// API callback
related_results_labels_thumbs({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-913600556879440043"},"updated":{"$t":"2024-01-01T15:38:08.302+05:30"},"category":[{"term":"Java"},{"term":"General"},{"term":"C Plus Plus Programming"},{"term":"Selenium Automation Testing"},{"term":"High Performance Computing"},{"term":"PPL"},{"term":"Parallel Computing"},{"term":"My Vlogs"},{"term":"Blogging Tips"},{"term":"Skill Development Lab"},{"term":"Compiler"},{"term":"Website Designing"},{"term":"Data Structures"},{"term":"Android"},{"term":"Database"},{"term":"CUDA"},{"term":"OPENMP"},{"term":"YouTube Tips"},{"term":"Youtube"},{"term":"C Programming"},{"term":"How To Write Blog"},{"term":"Android App Development"},{"term":"Salesforce"},{"term":"Multithreading"},{"term":"Networking"},{"term":"Swing"},{"term":"LEX \u0026 YACC"},{"term":"Linux"},{"term":"Ubuntu"},{"term":"Mysql"},{"term":"Nanded City Pune"},{"term":"GATE"},{"term":"Cloud Computing"},{"term":"MS Excel Formulas \u0026 Functions"},{"term":"Applet"},{"term":"Computer Networks"},{"term":"Google Forms"},{"term":"SQL"},{"term":"MPI"},{"term":"OpenMPI"},{"term":"Socket Programming"},{"term":"Thread Pool"},{"term":"Amazon Links Summary"},{"term":"Fedora"},{"term":"Guest Blogging"},{"term":"Python"},{"term":"SDL"},{"term":"Wine"},{"term":"Abbreviations in Computer Science"},{"term":"Amazon Affiliate Program"},{"term":"Dia Software"},{"term":"Lisp"},{"term":"Mathematics"},{"term":"OPENCL"},{"term":"Udemy Courses"},{"term":"Unboxing \u0026 Review"},{"term":"Vedic Mathematics"},{"term":"Vocabulary"}],"title":{"type":"text","$t":"Computer Revolution (www.comrevo.com)"},"subtitle":{"type":"html","$t":""},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https:\/\/www.comrevo.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/913600556879440043\/posts\/default\/-\/Guest+Blogging?alt=json-in-script\u0026max-results=6"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.comrevo.com\/search\/label\/Guest%20Blogging"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"2"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"6"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-1102070227192753232"},"published":{"$t":"2017-10-12T18:30:00.000+05:30"},"updated":{"$t":"2017-10-22T20:25:01.603+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Cloud Computing"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Guest Blogging"}],"title":{"type":"text","$t":"Cloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; A post by\u0026nbsp;\u003Cspan class=\"_username\" style=\"border: 0px; color: #222222; margin: 0px; padding: 0px; white-space: nowrap;\"\u003E\u003Cspan class=\"KCE12V-N-a\" style=\"border: 0px; cursor: default; font-weight: bold; margin: 0px; padding: 0px; vertical-align: top;\"\u003EGerard Blokdijk\u003C\/span\u003E\u003C\/span\u003E\u003Cspan style=\"color: #222222; white-space: nowrap;\"\u003E\u0026nbsp;(via\u0026nbsp;\u003Ca href=\"http:\/\/www.comrevo.com\/2017\/09\/guest-blogging.html\" target=\"_blank\"\u003EGuest Blogging\u003C\/a\u003E)\u003C\/span\u003E\u0026nbsp;on \"\u003Cspan style=\"color: #222222;\"\u003ECloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow\u003C\/span\u003E\".\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp;Go through the following:\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThis checklist will provide you with the 57 fundamental questions you need to ASK to Grow. For practitioners and their organizations, making sure that all Cloud computing essentials are covered, from every angle, is a challenge.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EA Self Assessment is a helpful tool for professionals to get a project started and\/or audited. The Art of Service develops Self Assessments that help professionals to do just that.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThe Cloud computing Self Assessment covers numerous criteria related to a successful Cloud computing project, read more at\u0026nbsp;\u003Ca href=\"https:\/\/store.theartofservice.com\/cloud-computing-complete-self-assessment\/\" rel=\"nofollow\" style=\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target=\"_blank\"\u003Ehttps:\/\/store.theartofservice.\u003Cwbr\u003E\u003C\/wbr\u003Ecom\/cloud-computing-complete-\u003Cwbr\u003E\u003C\/wbr\u003Eself-assessment\/\u003C\/a\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIn the Cloud computing Self Assessment, the following questions are the most frequent ones asked.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThe Fundamental Cloud Computing Checklist: 57 Cloud Computing Criteria You Need To Know The Answers To In The Cloud Computing Domain Covering: Cloud Computing, Audit log, Cloud management, Cloud service, Cloud storage, Digital object identifier, Disaster recovery, IT infrastructure, Performance metric, Quality of service, Research and Development, Security event, Sensitive data, Service provider, Systems engineering, Utility computing and Virtual machines:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cb\u003ECloud Computing Critical Criteria:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHow can a small cloud computing consultancy take advantage of the Federal Cloud Computing Strategy?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat are the key business and technical challenges of transitioning to a cloud computing strategy?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat is the importance of standards-based cloud computing?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs there any recourses about cloud computing performance?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ENetworks that are flexible, well-performing, and secure?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs the market ready yet for P2P cloud computing?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHow does BYOD affect security in the cloud?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat problems does cloud computing solve?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHIPAA and Cloud A Great Match?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat is grid computing?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAudit log Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAre audit logs regularly backed up, secured, and retained for at least three months online and one-year offline for all critical systems?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EMaintain the integrity of audit logs through self-protection and limited auditor access?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECloud management Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHow can you verify that the virtualization platform or cloud management software running on the systems you use, which you did not install and do not control, does not contain malware?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECloud management for\u0026nbsp; do we really need one?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECloud service Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHow quickly can a cloud service provider scale services and capability and is this quick enough for the requirements of the customer\/consumer?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhich cloud service model encompasses the complete cloud computing stack?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECloud storage Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDoes cloud storage get affected during a natural disaster how can we ensure a secure disaster recovery for that?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat are the ramifications of cloud storage?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cb\u003EDigital object identifier Critical Criteria:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAre the data and associated software produced and\/or used in the project discoverable (and readily located), identifiable by means of a standard identification mechanism (e.g. digital object identifier)?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDisaster recovery Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; color: #222222; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAny changes in the status of the location due to the disaster from the local or federal government that should be considered?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWill we rebuild to how things were before the disaster, or do we reset and do some things differently?