Wednesday, January 29, 2020

Lyme Disease Essay Example for Free

Lyme Disease Essay Chronic Lyme disease has been a controversial topic for many years. Researchers are in between opinions to determine if this disease really does exist. Lyme disease is a tick-borne disease that passes to the tick’s host once it has latched on and started feeding. The disease goes into the host’s blood and implants a bacterium called Borrelia burgdorferi. This type of bacterium is from the spirochete family. Stricker (2008) â€Å"Chronic infections with the Lyme spirochete, Borrelia burgdorferi, is rare and non-existent, and the concept of chronic Lyme disease rest on ‘faith-based’ opinion rather than ‘evidence-based’ science† (Chronic Lyme Disease and the â€Å"Axis of Evil†). This is an article from a very popular website for medical information. The source may have a sense of bias toward particular topics. The statement, â€Å"†¦rest on ‘faith-based’ opinion rather than ‘evidence-based’ science† is a fallacy. According to the Center for Disease Control and Prevention (2013), â€Å"Approximately 10 to 20% of patients treated for Lyme disease with a recommended 2–4 week course of antibiotics will have lingering symptoms of fatigue, pain, or joint and muscle aches. In some cases, these can last for more than 6 months. Although often called chronic Lyme disease, this condition is properly known as Post-treatment Lyme Disease Syndrome (PTLDS)† (Post-Treatment Lyme Disease Syndrome). This backs up the other half of researches stating that Lyme disease does not always go away after the initial treatment. There are known cases in which the symptoms are still active in the patient and must continue with treatment. This article comes from a credible government organization that has a goal to maintain the disease in the United States and inform the people of necessary information pertaining to different diseases and illnesses. The CDC is controlled by our countries government and is not to take a bias view on various topics. The data used is based upon studies that have been performed on human and non-human research. In conclusion it is clear that the first article did not have supporting studies however the second one did. Both articles are credible but the CDC is a government funded agency that is committed to the well-being of the people. Having back-up studies and scientific evidence to support any arguments that are made is important to keeping credibility, making sure the information is reliable, and the data gathered is valid.

Tuesday, January 21, 2020

Symbolism in A Streetcar Named Desire by Tennessee Williams Essay

During the late nineteen-forties, it was common for playwrights such as Tennessee Williams to use symbolism as an approach to convey personal thoughts, through the attitudes of the characters and the setting. Williams' actors have used symbolism to disguise the actuality of their thoughts and to accommodate the needs of their conservative audience. A Streetcar Named 'Desire' has a few complicated character traits and themes. Therefore, they have to be symbolised using figures or images to express abstract and mystical ideas, so that the viewers can remain clueless. Williams not only depicts a clear personality of the actors but he also includes real-life public opinions from the past (some of which are contemporary.) These opinions were likely to raise controversies on issues such as prejudice, social gender expectations and men and women's roles in society. There have been numerous occasions when symbolism has taken place in A Streetcar Named 'Desire.' Firstly, Stanley is insulted several times by Blanche (his sister-in-law) Stella (his beloved wife) and other residents of the 'Quarter'. For example, the term 'animal' has been constantly spoken of, to define Stanley's malicious and ill-natured conduct. In scene four, Blanche tries to persuade her younger sister to go elsewhere and leave her husband. On page 163, she complains: Blanche: He acts like an animal, has an animal's habits! Eats like one, talks like one! There's even something - sub-human - something not quite to the stage of humanity yet! Yes, something - ape-like about him there he is - Stanley Kowalski - Bearing the raw meat home from the kill in the jungle! Furthermore, when the play begins, Stanley enters the ground-floor apartm... ... of the play, Williams may be hinting that Blanche is gradually being ruined. Perhaps her 'white radio' being tossed 'out of the window' tells us that Stanley is already against Blanche and does not like the sound of her being around. I shall conclude this essay with a brief understanding of symbolism. It is a very useful concept and often needed to give the audience a few suggestions. Symbolism makes people think and broadens their mind with varieties and ideas. In A Streetcar Named 'Desire', symbolism has been significantly used to show the roles of men and women in society and how they expect each other to be treated. It has disguised many possible sexual scenes; therefore, Williams has succeeded in transmitting some of his themes or ideas. Some of these are sexuality, madness, jealousy, racism, cruelty, loyalty, gender relationships and conflict.

