gdata.io.handleScriptLoaded({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$georss":"http://www.georss.org/georss","xmlns$thr":"http://purl.org/syndication/thread/1.0","xmlns$blogger":"http://schemas.google.com/blogger/2008","id":{"$t":"tag:blogger.com,1999:blog-913600556879440043"},"updated":{"$t":"2024-01-01T15:38:08.302+05:30"},"category":[{"term":"Data Structures"},{"term":"Vedic Mathematics"},{"term":"My Vlogs"},{"term":"Website Designing"},{"term":"Guest Blogging"},{"term":"Youtube"},{"term":"PPL"},{"term":"Android"},{"term":"Android App Development"},{"term":"High Performance Computing"},{"term":"Socket Programming"},{"term":"Java"},{"term":"Cloud Computing"},{"term":"Unboxing \u0026 Review"},{"term":"Database"},{"term":"OpenMPI"},{"term":"OPENCL"},{"term":"CUDA"},{"term":"LEX \u0026 YACC"},{"term":"Vocabulary"},{"term":"Compiler"},{"term":"Blogging Tips"},{"term":"Networking"},{"term":"Linux"},{"term":"Nanded City Pune"},{"term":"Parallel Computing"},{"term":"SDL"},{"term":"Fedora"},{"term":"Udemy Courses"},{"term":"Dia Software"},{"term":"MPI"},{"term":"Multithreading"},{"term":"Computer Networks"},{"term":"Abbreviations in Computer Science"},{"term":"Salesforce"},{"term":"Lisp"},{"term":"YouTube Tips"},{"term":"MS Excel Formulas \u0026 Functions"},{"term":"C Plus Plus Programming"},{"term":"GATE"},{"term":"Mysql"},{"term":"Google Forms"},{"term":"Wine"},{"term":"Swing"},{"term":"Mathematics"},{"term":"SQL"},{"term":"Amazon Links Summary"},{"term":"Thread Pool"},{"term":"General"},{"term":"Amazon Affiliate Program"},{"term":"How To Write Blog"},{"term":"C Programming"},{"term":"Applet"},{"term":"Selenium Automation Testing"},{"term":"Skill Development Lab"},{"term":"OPENMP"},{"term":"Python"},{"term":"Ubuntu"}],"title":{"type":"text","$t":"Computer Revolution (www.comrevo.com)"},"subtitle":{"type":"html","$t":""},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/-/Cloud+Computing?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/-/Cloud+Computing?alt\u003djson-in-script\u0026max-results\u003d6"},{"rel":"alternate","type":"text/html","href":"http://www.comrevo.com/search/label/Cloud%20Computing"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"generator":{"version":"7.00","uri":"https://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"5"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"6"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-8191617583640633655"},"published":{"$t":"2020-03-27T16:26:00.000+05:30"},"updated":{"$t":"2020-03-27T16:26:13.395+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"}],"title":{"type":"text","$t":"What is Cloud Computing? Service Models and Deployment Models of Cloud Computing"},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; In this post, we will see Basic details of Cloud Computing.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan class\u003d\"style-scope yt-formatted-string\" dir\u003d\"auto\"\u003eWhat is Cloud Computing? Service Models and Deployment Models of Cloud Computing | Basics of Cloud Computing\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan class\u003d\"style-scope yt-formatted-string\" dir\u003d\"auto\"\u003eIn this video, we will see what do you mean by term Cloud Computing. How it became so much popular. What are the service models and deployment models of cloud computing.\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan class\u003d\"style-scope yt-formatted-string\" dir\u003d\"auto\"\u003eSubscribe this channel to get regular updates.\u003c/span\u003e \u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003eWatch following video:\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003ciframe allow\u003d\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen\u003d\"\" frameborder\u003d\"0\" height\u003d\"360\" src\u003d\"https://www.youtube.com/embed/VVZ6D85oXE0\" width\u003d\"640\"\u003e\u003c/iframe\u003e\n\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u0026nbsp;\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003eWatch on YouTube: \u003ca href\u003d\"https://www.youtube.com/watch?v\u003dVVZ6D85oXE0\" target\u003d\"_blank\"\u003ehttps://www.youtube.com/watch?v\u003dVVZ6D85oXE0\u003c/a\u003e\u003c/b\u003e\u003c/span\u003e\u003c/div\u003e\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.comrevo.com/feeds/8191617583640633655/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.comrevo.com/2020/03/what-is-cloud-computing-service-models-deployment-models.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/8191617583640633655"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/8191617583640633655"},{"rel":"alternate","type":"text/html","href":"https://www.comrevo.com/2020/03/what-is-cloud-computing-service-models-deployment-models.html","title":"What is Cloud Computing? Service Models and Deployment Models of Cloud Computing"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https://i.ytimg.com/vi/VVZ6D85oXE0/default.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-1102070227192753232"},"published":{"$t":"2017-10-12T18:30:00.000+05:30"},"updated":{"$t":"2017-10-22T20:25:01.603+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Guest Blogging"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"}],"title":{"type":"text","$t":"Cloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow"},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; A post by\u0026nbsp;\u003cspan class\u003d\"_username\" style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px; white-space: nowrap;\"\u003e\u003cspan class\u003d\"KCE12V-N-a\" style\u003d\"border: 0px; cursor: default; font-weight: bold; margin: 0px; padding: 0px; vertical-align: top;\"\u003eGerard Blokdijk\u003c/span\u003e\u003c/span\u003e\u003cspan style\u003d\"color: #222222; white-space: nowrap;\"\u003e\u0026nbsp;(via\u0026nbsp;\u003ca href\u003d\"http://www.comrevo.com/2017/09/guest-blogging.html\" target\u003d\"_blank\"\u003eGuest Blogging\u003c/a\u003e)\u003c/span\u003e\u0026nbsp;on \"\u003cspan style\u003d\"color: #222222;\"\u003eCloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow\u003c/span\u003e\".