Sunday, December 29, 2019

Essay on Gender Stereotypes in the Merchant of Venice

Themes in the Merchant of Venice Gender stereotypes are not a modern notion and as such expectations and limitations have always existed for both men and women. Fortunately women, who have formerly beared great burdens of discrimination, now have very liberated roles in society as a result of slowly shifting attitudes and values. Shakespeare was integral in challenging the subservient role expected of women in the 16th century. Throughout the play, ‘The Merchant of Venice’, women are expressed as powerful characters who behave, speak and live in a way that breaks away from the conformist role of females during the 16th century. Therefore, the submissive stereotype expected of women in Shakespearean time is confronted and defied through†¦show more content†¦Overall, this positions the audience to view women as strong characters who confront the stereotype of women as possessions in Elizabethan time. The characterisation of Jessica further challenges the role and expectations for women in the 16th century. Jessica is initially bound to her Jewish father, but later elopes with her lover, Lorenzo, defying the most prominent male in her life to live by her own free will; definitely not a common practice of her time. Jessica’s courage and strength which are exemplified through her actions and are also expressed in the quote; ‘I am a daughter to his blood; I am not to his manners’ (Act 2, Scene3, 18-19). When Jessica says this as she betrays her father to secretly marry Lorenzo, it is clear that she possesses a strong sense of defiance and strength against this dominant male, showing that she is free to be her own person and is not going to let her life be run by her father. This brave and controversial act by a young girl is in stark contrast to the expectations of 16th century society, revealing a hint of disrespect in the character of Jessica that is admired as a sign of her power. Overall, the actions of Jessica exemplify Shakespeare’s construction of women as powerful characters whoShow MoreRelatedTo Kill a Mockingbird and the Merchant of Venice861 Words   |  4 PagesStereotypes are saying bad things about someone because they belong in a certain group or race Shakespeare’s The Merchant of Venice and Harper Lee’s To Kill a Mockingbird both are based on the theme of stereotypes. In the next 3 paragraphs I will talk about stereotypes in To Kill a Mockingbird, The Merchant of Venice, and finally compare the stereotypes in both. There are many stereotypes and these 2 stories contain many that are alike. One big theme in To Kill a Mockingbird is stereotypes.Read MoreThe Merchant Of Venice By William Shakespeare1102 Words   |  5 Pagespassed, but even today, women are being treated unfairly in certain situations. However, in The Merchant of Venice, William Shakespeare challenges the concept of women being unequal to men. He conveys this message through the actions of Jessica, Portia, and Nerissa. The female characters empower themselves, accomplishing various tasks in order to gain control over the men in their lives. The Merchant of Venice is a highly effective feminist play, which is demonstrated through the assertive and cleverRead MoreThe Merchant Of Venice By William Shakespeare1153 Words   |  5 Pagesprogressed as time has passed, but even today, women are treated unfairly. However, in The Merchant of Venice, William Shakespeare challenges the concept of women being unequal to men. He conveys this message through the actions of Jessica, Portia, and Nerissa. The female cha racters empower themselves, accomplishing various tasks in order to gain control over the men in their lives. The Merchant of Venice is a highly effective feminist play, which is demonstrated through the assertive and cleverRead MoreStereotypes and The Merchant of Venice1611 Words   |  7 PagesStereotypes are a fixed image of all members of a culture, group, or race usually based on limited and