Saturday, December 28, 2019

Swot Analysis Of Rowland Co And Owc Company - 1045 Words

I like to have a mutual understanding of the possible cooperation between Rowland Co and OWC company where I is cofounder and a managing partner. I totally understand, that the capital investments involves risk. In order to help you with the risk assessments I would like to hear from you, what is most important information you need to realistically look at the big picture and make the decision. We can describe the risk by evaluation of Financial, Market , Technical and Management feasibility for our enterprise. Financial: OWC invested available capital into developing engineering solutions and knowhow for the depleted oil wells and reservoirs. Significant studies, testing and deployment were done in the Soviet Union and the†¦show more content†¦The Short-term Energy outlook for the end of 2016 is $40/b, For 2017 $50 The Forecast West Texas Intermediate (WTI) at the end of 2016 around $38/b Operating Cost In the US Average Operating cost per barrel $13.50. The most expensive is the shale operations. The cost varies from the Texas Permian Basin to the Marcellus shale. For conventional well cost-effective prices to maintain many existing wells is $10/b across the US. To increase the oil output the oil operators are facing the decision: drilling new wells or subscribe to the Enhancing Oil Recovery (EOR). We can argue that the correct EOR is more cost effective to the drilling new wells. In many places the drilling is financially prohibited at the current oil price. Technical: There are many methods intended to increase the wells productivity: Chemical, thermal, magnetic pulse generators ,CO2 and many others . All of the above methods in certain circumstances could make improvements in few additional barrels. It is not my intention to conduct and provide comparison studies. Our methods were built around the Hydro Slotted Perforation. The technology is based on the uploading rock stress around the wellbore zone and in opening a hydrodynamic communication that instigates the drastic increase in the oil output. Depending on the formation, we can increase oil output in average to 25 barrels/day. We could use additional methods centered

Friday, December 20, 2019

False Appearances in Macbeth - 895 Words

Darkness, fear, mayhem, guilt and hypocrisy are all important themes which are carried throughout the play. The use of imagery in reference to blood, light versus dark, false appearance and disease reinforce these themes. The imagery appears to tiptoe through every scene to create a malevolent atmosphere of shame and false pretence. One of the key themes in the play that was reinforced and highlighted by the use of imagery was false appearance. The use of imagery to portray false appearance can be seen when Lady Macbeth tells Macbeth to ...look like the innocent flower but be the serpent under it. Also, this portrayal of false appearance can be seen after the murder of Duncan, when Donalbain states that â€Å"There are daggers in men’s†¦show more content†¦In act five Macbeth wishes that the doctor could have the power to restore his country back to having pristine health. This is ironic because it seems that he is unaware that he is the disease of the land. This imagery highlights the theme of corrupt kingship in the play. Kingship is often linked with blood in Macbeths role throughout the play. The use of bloody imagery occurs over fifty times in the play. Thus, it is safe to say that blood is the dominant image used. The first few scenes are blood-soaked. For instance in the opening scene a soldier runs in from war, gives Duncan the latest news and then cries my gashes cry for help! this effectively sets the tone of blood of the play. Also in the first scene Macbeths sword is described to have been used with â€Å"bloody execution† as he killed through the many ranks of his enemies. Though it can be said that the bloody imagery is just that (of murder and injury); it can also be said that blood has also been used to portray guilt. The guilt Macbeth feels for murdering Banquo is apparent when he sees his (Banquos) ghost in the banquet scene. He shouts at the spirit to stop waving its gory (blood-soaked) locks at him. But, Macbeth is not the only one to feel remorse; Lady Macbeth is plagued by an image of a damned (red) spot of blood on her hand which can symbolise the inescapableShow MoreRelatedAppearance vs. Reality; The Cause of a Hero’s Downfall1025 Words   |  5 PagesIn the tragedy Macbeth; the reader witnesses the inevitable downfall of the tragic hero Macbeth as he attempts to do the impractical. While Macbeth turns from an admirable nobleman into the traitor fiend that is the result of his wife’s relentless coaxing, the reader distinguishes more and more of the â€Å"appearance versus reality† or the â€Å"things are not what they seem† theme that intertwines with Macbeth’s hubris thus leading to his downfall. As Macbeth furthers his plans, which fall in step with theRead MoreMacbeth - Appearance vs. Reality1537 Words   |  7 PagesAppearance vs. Reality – Macbeth: Commentary Macbeth is a play written by William Shakespeare, which focuses on the life of Macbeth. Out of the four Shakespearean play categories, it is categorized as a tragedy, as the events of the play ultimately lead to the downfall of the protagonist, Macbeth. The theme of appearance versus reality is constantly repeated throughout the play, as it greatly contributes to the development of the plot. The idea is constantly conveyed by the characters using a pleasantRead MoreMacbeth Appearance vs Reality1046 Words   |  5 PagesAppearance vs. Reality The role of deception and the motif of appearance and reality had a large role in Shakespeare’s play, Macbeth. The motif of appearance and reality is first introduced by Shakespeare early on in the play when Macbeth must cover up for the murder of Duncan. This motif of appearance versus reality, or deception, appears again when Macbeth fools the murderers that killed Banquo. Macbeth tricks the murderer’s into believing it was Banquo’s fault that they led such miserableRead MoreAppearances are Deceiving in Shakespeares Macbeth. Reference quotes to the text and lines cited.1495 Words   |  6 PagesThe Renaissance play The Tragedy of Macbeth, written by William Shakespeare, truly demonstrated a compelling tale of greed, power, and jealousy. The play revealed the turn of a good nobleman into a powerful and greedy king. It showed audiences how one crime led to another and eventually to a gruesome melee. Throughout the tragedy there appeared to be a reoccurring th eme stated finest as appearances are deceiving. The audience is first introduced to the theme in the first scene of the play where theRead MoreDeceptive Appearances in Macbeth1362 Words   |  6 PagesShakespeare’s Macbeth, a selfish Scottish thane becomes over-ambitious and commits several murders in order to gain and stay in power. After the murders, Macbeth evades suspicion by hiding his guilt and intentions, therefore deceiving others into thinking that he is innocent. Other characters including Lady Macbeth, the witches and the Scottish thanes also use their appearances to hide the truth and deceive others. With these examples, Shakespeare shows that appearances can be deceiving. Macbeth usesRead MoreAppearance vs Reality in Macbeth772 Words   |  4 PagesFair is foul and foul is fair, chant the witches in the opening scene of Macbeth. With this apparent contradiction a seed is sown for the examination of what is indeed a major theme of the play. False appearance and apparition recur regularly throughout the story. The audience and even the characters themselves are often unsure of the distinction between what appears to be real and what actually is. Shakespeare makes a great statement through the play of how easily one can deceive and be deceivedRead MoreSupernatural in Hamlet754 Words   |  4 Pagesplays. In two such plays, Hamlet and Macbeth, the supernatural is an integral part of the structure of the plot. It provides a catalyst for action, an insight into character, and augments the impact of many key scenes. The supernatural appears to the audience in many varied forms. In Hamlet, the most notable form of the supernatural that appears is the gh ost. However, in Macbeth, a ghost, a floating dagger, witches, and prophetic apparitions make appearances. The role of the supernatural is veryRead MoreAnalysis Of Shakespeare s Macbeth By William Shakespeare1236 Words   |  5 PagesDanna Santillan English H 2 Period 2 22 October 2016 Are Things Truly How They Appear? All things have an appearance, most of the time blissfully untainted or highly corrupt. Dependent upon the appearance something is illustrated to have, we layout our own supposition about it. This idea of equivocation is abundant in Shakespeare’s tragedy, Macbeth. In Macbeth, Shakespeare exposes literary devices such as illustrative imagery, sarcastic similes, and dubious diction to unveil one of his manyRead More Comparing the Supernatural in William Shakespeares Hamlet and Macbeth 921 Words   |  4 PagesComparing the Supernatural in William Shakespeares Hamlet and Macbeth  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   In the time of William Shakespeare there was a strong belief in the existence of the supernatural. Therefore, the supernatural is a recurring theme in many of Shakespeares plays. In two such plays, Hamlet and Macbeth, the supernatural is an integral part of the structure of the plot. It provides a catalyst for action, an insight into character, and an augmentation of the impact of many key scenes. TheRead MoreWilliam Potter s Macbeth 1247 Words   |  5 PagesMacbeth, a tragedy play written by Shakespeare, illustrates the damaging physical and psychological effects of political ambition on those who seek power for its own sake. Harry Potter, a series of fantasy, fiction novels written by J.K Rowling, chronicles the life of a young wizard, Harry Potter, a chain adventure of his friends, all of whom are students at Hogwarts School of Witchcraft and Wizardry. Despite the fact that these two books may seem completely unreliable, there are indeed, certain

