cloud computing in higher education in jordan

Upload: world-of-computer-science-and-information-technology-journal

Post on 03-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    1/6

    World of Computer Science and Information Technology Journal (WCSIT)ISSN: 2221-0741Vol. 3, No. 2, 38-43, 2013

    38

    Cloud Computing in Higher Education in Jordan

    Samah A. Massadeh

    Department of computer engineeringFaculty of Engineering Technology

    Amman, Jordan

    Muhammad A. Mesleh

    Department of computer engineering

    Faculty of Engineering TechnologyAmman, Jordan

    AbstractWith the high budget cuts in higher education in Jordanian universities and with the growing demand for information

    technology (IT) services Jordanian Universities should consider adopting cloud computing strategies to meet with this growing

    demand on different IT services and the budget cuts, Cloud computing could offer good business models for Jordanian universities

    since these universities often do not have enough resources and knowledge to manage the necessary information technology (IT)

    support for educational, research and development activities that must be provided in a higher education environment, while cloud

    computing aims to eliminate these complexities from the user.

    This paper describes the importance and the challenges facing higher education in Jordan, introduction to cloud computingtechnologies, services and deployment models, reasons for the rise of cloud computing in higher education as a possible solution for

    the challenges facing higher education in Jordan, a proposed model for universities using Cloud computing technology in Jordan

    and the possible challenges that could face the proposed model.

    Keywords- Cloud Computing; Higher Education; Jordan; Cloud Computing Services; Cloud Computing Challenges.

    I. INTRODUCTIONImportance of higher education in Jordan

    Jordans population is young, with 70% under the age of 30

    and a 94% literacy rate. A well established andmultidisciplinary educational system innovates starting inelementary school (e.g. one lap top per child initiative),delivering specialized Information and CommunicationsTechnologies track option for high school diplomas, and a widearray of advanced Information and CommunicationsTechnologies and Engineering degrees in Jordanianuniversities. Jordan has a higher proportion of universitygraduates in technological fields than any other country in theregion.

    Challenges facing higher education in Jordan:

    With significant budgets needed in higher education and the

    growing demand for information technology (IT) services,universities in Jordan are facing challenges in providingnecessary information technology (IT) support for educational,research and development activities.

    The age of doing more with less has been described as thenew normal in higher education [15][16].

    With escalating expectations for IT resources and servicesyet diminished funding, doing more with less has been on theradar in IT for some time [14].

    That is why educational establishments should seekopportunities to make the way they manage their resourcesmore efficient, and to provide an information andcommunications technology enabled teaching environment.

    II. WHAT IS CLOUD COMPUTING?The National Institute of Standards and Technology

    (NIST), defines and describes cloud computing as a model forenabling ubiquitous, convenient, on-demand network access toa shared pool of configurable computing resources (e.g.,networks, servers, storage, applications, and services) that canbe rapidly provisioned and released with minimal managementeffort or service provider interaction [10].

    Cloud computing is a style of computing wheredynamically scalable and virtualized resources are provided asa service over the Internet. The cloud refers to the datacenterhardware and software that supports a clients needs, often inthe form of data stores and remotely hosted applications. Theseinfrastructures enable companies to cut costs by eliminating theneed for physical hardware, allowing companies to outsourcedata and computations on demand [3].

    The cloud allows systems to dynamically provide thecomputing resources their users need, reducing expenses,energy consumption and improving on their scalability [4],[5],[6]. Hence, if users want to run some applications in a cloud, itis the computer which has to fit into the needs of the users.

  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    2/6

    WCSIT 3 (2), 38 -43, 2013

    39

    The cloud system can thus be considered as a user guidedsystem, since the computing resource is adapted to the usersneeds. Furthermore, an appropriate cloud infrastructuremanager (such as OpenNebula [7], [8] or Eucalyptus [9]) canprovide on demand instantiation, monitoring, and livemigration of VMs. In this manner, fault tolerance andscalability are provided.