inaccurate information resulted from the minimal contact with this stereotyped groups. stereotypes have many forms; people are stereotyped according to their religion, race, ethnicity, age, gender, coulor, or national origins. This kind of intolerance is focused on the easily observable characteristics of groups of people. In general, stereotypes reduce individuals to a rigid and inflexible imageRead MoreThe Roles of Portia and Shylock in The Merchant of Venice Essay1776 Words   |  8 PagesStereotypes for every different religion, ethnicity, culture, and gender exist among the minds of the human race. These typecasts have ruled this world for as long as there has been diversity among people. In Shakespeare’s comedic tragedy, The Merchant of Venice, one prejudice is very central to the theme. The play is dominantly set in Venice, one of the most liberal cities of the Renaissance era. In this place and time period, anti-Semitism is very much in force. The Jewish people are discriminatedRead MoreBackground and Influence: Merchant of Venice1447 Words   |  6 Pagespeople of different races, ethnicities, and even genders. The religious conflicts stemmed from the differing translations of G-ds word. This created conflicts and segregation by religion, turning some people into aliens in their own country. The battles existed between Catholics, Jews, and Protestants although, for the majority of the time, the Protestants pitted the Jews and Catholics on the same side, against themselves. In The Merchant of Venice, a play that was later dubbed a comedy, tragedyRea d MoreRepresentation Of Diversity : The Birth Of A Nation Essay1449 Words   |  6 PagesAmerican males as being associated with a life of crime. In the film, Morris suffered from this negative stereotype. One-day Marijuana was found at his community center. The director of the center immediately assumed that the contraband marijuana belonged to, and was brought in by Morris. Morris had not actually brought the marijuana into the center, but the representation of his race and gender from the media makes him prone to this negative association. The media taking characteristicsRead MoreStereotyping of Jews Essay1277 Words   |  6 Pagespromoters of or victims of the unremitting nature of stereotypes. According to the Webster’s dictionary, a stereotype is defined as â€Å"a simplified and standardized conception or image invested with special meaning and held in common by members of a group.† Most stereotypes take on a negative form and are based on characteristics such as age, gender, race, status, and personal beliefs. Generally speaking, the greatest problem that arises with stereotypes is that they judge group of people by the characteristicsRead MoreAnalysis Of The Movie The Merchant Of Venice 1918 Words   |  8 PagesPerformance Analysis of T he Merchant of Venice Jordan Thomas Mullineaux-Davis William Shakespeare has regularly throughout time been referred to and could be viewed as anti-Semitic because of the cultural implications within many of his plays. A particularly strong example of this could be The Merchant of Venice. This essay will explore arguments of post-colonialism within The Merchant of Venice, discussing the pertinent issues of anti-semitism, racial isolation and prejudice. It will also commentRead MoreGender Roles And Roles Of William Shakespeare s The Merchant Of Venice 1837 Words   |  8 Pages Gender plays an important role in Shakespeare’s comedies. Cross gender roles and cross dressing are essential not only for the inherent humour of the situation but also for the advancment of the plot. English Renaissance stereotypes of women and men and their various roles and responsibilities in society are reflected in Shakespeare. What sets Shakespeare apart is the fact that he also challenges, and at times even breaks down those stereotypes especially in his comedies. Hamlet may proclaim â€Å"Frailty

Saturday, December 21, 2019

Only 5% of women in the United States naturally posses...