Thursday, December 12, 2019

Historical Structure of Chicagos and LAs Racism free essay sample

Headgears analysis of the Hamburgs, and the Conservative Vice Lords in Chicago, and the Crisp and Bloods videos analysis of gangs in LA, discuss how Headgears concept of demoralizing, and Cornell Wests concept of nihilism, have an objective basis in the historical structure of Chicago and LAs racism. In John M.Headgears book A World of Gangs he states, An increasingly frustrated and demoralized population will reluctantly turn to armed non-state actors who can provide security of a sort, a sense of identity, perhaps the sole local supply of Jobs, ND rudimentary services that the state cannot or will not offer (Headgear p. 21). This notion Is supported when one analyzes and considers the story of the Hamburgs and the Conservative Vice Lords of Chicago.Consider the following; during the industrial era many newly freed slaves of the South moved North into industrialized cities looking to build a better future, rather than having their kids become accustomed to the same racism they dealt with day In and day out In the South. People in their community started to become users and this led to dysfunctional families where the mom is a drug addict and dad is in jail for being apart of the gangs that distribute and make their money off of the only line of work that was available to them.With the drug game being dominated primarily by males, women sought income too by selling their bodies to prostitution. That said, the economic factors were not the primary drivers of C.V. into the drug business, Other contributing factors Were the deterioration f their Allendale community, caused by denationalization that drove the C.V. to a third world trajectory of social exclusion (Headgear p. 83). The Hamburgs (HA) enjoyed a much different outcome. In essence, the C.V. became isolated due to no political, police and/or social acceptance.This is the defining role of modern day demoralizing in ghettos all across the world. Nihilism can be defined as lifelessness, hopelessness, loveless-news and gang based mentality (No matter how bad I got it Ill always have something). Cornel West states, Nihilism among African Americans spread after the 1 9605, though most feel that its roots go all the way back to the time of slavery and years and years of racism (Headgear p. 57). He goes on to say that, He hope of the asss was blown up when the IIS government failed to live up to its promises of the war on poverty (Headgear p. 57). For example, these nihilistic fallacies are expressed by famous rapper Kenya West in a hit song, Cue when you try hard, thats when hay die hard his meaning being washes the point of trying in a white dominated country where if I try my hardest, in the end you will just be left more disappointed due to no acceptance. This led to African Americans feeling cynical about freedom.In the video Bloods and Crisp: Made in America it was clear that gangs replaced immediate families, were about unity and gave members a sense of purpose that they had lost as a result of social exclusion and other educational, occupational, and economical opportunities. Question #2: Discuss the significance of Manuel Chattels devastating picture Of the popularization and social exclusion Of the Fourth World and are the concepts of institutionalizing and defensible spaces, for understanding he history of gangs in Chicago, Cape Town, and ROI De Jeanine.Social exclusion and economic popularization are key elements in what Castles says are policies aimed at the dismantling of the welfare state in the IIS and the West. He says that when the state can no longer provide adequate employment, protection, services, or security for expanding, closely tied and quartered urban populations that the potential for illegitimate forces of violent, private groups can and will move in to fill the void. (Headgear p. ) According to Manuel Castles and John Headgear major gangs that have been round for decades have spread outside their original neighborhoods, and have evolved from wild peer groups to organized criminals with a gang identity are labeled or defined as institutionalized. Gangs are considered institutionalized because they are continually increasing the members in their group and have some sort tie to their community. They are impossible to remove, because their members and those, or the youth, that will ultimately become their members have no other options.The fact is they have been around and exist for years and years. Some may raise the question, Well, if o incarcerate the top dog Or the kingpin Wont everything just fall apart? The answer is no. Many gangs of today and also in the past are highly decentralized. This means that they are not laid out in a bureaucratic or hierarchical fashion; there is not one chief at the top of the pyramid and many foot soldiers below. Headgear states that, Institutionalized gangs are not merely an expendable tool of dynamic leaders or sustained only by profits of drug sales.These gangs are living organisms instilling in their