    Cloud computing refers to both hardware, software and

    their infrastructure delivered as services over the Internet.

    The cloud model according to (NIST) promotes availabilityand is composed of five essential characteristics, three servicemodels, and four deployment models [10].

    The following five characteristics, as defined by NIST, areconsidered inherent in cloud computing services [10]:

    1. On-Demand Self-Service: Customers can automaticallyprovision computing capabilities and resources on their

    own when needed without necessitating any human

    intervention.

    2. Broad Network Access: Access and capabilities areavailable over the network through standard devices, such

    as cell phones, laptops, PDAs, etc.3. Resource Pooling: Resources such as network bandwidth,

    virtual machines, memory, processing power, storage

    capacity, etc. are pooled together to serve multiple

    customers using a multi-tenant model. That is, virtual and

    physical resources are dynamically assigned and

    reassigned based on need and customers demands.

    4. Rapid Elasticity: Depending on demand, resources andcapabilities can be quickly and automatically deployed

    and scaled at any quantity and at any time.

    5. Measured Service: Customer usage of the vendorsresources and services are automatically monitored

    controlled and reported offering a high level of

    transparency for the customer and vendor.

    Services offered by Cloud computing

    NIST [10] describes three service models:

    Cloud Software as a Service; Cloud Platform as a Service; and Cloud Infrastructure as a Service.

    The differentiators among these three service models arethe nature of the service and the level of customer-vendorcontrol and engagement. Furthermore, it should be noted that

    these models are not mutually exclusive; organizations can anddo employ different cloud service models on varying scales fordifferent departments within the organization based on specificneeds.

    Cloud software as a service (SaaS):The vendorprovides, manages and controls the underlying cloud

    infrastructure, including individual applications,

    network, storage, servers, operating systems, etc. The

    customer is able to fully access the vendors

    applications in the cloud via a variety of devices (e.g.

    cell phone, laptop, PDA). SaaS examples include

    MyErp.com, Salesforce.com and Workday.com.

    Google Docs, Twitter and Facebook also fall into this

    category.

    Cloud platform as a service (PaaS): Similar to SaaS,the vendor provides, manages and controls the cloud

    infrastructure, except for applications, which the

    customer has control over. The vendor provides toolsand resources allowing the customers to create and/or

    acquire applications to meet their specific

    needs. PaaS vendor examples include Wolf

    Frameworks, Dell-Boomi Atmosphere, Heroku,

    Google App Engine and Microsofts Azure [11].

    Cloud infrastructure as a service (IaaS): The vendorprovides, manages and controls the general cloud

    infrastructure but provides the customer control over

    operating systems, storage, processing, and networks

    on demand. IaaS vendor examples include Flexiants

    Flexscale, Rackspace and Amazons Elastic Cloud

    Compute (EC2) and their Simple Storage Service

    (S3).

    We must not assume that cloud products offered by any ofthe above services are likely to work out-of-the-box. In somecases they might, Google Apps, a messaging and collaborationcloud platform from Google, is probably one good example ofthose out-of-the-box products (even though it does requiresome level of configuration nevertheless). Many of theproducts that are offered by those three types of cloud serviceswill require some degree of programming (by the user or thecloud provider) in order to access the functionality that exists inthose services.

    Cloud providers will have created their own APIs(application programming interfaces) so that softwaredevelopers can use them to create client applications in order toaccess that functionality.

    Deployment Models

    These deployment models, as defined by NIST[10], are notdefined by operator, location or physically but by the serviceoffered and type of community. Similar to cloud servicemodels, the deployment models are not mutually exclusive.

    Private cloud: The cloud infrastructure is operatedsolely for an organization. It may be managed by the

    organization or a third party, and may exist on

    premise or off premise. Community cloud:The cloud infrastructure is shared

    by several organizations and supports a specific

    community that has shared concerns (e.g., mission,

    security requirements, and policy and compliance

    considerations). It may be managed by the

    organizations or a third party, and may exist on

    premise or off premise.