Only 5% of women in the United States naturally posses the body type portrayed in the media.( ) Everyday young women and teens are surrounded by media, whether its magazines, television, radio, or newspapers. The media has a big impact on our every day lives and can take a negative toll. Teens and young women look up to the women that they see and hear about in media. They see different haircuts, outfits, and different body types that influence them, and the people in charge of media know this. The media portrays dangerous and unrealistic ideals of womens bodies that can be life threatening for them. This could ultimately lead to eating disorders, depression, and or unnecessary cosmetic surgery. The look of women has changed†¦show more content†¦This means that a person will take in huge amounts of food without feeling or having the power to stop. Binge eaters even sometimes eat when theyre not even hungry and continue even when theyre full. Anorexia is another eating disor ders where a person is very scared of gaining weight and see themselves differently than others when they look in the mirror. People that suffered from anorexia either have a ridiculous diet, like only eating a few nuts and carrots through the day, to prevent them from gaining weight or purging. Bulimia can get confused with binge eating disorder, but bulimia is when a person has moments where they eat for no reason, its periodic. Explaining why people say that you can eat your feelings. After one eats, they feel guilty and decide to regurgitate. Another result of how media affects a person is depression. Depression is an intense feeling of sadness that occurs. Many people just say that its a mental factor, but it can begin when something like losing family happens. Depression can affect how you act and think causing a person to possibly have struggles doing everyday normal things. Symptoms of depression includes: isolation, thoughts of suicide, self hate, and change in appetite a lso leading to weight loss of weight gain. ( ) In a moment of weakness a woman could decide to change their bodies by getting unnecessary cosmetic surgery. Everybody reads about who got a face life, who got their lipsShow MoreRelatedCapstone Project712 Words   |  3 Pagesstudied, what was already presumed about this topic, if there are personal experience associated with this topic that might create obstacles, if this topic benefited the field of education, and if this topic sustained a prolonged focus to complete the Capstone project. Reason Why the Topic Wanted to be Studied The reason why the topic of engaging dental hygiene students with the use of technology that supported active learning wanted to be studied was to see if technology engaged dental hygiene studentsRead MoreCapstone1388 Words   |  6 PagesTable of Contents Executive summary 3 Effects of a leveraged recapitalization 4 EPS 4 Financial Distress and Flexibility 4 Value to shareholders 6 Signalling effects 6 Conclusion and Recommendations 7 References 8 Appendix 9 (Appendix A) 9 Interest Coverage Ratio Calculations (Appendix B) 9 Optimal Capital Structure (Appendix B-2) 9 WACC 9 Exhibit 2.Earnings and per share amounts 10 Exhibit 6. Key industrial financial ratios 11 Exhibit 7. Capital market conditions 12 â€Æ' ExecutiveRead MoreCapstone Reflection1238 Words   |  5 Pagespaper; that is, different people can be expected to reflect uniquely on the simulation experience. Just think about your simulation experience for a while and then write about what stands out to you.    3. You should keep in mind that this is a capstone/strategy class; accordingly, your reflections may address strategic (rare, consequential, directive) issues, as well as varied authors, topics, and business functions.    4. It is appropriate for you to reflect on the simulation in relation toRead MoreCapstone Format4756 Words   |  20 PagesTechnology (BSIT) program prepares students to be IT professionals, be well versed on application installation, operation, development, maintenance and administration, and familiar with hardware installation, operation, and maintenance. (CMO 53 s. 2006) Capstone project is required for the BSIT program. It should be in the form of a systems application or an enterprise resource plan (CMO 53 s. 2006). The skills, methods and theories learned by the students in their stay in the BSIT program are applied inRead MoreCapstone Project2852 Words   |  12 PagesAppendix 1: Title Page format lt;insert capstone project title heregt; A Capstone Project presented to the Department of Information and Computer Studies Faculty of Engineering University of Santo Tomas in partial fulfilment of the requirements in the degree of Bachelor of Science in Information Technology lt;proponent 1 Last name, First name, MIgt; lt;proponent 2 Last name, First name, MIgt; lt;proponent 3 Last name, First name, MIgt; lt;proponent 4 Last name, FirstRead MoreCapstone Project3814 Words   |  16 Pagesï » ¿ Technical