Sunday, January 12, 2020

Logical Processor and Reactive Stimulator Essay

When I took the test I came out with Logical Processor and Reactive Simulator. Both of my styles were even so not one outweighed the other. I had to laugh when I actually completed the test. It all comes in hand with my current additional duties at work. I am a union steward and when it comes to this job I initially use Reactive Simulator. When I first get a grievance, my initial reaction is to get to the meeting immediately so that I can hurry up and fry the other individual because I need immediate results. Well it doesn’t work like that. I have 15 days from the time that I receive my case to get all of my facts together; do research within the contract laws to see which ones were violated. It really helps when I have a griever that has a good case they could win. As a steward I have to fight for the griever whether or not they are correct. Sometimes being a Reactive simulator causes me to get into confrontations. I immediately react to different situations, always on the defense. With this style it causes me to not hear other individual’s side of the story, because in my eyes if you are wrong than that’s how I am going keep the situation until I am proven otherwise. My communication is a little misunderstood by my co-workers. I am not a really compassionate person so I don’t take personal issues into consideration. I can sometimes come off harsh, but I really think that I am misunderstood by others. My Logical Processor can also balance me out. When I have a task or a major project, I will do my research on it. I am not going to say that I am a know-it-all, but if I have to prove something to my supervisor, I will go to the regulations and prove her wrong, not intentionally. If it takes me all day to find the answer to an issue, than I will use the whole day, as long as I am correct. I am a individual that hates change and if I can keep something the same by proving that they are doing something illegal, then so be it. Both the Logical Processor and the Reactive Simulator makes my Strategic pattern a performer. One of those attributes is that I want results to be quickly achieved. The results have to have a good outcome with it. I like to get the job done, I do not like to take the shortcut, nor do I like the think out of the box approach!