\u0026nbsp;\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Go through the following:\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThis checklist will provide you with the 57 fundamental questions you need to ASK to Grow. For practitioners and their organizations, making sure that all Cloud computing essentials are covered, from every angle, is a challenge.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eA Self Assessment is a helpful tool for professionals to get a project started and/or audited. The Art of Service develops Self Assessments that help professionals to do just that.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThe Cloud computing Self Assessment covers numerous criteria related to a successful Cloud computing project, read more at\u0026nbsp;\u003ca href\u003d\"https://store.theartofservice.com/cloud-computing-complete-self-assessment/\" rel\u003d\"nofollow\" style\u003d\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target\u003d\"_blank\"\u003ehttps://store.theartofservice.\u003cwbr\u003e\u003c/wbr\u003ecom/cloud-computing-complete-\u003cwbr\u003e\u003c/wbr\u003eself-assessment/\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIn the Cloud computing Self Assessment, the following questions are the most frequent ones asked.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThe Fundamental Cloud Computing Checklist: 57 Cloud Computing Criteria You Need To Know The Answers To In The Cloud Computing Domain Covering: Cloud Computing, Audit log, Cloud management, Cloud service, Cloud storage, Digital object identifier, Disaster recovery, IT infrastructure, Performance metric, Quality of service, Research and Development, Security event, Sensitive data, Service provider, Systems engineering, Utility computing and Virtual machines:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cb\u003eCloud Computing Critical Criteria:\u003c/b\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHow can a small cloud computing consultancy take advantage of the Federal Cloud Computing Strategy?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat are the key business and technical challenges of transitioning to a cloud computing strategy?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat is the importance of standards-based cloud computing?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs there any recourses about cloud computing performance?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eNetworks that are flexible, well-performing, and secure?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs the market ready yet for P2P cloud computing?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHow does BYOD affect security in the cloud?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat problems does cloud computing solve?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHIPAA and Cloud A Great Match?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat is grid computing?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAudit log Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAre audit logs regularly backed up, secured, and retained for at least three months online and one-year offline for all critical systems?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eMaintain the integrity of audit logs through self-protection and limited auditor access?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCloud management Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHow can you verify that the virtualization platform or cloud management software running on the systems you use, which you did not install and do not control, does not contain malware?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCloud management for\u0026nbsp; do we really need one?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCloud service Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHow quickly can a cloud service provider scale services and capability and is this quick enough for the requirements of the customer/consumer?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhich cloud service model encompasses the complete cloud computing stack?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCloud storage Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDoes cloud storage get affected during a natural disaster how can we ensure a secure disaster recovery for that?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat are the ramifications of cloud storage?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cb\u003eDigital object identifier Critical Criteria:\u003c/b\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAre the data and associated software produced and/or used in the project discoverable (and readily located), identifiable by means of a standard identification mechanism (e.g. digital object identifier)?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDisaster recovery Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAny changes in the status of the location due to the disaster from the local or federal government that should be considered?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWill we rebuild to how things were before the disaster, or do we reset and do some things differently?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat is the best strategy going forward for data center disaster recovery?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat is the current financial position of your business?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat is our definition of recovery point objective?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eHow do we create backups for disaster recovery?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ePostpone purchasing supplies inventory?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat are ideal use cases for the cloud?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ewhat is post-disaster recovery to us?