Writing Project Cover Sheet Capstone Proposal Project Name: Network Security Survey Student Name: Peter Planica Degree Program: Information Technology – Security Emphasis Mentor Name: Ted Reasoner Capstone Project Waiver/Release Statement Acknowledgement It is the policy of Western Governors University (â€Å"WGU†) that student Capstone projects should not be based upon, and should not include, any proprietary or classified information or material belonging to your employer orRead MoreCapstone Project3045 Words   |  13 PagesCAPSTONE PROJECT WRITING GUIDE Chapter | Subsections | What to write | Sample Output | Introduction | 1.1 Project Context | a. Set the basic context * What is the big picture for the problem you are working with? b. State the research Question * What will you do in your project and what problem will you solve? c. Summarize your approach *how will you do that? | Cloud computing is considered to be a new computing paradigm where applications, data and Information Technology servicesRead MoreCapstone Project15365 Words   |  62 PagesThe Student Guide to the MSA Capstone Project Part 1: The Research Proposal and the Research Project Central Michigan University August 2012 Contents What is the MSA 699 Project? ........................................................................................................ 4 Overview of the MSA 699 Project................................................................................................... 5 Plagiarism and Ethics ..........................................Read MoreBusiness Capstone Essay935 Words   |  4 PagesCapstone Project: BUS485 The structure of this assignment is comprehensive and integrative. It requires synthesis and evaluation of information, skills and knowledge developed throughout the BS program at KBCOB. This 8 week assignment (introduced the 1st week of the class) will serve as a culminating project. Each week, the student will have a specific portion to submit (hereunder) as described in the modules. Prepare each assignment according to the APA guidelines found in the APA Style GuideRead MoreWgu Capstone8760 Words   |  36 Pagesvulnerable areas of his networks and the recommendations for making it more secure and GLBA compliant; now that the assessment is completed the client is aware of the vulnerabilities and the areas where they are not meeting GLBA requirements. My capstone will focus on the steps that will assure compliance for (ABC Loans). Payday loan companies are regulated by the Federal Deposit Insurance Corporation, and they require that financial institutions adhere to their guidelines. The points I will focus

Friday, December 13, 2019

Buisness and the Recession Free Essays

How AIG was affected by U. S. recession: AIG is an insurance corporation that is multinational. We will write a custom essay sample on Buisness and the Recession or any similar topic only for you Order Now They have headquarters in New York City, London, Paris, and Hong Kong. In the year 2000, the company held the title for the 29th largest company in the world. Things took a turn for the worse in this company when, in 2008, they suffered from a liquidity crisis and its credit ratings were downgraded below â€Å"AA† level. AIG had to take out a number of down loans and had to sell a number of its subsidiaries to pay them all off. Source: Johnson, Rodney. â€Å"Is AIG a Tipping Point in This Recession? Chief Marketer Home Page. 24 Mar. 2009. Web. 14 May 2012. . How Sallie Mae was affected by U. S. recession: This Company was one of the few companies in business at this time of recession that was affected in a positive way. With more and more companies failing and people losing their jobs, this gives all Americans many more reasons to want to have higher education and provide their children with higher education. With the need for more education, comes all the extra costs, and w ith more and more people without jobs, there is a great increase in needing loans. That is exactly what this company’s strategy was and they took full advantage of the opportunity to give student loans to students across the country hoping for a successful future. Source: â€Å"Sallie Mae. † Wikipedia. Wikimedia Foundation, 18 Apr. 2012. Web. 14 May 2012. . How Lehman brothers was affected by U. S. recession: the Lehman brothers crisis first began when Britain’s biggest mortgage lender crashed 34 percent in early trading. Next, billions of dollars were wiped out when the FTSE fell below 4000 and it seemed to be all downhill from there. Within the next month following the Lehman Brothers crash, Bank of America took over Merrill Lynch and Mortgage giants Fannie Mae and Freddie Mac practically fell apart. Source: Gamm, Scott. â€Å"Three Years Ago: Lehman Brothers Collapsed. † How to Save Money, Reduce Debt and Manage Credit Cards. 