Saturday, January 4, 2020

The Problem With Mass Incarceration - 1445 Words

The Problem with Mass Incarceration Over the past few decades, the United States has witnessed a huge surge in the number of individuals in jail and in prison. Evidence suggests the mass imprisonment policy from the last 40 years was a horrible catastrophe. Putting more people in prison not only ruined lives, it disrupted families, prevented ex-prisoners to find housing, to get an education, or even a good job. Regrettably, the United States has a higher percent of its population incarcerated than any other country. America is responsible for a quarter of the world’s inmates, and its incarceration rate is increasing exponentially. The expense produced by these overcrowded prisons cost the country a substantial amount of money every year. Although people are incarcerated for a number of reasons, the country’s prisons are focused on punishment rather than reform, and the result is a misguided system that fails to rehabilitate criminals or discourage crime. By researchin g mass incarceration, I hope to get society to understand that incarcerating an individual not only effects the family, but we will look at the long term consequences on society and how the United States can remain safe and, at the same time, undo much of the damage that results from large-scale imprisonment. Incarceration is the act of placing someone in prison, it also aids as a punishment for offenders due to their actions against the law. Furthermore, by locking people up itShow MoreRelatedThe Problem Of Mass Incarceration Essay1780 Words   |  8 PagesMass incarceration has been an ongoing problem in America that became prevalent in the 1960s and still continues today. The reason this mass incarceration is such a crisis in our country is because it has been ripping apart the family and impacting all those involved. This epidemic affects those of every race, but more specifically, African Americans. Many researchers attribute this prison boom to police officers cracking down o n crime, but only focusing on the inner city which is often times itRead MoreThe Social Problem Of Mass Incarceration Of Minority Groups1753 Words   |  8 Pagesfocus specifically on the social problem of mass incarceration of minority groups and how the criminal justice system targets these groups. Although this social problem can be linked to specifically African Americans, the impacts of mass incarceration can be felt by almost everyone. I have chosen three articles that focus on how the criminal justice system is masking mass imprisonment a major problem in minority communities. Addressing Racial Disparities in Incarceration by Marc Mauer describes the currentRead MoreMass Incarceration : A Major Problem Within The United States1695 Words   |  7 PagesMass incarceration has recently become a major problem within the United States. Although crime rates have dropped since the 1990s, incarceration rates have soared. This trend is largely associated with increased enforcement of drug-related crimes. Unfortunately, though not surprisingly, this problem involves racial discrepancies when regarding these mass incarcerations. Incarcerations appear to be the most prominent throughout urban areas and the south, which happen to be the areas where AfricanRead MoreMass Incarceration802 Words   |  4 PagesAlexander identifies the racialized mass incarceration problem that we have in our criminal justice system. Reading the book, you can see that mass incarceration is a social problem. This means that the problem can follow the six stages of the policy process. If I were a claimsmaker, I could assert that mass incarceration is a problem by following the six stages. In the claimsmaking stage, I would claim that the War on Drugs creates the racialized mass incarceration in our society today. To show thatRead MoreCriminals Must Be Punished For Breaking The Laws Of The Land1489 Words   |  6 Pagesthe system of incarceration. Jails have functioned in our society to protect citizens, or those who obey the constitution. For years, our jails were able to separate criminals from obedient citizens as well as punish criminals for their wrong doings. In the past, people have questioned whether this system was effective or not. Now, we have shifted our focus onto how much longer our jails will exist due to our lack of resources. The longer we wait to find a solution to mass incarceration the harder theRead MoreMass Incarceration Is Defined As The Imprisonment Of A Large Amount Of People1439 Words   |  6 PagesAt the simplest level, mass incarceration is defined as the imprisonment of a large amount of people. However, that does not tell the whole sto ry. The majority of people incarcerated are minorities, and although mass incarceration began as a system of unjust racial and social control, today it continues for many political reasons including government grants, swaying voter opinion, and for-profit prison revenue. The United States incarcerates more people, per capita, than any other nation in theRead MoreThe Political And Economic Factors Of The War On Drugs872 Words   |  4 Pagesuncovers the system of mass incarceration: a system comprised of laws, rules, policies, and customs that control criminals both in and out of prison. The greatest instigator of mass incarceration is the War on Drugs. Rather than combat drug activity, the War on Drugs has served as a deliberate strategy to control people of color and remove them from the political process, which is racist in both application and design. Alexander suggests that the War on Drugs and mass incarceration constitute a rebirthRead MoreMass Incarceration During The United States1322 Words   |  6 PagesMonroe Craver Mrs. Gallos English 3 Honors 30 March 2017 Mass Incarceration in the United States There are too many people in prison in our country and any people in prison today are non-violent drug offenders. The American war on drugs has targeted people in poverty and minorities, who are more likely to be involved in drug use. This has created a pattern of crime and incarceration and â€Å"...[a] connection between increased prison rates and lower crime is tenuous and small.† (Wyler). The prisonRead MoreThe Division Of Our Society : Exploring Mass Imprisonment1737 Words   |  7 Pages Mass Incarceration The Division of Our Society: Exploring Mass Imprisonment Pamela D. Jackson WRIT 130: Research Paper Professor Jane Campanizzi-Mook September 11th 2015 ABSTRACT Prison is unfortunately big business in the United States and our society is paying the ultimate cost and there is only one system being rewarded. More than often we do not put much emphasis on the prison system in its entirety. It is a fairly simple concept to most Americans that if you commit a crime or ifRead More The New Jim Crow: Mass Incarceration in the Age of Colorblindness, by Michelle Alexander1182 Words   |  5 PagesThe New Jim Crow: Mass Incarceration in the Age of Colorblindness is a book by Michelle Alexander, a civil rights litigator and legal scholar. The book discusses race-related issues specific to African-American males and mass incarceration in the United States. Michelle Alexander (2010) argues that despite the old Jim Crow is death, does not necessarily means the end of racial caste (p.21). In her book â€Å"The New Jim Crow†, Alexander describes a set of practices and social discourses that serve to