\u003c/span\u003e\u003c/li\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eEquipment in working order?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003cdiv\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIT infrastructure Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat IT infrastructure do we have and what do we need to support the future organisation needs?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cb\u003ePerformance metric Critical Criteria:\u003c/b\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cul\u003e\n\u003cli style\u003d\"line-height: 17px;\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDoes your company have defined information technology risk performance metrics that are monitored and reported to management on a regular basis?\u003c/span\u003e\u003c/li\u003e\n\u003c/ul\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eQuality of service Critical Criteria:\u003c/span\u003e\u003c/b\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs the Quality of Service met?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eResearch and Development Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eA vital question in new product management is: how should the business most effectively invest its research and development (r\u0026amp;d) and new product resources?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eSecurity event Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ePolicy compliance is closely related to IT governance. Compliance has much to do with defining, controlling and governing security efforts. How should an organization respond to security events?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAre the procedures and other controls capable of enabling prompt detection of security events and response to security incidents implemented?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eSensitive data Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThe pharmaceutical industry is also taking advantage of digital progress. It is using IoT for supply chain security in packaging and tracking of drugs. There are new companies using computer chips in pills for tracking adherence to drug regimens and associated biometrics. Using this as an example, how will we use and protect this sensitive data?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat measures are in place to protect sensitive data?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eService provider Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDuring the last 3 years, have you been the subject of an investigation or action by any regulatory or administrative agency for privacy related violations?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIf a back door exit was used to circumvent an attack, do the attackers now know of such a back door, and thus should a new back door be constructed?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs there an appropriately trained security analyst on staff to assist in identifying and mitigating incidents involving undetected malware?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eFor the private information collected, is there a process for deleting this information once it is complete or not needed anymore?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDo you publish a bulletin board, chat room or otherwise allow users to upload or post content to your website?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDo you require that sub contractors submit proof of insurance separate from the primary?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs the product compatible and interoperable with other PKI products/service providers?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIs the service provider eligible for certification under the scheme?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eSecurity Considerations -What?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWho Will Benefit?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eSystems engineering Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eis the project using any technologies that have not been widely deployed or that the project team is unfamiliar with?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eDoes management understand principles and concepts of system engineering?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhy has systems engineering emerged as a distinct discipline?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eAre the requirements mapped to one or more user needs?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat priorities are appropriate?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eUtility computing Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhen is utility computing preferable to running a private cloud?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eVirtual machines Critical Criteria:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e------------------\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCan your application be packaged into a virtual machine (VM) instance and run on cloud infrastructure or does it need specialized hardware and/or special access to hardware that the AWS cloud cannot provide?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhich technique can be used to cluster a virtual machine with a physical machine?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eWhat types of resources (e.g., virtual machines, storage space, development environments) does the provider offer as part of each of its service models?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ehow many virtual machines are to be protected by the disaster recovery solution?\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eNext, read more and get started with the Cloud computing Self Assessment:\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003ca href\u003d\"https://store.theartofservice.com/cloud-computing-complete-self-assessment/\" rel\u003d\"nofollow\" style\u003d\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target\u003d\"_blank\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ehttps://store.theartofservice.