members, as well as the community, a belief in the organization itself (Headgear p. ). Its like a tradition that is handed down from generation to generation. Defensible Spaces can be defined as areas or communities in which those who do not live in that community do not want to be visited by the general public or police. This creates an invisible barrier where these communities become safety nets for gang bangers, drug dealers, prostitutes etc. Here they consciously know that they can commit a violent, crime with little chance of getting caught. The business of the gang can be managed unencumbered. As described in the movie Bloods and Crisp: Made in America, there was an invisible line drawn right through the center of south LA, one side being black and the other white. With a police force of predominately white male officers their inclination was to patrol and keep safe the people of their own community and leave the poor black communities to fend for themselves.The fact that the gangs in Chicago, Cape Town, and ROI De Jeanine were able to sell drugs within defensible spaces allowed them to institutionalize. Whether in housing projects or vales (as they are know in ROI De Jeanine) the affect was the same, it provided a safe haven from police. In Chicago, dense ND crowded projects provided a defensible space for gangs to carry out their drug trafficking without the threat of police activity. In ROI De Jeanine, on the other hand, they built their vales in the mountains, this location separated them from exotic beaches and pr ovided natural barrier. Their buildings were very close and tight quartered living conditions made it easier for them to keep their trafficking under the radar, another benefit to this was that they could see police coming to from a far so they used tactics similar to the military to alert everyone in the vales to take cover and hide all incriminating evidence. In Cape Town, the gangs control the turf, not the police; and it has been that way for many generations.It is clear as Headgear points out that, defensible spaces appear to be important conditions for the institutionalizing of gangs (Headgear p. 15). In conclusion, the history and perseverance of gangs in Chicago, Cape Town, and ROI De Jeanine lead one to conclude that even if conditions change overtime, gangs are able to adapt to these circumstances, and make due with resources given. Also, a loss of leadership to prison or death will not deter their ability to adapt and thrive in he changing environment around them.Question #3: Why does Headgear ar gue that hip-hop and its gangs rap variant are cultural answers to the permanence of racism and oppression, and have become a contagious culture of rebellion that expresses a resistance identity for youth worldwide? Rap and hip-hop are the base of the contagious culture of rebellion. This is true because the certain kind of music that African Americans portray is how they are affiliated with their community, it is how they express themselves and how they see themselves not by how others project statistics and how they see things.Hip-hop would give people that lived in ghettos a sense of hope and helped take their mind off of their nihilistic thoughts of how they live. Complementing my last statement, Africa Bumboat, respectfully known as the grandfather to the origination of hip-hop once stated, When we made hip-hop, we made it hoping it would be about peace, love, unity and having fun so that people could get away from the negativity that was plaguing our streets (Headgear p. 93).Bombasts goal was to pull kids from the self-hatred and destructive behavior that is an all-too common response to poverty and schism (Headgear p. 95). With this insight from an innovator of hip-hop culture we can point out that hip-hop was more positive than negative because it had th e capacity to point kids into a better direction and change their lives. On the other hand gangs rap, which is actually a submerge of hip-hop was more hardcore in the fact that Macs rapped about how they lived and put into perspective how they thought about the public, government, police etc.With popularity in this specific area of music and culture there was money to be made and the ghettos where these rap artists were derived from id not see much of this profit, the liberal white businessmen saw money signs so they had the financial ability to exploit this lifestyle. Therefore gangs rap skyrocketed in all musical polls all across the country; not only was it was it residing in ghetto communities that were listening to this contagious music and lifestyle, it was actually aimed mostly towards affluent white teenagers that fantasized about exotic experience of thug life.The most power that comes with this mass spread of negative violent genre topping music boards is that it gave many people across the country the mindset of Im going to get rich, or die tr ying (50 Cent). This quote made famous by African American rapper Curtis Jackson (50 Cent), did not show people of color to condone themselves into the drug market and gang life but provoked it.

