Deepfake videos are a far, far bigger problem for women

The number of deepfake videos found online has nearly doubled since 2018, and most of them are pornographic videos featuring women without their consent. The term “deepfake” refers to video altered using machine-learning technology to present a situation that didn’t occur, such as this video of filmmaker

New Training Courses Teach New APN Partners to Better Help Their Customers

AWS Training and Certification has updated one partner course and added another to its training portfolio. First, we made major updates to our AWS Solutions Training for Partners: Foundations (Business) course. Second, we are introducing a new course, AWS Solutions Training for Partners Foundations - Public Sector -

Overcoming Obstacles In Cloud Computing Adoption

Computing Obstacles

According to Buyya et al. (2008), “A Cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers.” The enormous advantages of cloud computing in improving businesses have generated unprecedented interest in its adoption. However, customers face numerous cloud computing obstacles such as service requirements; unexpected outages; invalid assumptions about the operating environment; poor isolation between users, hardware degradation, misconfiguration of software; cost implications of failure and uncertainty about cloud providers’ ability to meet service level agreements (SLA). Cloud providers are usually responsible for problems related to their own infrastructure. Although cloud providers monitor their physical resources such as servers, storage and network systems to provide a highly stable infrastructure, they usually do not guarantee individual instance availability.

In addition, Benson and his colleagues analysed the problems users faced and categorized them into five categories: Application-related (e.g. Email server setup, Windows Licensing, LAMP setup, Linux), Virtual Infrastructure-related ( e.g. Virtualized Storage, Attach/Detach, Virtualized load balancer, DNS & Virtualized IP) , Image Management-related ( Image bundling issues, storage and migration of image between buckets, Update/kernel install issues),Performance-related ( Instance not responding, Instance stuck in terminating, EBS performance), and Connectivity-related (General connectivity, Firewall, Connection performance, Connecting to app).

These risks hinder the adoption of cloud. Zardri et al. (2013) believe that “evaluating pre adoption choices at early stages is cost-effective strategy to mitigate risks for probable losses due to wrong or uninformed selection decisions”. They suggested that companies should identify obstacles and their importance through understanding their consequences on the adoption process (obstacle prioritization). Then, appropriate tactics should be used to handle, manage, and solve the problems. Furthermore, analysing Service Level Agreements (SLA) of cloud providers and matching them against users’ requirements can be useful in revealing potential SLA violations, conflicts and probable risks.

Benson (2013) also  introduced several strategies that cloud providers can apply to help users.

Best Effort Support Model: “user forumis considered as one of the most common version of support models. Unfortunately, cloud providers do not make guarantee on the response time of the operators and the resolution time of the problem.

Premium Support Model: In this model, cloud providers guarantee the user that problems will be resolved within a certain period of time. The SLA provided to a user is inversely proportional to the price paid by the users; a higher price demands a guaranteed for a shorter resolution time. Certain providers also ensure that users have access to dedicated operators who are familiar with the user’s environment and needs.”

As discussed above, it would seem that companies should identify and understand early the properties of the problems that they will face in using a cloud before migrating any servers, databases, applications or data to the cloud.  Data security and privacy breaches, as well as regulatory and legal compliance are significant issues when moving from in-house IT infrastructure to cloud services. Therefore, specific standards, education, and appropriate support mechanisms should be designed to solve the problems.

By Mojgan Afshari

Mojgan Afshari Contributor
Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.


HTML5 Speed Test

HTML5 Speed Test

#SECURITY #DEVOPS HTML5 SPEED TESTING Provided is a list of some of the leading website speed testing services. Most, if not all, should provide you ...
Cloud Security Tools

10 Useful Cloud Security Tools For Your Business

Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense ...
Sam Bowman

Medical Data in the Cloud: What Are the Risks?

Medical Data in the Cloud Executive-level healthcare leaders must have a thorough understanding of cloud-based security risks. Patient data can vary from simple information such ...
3 Challenges of Network Deployment in Hyperconverged Infrastructure

3 Challenges of Network Deployment in Hyperconverged Infrastructure

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several ...