    Public cloud: The cloud infrastructure is madeavailable to the general public or to a large industry

  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    3/6

    WCSIT 3 (2), 38 -43, 2013

    40

    group, and is owned by an organization selling cloud

    services.

    Hybrid cloud: The cloud infrastructure is acomposition of two or more clouds (private,

    community or public) that remain unique entities but

    are bound together by standardized or proprietary

    technology that enables data and application

    portability (e.g., cloud bursting for load balancing

    between clouds).It is essential to understand that the service models,

    deployment models and the five characteristics of cloudcomputing as described by NIST [10] do not run independentlybut are necessarily interrelated and connected to each other.Jerry Bishop, the Chief Information Officer at ChippewaValley Technical College in Wisconsin, created a visual (seeFigure 1) that displays these inter-relationships and necessaryconnections of the NIST cloud computing characteristics andmodels (Bishop, 2011). This visual demonstrates that a cloud-based strategy can take on different configurations dependingon the institutions needs. It is not uncommon for institutions tobegin with one service model, such as SaaS and a Public Clouddeployment model as a pilot, and then slowly scale if the pilot

    proves successful. It is also possibly to use several deploymentmodels to support one or more service models (as indicated bythe various red, green, and grey arrows) depending again on theinstitutional needs and costs.

    Figure 1: Services Offered by Cloud Computing

    CLOUD COMPUTING AS A POSSIBLE SOLUTION FOR THE

    CHALLENGES FACING HIGHER EDUCATION IN JORDAN

    Cloud computing services provide universities with theopportunity to continue to take advantage of the new ITtechnologies as it has the following advantages

    Reducing management cost: Cloud computing could helpJordanian universities to reduce the operation and

    management cost. In particular, management cost is

    important as, with cloud computing, academic staff can

    focus on their own research, instead of dealing with the

    complexity of high performance computing systems. This

    benefit also meets the main slogan of the cloud computing

    industry.

    Reducing resource cost: Universities can reduce oreliminate IT capital expenditures and decrease ongoing

    operating expenses by paying only for the services they

    use and potentially by reducing IT staff.

    Ease of implementation: Without the need to purchasehardware, software licenses, or implementation services,any university can deploy cloud computing easily.

    Elasticity and scalability: The cloud is elastic, meaningthat resource allocation can get bigger or smaller

    depending on demand. Elasticity enables scalability,

    which means that the cloud can scale upward for peak

    demand and downward for lighter demand. Scalability

    also means that an application can scale when adding

    users and when application requirements change.

    Self-service provisioning: Cloud customers can provisioncloud services without going through a lengthy process.

    The customer requests an amount of computing, storage,software, process, or more from the service provider.

    After these resources are used, they are automatically

    deprovisioned.

    Standardized interfaces: Cloud services havestandardized APIs, which provide instructions on how

    two application or data sources can communicate with

    each other. A standardized interface lets the customer

    more easily link cloud services together.

    III. A PROPOSED MODEL FOR UNIVERSITIES USING CLOUDCOMPUTING TECHNOLOGY IN JORDAN

    To demonstrate how Cloud Computing services can beutilized and the processes involved in their utilization.

    We will take as an example of a typical Jordanianuniversity with an IT infrastructure that should satisfy theneeds of students, teaching staff and management, researchstaff and software developers (e.g., Web developers).

    As we all know the demand for IT services in thisenvironment is directed to the IT Services Department(Computer Center) whose job is to:

    - Provide students and staff with software (e.g., email

    accounts, operating systems, productivity applications,

    malware detectors and cleaners, etc.) and hardware (e.g., PCs,

    Servers, etc.).

    - Provide researchers and postgraduate students with the

    required special software and hardware to run experiments that

    are likely to involve a great deal of processing and

    computation.