Wednesday, December 4, 2019

Organisational and Environmental Factors †Free Samples to Students

Question: Discuss about the Organisational and Environmental Factors. Answer: Introduction During the past few years there has been a solution which appeared in the field of the information technology, which is the cloud computing, it is impossible to ignore it since the cloud computing enables the business to outsource the data, electronically mail, folders as well as the other programs via the virtual setups via the medium of the servers that are attached between them. This data could be reached wherever anytime (Abadi, 2009). The only necessity for the cloud computing would be to have an offered connection of the internet. The influences of the cloud computing has brought a number of changes not merely in the global efficiency of the business, in addition to their internal organization particularly in the IT department. This opportunity is modifying on the way the usual method in the business are carried out such as the back-up of the data (Abadi, 2009). The cloud computing has brought new tools as well as new perspectives of the evolution for the business which are usi ng it. The term cloud computing is regarded as the data which is stored and could be accessed via the internet and not in the traditional way from the hardware of the computers. The cloud computing for business is aimed at providing the holistic view of how cloud computing relates to the business world (Abdollahzadegan, Hussin, Razak, Moshfegh Gohary and Amini, 2013). In this research it will provide a review of the advantages and the disadvantages to which the cloud computing has brought to the business. The aim of this research is to explore on the current cloud computing market with the critical analysis of the advantages and the disadvantages it bring to the businesses (Abadi, 2009). This is geared as being the reference point to the business enterprises who are willing to use the cloud in utilizing its objective. The scope of this study has been limited to the peripheral of the cloud computing complexity and that of the business. This research would give the common reader a clear understanding to the issue which will be discussed (Alshamaila, Papagiannidis and Li, 2013). This study has a wider coverage but the focus of the study is on the advantages and the disadvantages of the cloud computing for the business. Analysis of the advantages and disadvantages of cloud computing In this section of the literature review it will highlights on the main advantages and disadvantages of the cloud computing for the business. Advantages of the cloud computing The cloud computing presents a lot of benefits for the business, some of these are as follows; Cost efficiency: The cloud computing is regarded as the cost effective method to use, sustain as well as upgrade for the business (Aljabre, 2012). The traditional desktop software cost business a lot in relation to the finances. Increasing to the licensing fees for the numerous users that could turn out to be very costly particularly for the establishment which are concerned. With regards to the cloud computing it really is offered at an appreciably lower rates and therefore it could lower on the company costs (Alshamaila, Papagiannidis and Li, 2013). Additionally, there are numerous onetime payment, pay while you go along with other scalable options available, that makes it to be particularly reasonable for the organizations. Backup and recovery: This benefit is important in that all the data is stored in the cloud, backing it up in addition to restoring the same is extremely easier than storing it on the bodily devices for example the hard drives (Alshamaila, Papagiannidis and Li, 2013). Furthermore, many of the cloud services providers are in a position to the level that they can handle the recovery of the data (Aljabre, 2012). Consequently, this make the entire process of backing along with the recovery to be much easier than the other traditional methods which are useful for storage of the data. It is also crucial that you note that in some instances, the cloud itself could be utilized as the repository backup of the data especially to the local computers. Automation of the software integration: when it comes to the cloud computing, the software integration is something which occurs automatically. This hence signifies that one does not have to take the additional initiatives to be able to personalize in addition to integrate on the software according to one preferences (Al-Rousan, 2015). This aspect typically takes care of itself. Furthermore, in the cloud computing it enables one to personalize on the numerous alternatives with significantly ease (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). The businesses are able to handpick the services as well as the software programs which they think will suit best to their organization. Scalability and performance: The aspect of scalability is an in-built feature for the deployments of the cloud. Example the cloud are integrated instantly only as required and as result, one only require to pay for the programs in addition to the data storage that one needs (Velte, Elsenpeter and Elsenpeter 2010). Hand in hand, it also comes flexibility, given that the clouds might be extended to satisfy on the altering information technology system demands (Al-Rousan, 