15 Sept. 2011. Web. 14 May 2012. . Government action: In response to the economies recession the government took a number of actions. Programs were put in place called automatic stabilizers that would increase spending or cut taxes to whoever was impacted by the ecession, without new legislation. Actions were taken by the Federal Government in support of the housing and financial markets, increases in discretionary spending, and the passing of stimulus bills. Source: Romer, Christina D. â€Å"From Recession to Recovery: The Economic Crisis, the Policy Response, and the Challenges We Face Going Forward. † The White House. White House, 22 Oct. 2009. Web. 14 May 2012. . Do you fe el any of the companies played a role in creating the current recession or their own financial hardships? Do you feel they should have been more prepared to overcome financial hardships? Why or why not? I think for the most part, companies did the best they could to avoid recession, but when it comes to creating their own financial hardships, taking out multiple loans did not help any of the companies at all. I do agree that yes, they should have been more prepared to overcome the financial hardships and have more options instead of putting themselves further into debt. Should the government get involved in â€Å"bailing out† major U. S. corporations? Why or why not? If the government can be of any help that doesn’t push themselves or the company into further damage then I don’t believe there is any reason not to. Should companies be required to pay the government back? Yes absolutely. The governments money comes from us, the citizens and it is not fair that we would have to be paying off someone’s financial burdens without the government being paid back, because then we would be having to give more money when we may have financial burdens of our own. How to cite Buisness and the Recession, Essay examples

Thursday, December 5, 2019

Department of the Spatial Information

Questions: 1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjans operational checklists for DSIs OSDS. This section should be no more than two to three pages in length. 2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length. Answers: Introduction The Department of the Spatial Information (DSI) is the department of the state government that functions to provide proper as well as appropriate spatial information to the various government departments. The main functions of the DSI are to give spatial information to the public as well as government. Therefore, in order to give spatial information, DSI develops web services that used to deliver information using developed applications. This suite of web services, as well as applications for the DSI, is the Online Spatial Delivery System. With the use of this system, DSI makes their business processes more efficient as well as fast by providing information to the public services as well as government departments. DSI chooses Amazon Web Services cloud vendor for assessing the management requirements as well as provisions of the Service Level Agreement (SLA). This report reflects on the use of Online Spatial Delivery System by the DSI. It discusses the requirements for the remote administration, SLA as well as resource management. It consists of the Morad and Dalbhanjans operational checklists for the Online Spatial Delivery System of DSI. It summarizes the use of application resilience, disaster recovery as well as a backup for the chosen cloud provider. Finally, the guidelines of SLA assess the chosen cloud provider which helps to overcome with the SLA issues of DSI. 1.0 Requirements of remote administration, SLA and resource management in DSIs Online Spatial Delivery System DSI involved into a number of new projects to develop its business functionality by increasing the demand for spatial data (Rajarajeswari Aramudhan, 2014). The Executive Management of the DSI proposes to support their new Online Spatial Delivery System program by increasing the internal DSI capacity of the data centre in order to host as well as support their new proposed system. In order to provide more spatial information to the public as well as government, DSI requires developing their web infrastructure as well as supporting services (Barz Bassett, 2016). Therefore, the organization requires increasing in the data centre as well as bandwidth available to DSI. DSI desires to mitigate the Online Spatial Delivery System to the Amazon, cloud provider. It allows the organization to expand the data into internal maintenance system (Benslimane et al. 2014). It also helps to move the completed data to the cloud based delivery system for the purpose of publication. Requirement of remote administration: In order to work the new delivery system of DSI efficiently, there is a requirement of refresh the client side spatial system with new data baseline. In order to do so, remote maintenance services are required to synchronize the data against the system database (Rajarajeswari Aramudhan, 2014). Once the new baseline is established, then the remote administration