    - Provide Web developers with the development tools needed

    to write and host Web applications.

    http://www.librarystudentjournal.org/index.php/lsj/article/view/289/321#bishop2011http://www.librarystudentjournal.org/index.php/lsj/article/view/289/321#bishop2011
  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    4/6

    WCSIT 3 (2), 38 -43, 2013

    41

    Figure 2: A Simplified structure of the main users of IT services in a typical

    Jordanian university.

    Many aspects of the arrangement can be migrated to thecloud as demonstrated in Figure 3. For example, students,administrative staff and lecturers can be made to use theservices of providers of SaaS and IaaS clouds. These serviceswill be ideally accessed through thin clients.

    Any software launched by these groups of people resides onthe servers of the SaaS cloud provider and is accessed online.

    Any requirement for disk space or additional hardware(e.g., a virtual PC or a virtual Server) is executed immediatelyonline by the IaaS cloud provider.

    The same situation applies to the developers category inthis scenario. Developers can now use all the software theyneed for their development online and all the hardware forhosting their applications through a PaaS cloud provider.

    Finally, researchers whose projects require a great deal ofprocessing power and/or additional server capacity can do so atthe click of a button through an IaaS cloud provider.

    TABLE I. SERVICE MODEL OF A CLOUD ARCHITECTURE IN A TYPICALJORDANIAN UNIVERSITY.

    SaaS Management

    ApplicationsBusiness

    ProcessesCollaboration

    Student

    Information

    PaaS Management

    Programming

    Environment.Middleware Databases

    Execution

    environment

    IaaS Management

    Servers Network Operating systems Computing

    Figure 3: A Simplified structure of the main users of IT services in a typical

    Jordanian university using the services of cloud computing.I believe that when considering a Cloud Strategy for Higher

    Education in typical universities in Jordan a very importantpoint that should be taken into consideration is the dataprotection issue, special attention must be paid to the sensitive

    data from the university (for example, research results,students scholastic records, employees accounts). The mainstep that may be taken regarding data is to maintain thesensitive data within the institution data centers (ComputerCenter) and externalize the other data with the risk of achievingsome latency for many applications and users

    The best development model is using a hybrid cloud since apublic cloud is both owned and managed by the serviceprovider and the university has no control on it, and its accessis only limited by subscription, on the other hand the privatecloud is owned and managed by the university and its accessedis limited only to students and faculty, staff of the university.

    To solve the data protection issue access to sensitive data

    should be limited, hence should be stored on the private cloudof the university, any other data should be stored on the publiccloud so the users would take advantage of the new CloudComputing technology, another good reason why shoulduniversities create their own private clouds for their own coreapplications.

    Many important steps should be taken in the preparation forcloud-computing adoption, whether public or private:

    1. Identify all potential opportunities and benefits forswitching from existing computing arrangements to cloud

    services.

    2. Ensure that in-house infrastructure complements cloud-based services. The shift to cloud services is not all-or-nothing, and some cloud services (for instance,

    infrastructure services) will support the ability of in-house

    IT to extend into some clouds for additional compute and

    storage capacity. Virtualization will be a critical piece of a

    compatible infrastructure.

    3. Develop a cost/benefit and risk-evaluation framework tosupport decisions about where, when, and how you can

    adopt cloud services. Develop a roadmap for optimizing

    the current IT environment for adoption of public and

  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    5/6

    WCSIT 3 (2), 38 -43, 2013

    42

    private cloud services. Identify which, if any, data cannot

    be held in public cloud-computing environments for legal

    or security reasons. White Paper

    4. Identify and secure in-house competencies that will berequired to manage effective adoption of cloud services.

    5. Evaluate technical challenges that must be addressedwhen moving any current information or applications into

    a cloud environment, even a private cloud.

    6. Ensure that the networking environment is ready for cloudcomputing.IV. POSSIBLE CHALLENGES THAT COULD FACE THE

    PROPOSED MODEL

    The use of Cloud Computing in higher education must beanalyzed both from the benefits point of view, as well as fromthat of the risks and limitations.