Friday, December 27, 2019

The Role of Project Manager - 1140 Words

Introduction Nowadays, with the development of project management, project success has been defined clearly. A definition of project success from Lock is that if the project finish on time, within budget and in good quality, the project is considered as a successful project (Lock, 2007). However, our understanding about the role of project manager is unclear. Different people hold various viewpoints about it. According to Lewis, people have a vague understanding of what is the role of project manager, because a majority of project managers are promoted from other jobs such as engineers or technologists and so on (Lewis, 2007). Some individuals think that the role of the project manager is to command and control. Is it enough for a project†¦show more content†¦Actually, Project managers do need to command and control. As I stated above, project manager is responsible for the project, which means that a project manager needs to control the project’ process for obtaining a successful completion of the project as well as to command the stakeholders to follow the right path to realize the project’ objective. But it is important to emphasize that â€Å"command and control†is a purpose, not a process. Just like Bull said that there is essential difference between a dictator and a leader, a dictator gives command to people for doing something, but a leader inspires people to let them want to do things. The role of project manager should be a leader, not a dictator (Bull, 2010). Lewis also thought that the biggest part of project manager’s job is dealing with people. Even though project manager has quite little authority, it is not zero (Lewis 2010). Therefore, for project managers, the biggest challenge should be how to your limited authority effectively. To optimize the use of the authority, project managers need to build their leadership. Instead of using your authority to build your leadership, project managers should use their people skill which involves personality, management skill and communication skill. (Lewis, 2007, p. 27) So, â€Å"command and control†is a purpose, not a process. Which means that project manager should be a leader, not a dictator. More important thing than â€Å"command and control† AsShow MoreRelatedRole of a Project Manager1009 Words   |  4 PagesProject management The role of a project manager is the most challenging roles within the project team. As the project goes on and takes advances in its various stages a project manager should ensure that they are able to adopt according to the demands of the project that are ever changing. Clearly this particular project in the organization has been marred with many challenges. These challenges need a good project manager who ill ensures that the project gets completed successfully. The currentRead MoreRoles Of A Project Manager1647 Words   |  7 PagesThere are many roles that a project manager must fulfill. The most important roles of a project manager though, may not be the roles one may first think of. Of course there are the visible roles such as integration of processes, managing project scope and cost, and managing risks (Gomes, Yasin, Small). Less visible roles such as effective leadership and communication affect all of the visible roles of the project manager. Because these less visible ro les take on many forms and touch many aspectsRead MoreRole of Project Manager2484 Words   |  10 PagesNICMAR ASSIGNMENT ON â€Å"ROLE OF PROJECT MANAGERS† SUBMITTED BY: JHA PRAVIN KUMAR JOSHI SOURABH MALANI GOVIND 221071 221074 221094 GUIDED BY: Prof. T.K.GANGULI ACM 22-SECTION 2 NATIONAL INSTITUTE OF CONSTRUCTION MANAGEMENT AND RESEARCH, PUNE ROLE OF PROJECT MANAGERS Page 1 NICMAR INDEX Contents 1. Introduction 2. Role of Project Manager 2.1 Planning 2.2 Organizing 2.3 Controlling 2.4 Leading 2.5 Communicating 2.6 Cognitive functions 2.7 Self management functions 2.8 Motivational and personalRead MoreRole Of A Project Manager On A Construction Project Essay830 Words   |  4 PagesThe main role of a project manager on a construction project is that they are the people who are responsible for making decisions, both large and small and are also responsible for everything that happens on the site from the date of starting of the project till the closure of the project, they take the overall responsibility for the successful initiation, design, execution, monitoring, controlling. A project manager sets up the estimates, budget and construction timetable for the clients and alsoRead MoreProject Management And The Roles And Responsibilities Of Project Manager922 Words   |  4 Pages Initially I had a view that project management is organized planned objective of an organization with the consideration of all other constraints like budget cost, man-power and utilizing resources. From the classes my knowledge on project management has enhanced. Here I comes to know the different kinds of management in an organization and the roles and responsibilities of project manager, line manager, functional manager and sponsor. Project manager responsible for coordinating and merging activitiesRead More1.The Role Of The Project Manager On Construction Projects..1062 Words   |  5 Pages1.The role of the project manager on construction projects. Generally, as a project manager, he(or she) should be able to have thorough control of time, cost and quality of the project, and have the overall responsibility for the successful initiation, planning, design, execution, monitoring, controlling and closure of a project. The following are some specifications: 1) Leader of the team A project manager should form and lead a team which has the professionals and specialists, and enable themRead MoreProject Manager s Role On Construction Project Essay1802 Words   |  8 PagesPart 1. Investigation 1. The project manager plays a vital role on the construction project, from the very beginning of its initiation and planning to execution, to completion and handing over the complete project to the client. The project manager identifies and select the discrete processes to meet the project objective and target, considering the constituting inputs and outputs for the process (Project Management Institute, 2013). The project manager should be perceptive, well informed and shouldRead MoreAssignment on Roles and Responsibilities of Project Manager9779 Words   |  40 PagesAssignment on â€Å"Roles and Responsibilities of Project Manager† [The assignment is prepared for the requirement of the course Project Management (MGT-4705) of BBA 7th semester] Prepared for Muhammd Shah Course Instructor Department of Business Administration International Islamic University Chittagong. Prepared By Name: Nafisa Ahmed Matric No: B-061213 Semester: Spring Level: BBA 7th Female (B) Submission Date: 11th August, 2009 Department of BusinessRead Moreâ€Å"the Role of the Project Manager Is to Command and Control.† Critically Discuss.1426 Words   |  6 PagesTOPIC: â€Å"The role of the Project Manager is to command and control.† Critically discuss. INTRODUCTION: In management, command and control refers more generally to the maintenance of authority with somewhat more distributed decision making [Command and Control Research Program 2011]. Being an effective project manager is among the most challenging jobs in the industry for two reasons. First it requires management skills and abilities different from those required in a traditional functionalRead MoreRole Of A Project Manager Within A Building Information Model2240 Words   |  9 PagesBefore we delve into the role of a Project Manager within a Building Information Model (BIM) project and how, if at all, that role has altered, lets step back and understand how BIM evolved. The concept of BIM has actually existed since the 1970’s with the term building model first used in papers in the mid-1980’s. However, it wasn’t until around 10 years later that the terms Building Information Model and Building Information Modelling (including the acronym BIM) became more mainstream

