Thursday, August 27, 2020

Comparing Seamus Heaney Poems Follower, Mid-term Break, and Digging Ess

In this exposition I will think about three Seamus Heaney sonnets we took a gander at in class these are called, â€Å"Follower†, â€Å"Mid-term Break† and, â€Å"Digging†. There are contrasts just as likenesses, the similitudes include: they are largely sonnets about and set in Seamus’ beloved recollections What's more, all the sonnets pretty much utilize a portion of the equivalent beautiful gadgets and strategies like: sound to word imitation and a portion of similar characters show up in every one of the three sonnets, for example, as: Seamus (himself clearly) and his dad. The distinctions incorporate the reality, â€Å"Mid-term break† which is progressively passionate as I would like to think. What's more, is about a totally extraordinary circumstance at that point, â€Å"Follower† and, â€Å"Digging†, which are determined to the ranch Seamus lives on and is about him watching his dad while he deals with the homestead and how Seamus feels about him. While the general circumstance in, â€Å"Mid-term break,† is that Seamus’ four-year-old sibling has passed on. He is removed from the Collage, â€Å"Sickbay† or emergency treatment room where he is standing by to be taken to his younger siblings memorial service by his nearby neighbors they are getting him for two potential reasons: A) There is no notice of Seamus’ family having a vehicle. B) Even if Seamus’ family had a vehicle the farther would not be fit to drive in light of the fact that Seamus sees his father on the Porch crying as a result of his lost of a child if he somehow managed to drive he would consider his child rather than the street ahead and behind him and might wind up being covered with his child and the exact opposite thing the family needs is another passing yet more precisely it is the exact opposite thing the spouse needs since she would have lost her multi year old child as well as her better half too, leaving her with just Seamus and herself. The first Seamus Heaney sonnet I... ...hing is unique and that incorporates bits of education work any sort of proficiency work, from letters to books any a few kinds of proficiency work are not the equivalent regardless of whether they are on the whole sonnets or all letters they are on the whole extraordinary (except if you duplicate it in exactly the same words) a there are inadvertent likenesses and similitudes that have been made intentionally. All in all, I have discovered numerous things. Like the various subjects need various structures and rhyming plans to implement their point. I saw likewise that various strategies and gadgets he utilized assist me with picturing in my psyche what he portrays in his sonnets and how he saw things throughout his life. Looking at his work has helped me comprehend different sonnets as well. By and by, I discovered Seamus Heaney’s sonnets intriguing as they gave a child’s point of view of his life and the occasions harmonizing with it. Relatively few sonnets do this.

Saturday, August 22, 2020

Paul Robeson Essay -- The Civil Rights Movement

Paul Robeson Paul Robeson as a researcher and competitor was a double cross All-American in football and baseball, an individual from Phi Beta Kappa, and valedictorian of his secondary school and school class. As a performer he featured in eleven motion pictures, five Broadway musicals, and sang in sold out shows all through the world in twenty-five unique dialects. As a legislator he got known as the resident of the world, who stood up at whatever point he saw social or racial shameful acts in any nation, and spent his last years working with Albert Einstein to bring world harmony. This wonderful African-American had the option to do every one of these things during a period in America when most African-Americans were refused assistance at a neighborhood eatery. He was Michael Jordan before there was a Michael Jordan, Michael Jackson before Michael Jackson. He was additionally Muhammad Ali. He was the most well known, gifted, and straightforward dark individual on the planet, yet today many don' t generally have any acquaintance with him by any means. (1999, Kane) In the wake of exceeding expectations in secondary school, Paul Robeson went to Rutgers College on a four-year scholastic grant. While going to Rutgers he played football, baseball, ball, and took part in track acquiring himself fifteen varsity letters. Robeson was a double cross All-American in football and baseball in 1917 and 1918. During his four years at Rutgers he likewise was chosen for all the school's respect social orders, which included being one of just four cohorts chose to the Phi Beta Kappa his lesser year. In 1919, his senior year at Rutgers, Robeson's difficult work earned him the respect of being the valedictorian of his group. The discourse he gave was brimming with knowledge past his years and time. He titled his discourse The New Idealism, where he upheld to a larger part white... ...eople kicked the bucket to manufacture this nation, and I am going to remain directly here and have a section in it simply like you. What's more, no fundamentalist disapproved of individuals will drive me from it. Is that unmistakable? With those words Robeson settled on a choice that would decide his destiny. He picked his standards and ethics over his notoriety and fortune. After his preliminary, individuals were reluctant to concur with him since they could be named a socialist. Fearless Robeson would proceed to sing and stand up for every single persecuted individuals, yet tragically lost all genuine help in the U.S. Paul Robeson was an authentic renaissance man. He was a splendid researcher, achieved competitor, amazing vocalist, talented on-screen character, and a candid legislator. Living to its fullest doesn't verge on portraying the accomplishments that Robeson achieved in the course of his life. There are scarcely any men that can contrast with him and barely any men that ever will.