\u003cwbr\u003e\u003c/wbr\u003ecom/cloud-computing-complete-\u003cwbr\u003e\u003c/wbr\u003eself-assessment/\u003c/span\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThe Cloud computing Self-Assessment Excel Dashboard shows what needs to be covered to organize the business/project activities and processes so that Cloud computing outcomes are achieved.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv\u003e\n\u003cdiv class\u003d\"KCE12V-oc-a\" style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px 0px 0px 44px; padding: 0px 0px 0px 5px;\"\u003e\n\u003cdiv class\u003d\"KCE12V-A-P\" style\u003d\"border: 0px; margin: 0px; padding: 0px;\" tabindex\u003d\"0\"\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; overflow: auto; padding: 0px;\"\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; max-height: 10000px; padding: 0px;\"\u003e\n\u003cdiv dir\u003d\"ltr\" style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eThe Self-Assessment provides its value in understanding how to ensure that the outcome of any efforts in Cloud computing are maximized.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eIt does this by securing that responsibilities for Cloud computing criteria get automatically prioritized and assigned; uncovering where progress can be made now.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eGerard Blokdijk\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eCEO at The Art of Service\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003eGerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003ca href\u003d\"https://www.linkedin.com/in/gerardblokdijk\" rel\u003d\"nofollow\" style\u003d\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target\u003d\"_blank\"\u003e\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003ehttps://www.linkedin.com/in/\u003cwbr\u003e\u003c/wbr\u003egerardblokdijk\u003c/span\u003e\u003c/a\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cdiv class\u003d\"KCE12V-oc-a\" style\u003d\"border: 0px; margin: 0px 0px 0px 44px; padding: 0px 0px 0px 5px;\"\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class\u003d\"KCE12V-A-b\" style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin-bottom: 0px; margin-left: 39px; margin-right: 0px !important; margin-top: 0px; padding: 0px 0px 0px 5px;\"\u003e\n\u003cdiv class\u003d\"KCE12V-A-a KCE12V-A-cb\" style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 4px 0px; position: relative;\"\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cdiv style\u003d\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; display: inline-block; margin: 0px; padding: 0px;\"\u003e\n\u003c/div\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\n\u003c/span\u003e\n\u003cbr /\u003e\n\u003cdiv class\u003d\"KCE12V-yc-a\" style\u003d\"border: 0px; height: 34px; margin: 4px 0px 0px; padding: 0px; position: relative;\"\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.comrevo.com/feeds/1102070227192753232/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.comrevo.com/2017/10/Cloud-computing-Quick-Fundamental-Checklist.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/1102070227192753232"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/1102070227192753232"},{"rel":"alternate","type":"text/html","href":"https://www.comrevo.com/2017/10/Cloud-computing-Quick-Fundamental-Checklist.html","title":"Cloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-6474352660838470254"},"published":{"$t":"2016-08-31T19:48:00.000+05:30"},"updated":{"$t":"2017-10-14T10:13:52.125+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"}],"title":{"type":"text","$t":"Cloud Computing"},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Go through the following posts:\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u003cbr /\u003e\u003c/b\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e1.\u0026nbsp;\u003ca href\u003d\"http://www.comrevo.com/2015/05/what-is-cloud-computing-basics-iaas-paas-saas-public-private-community-hybrid-cloud-service-deployment-models.html\" target\u003d\"_blank\"\u003eWhat is Cloud Computing? / Basics of Cloud Computing (IAAS, PAAS, SAAS, Public, Private, Community, Hybrid Cloud)\u003c/a\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u003cbr /\u003e\u003c/b\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e2.\u0026nbsp;\u003ca href\u003d\"http://www.comrevo.com/2015/04/host-website-on-google-app-engine-godaddy-domain-name.html\" target\u003d\"_blank\"\u003eHow to host your website on Google App Engine (GAE) and How to link it with custom domain name from godaddy\u003c/a\u003e\u0026nbsp;\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u003cbr /\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e3.\u0026nbsp;\u003ca href\u003d\"http://www.comrevo.com/2017/10/Cloud-computing-Quick-Fundamental-Checklist.html\" target\u003d\"_blank\"\u003eCloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow\u003c/a\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e\u003cbr /\u003e\u003c/b\u003e\n\u003c/span\u003e\u003cbr /\u003e\n\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cbr /\u003e\n\u003cdiv style\u003d\"color: black; font-family: 'times new roman'; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003e\n\u003ctable border\u003d\"1\"\u003e\u003ctbody\u003e\n\u003ctr\u003e\u003ctd\u003e\u003cdiv style\u003d\"margin: 0px;\"\u003e\n\u003cspan style\u003d\"font-family: inherit; font-size: large;\"\u003e\u003cb\u003e\u0026nbsp;\u003c/b\u003e\u003cspan style\u003d\"font-size: large; font-weight: bold;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\u003c/span\u003e\u003cspan style\u003d\"color: black; font-size: large;\"\u003eAsk your\u0026nbsp;\u003cb\u003eQuestion\u003c/b\u003e\u0026nbsp;related to\u0026nbsp;\u003cb\u003eCloud Computing\u003c/b\u003e\u0026nbsp;as a Comment in following\u0026nbsp;\u003cb\u003eTextbox\u003c/b\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"margin: 0px;\"\u003e\n\u003cspan style\u003d\"color: black; font-family: inherit; font-size: large;\"\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; You can\u0026nbsp;\u003cb\u003eAnswer\u003c/b\u003e\u0026nbsp;the already asked Question as\u0026nbsp;\u003cb\u003ereply\u003c/b\u003e\u0026nbsp;to the Question.