Thursday, December 19, 2019

Design And Cross Pollination Of Fields And Practices

It is believed that due to the high level of risk undertaken by the client and intrusted in the designers that it is now a safer option to put the contractors in the driving seat rather than the architects who simply provide the design (Jamieson.C, 2010and that larger multidisciplinary practices containing architects, surveyors and contractors would be even more prevalent in fifteen years time because they are able to carry the risk on behalf of the client (Jamieson.C, 2010). So surely if architects are no longer trusted or believe in themselves there is no longer a need for them to carry out certain duties or training? If an architect no longer carried the same responsibilities then there is no need for them to work in the same methods.†¦show more content†¦Weston believed that ‘the stylistic postmodernism of the 1980’s (risk), had threatened to reduce architecture to a stylish fad.’ He believed that the risk architects felt upon themselves meant that â €˜In its place it was argued the case for buildings that are monumental and anti-heroic, and grounded in the familiar routine and environments of daily life( Weston.R, 2011). Due to the amount of money and time needed to be invested into building architecture the industry can take astronomical hits during financial crisis such as the credit crunch in 2008. Risk plays a huge part in the way we build and create architecture. For the architect, a great deal of risk is encountered by intrusting the client to pay for our services. One London based boutique architecture practice described â€Å"our main threat is not being paid for the work we do- particularly the brief making part- but we never turn down unpaid work because It might lead to paid work in the future†(RIBA the future for architects, 2010). But it is not just the architects who feel the ‘risk’, it is also the clients who are effectively putting their money, land or property and quite often their reputa tions at stake, so there is a lot riding on the architects back to make the whole operation run smoothly. The guardian stated that in 2008 ‘40% of architects lost their jobs’ causing many practicing Architects to brake off into different fields. For example in the 1970’s, 50% of architects