    Not all applications run in cloud Security: The key concern is data privacy: users do not

    have control or know where their data is being stored.

    Interoperability: A universal set of standards and/orinterfaces have not yet been defined, resulting in a

    significant risk of vendor lock-in.

    Control: The amount of control that the user has over thecloud environment varies greatly.

    Performance: All access to the cloud is done via theinternet, introducing latency into every communication

    between the user and the environment.

    Reliability: Many existing cloud infrastructures leveragecommodity hardware that is known to fail unexpectedly.

    Regarding the implementation risks, a research conductedby the IDC Enterprise Panel [10] concluded that the primaryconcerns about adoption in higher education are: security,performance and availability, not enough ability to customize,worried on-demand will cost more, bringing back in-house maybe difficult, regulatory requirements prohibit cloud, and notenough major suppliers yet.

    I must emphasize that the security and data protection risksis the main concern about the adoption of cloud computing inhigher education. The transfer of the research results and theknowledge between cloud and networks and moving theknowledge to external providers may become an attractivetarget to attackers. These aspects, according to a studyconducted by EDUCAUSE based on 372 member institutions[12], are considered top barriers.

    The most important risks regarding security are: loss ofgovernance, lock-in, isolation failure, compliance risks,management interface compromise, data protection, insecure orincomplete data deletion, and malicious insider [13].

    V. CONCLUSION:Cloud computing is still young in terms of adoption in

    higher education.

    The expectation is that it will undergo several changes inthe future, in terms of resources, issues, risks, and ultimatelybest practices and standards.

    However, there are some sought advantages that it can

    potentially provide value for institutions of higher education.On-demand services can resonate positively with the currentuniversity tight budgets across Jordan. Several benefits of thetransition to cloud computing were pointed out in this paperalong with concerns regarding the general implementation.

    The key question remains whether or not it makes sensefrom a business and strategic point of view to move to cloudcomputing and the answer is that it depends on various factorsthat were mentioned above.

    One main conclusion that we draw from this research is thatcloud computing may have considerable potential in improvingthe IT application and infrastructure at higher educationinstitutions. However, it is strongly recommended that early

    adopters plan the transition carefully and keep in close contactwith organizations that establish industry standards, such asNIST, in order to ensure a uniform and smooth transition.

    Another important outcome is that it may be practical tofollow a hybrid approach where, university IT management andadministration may decide to pursue a hybrid approach thustransitioning some application and data to cloud computingwhile leaving others to be served in-house.

    REFERENCES

    [1] G. Marker. (July 2010, Cloud computing: The objective of the cloud.Informtica Hoy Available: http://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.php.

    [2] S. Olsen. Sun's john gage joins al gore in clean-tech investing. (July2010), On-line: http://news.cnet.com/8301-10784_3-9964131-7.html.[3] AMIT GOYAL and SARA DADIZADEH, A Survey on Cloud

    Computing.

    [4] Public Data Sets on Amazon Web Services, Web page athttp://aws.amazon.com/publicdatasets. September, 2010.

    [5] Amazon Elastic Compute Cloud, Web page athttp://aws.amazon.com/ec2/.

    [6] Amazon Simple Storage Service, Web page athttp://aws.amazon.com/s3/.

    [7] B. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, Virtualinfrastructure management in private and hybrid clouds, InternetComputing, vol. 13, no. 5, pp. 1422, Sept 2009.

    [8] OpenNebula, Web page athttp://www.opennebula.org/. last access: 14thSeptember, 2010.