services maintain the synchronicity of the data of client against the master data by upgrading the data bundles. Requirement of Service Level Agreement (SLA): SLA codifies the particular parameters and gives remedies for failure of the system requirements. It gives detailed system infrastructure for Online Spatial Delivery System for DSI as well as security standards that should be maintained by the service provider (Kracheel, Bronzi, Kazemi, 2014). It also consists of the rights in order to audit their compliance. The most vital functions of SLA are to ensure that the cloud meets the system requirements of the DSI. In order to develop the SLA within DSI, the following criteria are being established such as: Encryption of the stored as well as transmitted data Disaster recovery expectations Location of the data and access to the data Requirement of resource management: Before the implementation of Online Spatial Delivery System in DSI, it is required to evaluate the software as well as hardware requirements for the system (Sampaio Barbosa, 2016). While evaluation of the software resources, it includes performance, licensing and functionality. In the spatial information system software, the activities are command driven, and it requires the users to type the command in the system in order to execute the tasks (Almutairi et al. 2012). The software vendors are providing recommended specifications for the hardware in their websites. Even this system is compatible with the operating system used by the council such as UNIX, Windows, and Linux, etc. 1.1 Morad and Dalbhanjans operational checklists for Online Spatial Delivery System of DSI Amazon web services (AWS) uses the Morad and Dalbhanjans operational checklists to implement the delivery system for DSI that provides with a suite of infrastructure services that used to deploy their applications (Benslimane et al. 2014). The operational checklists used to evaluate if the system should give benefits to the DSI. Operational checklist items Description Security and Access Management Has DSI developed the security strategy to manage AWS, operating systems, data access as well as the network? Application high availability/ Resilience Does the AWS solution exceed the systems high availability as well as requirements of resilience? Application Disaster Recovery/ Backup Does the AWS solution exceed the systems disaster recovery as well as requirements of backup? Configure and change Does DSI have both configurations as well as change management for the resources for ASW? Asset Management Does DSI have identification strategy as well as tracking the resources of ASW? Release and Deployment Management Has DSI determined to integrate application releases as well as deployments to configuration strategy? Monitoring and incident management Has DSI configured monitoring tools to ASW resources into incident management processes? Billing and account governance Has DSI developed billing and account management? 2.0 Discussion of considering the application resilience, backup and disaster recovery for chosen provider based to Online Spatial Delivery System DSI has successfully operated their cloud applications on the Amazon Web Services. The application resilience, disaster recovery as well as backup increase the deployment as well as free operations of the organization (Ferwerda, Herendeen, Mousseau, 2015). These three strategic considerations are considered for existing as well as new application deployments on the AWS. DSI invests time as well as resources for assessing the operational willingness of the applications before launching higher rate of satisfaction of the organization (Chinneck, Litoiu, Woodside, 2014). The following are the operational strategies that provide best practices that DSI considers while developing an Online Spatial Delivery System for their organization. The three operational strategies are as follows: Application Resilience: The chosen cloud provider for DSI, Amazon Web Services provides an infrastructure that builds blocks in order to help DSI to meet their organizational requirements cost effectively (Wu Buyya, 2012). Effective application resilience consists of redundancy, various availability zones, load balancing, monitoring, recovery as well as auto scaling within the region. The following are the AWS that DSI considers while leveraging for application resilience: Running on various Amazon EC2 instances in various availability zones Auto-scaling for automation instance recovery (Chang et al. 2014). Elastic load balancing to balance load across various availability zones (Epstein Khan, 2014). Leveraging of synchronized data replication technologies such as database mirroring Multi-AZ Amazon Radio Data System used for various availability zones managed databases Backup: While loading large amount of data, the automated backups of ASW is used. This automated backup disables point-to-time recovery of the loaded data. The