Friday, August 21, 2020

How to Choose the Best Presentation Topics for Your Prospects

How to Choose the Best Presentation Topics for Your ProspectsKnowing how to choose the best presentation topics for a client or customer is of utmost importance. Here are some tips that will help you choose the best topics that your prospects and customers will be interested in hearing about.First, try to focus on the overall content of the presentation. Whether it is about a product or service, there is a certain type of topic that will not only be interesting to the audience but also will provide insight into the kind of business that you are operating. Using these tips will help you choose the best presentation topics for your needs.When it comes to selecting the best presentation topics, there are a few key things that you need to take into consideration. These include the level of attention that you would like to give to your customers and prospects. You also need to be sure that they will get value for their time. This means that you need to make sure that your presentation top ics should be interesting enough to make them want to return to hear more from you.The next thing that you need to think about is the subject that you want to discuss with your customers. If you are providing a service, then this can be a good topic. If you are selling a product, then you will want to talk about the different aspects of the product.The next thing that you need to consider is your call list. Although you may have many potential customers in your list, you will want to find out what these people actually want to hear about. This means that you will need to get feedback on your presentation topics from your customers. In doing so, you will be able to determine which ones they will be interested in hearing about.You should also consider how much time you will be spending on this interaction with your customer. If you have a lot of time to spend with your customers, then it is possible that you will be able to focus more on presenting your services or products. However, if you are only in front of your customers for a short amount of time, then it is important that you know what topics to talk about.The most important thing to remember when it comes to finding the best presentation topics is that you need to focus on what your audience wants to hear. It is important that you let them know what kind of business you are in. For example, if you have clients that are looking for something specific, then you can talk about that during your presentation. Just make sure that the topics that you select should be ones that your audience will be interested in hearing about.Remember that the best presentation topics for your customers or prospects will be those that are informative and interesting. These topics will also be ones that will make them want to go back to your presentation as often as possible. The key to this is to come up with different topics that your audience will be interested in knowing about.