Wednesday, December 11, 2019

Cloud Computing and its Services

Question: Discuss about Cloud computing and its services. Answer: Introduction Deployment of applications in the cloud has not been rampant among the cloud consumers because many consumers have been ignorant on what it takes for one to deploy an application and the roles that they play in ensuring the success of the application. When the client is aware of their roles and does a proper planning prior to the deployment of the application, the success rate in the performance of the application in the cloud increases. To guarantee this, the customer to the cloud service must go to an extra mile and gauge what is required of them by the cloud provider and what the service level agreement entails as a guarantee of the services offered. However, these services have not been utilized by the customers because most of them do not understand what services the cloud vendor offer. The SLAs provided by the cloud service providers are often drafted in a way that terminologies and jargons used in its content are difficult for the consumers to decipher hence making the resulting relationship between the cloud vendors and the consumers a challenging one. Misconceptions also exist in that most of the consumers believe that their responsibilities and duties as it pertains security and management of the deployed application ends immediately the application has been deployed to the cloud. The end result is a failed application that does not meet the expectations of the consumer and ends up being withdrawn from the cloud hence mistrust by the consumer on the capability of the cloud services. To curb these misconception and to reduce the fallout between the cloud vendor and the consumers, it is mandatory for the consumer to understand its roles and responsibilities together with those of the cloud provider before it does the deployment of the application to the cloud. Before making any agreement with the cloud providers, customers should seek to understand what to expect from the vendors and what its SLAs entail. This will give an easier platform for the enterprise to make comparisons of different cloud vendors and to get to know which of the vendors offer the best in terms of their services. The following subsections discusses the requirements that DSI should adhere to when deploying the OSDS application to the cloud. The requirements are broken down into remote administration, SLA management and resource management. This is coupled up by the guarantee for application resilience by the cloud provider and the backup and recovery services offered by the cloud. The paper also discusses the general standards followed when coming up with an SLA agreement. Management Requirements Management is the major role in cloud computing and this is necessary for all the parties to the cloud computing services. Understanding the proper management roles necessary for the cloud service provider and that of the end user is mandatory as it helps to ensure that the services of the cloud are well enjoyed by the customers to the cloud. Several things come into play when management in the cloud is talked of and this involves remote management, SLA and resource management. Dalbhanjan and Morad provides a clear specification that is essential for the management needs of the cloud services. The specific requirements for each category of the cloud management services is discussed in details in the subsequent sections. Remote Administration Requirements When remote administration is mentioned in regard to cloud computing, the same is actually used to mean the configuration and management of the cloud provided information technology resources by the enterprise administrators. This is normally done through the tools and interfaces like portals, which have been developed by the cloud providers for such purposes (Mustard Harrison, 2004). Several remote management tools have been provided by the cloud vendors and this can be used by the clients as the basis for choosing the best cloud vendor based on the provided tools (Rimal, Jukan, Katsaros, Goeleven, 2010). Amazon Web Services provides some of the tools that can be used for remote administration and this are listed below; The users to the cloud services are granted access with the help of an identity management tool known as Identity Access management abbreviated as IAM. Clients who wish to make requests to the cloud services are identified using particular credentials that are provided prior to the access. The cloud vendor utilizes a good operating system for client access credentials which guarantees that each and every client is issued with a unique identifier and this identifier is matched with AWS key pair such that everyone has its own unique way and does not need to share details with that users. Agreeing to business or endeavor bolster AWS represents the creation of the application and consolidating it with the AWS Trusted Advisor reports. Resource Management Requirements Resource management is yet another term that is tied with cloud computing and it simply means the coordination of IT resources by the cloud vendors and the clients who use the cloud services. Resource management in the cloud is the most essential thing as it determines how best the resources can be put into use for the betterment of the cloud services and to guarantee the application success in terms of performance and availability (Schubert and Jeffery, 2015). Using the AWS checklist for cloud management, there are several tools available offered by cloud vendors and can be utilized by cloud clients to ensure that the resources allotted to them are well managed. These tools are listed below together with their requirements. Understanding which of the venture examples is Amazon Elastic Block Store (Amazon EBS) - supported when contrasted with occasion put away sponsored. The undertaking ought to pick what is best for them as far as capacity and see the type of implications that this will have on the information tirelessness, reinforcement and recuperation (Lee, 2016). The DSI should be able to decide on whether they need to combine the working framework together with the AWS EBS volumes or have them stored separately. The DSI ought to comprehend the requirement for a customary reinforcement of the Amazon EC2 occurrences either with the assistance of the Amazon EBS depictions or by using an outsider for the administration. SLA Management Requirements SLA management is the actual things undertaken on the part of the cloud vendor and the cloud customer to ensure that the agreement entered between them is binding. Management of SLA ensures that whatever service is guaranteed in the SLA document is actually offered by the cloud vendor and it is to the satisfaction of the client. The same also ensures that the customer uses the services rendered to them by the cloud vendor in accordance to the agreement signed between them (Gillam, Li, O', and Loughlin, 2014). Several SLA management requirements and tools have been listed down in the AWS checklist and these include; Amazon Machine Images, Amazon EBS preview and bootstrapping are used in the routine testing of how practical it is to use the Amazon EBS volumes and the Amazon EC2 for recovery whenever there is a looming disaster. Ensuring that all possible loopholes for any failover has been identified and proper measure has been put in place to ensure that upon the occurrence of such failover, the application is able to still perform well. The features useful for provision of metrics for SLA management are routinely checked and tested to ensure that the procedure of securing and fixing them is possible and again, upgrade can be done without interruption to the services offered. The application to be deployed in the AWS cloud has been tested thoroughly and that no bug or problem has been left to chance just before the application is uploaded to the cloud. Sensitive and confidential information is highly protected and removed from the application before it is uploaded to the server. Other information that may pose security threats and become a vulnerability are encrypted just before being shared to the cloud. Backup and Disaster Recovery Application Resilience One of the basic requirement for the OSDS system is the high availability feature since most of its uses such as remote sensing, scanners, radars and photogrammetric instrumentation and these technologies are meant to constantly send data to a remote database stored with the app so that the data can be accessed by the users of the OSDS application, hence at no point should this system be down (Beach, Rezgui, Parashar, and Rana, 2013). Users to the OSDS system have varied need for the data stored and distributed by the system and may need to access it at different times. Subsequently, for an application to be sent, diverse contemplations ought to be made. Such contemplations are outfitted towards guaranteeing flexibility of the application furthermore guarantees that reinforcement of information is done at ongoing to guarantee that the information is accessible notwithstanding when there is a cataclysm that requires loss of information. For DSI to accomplish high accessibility necessity for the OSDS framework, looking for the instruments gave by the cloud administration supplier is a prerequisite. These instruments incorporate; Utilizing the auto scaling instrument this aides in running robotized example recuperation or scaling The utilization of flexible burden adjusting this is a device that help with burden adjusting over different zones that are utilized by the undertaking. The utilization of Amazon EBS previews this takes point-in-time depictions of the Amazon EBS volumes Storage of articles in Amazon S3 or utilizing Amazon CloudFront to help as a part of substance dispersion Utilization of the non-concurrent information replication innovations this incorporates such advances as database reflecting and it empowers propagation of information in a few databases such that on the off chance that one database comes up short, there is constantly another to fall again into (Varadharajan and Tupakula, 2016). Backup and Disaster Recovery Plan Thought of how the cloud administration supplier will provide food for reinforcement and recuperation of the application and information if there should arise an occurrence of any debacle is additionally a noteworthy sympathy toward the DSI division with respect to its online spatial conveyance framework (Arean, 2013). Having a decent cloud administration supplier that has great administrations for the reinforcement catastrophe recuperation will empower the association influence more from the administration supplier (Sohal, 2013). Several tools and technologies have been listed down in the AWS checklist that can be used for backup and recovery in case of an impending disaster. These tools are available and DSI can choose to leverage on them to better shield their application from unforeseen disasters. The checklist includes; Use of non-concurrent information replication innovations The utilization of EBS Snapshot duplicate crosswise over districts Capacity of information in various cloud supplier administration districts Utilizing on S3 object lifecycle arrangements to chronicle information Taking occasional EBS depictions to guarantee speedy recuperation from information misfortune Cloud Service Level Agreement Assessment Distributed computing licenses individuals, associations and general society zone to store their data and do data taking care of in remote servers, setting aside to 20% all things considered. An SLA is an agreement which describes a particular and honest to goodness parts of the organization that is provided by the administration supplier (B.S., Dakshayini, and Guruprasad, 2015). This is important for anyone that wishes to use the cloud services. Regardless, defenselessness over SLAs goes about as a hindrance which banishes the cloud consumers from comprehending how the cloud services are offered amidst the lack of clarity, vocabularies, standard structures, phrasings and estimations that