), 256-29. Younis, M. Y. A., Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey.Liverpool John Moores University, United Kingdom, Tech. Rep. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.
Subscribe to:
Comments (Atom)