Tuesday, May 26, 2020

Essay on A Methodology to Teaching Writing - 2030 Words

A Methodology to Teaching Writing I believe that achieving success in teaching very different aspects of life may still combine similar processes. My life in high school was very similar to the lives of many other students in that it revolved around two things: sports and school. My sport of choice was tennis and my favorite academic area was English. Unexpectedly, I found many similarities led to a successful performance in both areas. My understanding of the need for a good program to follow and a lot of practice with it led to success in both tennis and my academic performance (especially English). Upon becoming a recognized player in my area, I decided to take the skill that I knew better than any other and utilize it as a†¦show more content†¦Thus the assignment should be a specific topic but not necessarily a specific format, and the teacher should be very encouraging and clear that students need not worry about grading quite yet. Students should feel free to get ideas down on paper. For instanc e, the teacher can write a couple pages about the memory of their favorite vacation, and read it to the class. Given that model provided by the teacher, students can do the same (if they have never had a vacation they may select their favorite or most sentimental place to go). A couple of pages may provide a basis for what level the student is currently performing at. Now that I have given the first tennis lesson, I can assess the player’s fundamental skills and apparent grasp of my instructions. Every strength that has been shown at this early stage should be commented on. The player should be proud of what they have essentially done instinctively well. Then I carry out only very general improvements as the lesson continues: â€Å"bend your knees, step forward as you swing, remember to keep your wrist straight†. (These suggestions may seem specific but are really very general for tennis). Each time something is done correctly it should be positively reinforced. The next step in writing should be similar. The teacher reads the pieces privately and focuses on strengths and general content improvements rather than specific grammatical issues. What is the key point of this story about family vacation?Show MoreRelatedAre Writing Deficiencies Creating A Lost Generation Of Business Writers?1088 Words   |  5 Pages Are writing deficiencies creating a lost generation of Business writers? . The composition ability deficiencies of a worker have unmistakable and non-substantial expenses. The immaterial expenses incorporate picture servility of both executive and worker, negative effect on profitability, and result of mistaken choice because of ineffectual composed material. Composing aptitudes are more critical for the states than the private segments, yet a significant mass of representatives don tRead MoreMy Writing Goals And Curriculum927 Words   |  4 Pagesabout the narrative tenses. I spent hours learning the tenses, writing CCQs, creating examples, and designing materials. When time came to teach I was ready. I achieved the aims and I received an ‘Above Standard’ grade for that lesson. I found this to be the highlight of my CELTA experience. I felt a wonderful sense of accomplishment and received wonderful feedback from my tutor. Apart from obtaining a CELTA I have 22 months of ESL teaching experience. I have instructed complete beginners to advanceRead MoreAssessing and Evaluating Our Students1386 Words   |  6 Pagesresults (formative), mid-term examination results (formative), final term examination/achievement test results (summative) as well as samples of students’ writing, self and peer assessment, and my personal observation to monitor the learning progress and make any changes that situational factors may require in the course design or the teaching methodology. 1.2. Choice of Assessment with its underlying principles Assessment refers to what students can or cannot do and this ability is measured against aRead More Acquiring Skills in a New Language Essay1510 Words   |  7 Pageslanguage is the ability to communicate messages in writing. For a teacher of English as a second language, nurturing students to develop sound writing skills is crucial to the success of the student both as a learner of the language, and their skills communication skills in reading, speaking and even listening in English. The natural ability of native speakers to communicate in a given language does not automatically indicate proficiency in their writing skills, which must be acquired. The psycholinguistRead More The Composition and Rhetoric Field Essay1051 Words   |  5 PagesRhetoric (a.k.a. Writing Studies): A Flexible Field In his essay, Teach Writing as a Process not a Product, Donald Murray outlines the major difference between the traditional pedagogy that directed the teaching of writing in the past and his newly hailed model. Traditionally, Murray explains, English teachers were taught to teach and evaluate students writing as if it was a finished product of literature when, as he has discovered, students learn better if theyre taught that writing is a processRead MoreTeaching English As A Second Language Learners1368 Words   |  6 Pagesdifferent teaching techniques are used. In some subjects like math these teaching techniques can change in a minute ways from how the teacher would normally teach making it inconspicuous. Yet in subjects such as writing the whole process in teaching drastically alters as teacher have to new knowledge barriers to overcome with ESL students. These changes in way teachers teach writing caused by ESL students can benefit all students especially in elementary schoo l in comprehending writing skills. Read MoreChallenges Facing Students At Secondary School Level1490 Words   |  6 Pagesand Challenges Facing Students at Secondary School Level in Al-Kharj City with Writing in English Table of contents: Page Number Section 3 1-Abstract 3 2-Introduction 4 3-Literature Review 4-5 4-Significance of Research 5 5-Research Question 5 6-Research Methodology 6 7-Ethical Considerations 6 8-Limitation of The Research 6-7 9-Expected Results 7 10-References Abstract Writing has always been regarded as playing a prominent role in learning a second languageRead MoreIntelligent Skills For Efl Learners Essay1637 Words   |  7 PagesApproachable skills for EFL are indeed concerning receiving information and can be describe as writing and speaking. Students must process a text either in written or listening scheme and the way in which they are approached and the usefulness of the process depends of course upon the teaching methodology selected or being used during the lesson plan among the activities. Productive skills pose challenges for EFL learners for many reasons, beginning with their acknowledgment to texts of differentRead MoreA Research Paper On The Quality Research906 Words   |  4 Pagesfor our class to understand how to write a research paper in higher standard. The Quality Research Papers is written by Nancy Vyhmeister has forty-five years of experience in teaching future pastors and professors throughout the world. She continues to have a global ministry in her retirement years, mostly teaching and writing. She also has authored several books, both in Spanish and English, including a Greek grammar for Spanish speaking students. She was editor of Women in Ministry: Biblical andRead MoreEnglish as a Second Language1197 Words   |  5 Pagespractice, they cannot express their thoughts. I think it is because of the typical learning style here - teacher oriented method, book – centered method. Teacher usually speaks Russian in the classroom, lessons are all the s ame: reading a book and writing exercises. Students do not speak any English during the lesson, all their discussions, questions and teacher’s explanations are in Russian. The only possibility to speak English is attending an English club once a week for an additional charge. Many