\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"margin: 0px;\"\u003e\n\u003cspan style\u003d\"color: black; font-family: inherit; font-size: large;\"\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cspan style\u003d\"font-size: large;\"\u003e(Note: Your\u0026nbsp;\u003cb\u003eQuestion/Answer\u003c/b\u003e\u0026nbsp;will be added after validation)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv\u003e\n\u003cdiv style\u003d\"margin: 0px;\"\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/td\u003e\u003c/tr\u003e\n\u003c/tbody\u003e\u003c/table\u003e\n\u003c/div\u003e\n\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.comrevo.com/feeds/6474352660838470254/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.comrevo.com/2016/08/cloud-computing.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/6474352660838470254"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/6474352660838470254"},{"rel":"alternate","type":"text/html","href":"https://www.comrevo.com/2016/08/cloud-computing.html","title":"Cloud Computing"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-6724808806291500113"},"published":{"$t":"2015-05-01T20:30:00.001+05:30"},"updated":{"$t":"2020-03-24T17:32:06.443+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"}],"title":{"type":"text","$t":"What is Cloud Computing? / Basics of Cloud Computing (IAAS, PAAS, SAAS, Public, Private, Community, Hybrid Cloud)"},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003eHi Friends,\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; Almost all of us have heard the term \"Cloud Computing\", but very few of us know the exact basics of Cloud Computing. This post is for all those who wants to know what is cloud computing; how did it become popular; what is SAAS, PAAS, IAAS; what is public, private, community, hybrid cloud.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; First let us know desktop computing, client-server computing, cluster computing, grid computing and cloud computing.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eDesktop computing:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; It is a computing(certain processing) on single system(desktop machine). \u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eClient-Server computing:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; It involves two types of systems. First is Client machine which has less amount of resourses(memory, processing). As the client machines have less amount of resourses, they request service(computing) from another machine which comparatively has higher amount of resourses. This another type of machine is called a Server. In this type of model, client machines can be one or more while server machine is considered to be just one.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/b\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eCluster computing:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; In the above computing model, as I told, server machine is a single machine. Now assume a case in which many more client machines are requesting so much computing from a single server machine. In this case, for a single server machine, it is impossible to response these many client requests. Hence instead of a single server machine, a group of server machines is used. Such a group of server machines is called a Cluster. Computing on such a system is called Cluster computing.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/b\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eGrid computing:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Assume there are several client-server systems which are physically(say region wise) separated. If all the servers from each client-server systems are connected together(means they are communicating with each other), then this group of client-server systems is called a grid. For e.g. in telecommunication, servers from different regions transfer certain information(e.g. roaming information) among them. Hence telecommunication is an example of grid computing model.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eCloud computing:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; A combination of cluster and grid is called a Cloud. Henceforth a computing on a cloud is a cloud computing. \u0026nbsp; \u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003eBig multinational companies like Amazon, Google, Microsoft had their big cloud spread all over the world which they built for their own use. Afterwards they started providing their infrastructure to others on rent(use and pay) basis and from there, a cloud computing was started on commercial basis.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003eNow let us see various \u003cu\u003e\u003cb\u003eService models of cloud computing\u003c/b\u003e\u003c/u\u003e.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/b\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e1. Infrastructure as a service(IAAS):\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Providing resourses(memory, processing) as a service to the requesters is called Infrastructure as a service. Here cloud service providers only provide infrastructure(memory, computing) while users(requesters) has to deploy their own platform(OS or other environment) and also they have to deploy their own software applications.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Amazon is the biggest provider of IAAS.