    [9] Eucalyptus, Web page athttp://http://www.eucalyptus.com/. last access:14th September, 2010.[10] Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

    National Institute of Standards and Technology, U.S. Department ofCommerce. (Special Publication 800-145). Retrievedfromhttp://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

    [11] Metz, R. (2010). Cloud Computing in Higher Education: Changing theWay We Provide Systems. Retrieved fromhttp://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928

    http://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.phphttp://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.phphttp://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.phphttp://news.cnet.com/8301-10784_3-9964131-7.htmlhttp://aws.amazon.com/publicdatasetshttp://aws.amazon.com/publicdatasetshttp://aws.amazon.com/ec2/http://aws.amazon.com/ec2/http://aws.amazon.com/s3/http://aws.amazon.com/s3/http://www.opennebula.org/http://www.opennebula.org/http://www.opennebula.org/http://http/www.eucalyptus.com/http://http/www.eucalyptus.com/http://http/www.eucalyptus.com/http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfhttp://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfhttp://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfhttp://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928http://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928http://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928http://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928http://www.educause.edu/Resources/CloudComputinginHigherEducatio/200928http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdfhttp://http/www.eucalyptus.com/http://www.opennebula.org/http://aws.amazon.com/s3/http://aws.amazon.com/ec2/http://aws.amazon.com/publicdatasetshttp://news.cnet.com/8301-10784_3-9964131-7.htmlhttp://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.phphttp://www.informatica-hoy.com.ar/lanube/Cloud-Computing-el-objetivo-de-la-nube.php
  • 7/29/2019 Cloud Computing in Higher Education in Jordan

    6/6

    WCSIT 3 (2), 38 -43, 2013

    43

    [12] Goldstein, B. (2008). The tower, the cloud and the IT leader andworkforce. In R. Katz (Ed.), The tower and the cloud. EDUCAUSE (pp.238-261). Retrievedfromhttp://net.educause.edu/ir/library/pdf/PUB7202x.pdf

    [13] Catteddu, D., & Massonet, T. (2010). Cloud computing: Benefits, risks,and recommendations for information security. Retrievedfromhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdf

    [14] Green, K. C. (2003). Striving to do more with less, again. Retrievedfromhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspx

    [15] Duncan, A. (2010). The new normal: Doing more with less SecretaryArne Duncans remarks at the American Enterprise Institute. Retrievedfromhttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-institut

    [16] Durso, T. W. (2011). First things first. University Business Magazine.Retrieved fromhttp://www.universitybusiness.com/moe/1883

    [17] http://www.librarystudentjournal.org/index.php/lsj/article/view/289/321[18] Cloud Computing in Higher Education , Marwin Britto University of

    WisconsinMilwaukee.

    [19] http://info.apps.gov/content/what-are-deployment-models[20] http://www.dummies.com/how-to/content/cloud-computing-cheat-

    sheet.html

    http://net.educause.edu/ir/library/pdf/PUB7202x.pdfhttp://net.educause.edu/ir/library/pdf/PUB7202x.pdfhttp://net.educause.edu/ir/library/pdf/PUB7202x.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://www.universitybusiness.com/moe/1883http://www.librarystudentjournal.org/index.php/lsj/article/view/289/321http://www.librarystudentjournal.org/index.php/lsj/article/view/289/321http://info.apps.gov/content/what-are-deployment-modelshttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://www.dummies.com/how-to/content/cloud-computing-cheat-sheet.htmlhttp://info.apps.gov/content/what-are-deployment-modelshttp://www.librarystudentjournal.org/index.php/lsj/article/view/289/321http://www.universitybusiness.com/moe/1883http://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://www.ed.gov/news/speeches/new-normal-doing-more-less-secretary-arne-duncans-remarks-american-enterprise-instituthttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://campustechnology.com/articles/2003/05/striving-to-do-more-with-less-again.aspxhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://www.trust-itservices.com/download/Cloudscape-II/Channel_presentations/Tuesday_11.00-13.00/Philippe_Massonet-Cloud_Computing_Benefits,risks_and_recommendations_for_information_security.pdfhttp://net.educause.edu/ir/library/pdf/PUB7202x.pdf