Friday, May 15, 2020

Descriptive Essay About My True Hero - 896 Words

Would you believe me if I tell you that the heroes we grew up watching really exist in real life? Maybe there isn’t Superman, Batman, Catwoman, or Hulk in the real world. However, in real life there are superheroes. Not the type of heroes that have super powers or wear flashy capes, but normal people with normal human abilities. In my opinion, a true hero is a person that cares for you and will always be there helping you in every step you make. My mom is my true hero. If you ever see my mom from a distance you wouldn’t recognize her as a hero. She doesn’t wear spandex and flashy capes or carry cool gadgets. If you see her walking down the street, she s probably wearing some Capris with a T-shirt and some tennis shoes. She is†¦show more content†¦There were also this two things that looked like wings that were stuck outside the underwear for better protection. She even put some in my backpack in case an accident happen. After that, she told me they wer e called pads. Since that they I knew how to use one. Every year my school does a Halloween festival. Students dress up as anything they want to be whether it’s a princess, witch, superhero, etc. There are many stations where you can get candy and there is even a haunted house or should I say a haunted class. Like every other 5-year-old girl I wanted to be a princess. 2 weeks before the festival my mom and I went to find my costume. We enter to this store where there were many costumes. As I walk in I saw a beautiful pink scoop dress. The bottom part was really puffy. The dress had a bow in the back and had lots, of glitter all over. It even came with pink shoes and a beautiful crown. Mom, can I have this, I asked. Mom was looking at another dress that was blue but didn’t look as pretty as the pink one. Mom came towards me and looked at the dress. It s beautiful, mom said. I know right can I have it. mom went and saw the price. I’m sorry Gloria but it s to expensive, mom said. Why don’t you pick another?† I tried to find another, but there were none that I liked. We left the store and went home. I tried not to show that I was sad, but I couldn’t hide it. 2-week pass and I had nothing to wear. Then I heard my mom said, Come, Gloria, I have aShow MoreRelatedMuch Ado About Nothing, Act 4 Scene 1 Analysis1566 Words   |  7 PagesEssay: Much Ado About Nothing In Act 4 Scene 1, Shakespeare employs numerous dramatic techniques to create a remarkable and memorable moment in the play. The techniques include: the positioning of the scene in the context of the play as a whole; the successful characterization of the key players, including Leonato, Claudio and Hero in particular; and the use of poetic and descriptive language. To begin with the structure of the play as a whole, the audience would already feel tense because ofRead MoreThe Brothers Karamazov By Fyodor Dostoevsky1444 Words   |  6 Pagesloving or even on the dark side. Furthermore, there is also the effect of one’s upbringing, surrounding environment and the influence of certain occurrences, particularly those that were neither anticipated nor facilitated by the individual. In this essay, I will explore the idea of how accountable and intensely criticized or praised one person should be for their choices that follow such constricted conditions. I will be studying characters from The Brothers Karamazov by Fyodor Dostoevsky, charactersRead MoreExplication Essay of aP by John Updike1067 Words   |  5 PagesEssay 1-Explication Essay of Aamp;P by John Updike We have all had that moment of clarity when we realize, no longer children, our decisions can greatly impact the course of our future. Aamp;P gives an insight into the main character’s realization of how he perceives his life, the lives of those around him, and how with one impulsive decision he forever changed the course of his life. Sammy, the narrator of Aamp;P, is a 19 year old boy whose assumption of others, dislike of conformity, andRead MoreAnalysis Of Homer s The Odyssey 1418 Words   |  6 Pagesimmortality’ skin and be reborn to understand the peaceful human existence in the cosmic universe. In retelling of his tale to the Phaià ¡kians, Odysseus recaptures the inward lost by means of descriptive heroic insight and over imagination of the external drama, skimming over his most fatal flaw - his ego. My argument in this essay is our hero’s ego and his continuous struggle with it causes the downfall for him and others . Odysseus’s need of recogn ition from his community for his kelos is always on the tippingRead MoreEssay on Antony and Cleopatra1655 Words   |  7 PagesEngland during Elizabeths reign. Military prowess defined masculinity by power and honor. Giddens highlights a Francis Bacon quote from Of the True Greatness of Kingdoms and Estates in which Bacon writes No body can be healthful without exercise, neither natural body nor politic: and certainly to a kingdom or estate, a just and honourable war is the true exercise . . . for in a slothful peace, both courages will effeminate and manners corrupt (Giddens 13). Note the same sentiment for the relationshipRead More An Analysis of the Epic Poem, Beowulf - Characterization of Beowulf1918 Words   |  8 PagesCharacterization of Beowulf  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚         The dialogue, action and motivation revolve about the characters in the poem (Abrams 32-33). It is the purpose of this essay to demonstrate the types of characters present in the anonymously written Anglo-Saxon poem, Beowulf - whether static or dynamic, whether flat or round, and whether protrayed through showing or telling.    At the very outset of the poem the reader is introduced, through â€Å"telling† by the scop, to Scyld Scefing, forefatherRead MoreSymbolism in Hedda Gabler1673 Words   |  7 Pagesmid-nineteenth century realist playwright Alexandre Dumas wrote the following about his drama. IfÂ…I can exercise some influence over society; if, instead of treating effects I can treat causes; if, for example, while I satirize and describe and dramatize adultery, I can find means to force people to discuss the problem, and the law-maker to revise the law, I shall have done more than my part as a poet, I shall have done my duty as a manÂ….We need invent nothing; we have only to observe, remember, feelRead MoreModern Drama And Modern Criticism2836 Words   |  12 Pagespopular dramatic form of its age, a form that depended more on graphic exhilaration and the thrill of the moment – qualities almost beyond critical recall – than anything ever written for the stage. Now it is all gone, and I will hopefully through this essay bring some of this back to life. Yet because of its energy and vividness, something of its nature can be imparted. Melodrama had never been rated highly by dramatic critics or historians, whose most contemptuous word is â€Å"melodramatic.† To describeRead MoreMacbeth, By William Shakespeare1839 Words   |  8 PagesShakespeare in the year 1606, is a prominent tragic play that is notoriously recognized for its excessive use of violence. The author mainly elaborates how Macbeth, who used to be a proud hero of Scotland, spreads his turmoil throughout the whole kingdom. In the beginning of the play, Macbeth is widely regarded as an honorable hero because he is a valiant warrior who wants to protect the kingdom to the best of his abilities. As the play progresses, however, Macbeth’s personality, motives, and character startRead MoreThe History of The Old Lie and Poetry of Wilfred Owen2490 Words   |  10 PagesLatin saying telling people through their poems that it was honourable to die for your country. Lord Alfred Tennyson was a poet in 19th Century. One of the poems he wrote is called The Charge of the Light Brigade. This poem is about a battle that took place in 1854 it could also be described as a slaughter because it was the result of a mix up of communication so that 600 horses and soldiers rode into a valley of death as Tennyson described it. The atmosphere