2015). In relation to the performance, the system usually use distributed architectures which offer a great speed of the computations. Additionally, the responsibility of the provider could be to make sure that the solutions could operate on the cutting edge machinery (Al-Rousan, 2015). The situations can certainly be added for the immediately enhanced performances and the clients will surely have a use of the overall tools of the primary of the cloud through their dashboards. Device diversity and the location indepen dence: The cloud computing services could be accessed via the plethora of the electronic devices that are in a position to have accessibility to the internet. These device constitute not merely the conventional PCs, however along with the smartphones and the tablets (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). With the cloud BYOD policy they could be designed very easily, enabling the employees to bring their private owned devices to the work environment. Additionally, a client might determine which the devices to use are along with the where to access the service from (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). There is absolutely no restriction of the place and the medium. Businesses can gain access to their programs and the data from anywhere on the globe, hence making this approach to be essential for the business (Sajid and Raza, 2013). The cloud computing is this manner since it is appealing to the internal organization since it offered the versatility for the employees to gain access to on the business files whenever they are. Reduced support and hardware needs: As one move much more crucial application for the enterprise in the cloud, they might most likely note that there is no need for upgrade of the computers consistently as many of the staff can do without the higher end of the computers (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). The reason being the actual computing is not taking place on the computer. An example a two hundred dollars tablet can access the salesforce as well as the Google Apps accounts much quicker as the two thousand dollars premium computers (Aljabre, 2012). The cloud computing infrastructure requires a much smaller information technology employees as comparison to the traditional IT set up which does. This is because the organization will not be managing on the software anymore. Disadvantages of the cloud computing The business have encountered many drawbacks of the cloud computing, these aspect are discussed as below: Security: Although the providers of the cloud services implement the best security protocols, standards and the industry specification, storage of the data and vital files to the external service provider could pose a risk to the business (Assuno, Calheiros, Bianchi, Netto and Buyya, 2015). Through use of the cloud powered technologies highlights that one needs to offer your service provider with the use of these types of essential business data. Furthermore, being a public service opens up cloud providers to the security issues each day (Garrison, Wakefield and Kim, 2015). The easy of procuring along with accessing the cloud services could offer nefarious users the ability to scan, recognize along with exploit the loopholes and the vulnerabilities that might be within the system (Alshamaila, Papagiannidis and Li, 2013). An illustration might be in the multi-tenant cloud architecture in which there are several users who are hosted on the similar servers, an attacker might try to brea k into the data of the other business that are managed as well as stored on the same servers. Nonetheless, these exploits and loopholes which are inclined not to surface and the likelihood of the compromise is not great. The cloud vendors heading out of the business: The cloud computing is evolving field, and there is undoubtedly the danger that a new business might cross the business or maybe radically change on the service (Marston, Li, Bandyopadhyay, Zhang and Ghalsasi, 2011). Any specific sudden change in the service might not be too detrimental in case one was using the application for one time project, but this could be disastrous if a business is using it for the entire donor database (Rittinghouse and Ransome, 2016). When one is evaluating the cloud providers, it is important to find which options one could have when it comes to backing up as well as extracting on the data. Contracts and the obligations: when a business put their applications in the cloud they may think there application is safe. But they do not forget that the programs needs to be maintained and the OS needed to host the applications and they need to be managed and patched more regularly (Garrison, Wakefield and Kim, 2015). If the business does not make sure who is responsible for the security of the programs you are in sure trouble (Garrison, Wakefield and Kim, 2015). Therefore, when it comes to signing of a contract with the cloud service providers it is important to make it clear what are the obligations of the business and those of the cloud providers in regards to cloud security, management and data privacy. Technical issues It is true that the data as well as information on the cloud might be accessed anytime and from anyplace, there are time nevertheless that the system might have severe irregularities concerns (Raghava and Singh, 2014). The