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/b\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e2. Platform as a service(PAAS):\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Providing environment or platform(e.g. any OS, JVM, compilers for php or python etc.) alongwith Infrastructure, as a service to the requesters is called as a Platform as a service. Keep in mind, when service providers are providing platform, definitely they are providing Infrastructure alongwith platform. Therefore PAAS\u003dPAAS+IAAS.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Examples of a PAAS are Google App Engine, Microsoft Azure, all companies which provide hosting to your websites etc.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e3. Software as a service(SAAS)\u003c/b\u003e:\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Providing ready made softwares or web applications to requesters as a service is called a Software as a service. When softwares(web applications) are provided as a service, definitely platform and infrastructure are provided alongwith. Therefore SAAS\u003dSAAS+PAAS+IAAS.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Examples of SAAS are google services(gmail, youtube...), dropbox etc.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003eNow, we will see various \u003cu\u003e\u003cb\u003ecloud computing Deployment Models\u003c/b\u003e\u003c/u\u003e. Cloud computing deployment model is a way of using cloud computing. Let us see one by one-\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e1. Public cloud:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Providing same service to all users; is a Public cloud. For e.g. Google app engine service is same for all. There is no special privilege to particular user. Hence it is a public cloud.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e2. Private cloud:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Some companies, they have their own special needs. They request a service from cloud service providers which is specially configured for them. Such service is called a Private cloud.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003c/b\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003e3. Community cloud\u003c/b\u003e:\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; When a group of companies have a similar needs, they together request a service from cloud service providers which is specially configured for them. Such service is called Community cloud.\u003c/span\u003e\u003cbr /\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/b\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e4. Hybrid cloud:\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Some cloud service providers provide all above services like public cloud, private cloud, community cloud. Such a combination of more than one services is called as Hybrid cloud.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cb\u003eWatch Following Youtube Video on Cloud Computing:\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003ciframe allow\u003d\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen\u003d\"\" frameborder\u003d\"0\" height\u003d\"360\" src\u003d\"https://www.youtube.com/embed/VVZ6D85oXE0\" width\u003d\"640\"\u003e\u003c/iframe\u003e\n\n\n\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003ch1 class\u003d\"watch-title-container\" style\u003d\"background: rgb(255, 255, 255); border: 0px; font-family: 'YouTube Noto', Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; width: 457.5px; word-wrap: break-word;\"\u003e\n\u0026nbsp;\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" id\u003d\"eow-title\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003e\u003c/span\u003e\u003c/h1\u003e\n\u003ch1 class\u003d\"watch-title-container\" style\u003d\"background: rgb(255, 255, 255); border: 0px; font-family: 'YouTube Noto', Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; width: 457.5px; word-wrap: break-word;\"\u003e\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" id\u003d\"eow-title\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eWatch on YouTube:\u0026nbsp;\u003ca href\u003d\"https://www.youtube.com/watch?v\u003dVVZ6D85oXE0\" target\u003d\"_blank\"\u003ehttps://www.youtube.com/watch?v\u003dVVZ6D85oXE0\u003c/a\u003e \u0026nbsp;\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/h1\u003e\n\u003ch1 class\u003d\"watch-title-container\" style\u003d\"background: rgb(255, 255, 255); border: 0px; font-family: 'YouTube Noto', Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; width: 457.5px; word-wrap: break-word;\"\u003e\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" id\u003d\"eow-title\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp;\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/h1\u003e\n\u003ch1 class\u003d\"watch-title-container\" style\u003d\"background: rgb(255, 255, 255); border: 0px; font-family: 'YouTube Noto', Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; width: 457.5px; word-wrap: break-word;\"\u003e\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" id\u003d\"eow-title\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp;\u003c/span\u003e\u003c/b\u003e \u003c/span\u003e\u003c/h1\u003e\n\u003ch1 class\u003d\"watch-title-container\" style\u003d\"background: rgb(255, 255, 255); border: 0px; font-family: 'YouTube Noto', Roboto, arial, sans-serif; font-size: 20px; font-weight: normal; margin: 0px; padding: 0px; width: 457.5px; word-wrap: break-word;\"\u003e\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" id\u003d\"eow-title\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003eCloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\u003c/span\u003e\u003c/h1\u003e\n\u003cdiv\u003e\n\u003cspan class\u003d\"watch-title\" dir\u003d\"ltr\" style\u003d\"background: transparent; border: 0px; margin: 0px; padding: 0px;\" title\u003d\"Cloud Computing Part 1 : What is Cloud Computing? Origin of Cloud Computing\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003ciframe allow\u003d\"autoplay; encrypted-media\" allowfullscreen\u003d\"\" frameborder\u003d\"0\" height\u003d\"360\" src\u003d\"https://www.youtube.com/embed/SayjgVxQOXM\" width\u003d\"640\"\u003e\u003c/iframe\u003e\n\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cu\u003e\u003ci\u003eNext