backup strategy of ASW consists of backup of the file data, database as well as machine images. Backing up the data for database contrasts from the web as well as application layers (Yang et al. 2015). Overall, databases contain a large number of business information in database-particular arrangements that must be held and secured at all times. In these cases, it is required to influence effective information development methods, such as snapshots to build backups that are fast, space efficient as well as reliable. Amazon RDS creates storage volume snapshot for the DB instance DB snapshots are the user-initiated backups. The database backups are storing by the Amazon RDS (Epstein Khan, 2014). Using of EBS snapshot copy across the various regions Amazon EC2 instance used to run the database (Narula Jain, 2015). Amazon Glacier is used to achieve the data Disaster Recovery: Each of the application requires disaster recovery requirements that require to recovery point as well as time objectives. The disaster recovery restricts the physical proximity among both primary as well as disaster recovery sites (Nogueira, Medhi, Doverspike, 2014). Effective disaster recovery strategy includes regional redundancy, global traffic management, and monitoring as well as region-to-region recovery. The following are the techniques of ASW that should be considered as part of the disaster recovery strategy: Storing of data and addition instances in various AWS regions Use of Amazon Glacier in order to achieve the data (Rose Krausmann, 2013). Leveraging of Amazon S3 versioning in order to provide protection for storing the data Leveraging of asynchronous data replication technologies such as database log shipping (Wei et al. 2015). Taking of periodic Amazon snapshots as well as any third party tools for quick recovery from the loss of data 3.0 Using of Erls SLA guidelines in order to assess SLA for chosen provider Amazon service level agreement is the policy leading the use of Amazon elastic compute cloud (Amazon EC2) below the terms as well as conditions of the Amazon Web Services customer agreement. It utilizes industrially sensible effort to formulate Amazon EC2 each accessible with a Monthly Uptime Percentage of no less than 99.95%, for every situation amid any month-to-month charging cycle. In the occasion, Amazon EC2 does not assemble the Service Commitment; it will be capable to obtain a Service Credit. Amazon web services cloud compliance enables the customers to know the robust controls at AWS in order to continue both securities as well as data protection within the cloud. Amazons service level agreement at various levels is categorized as follows: Customer based SLA: Amazon web services make an agreement with the customers group (Colman-Meixner et al. 2015). This agreement is done between the supplier as well as finance department for the services such as payroll system, finance system as well as a billing system. Service based SLA: It is an agreement for all the clients using the services that are provided by the service providers. Corporate level SLA: It covers all the SLA issues that are accurate to each of the customers through the organization (Newcombe et al. 2015). The issues are less volatile as well as updating is required. Customer level SLA: It covers the SLA issues that are relevant to the customer groups. It is mainly for meeting the customer's requirements (Azevedo et al. 2014). Data privacy is the top priority for AWS as they are delivering cloud services to millions of customers such as governmental and public services. Service level SLA: It covers all the SLA issues that are specific to the services such as customer groups (Janiesch Niemann, 2012). Monitoring, as well as reporting on the cloud performance, is based on the experience of the end user ability in order to consume the resources. AWS provides their customers to manage access to the content. They are providing a set of access, secure logging features as well as encryption techniques to help them secured their data. AWS Cloud Trail helps the customers to access the data. AWS develops a security assurance program using the global privacy as well as data protection techniques to help their customers establish a secured control environment. These security controls are validated by the third party independent assessments. Security by Design is the security assurance advance that used to formalize the AWS account design. It also automates the security controls as well as streamlines the auditing. AWS Security by Design is used to plan for the security as well as consistence abilities for all periods of security by permitting the client to outline everything inside the AWS client environment. It authorizes logging, trust connections, encryption implementation, and mandatory approved machine pictures. Security by Desi gn empowers clients to computerize the front-end structure of an AWS account, dependably coding security and