specify a couple. The challenges experienced are becoming an obstacle to several customers that have a need for cloud computing and those looking forward to adopting an SLA agreement from the cloud vendors and this is the reason that explains why several people are slow to take up cloud computing services (Li and Du, 2013). Small enterprises are affected the most because they lack the necessary resources that are used by the large companies in trying to make sense of the terms and conditions contained in an SLA agreement that is to be signed between them and the service provider. Understanding and adhering to a standard method for thinking of an administration level assention is the most ideal method for unite every one of the partners (Gillam, Li, O', and Loughlin, 2014). There are a few methods that the DSI can leverage on to carry out survey and get an understanding of the cloud supplier to be utilized for the organization of the OSDS application. These methods incorporate; Recognizing the partners to the SLA the partners to the consent to be marked by the DSI division ought to be resolved so as to know the sort of relationship that exists. There are five interesting on-screen characters to the cloud SLA understanding and these are; cloud purchaser, supplier, transporter, intermediary and reviewer. Each has its own interesting parts and obligations to play and the right SLA report will unmistakably set out these obligations (Stanik, Kao, and Koerner, 2015). Assessment of the business level strategies after getting the approaches which are communicated in the SLA, it is the obligation of the venture to decide and contrast these arrangements and their own business level approaches. On the off chance that these approaches are not in concordance, then it will convey an issue to the administration of the endeavor and result to poor use of the cloud administrations. In this manner, the cloud strategies ought to be predictable with those of the business. Decide the cloud measurements the motivation behind the SLA is to decide the degree to which the supplier meets its administrations that it expressed that it will give. To know whether these guarantees have been met, there ought to be a method for measuring the achievement and this should be possible by touching base at standard measurements. It is consequently the obligation of DSI as the customer to decide the measurements utilized by the administration supplier as a part of measuring such limitations as accessibility and reaction time. Security the DSI ought to decide the security prerequisites gave by the administration supplier and the necessities from its side with a specific end goal to guarantee an ensured security of the cloud assets. Discovering these necessities is compulsory since the greater part of the guidelines/directions overseeing cloud administrations differ with nations and a sweeping presumption may influence the asset security of the DSI endeavor. Understanding the SaaS, PaaS and IaaS the undertaking ought to comprehend what the terms implies and the sort of cloud that runs them i.e. private, open or half and half. Ordinarily, the terms and conditions in the SLA will be controlled by the many-sided quality of the variables which are given to the shopper by the cloud administration supplier. Conclusion The DSI department needs to carry out a lot from their side in ensuring that the application deployment to the cloud is successful. This entails carrying out a prerequisite assessment of the cloud service provider to ensure that all the services and guarantees in the service level agreement is carried out to the latter by the cloud service provider. To make the work simple, a checklist is used to ensure that all details are considered. This checklist provides a guideline for the cloud customer to ensure that he/she has met all the requirements and that all the assessments have been done in order to facilitate proper deployment of the application. The DSI departments deployment of the OSDS application has to meet all the constraints placed to it in order for the application to be successful in delivering the spatial services to the end user. To facilitate this, Morad and Dalbhanjan AWS requirements checklist has been used to counter-check all the requirements for remote administration, SLA management and resource management. This document was also considered in order to assess the services offered by the cloud vendor as regards application resilience, backup and disaster recovery. The document also highlights the proper guideline for a standard service level agreement between the DSI and the cloud vendor. References B.S., R., Dakshayini, M., Guruprasad, H. (2015). Service Level Agreement based Scheduling Techniques in Cloud: A Survey. Beach, T., Rana, O., Rezgui, Y., Parashar, M. (2013). Cloud computing for the architecture, engineering construction sector: requirements, prototype experience. Journal Of Cloud Computing: Diez, O. Silva, A. (2014). Resilience of Cloud Computing in Critical Systems. Qual. Reliab. Engng. Int., 30(3), 397-412. Herrera, A. Janczewski, L. (2014). Issues in the Study of Organisational Resilience in Cloud Computing Environments. Lee, C. (2016). Cloud Federation Management and Beyond: Requirements, Relevant Standards, and Gaps. IEEE Cloud Comput., 3(1), 42-49. Li, X. Du, J. (2013). Adaptive and attribute-based trust model for service-level agreement guarantee in cloud computing. IET Information Security, 7(1), 39-50. Meland, P., Bernsmed, K., Jaatun, M., Castejn, H., Undheim, A. (2014). Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers. International Journal of Cloud Computing, 3(1), 69. Mustard, S. Harrison, S. (2004). Future requirements for remote telemetry units. Computing and Control Engineering, 15(1), 44-47. Rimal, B., Jukan, A., Katsaros, D., Goeleven, Y. (2010). Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach. J Grid Computing, 9(1), 3-26. Schubert, L. Jeffery, K. (2015). New Software Engineering Requirements in Clouds and Large-Scale Systems. IEEE Cloud Comput., 2(1), 48-58.