Post:\u003c/i\u003e\u003c/u\u003e\u0026nbsp;\u003ca href\u003d\"http://comrevo.blogspot.in/2015/04/host-website-on-google-app-engine-godaddy-domain-name.html\"\u003eCloud Computing : How to host your website on Google App Engine (GAE) and How to link it with custom domain name from godaddy \u003c/a\u003e \u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cu\u003e\u003ci\u003ePrevious Post:\u003c/i\u003e\u003c/u\u003e\u0026nbsp;\u003ca href\u003d\"http://www.comrevo.com/2016/02/how-to-embed-youtube-video-in-blogger.html\"\u003eHow To Embed Youtube Video in Blogger\u003c/a\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\u003c/span\u003e\u003c/div\u003e\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.comrevo.com/feeds/6724808806291500113/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.comrevo.com/2015/05/what-is-cloud-computing-basics-iaas-paas-saas-public-private-community-hybrid-cloud-service-deployment-models.html#comment-form","title":"16 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/6724808806291500113"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/6724808806291500113"},{"rel":"alternate","type":"text/html","href":"https://www.comrevo.com/2015/05/what-is-cloud-computing-basics-iaas-paas-saas-public-private-community-hybrid-cloud-service-deployment-models.html","title":"What is Cloud Computing? / Basics of Cloud Computing (IAAS, PAAS, SAAS, Public, Private, Community, Hybrid Cloud)"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https://i.ytimg.com/vi/VVZ6D85oXE0/default.jpg","height":"72","width":"72"},"thr$total":{"$t":"16"}},{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-2792934410319187296"},"published":{"$t":"2015-04-24T09:48:00.001+05:30"},"updated":{"$t":"2016-09-28T11:44:02.743+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Website Designing"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"}],"title":{"type":"text","$t":"How to host your website on Google App Engine (GAE) and How to link it with custom domain name from godaddy "},"content":{"type":"html","$t":"\u003cdiv dir\u003d\"ltr\" style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cdiv style\u003d\"text-align: left;\"\u003e\n\u003ch2\u003e\n\u003cspan style\u003d\"font-size: large; font-weight: normal;\"\u003e\n\u003c/span\u003e\n\u003c/h2\u003e\n\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: left;\" trbidi\u003d\"on\"\u003e\n\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003eGoogle App Engine\u003c/span\u003e\u003c/b\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp; Google App Engine is a cloud service(PAAS) provided by Google to host our web application. It provides platform for the web applications written in Java, PHP, Python or GO. For the details of Google App Engine, go through the link \u003ca href\u003d\"https://cloud.google.com/appengine/docs\"\u003ehttps://cloud.google.com/appengine/docs.\u003c/a\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; In this post, we will see step by step procedure starting from purchasing a domain name from godaddy.com, to host a website on Google App Engine and to link our website to the custom domain name purchased from godaddy.com.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp;\u0026nbsp;\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;\u0026nbsp; Let us see in detail,\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u0026nbsp; \u003c/span\u003e\u003cbr /\u003e\n\u003ca name\u003d'more'\u003e\u003c/a\u003e\u003cbr /\u003e\n\u003cu\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e1. How to purchase a website domain name from godaddy.com\u003c/span\u003e\u003c/b\u003e\u003c/u\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e1. Go to the \u003ca href\u003d\"http://godaddy.com/\"\u003egodaddy.com\u003c/a\u003e.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e2. Enter your favourite domain name that you want to purchase into the textbox given there.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e3. It will show whether the entered domain name is available or not.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e4. If it is available then click on next.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e5. It will show the costing plan(for a 3 months, 6 months, 1 year or more).\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e6. Choose one plan that you are comfortable with.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e7. In the next step, pay the money with available options(credit card, debit card, net banking etc.).\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e8. If you have followed all above steps, then that domain name is yours.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cu\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e2. How to host a website on Google App Engine\u003c/span\u003e\u003c/b\u003e\u003c/u\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e1. Go to the link \u003ca href\u003d\"https://appengine.google.com/\"\u003ehttps://appengine.google.com\u003c/a\u003e .\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e2. Enter your login credentials to sign in into your account.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e3. Click on \u003cb\u003e\"Create Application\"\u003c/b\u003e button.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e4. Enter all details. Now you can access your application on the url \u003cb\u003e\"\u0026lt;your application id\u0026gt;.appspot.com\" (e.g. mygateadhyayan.appspot.com).\u003c/b\u003e \u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e5. Now you can \u003cb\u003edeploy\u003c/b\u003e your website(written in python/php/Java) on google app engine by using software \u003cb\u003e\"Google App Engine Launcher\"\u003c/b\u003e. It is available for Windows/Linux/MAC. For Windows and MAC, it is user friendly as it provides graphical user interface. For Linux, you have to do all the operations from the terminal. But the best way to create and deploy website is to use \u003cb\u003eEclipse\u003c/b\u003e. For this read next step.