Wednesday, May 6, 2020

Hensoldt Swot Analysis - 1688 Words

Hensoldt (previously named Airbus) is an international optronic engineering company (situated in Centurion, Pretoria) that specialises primarily in the design and manufacturing of sensors and optics for military use. There are three key focus areas in the company namely (i) land, (ii) air and (iii) sea. The company is in cooperation with Denel, however other external companies make use of the specialised engineering services offered by Hensoldt. Mechanical engineers at the company often design functional mechanisms, structural housings and mountings for optics that are attached to the military equipment. These engineers make use of ANSYS for Finite Element Modelling and Computational Fluid Dynamics and Creo (newer version of ProE) as†¦show more content†¦Gerhard Booysen, a former lecturer at the University of Pretoria. All new employees are also exposed to the health and safety rules of the company. The information is shown in an hour-long presentation where the evacuation procedures are discussed and the hazards associated with the company is noted. There were essentially three key hazards namely (i) acetone leakages may occur which is nearly undetectable, (ii) the lasers used by the company is detrimental to eyesight and lastly (iii) the assembly tower for the periscopes is extremely high and strict rules apply when in the vicinity of the tower. Task Description The engineering student was tasked at completing small tasks each of which are documented and reported to Mr. Booysen. During the two weeks of training three large tasks were assigned to the student namely (i) the shock loading analysis of a transport jig, (ii) the tolerance analysis of a clutch regulator and lastly (iii) the modelling of a tensioner and sleeve on Creo. The engineer was also trained on other aspects such as Finite Element Modelling. Shock Loading of a Transport Jig Problem Description A Single Degree of Freedom System is used to approximate the duration of a shock load on a Transport Jig when released from a certain height above ground. There are 6 flexible tubular elements that act as spring elements in the module. The analysis only