consistence into AWS accounts, making the resistance of IT controls a thing of past times. Conclusion It is concluded that the Department of the Spatial Information (DSI) proposes to implement the Online Spatial Delivery System for increasing the demand for the spatial data. The Executive Management of the organization proposes to support this system implementation so that they can successfully implement it. Therefore, the management supports the implementation for increasing the infrastructure of the web as well as supports the services in the department. By increasing the DSI data centre, it supports as well as hosts the new implementation of the Online Spatial Delivery System. The chosen cloud provider for the DSI is Amazon Web Services. The executive management of the DSI decides that they are required with two of assessments such as technical management as well as service level agreement. The risks that DSI identifies are the security issues that are required to overcome with security assurance program. Remote support administrations are required to synchronize the information against the framework database. The most vital functions of SLA are to ensure that the cloud meets the system requirements of the DSI. It likewise comprises of the rights with a specific end goal to review their consistency. The most indispensable elements of SLA are to guarantee that the cloud meets with the framework necessities of the DSI. DSI contributes time and in addition assets for evaluating the operational ability of the applications before dispatching higher rate of the fulfillment of the association. References Almutairi, A., Sarfraz, M., Basalamah, S., Aref, W., Ghafoor, A. (2012). A distributed access control architecture for cloud computing.IEEE software,29(2), 36. Azevedo, L. G., Diirr, T., Baio, F., Santoro, F. (2014). A Business Model for Managing SOA Initiatives.iSys-Revista Brasileira de Sistemas de Informao,7(1), 4-33. Barz, H. W., Bassett, G. A. (2016).Multimedia Networks: Protocols, Design and Applications. John Wiley Sons. Benslimane, Y., Plaisent, M., Bernard, P., Bahli, B. (2014, December). Key Challenges and Opportunities in Cloud Computing and Implications on Service Requirements: Evidence from a Systematic Literature Review. InCloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on(pp. 114-121). IEEE. Chang, S. E., McDaniels, T., Fox, J., Dhariwal, R., Longstaff, H. (2014). Toward Disaster Resilient Cities: Characterizing Resilience of Infrastructure Systems with Expert Judgments.Risk Analysis,34(3), 416-434. Chinneck, J., Litoiu, M., Woodside, M. (2014, March). Real-time multi-cloud management needs application awareness. InProceedings of the 5th ACM/SPEC international conference on Performance engineering(pp. 293-296). ACM. Colman-Meixner, C., Develder, C., Tornatore, M., Mukherjee, B. (2015). A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications. Epstein, B., Khan, D. C. (2014). Application impact analysis: A risk-based approach to business continuity and disaster recovery.Journal of business continuity emergency planning,7(3), 230-237. Ferwerda, P., Herendeen, J., Mousseau, R. P. (2015).U.S. Patent No. 9,129,104. Washington, DC: U.S. Patent and Trademark Office. Janiesch, C., Niemann, M. (2012). Supporting USDL by a Governance Framework. InHandbook of Service Description(pp. 415-444). Springer US. Kracheel, M., Bronzi, W., Kazemi, H. (2014). A Wearable Revolution: Is the smartwatch the next small big thing?.IT ONE Magazine 2014,7(December), 18-19. Narula, S., Jain, A. (2015, February). Cloud Computing Security: Amazon Web Service. InAdvanced Computing Communication Technologies (ACCT), 2015 Fifth International Conference on(pp. 501-505). IEEE. Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M., Deardeuff, M. (2015). How Amazon web services uses formal methods.Communications of the ACM,58(4), 66-73. Nogueira, M., Medhi, D., Doverspike, R. (2014). Disaster resilience in communication networks [Guest Editorial].Communications Magazine, IEEE,52(10), 44-45. Rajarajeswari, C. Aramudhan, M. (2014). Ranking Model for SLA Resource Provisioning Management.International Journal Of Cloud Applications And Computing,4(3), 68-80. Rose, A., Krausmann, E. (2013). An economic framework for the development of a resilience index for business recovery.International Journal of Disaster Risk Reduction,5, 73-83. Sampaio, A. M., Barbosa, J. G. (2016). Energy-Efficient and SLA-Based Resource Management in Cloud Data Centers.Advances in Computers. Wei, F., Ouyang, C., Barros, A. (2015, June). Discovering Behavioural Interfaces for Overloaded Web Services. InServices (SERVICES), 2015 IEEE World Congress on(pp. 286-293). IEEE. Wu, L., Buyya, R. (2012). Service Level Agreement (SLA) in utility computing systems.IGI Global. Yang, H., Zhang, J., Zhao, Y., Ji, Y., Han, J., Lin, Y., Lee, Y. (2015). CSO: cross stratum optimization for optical as a service.Communications Magazine, IEEE,53(8), 130-139.