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e6. Install \u003cb\u003eEclipse\u003c/b\u003e latest version on your system(Windows/Linux). Install \u003cb\u003eplugin for google app engine in your installed Eclipse\u003c/b\u003e.(Find all details regarding installation of eclipse and Google App Engine plugin at \u003cb\u003e\u003ca href\u003d\"https://cloud.google.com/appengine/docs/java/tools/eclipse\"\u003ehttps://cloud.google.com/appengine/docs/java/tools/eclipse\u003c/a\u003e\u003c/b\u003e). Now it is very simple. Create your webpages by using \u003cb\u003eJava(Servlet/JSP).\u003c/b\u003e Deploy your website on Google App Engine by using button named \u003cb\u003e\"g\"\u003c/b\u003e on toolbar and drop down option \u003cb\u003e\"deploy\".\u003c/b\u003e Even you can test your website before deployment by running it on your local machine.\u003c/span\u003e\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\n\u003cu\u003e\u003cb\u003e\u003cspan style\u003d\"font-size: large;\"\u003e3. How to use custom domain name(your purchased website name) for your Google App Engine web application\u003c/span\u003e\u003c/b\u003e\u003c/u\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e1. Go to the link \u003ca href\u003d\"https://console.developers.google.com/project\"\u003ehttps://console.developers.google.com/project\u003c/a\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e2. Choose your \u003cb\u003eGoogle App Engine Application (e.g. mygateadhyayan).\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e3. Then choose \u003cb\u003eCompute \u0026gt; App Engine \u0026gt; Settings. \u003c/b\u003eChoose option \u003cb\u003eCustom domain name.\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e4. On this web page, you will get three steps. \u0026nbsp;In first step, mention your custom domain name. Click on button \u003cb\u003e\"verify\".\u003c/b\u003e It will take you to the \u003cb\u003edomain registrar website\u003c/b\u003e to verify that you own that domain name.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e5. Once it is verified, in second step , automatically it will update domain name and subdomain name. Choose any one and click on button \u003cb\u003e\"Add\".\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e6. In third step, automatically you will get \u003cb\u003eDNS records i.e. A(ip v4), AAAA(ip v6), CNAME.\u003c/b\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e7. Now the last and most important step. You have log in into \u003cb\u003edomain registrar website.\u003c/b\u003e Click on \u003cb\u003e\"VISIT MY ACCOUNT\".\u003c/b\u003e Then click on \u003cb\u003e\"Manage\" \u003c/b\u003ebutton situated in front of \u003cb\u003e\"DOMAINS\".\u003c/b\u003e Click on \u003cb\u003e\"DNS ZONE FILE\".\u003c/b\u003e Enter entry for \u003cb\u003eA\u003c/b\u003e(only one entry), \u003cb\u003eAAAA\u003c/b\u003e(only one entry), \u003cb\u003eCNAME\u003c/b\u003e(Host:www, Points To: ghs.googlehosted.com). These record's values you will get from above step.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e8. Your Google App Engine application will get linked to your \u003cb\u003ecustom domain\u003c/b\u003e within some time interval. It can take few seconds to at max 48 hours.\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cdiv\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cbr /\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: center;\"\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003ca href\u003d\"http://www.comrevo.com/2016/08/web-designing.html\" target\u003d\"_blank\"\u003e\u003cb\u003e\u003ccenter\u003e\u003ctable border\u003d\"1\"\u003e \u003ctbody\u003e\n\u003ctr\u003e\u003cth\u003eCheck Other Posts on Web Designing\u003c/th\u003e\u003c/tr\u003e\n\u003c/tbody\u003e\u003c/table\u003e\u003c/center\u003e\n\u003c/b\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cu\u003e\u003ci\u003e\u003cb\u003e\u003cbr /\u003e\u003c/b\u003e\u003c/i\u003e\u003c/u\u003e\u003c/span\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cu\u003e\u003ci\u003e\u003cb\u003eNext Post:\u003c/b\u003e\u0026nbsp;\u003c/i\u003e\u003c/u\u003e\u003ca href\u003d\"http://comrevo.blogspot.in/2015/05/what-is-cuda-basics-gpu-host-device-kernel-stream-multiprocessor-thread-block-grid-warp-memory-architecture-global-shared-constant-texture-local-registers.html\"\u003eWhat is CUDA? / Basics of CUDA / An overview of CUDA \u003c/a\u003e\u003c/span\u003e\u003cbr /\u003e\n\u003cbr /\u003e\n\u003cspan style\u003d\"font-size: large;\"\u003e\u003cu\u003e\u003ci\u003e\u003cb\u003ePrevious Post:\u003c/b\u003e\u003c/i\u003e\u003c/u\u003e\u0026nbsp;\u003ca href\u003d\"http://comrevo.blogspot.in/2015/05/what-is-cloud-computing-basics-iaas-paas-saas-public-private-community-hybrid-cloud-service-deployment-models.html\"\u003eWhat is Cloud Computing? / Basics of Cloud Computing (IAAS, PAAS, SAAS, Public, Private, Community, Hybrid Cloud) \u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: left;\"\u003e\n\u003cspan style\u003d\"font-size: large; font-weight: normal;\"\u003e\n\u003c/span\u003e\n\n\u003c/div\u003e\n\u003c/div\u003e\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.comrevo.com/feeds/2792934410319187296/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.comrevo.com/2015/04/host-website-on-google-app-engine-godaddy-domain-name.html#comment-form","title":"5 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/2792934410319187296"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/913600556879440043/posts/default/2792934410319187296"},{"rel":"alternate","type":"text/html","href":"https://www.comrevo.com/2015/04/host-website-on-google-app-engine-godaddy-domain-name.html","title":"How to host your website on Google App Engine (GAE) and How to link it with custom domain name from godaddy "}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"https://www.blogger.com/profile/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"5"}}]}});