Tuesday, May 5, 2020

Influence of Cloud Computing Technology-Free-Samples for Students

Question: Discuss about the Influence of Cloud computing technology in modern corporations. Answer: Introduction The use of cloud computing in businesses has grown substantially in past decade; it is referred as the activity of performing business functions such as storing, managing or processing data by using a network of remote servers that are hosted by a firm through the internet. Modern corporations use cloud computings online remote servers instead of using local servers or personal computer systems. The popularity of digitalisation and increase in use of internet allow organisations to use cloud computing for their business functions. The competition between corporations requires them to gain a competitive edge through using cloud computing technology. Modern companies use cloud computing due to its various benefits including reliability of software, reducing expenses, gaining a strategic edge, effective manageability, and improvement in usability. Although there are numerous advantages of clouding computing technology, there are few drawbacks as well, such as security problems, downtime, software issues and limited control. This report will evaluate various drawbacks and benefits of implementing cloud computing technology into a business to perform various activities. Further, the report will understand the perspective of modern organisations to understand the shortcomings and advantages of cloud computing technology. Project Objective The primary goal of the report is to understand the influence of cloud computing technology in modern corporations and ascertain its various disadvantages and benefits from reviewing multiple literatures. With the advancement of technology, the use of cloud computing in modern businesses has grown as well; the firms implement this technology to increase the efficiency of performing various business functions such as storing, accessing, managing and processing data. The secondary objective of the report is to examine the role and impact of cloud computing technology in modern businesses. Project Scope The scope of this report is wide which include researching modern corporations which use or provide the services of cloud computing. The report will understand the shortcoming and rewards of cloud computing from the examples of these companies. Various theories given by market experts on the topic will be discussed in the report as well Literature Review According to Armbrust et al. (2010), cloud computing is a model of information technology that has become between modern corporations in the past decade. The cloud computing technology includes the activities of implementing and using the network of remote server hosted through the internet in order to perform various business operations relating to storing, processing, managing and analysing companys data. Qian et al. (2009) stated that the cloud computing technology enables users to ubiquitously access their data through a shared pool of resources and services by using the internet; the technology eliminates the companys requirement of a high level of maintenance and management of data. The company uses cloud computing technology to avoid the traditional sources of data management such as local servers or personal computers. In other words, the technology of cloud computing allows the corporation to utilise the facilities of the cloud for performing computer or internet-based servi ces such as analytics, networking, storage of data and processing of information. Supriya (2012) mentioned that there are a number of corporations which provide cloud services to other companies such as Amazon Web Services, Microsoft Azure, IBM Cloud, and Google Cloud Platform (Figure 3). These companies are known as Cloud Service Providers, and they charge their client as per their usage just like water or electric bill. Using the cloud service of third party organisation allows corporations to increase their focus on main business objectives rather than non-core functions. As per Buyya et al. (2009), instead of spending time and resources on managing the secondary functions such as building and maintaining computer infrastructure, the company can improve its core activities. Amazon Web Services is the largest cloud computing service provider in the world which provide on-demand cloud computing platforms to corporations, individuals, and governments. As per the research of IDC, the worldwide public cloud spending will reach up to $127 billion by 2018 (WHIR, 2014) . Google entered in the industry of cloud computing by establishing Google Cloud Platform, the main clients of the corporation include PricewaterhouseCoopers, Best Buy, HTC, Coca-Cola and SunGard Financial Systems (Bort, 2015). As per Chen et al. (2011), modern companies prefer to implement the strategy of cloud computing because it increases the efficiency of operations and enhances customer satisfaction. Through cloud computing, companies provide various services to its customers such as listening to music, watching movies, sending and receiving emails, editing documents, storing personal data, playing games and many others. Organisation from different sectors such as consumer goods, financials, technology and consumers services; mostly, the companies in technology industry uses cloud computing technology in order to improve their performance (Figure 2). Along with numerous benefits in using cloud computing technology, modern corporations also face various risks and challenges relati ng to the technology. Following are disadvantage and advantages of using cloud computing technology in modern businesses. Advantages of Cloud Computing Reduction in Operating Cost According to Chaisiri, Lee, and Niyato (2012), the main benefit of implementing cloud computing technology in a corporation to perform various business activities is reducing the operating expenses. Organisations focus on establishing strategies that assist in reducing their operating costs in order to gain a competitive advantage. The use of cloud computing in operations can allow companies to save various costs relating to managing and maintenance of data and servers. The cloud computing technology reduces in-house storage expenses and application requirements of a firm to zero. The companies did not have to establish on-premise processing or storage infrastructure which reduces the expenses relating to establishing and managing such database. Le et al. (2011) mentioned that the firms save expenses of various operations such as power, electricity, air conditioning, and management cost. The cloud computing service providers cover all the requirement of managing and maintenance of co mpanys data; the corporations are able to access their data and applications from all around the world as long as they had an internet connection. Yi, Kondo, and Andrzejak (2010) provided that the companies only have to pay for the amount of data which is used by them through cloud computing and it saves their investment in IT software and hardware. In recent years, the cloud computing services have become substantially cheaper which makes it an affordable option for companies to use. The amount saved by the corporation by using cloud