businesses should know the fact that the technology is actually prone to the outages along with other technical issues (Chandrasekaran, 2014). Even the best cloud service providers can come across such trouble, despite the high standards of the maintenance. Furthermore, organizations requires a good connection of internet to be logged to the server all the times. In case there is network and the connectivity problems the organization could be stuck. Cost: initially, the cloud computing application would seem to be less expensive compared to a particular software solution which is set up and run in-house (Garrison, Wakefield and Kim, 2015). Moreover, the companies need to ensure that the cloud programs have all the capabilities which the software should have and to identify the ones that are missing functions (Chandrasekaran, 2014). There is a need for a total cost assessment which must be carried out to make sure that these application are not costly. Most of the cloud computers vendors they present themselves as the utility dependent providers, and they more regularly claim which they only charge for which the clients use , however this is not true ins many of the case (Nkhoma, Dang and De Souza-Daw, 2013). An organization should commit to a predetermined contract that is independent to the actual use. Businesses should look closely with regards to the pricing plans and the details for each of the program. There is the challenge of inflexibility: when the organization choose a cloud computing vendor, it means they will be locking their proprietary application or the formats (Chandrasekaran, 2014). An example, it becomes impossible to insert a document which is created in another program into the Google Docs spreadsheet (Chandrasekaran, 2014). Additionally, a business needs to be able to add or even subtract the cloud computing user as necessary as their business grow. Conclusion The cloud computing has been a quick changing area which will continue undoubtedly in playing the major role for the organizations. Like everything else, the cloud computing has advantages as well as disadvantages. This technology can prove to be a great asset to the business, however it can also result in harm in case it is not comprehended and used accordingly. The cloud computing can be an opportunity for the business to balance on the efforts that are implied by the information technology management , which is limited to the disadvantage of the cloud , as discussed in the research . The major concern raised is the security concern which relates to the organization taking their business data in then cloud. The recommendation to this issue is to adopt the cloud computing to the scaled-down section of the business application to allow business to count down the advantages and determine the risks. References Abadi, D.J., 2009. Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull., 32(1), pp.3-12. Abdollahzadegan, A., Hussin, C., Razak, A., Moshfegh Gohary, M. and Amini, M., 2013. The organizational critical success factors for adopting cloud computing in SMEs. Aljabre, A., 2012. Cloud computing for increased business value. International Journal of Business and social science, 3(1). Alshamaila, Y., Papagiannidis, S. and Li, F., 2013. Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework. Journal of Enterprise Information Management, 26(3), pp.250-275. Al-Rousan, T., 2015. Cloud Computing for Global Software Development: Opportunities and Challenges. In Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications (pp. 897-908). IGI Global. Assuno, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A. and Buyya, R., 2015. Big Data computing and clouds: Trends and future directions. Journal of Parallel and Distributed Computing, 79, pp.3-15. Apostu, A., Puican, F., Ularu, G.E.A.N.I.N.A., Suciu, G. and Todoran, G., 2013. Study on advantages and disadvantages of Cloud Computingthe advantages of Telemetry Applications in the Cloud. Recent Advances in Applied Computer Science and Digital Services. New York: Wseas, 200, pp.118-123. Chandrasekaran, K., 2014. Essentials of cloud computing. CRC Press. Garrison, G., Wakefield, R.L. and Kim, S., 2015. The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), pp.377-393. Gutierrez, A., Boukrami, E. and Lumsden, R., 2015. Technological, organisational and environmental factors influencing managers decision to adopt cloud computing in the UK. Journal of Enterprise Information Management, 28(6), pp.788-807. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J. and Ghalsasi, A., 2011. Cloud computingThe business perspective. Decision support systems, 51(1), pp.176-189. Nkhoma, M.Z., Dang, D.P. and De Souza-Daw, A., 2013, May. Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach. In Proceedings of the European Conference on Information Management Evaluation (pp. 180-189). Raghava, N.S. and Singh, D., 2014. Comparative study on load balancing techniques in cloud computing. Open journal of mobile computing and cloud computing, 1(1). Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press. Sajid, M. and Raza, Z., 2013, November. Cloud computing: Issues challenges. In International Conference on Cloud, Big Data and Trust (Vol. 20, No. 13, pp. 13-15). Velte, A.T., Velte, T.J., Elsenpeter, R.C. and Elsenpeter, R.C., 2010. Cloud computing: a practical approach (pp. 1-55). New York: McGraw-Hill.