computing can be spent on improving the quality of core activities of the business which result in improving the profitability and performance of the firm. For example, Pearson is a US based company which provide the service of education and learning to its clients. The company gained a competitive advantage by using cloud computing technology which increases the flexibility in their operations and allowed them to provide web-oriented products (IBM Voice, 2014). Reliability of Services The cloud computing service providers offer consistent and high-quality facilities to their clients; as compared to in-house IT infrastructure, the cloud computing is a more reliable method. Alhamad, Dillon, and Chang (2010) stated that the service providers perform all the activities relating to managing and maintenance of IT infrastructure of their clients; they also provide professional and expert advice which improves the efficiency of corporations. The hosting provider of a company performs all the necessary tasks relating to maintenance and management of the servers. The cloud computing service providers offer a Service Legal Agreement that includes the terms of their contract and the services provided by the provider. As per Khan and Mulluhi (2010), the agreement provides that service provider will give 24*7 and 365 days service which also include 99.99% availability. The service providers also might offer a creative and practical solution to its clients which include experts advice. The worldwide service providers such as Amazon, IBM, Microsoft, and Google are well-known companies, and people have trust in their services. These factors increase the reliability of cloud computing and make it a potential option for modern corporations. The reliability of service is necessary when companies are storing their sensitive data on the servers of another firm. Management of Cloud Computing The cloud computing technology assists in simplifying and enhancing the IT activities of a firm without the requirement of maintenance; the SLA backed contracts and vendors infrastructure establishes a central administration which performs all the practices relating to data management and processing. Beloglazov, Abawajy, and Buyya (2012) provided that the cloud computing technology eliminated the requirement of a firm to maintain and update their IT infrastructure because it is the job of the service provider. The technology allows corporations to seamlessly enjoy a web-based user interface which allow them to access and perform actions on application, service, and software without the requirement of installation or maintenance. The Service Legal Agreement signed by the firm guarantee the timely delivery of services, maintenance and supervision of IT infrastructure. All these factors assist companies in easy management their data which improves their manageability, and it also improv es the efficiency of operations. Recovery in Disaster Several natural and artificial disasters can cause significant damage to a corporations data; most of the companies are vulnerable towards natural disasters. In case of large businesses, they can afford to spend heavily on protecting themselves from the disasters by taken precautionary security measure but small, and median firms did have resources to protect themselves. Therefore, their data is always vulnerable to the risk of various disasters. Wood et al. (2010) stated that cloud computing technology can be beneficial for small and media corporations since it allow them to save their data on the online cloud which protects it from various natural disasters. The companies can easily recover their data even after their IT infrastructure is affected by the natural disaster. The cloud computing service providers offer the facility of data recovery which does not require heavy investment by the firm. Automatic Updates The IT infrastructure management by cloud computing service provider receive automatic software updates from the service provider; the corporations which use cloud computing technology did not have to worry about software updates. The service provider rolls out new security and interface updates that improve the usability of cloud computing services. It saves resources and time of the firm which uses cloud computing technology. Competitive Edge The role of internet is modern businesses is constantly growing, and the companies which effectively implement it into their system gains a competitive advantage over the others. As per Velte et al. (2010), the companies do not have to invest any time in maintenance of IT infrastructure if they use cloud computing technology. The companies can implement strategic policies into the organisational system which focuses on improvement of efficiency and productivity of the firm by using cloud computing technology. The time and resources saved by the enterprise in using cloud computing technology can be spent on core activities of the business which resulted in improved operations that provide a competitive edge to the firm. The time invested by a company in creating a new application, maintaining and setting new IT infrastructure is also reduced due to the implementation of cloud computing technology. Disadvantages of Cloud Computing Security Threats The primary risk of using cloud computing technology is the vulnerability of companys data against cyber-attack and data breaches. As per Zissis and Lekkas (2012), modern cloud computing service providers ensure that they implement industry standard high-quality security measure to protect the data of their client from breaches but still, cybercriminals find new ways to breach and collect the data of corporations. The cloud computing technology stores the data of users in multiples servers, and they are vulnerable to cyber-attacks. The cloud computing technology requires that users upload their sensitive data on the servers of service providers, and then they can access it anywhere in the world through an internet connection; similarly, cybercriminals can also access the data of companies by breaching into the servers of cloud computing service providers. Subashini and Kavitha (2011) provided that if corporations maintain flexibility into their operation and allow its employees to access their online data easily, the nefarious users can use this opportunity to find loopholes in the security system to gain an unfair advantage. The number of cyber-attacks on corporations have grown in past years, and popularity of cloud computing is one of its reasons; the company which uses cloud computing makes it a potential target for cybercriminals (Figure 4). The cyber-attack on companys cloud can lead data of multiple individuals, and it can negatively influence a large number of people. For example, the data breach of Yahoos account leaked a significant amount of companys data which affected more than 3 billion people. Internet Dependency The corporation which uses cloud computing technology requires having an internet connection at all time in order to access or process their data. Bamiah and Brohi (2011) stated that the companies dependency on the internet increases if they use cloud computing strategy into their business. The corporations are required to have a stable and continuous internet connection into their workplace; several natural or other factors can cause network error in a company which makes it impossible for them to access their data. The corporation which has large amount of data requires a high-speed internet connection to ensure that they efficiently access their data. Large blackouts and adverse weather conditions can shut down the internet connection of a firm which also limits their access to the organisational data. Lack of Control The cloud service providers are third party companies which offer their services to multiple firms, individuals, and governments; therefore, a single company cannot control the function and activities of its service provider. According to So (2011), the corporation which uses cloud computing service did not have the ability to control the operation of IT infrastructure or backend. All the maintenance and update of IT infrastructure is done by cloud service provider which eliminates the control of companies over the management of their data. Many organisations did not prefer the lack of control over their data; therefore, they avoid using cloud computing technology. Downtime Cloud computing technology is completely online based which means no service provider can guarantee the claim of immunity for facility outages. Durkee (2010) stated that the cloud computer performance is entirely based on servers ability to handle the data and there are various factors which negatively affects the ability to servers to handle large traffic. One cloud service provider such as Amazon Web Services provides its facilities to multiple clients, and sometimes their servers can be overwhelmed with the amount of traffic which may temporarily suspend users access to their data. The downtime of servers can also cause due to natural disasters and internet issues which make it difficult for corporations to perform their daily tasks and access their data. Conclusion Conclusively, the use of cloud computing in modern business has grown substantially in past decade; the corporations use these services to perform various functions relating to business such as processing, storing, managing and analysing the data. The implementation of cloud computing technology in business provide numerous advantages to a corporation such as improvement in manageability, reduction in operating expenses, continuous and automatic updates, data recovery option and reliability of services. Although the cloud computing technology provides various benefits to users, it suffered from various risks as well. For example, risk of cyber-attacks, lack of control over operations, dependency on internet and downtime. However, cloud computing technology is the future and corporations will keep using it despite having to depend on the internet or cybersecurity threats. Therefore, companies should measure their cloud computing requirements and implement an effective strategy to gain a competitive advantage by sustaining their future development. References Adhikary, J., 2016. 4 Latest Cloud Computing Trends For Businesses. [Online] GlobusSoft. Available at: https://globussoft.com/4-latest-cloud-computing-trends-for-businesses/ [Accessed on 14/12/2017] Alhamad, M., Dillon, T. and Chang, E., 2010, September. Sla-based trust model for cloud computing. InNetwork-Based Information Systems (NBiS), 2010 13th International Conference on(pp. 321-324). Ieee. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2010. A view of cloud computing.Communications of the ACM,53(4), pp.50-58. Bamiah, M.A. and Brohi, S.N., 2011. Seven deadly threats and vulnerabilities in cloud computing.International Journal of Advanced engineering sciences and technologies,9(1), pp.87-90. Beloglazov, A., Abawajy, J. and Buyya, R., 2012. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), pp.755-768. Bort, J., 2015. Google has nabbed some huge customers for its most important new business - cloud computing. [Online] Business Insider. Available at: https://www.businessinsider.in/Google-has-nabbed-some-huge-customers-for-its-most-important-new-business-cloud-computing/articleshow/47726391.cms [Accessed on 14/12/2017] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility.Future Generation computer systems,25(6), pp.599-616. Chaisiri, S., Lee, B.S. and Niyato, D., 2012. Optimization of resource provisioning cost in cloud computing.IEEE Transactions on Services Computing,5(2), pp.164-177. Chen, J., Wang, C., Zhou, B.B., Sun, L., Lee, Y.C. and Zomaya, A.Y., 2011, June. Tradeoffs between profit and customer satisfaction for service provisioning in the cloud. InProceedings of the 20th international symposium on High performance distributed computing(pp. 229-238). ACM. Durkee, D., 2010. Why cloud computing will never be free.Queue,8(4), p.20. IBM Voice., 2014. Three Companies That Transformed Their Businesses Using Cloud Computing. [Online] Forbes. Available at: https://www.forbes.com/sites/ibm/2014/11/03/three-companies-that-transformed-their-businesses-using-cloud-computing/#1ce85b11b66b [Accessed on 14/12/2017] Khan, K.M. and Malluhi, Q., 2010. Establishing trust in cloud computing.IT professional,12(5), pp.20-27. Le, K., Bianchini, R., Zhang, J., Jaluria, Y., Meng, J. and Nguyen, T.D., 2011, November. Reducing electricity cost through virtual machine placement in high performance computing clouds. InProceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis(p. 22). ACM. Pendse, G., 2017. Cloud Computing: Industry Report Investment Case. [Online] Nasdaq. Available at: https://business.nasdaq.com/marketinsite/2017/Cloud-Computing-Industry-Report-and-Investment-Case.html [Accessed on 14/12/2017] Qian, L., Luo, Z., Du, Y. and Guo, L., 2009. Cloud computing: An overview.Cloud computing, pp.626-631. So, K., 2011. Cloud computing security issues and challenges.International Journal of Computer Networks,3(5), pp.247-55. Statista., 2017. Cloud Computing Statistics Facts. [Online] Statista. Available at: https://www.statista.com/topics/1695/cloud-computing/ [Accessed on 14/12/2017] Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), pp.1-11. Supriya, M., 2012. Estimating trust value for cloud service providers using fuzzy logic. Velte, A.T., Velte, T.J., Elsenpeter, R.C. and Elsenpeter, R.C., 2010.Cloud computing: a practical approach(pp. 1-55). New York: McGraw-Hill. WHIR., 2014. Public Cloud Spending to Reach $127 Billion by 2018: Report - Web Host Industry Review. [Online] WHIR. Available at: https://www.thewhir.com/web-hosting-news/public-cloud-spending-reach-127-billion-2018-report [Accessed on 14/12/2017] Wood, T., Cecchet, E., Ramakrishnan, K.K., Shenoy, P.J., van der Merwe, J.E. and Venkataramani, A., 2010. Disaster Recovery as a Cloud Service: Economic Benefits Deployment Challenges.HotCloud,10, pp.8-15. Yi, S., Kondo, D. and Andrzejak, A., 2010, July. Reducing costs of spot instances via checkpointing in the amazon elastic compute cloud. InCloud Computing (CLOUD), 2010 IEEE 3rd International Conference on(pp. 236-243). IEEE. Zaharia, A., 2016. 10+ Critical Corporate Cyber Security Risks A Data Driven List [Updated]. [Online] Heimdal Security. Available at: https://heimdalsecurity.com/blog/10-critical-corporate-cyber-security-risks-a-data-driven-list/ [Accessed on 14/12/2017] Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-59