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat is the best strategy going forward for data center disaster recovery?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat is the current financial position of your business?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat is our definition of recovery point objective?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EHow do we create backups for disaster recovery?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EPostpone purchasing supplies inventory?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat are ideal use cases for the cloud?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003Ewhat is post-disaster recovery to us?\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EEquipment in working order?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cdiv\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIT infrastructure Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat IT infrastructure do we have and what do we need to support the future organisation needs?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cb\u003EPerformance metric Critical Criteria:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cul\u003E\n\u003Cli style=\"line-height: 17px;\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDoes your company have defined information technology risk performance metrics that are monitored and reported to management on a regular basis?\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EQuality of service Critical Criteria:\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs the Quality of Service met?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EResearch and Development Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EA vital question in new product management is: how should the business most effectively invest its research and development (r\u0026amp;d) and new product resources?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ESecurity event Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EPolicy compliance is closely related to IT governance. Compliance has much to do with defining, controlling and governing security efforts. How should an organization respond to security events?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAre the procedures and other controls capable of enabling prompt detection of security events and response to security incidents implemented?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ESensitive data Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThe pharmaceutical industry is also taking advantage of digital progress. It is using IoT for supply chain security in packaging and tracking of drugs. There are new companies using computer chips in pills for tracking adherence to drug regimens and associated biometrics. Using this as an example, how will we use and protect this sensitive data?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat measures are in place to protect sensitive data?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EService provider Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDuring the last 3 years, have you been the subject of an investigation or action by any regulatory or administrative agency for privacy related violations?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIf a back door exit was used to circumvent an attack, do the attackers now know of such a back door, and thus should a new back door be constructed?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs there an appropriately trained security analyst on staff to assist in identifying and mitigating incidents involving undetected malware?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EFor the private information collected, is there a process for deleting this information once it is complete or not needed anymore?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDo you publish a bulletin board, chat room or otherwise allow users to upload or post content to your website?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDo you require that sub contractors submit proof of insurance separate from the primary?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs the product compatible and interoperable with other PKI products\/service providers?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIs the service provider eligible for certification under the scheme?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ESecurity Considerations -What?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWho Will Benefit?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ESystems engineering Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003Eis the project using any technologies that have not been widely deployed or that the project team is unfamiliar with?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EDoes management understand principles and concepts of system engineering?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhy has systems engineering emerged as a distinct discipline?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EAre the requirements mapped to one or more user needs?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat priorities are appropriate?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EUtility computing Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhen is utility computing preferable to running a private cloud?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EVirtual machines Critical Criteria:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECan your application be packaged into a virtual machine (VM) instance and run on cloud infrastructure or does it need specialized hardware and\/or special access to hardware that the AWS cloud cannot provide?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhich technique can be used to cluster a virtual machine with a physical machine?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EWhat types of resources (e.g., virtual machines, storage space, development environments) does the provider offer as part of each of its service models?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003Ehow many virtual machines are to be protected by the disaster recovery solution?\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ENext, read more and get started with the Cloud computing Self Assessment:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Ca href=\"https:\/\/store.theartofservice.com\/cloud-computing-complete-self-assessment\/\" rel=\"nofollow\" style=\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target=\"_blank\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003Ehttps:\/\/store.theartofservice.\u003Cwbr\u003E\u003C\/wbr\u003Ecom\/cloud-computing-complete-\u003Cwbr\u003E\u003C\/wbr\u003Eself-assessment\/\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThe Cloud computing Self-Assessment Excel Dashboard shows what needs to be covered to organize the business\/project activities and processes so that Cloud computing outcomes are achieved.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"KCE12V-oc-a\" style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px 0px 0px 44px; padding: 0px 0px 0px 5px;\"\u003E\n\u003Cdiv class=\"KCE12V-A-P\" style=\"border: 0px; margin: 0px; padding: 0px;\" tabindex=\"0\"\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; overflow: auto; padding: 0px;\"\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; max-height: 10000px; padding: 0px;\"\u003E\n\u003Cdiv dir=\"ltr\" style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EThe Self-Assessment provides its value in understanding how to ensure that the outcome of any efforts in Cloud computing are maximized.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EIt does this by securing that responsibilities for Cloud computing criteria get automatically prioritized and assigned; uncovering where progress can be made now.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EGerard Blokdijk\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003ECEO at The Art of Service\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003EGerard is the CEO at The Art of Service. He has been providing information technology insights, talks, tools and products to organizations in a wide range of industries for over 25 years. Gerard is a widely recognized and respected information expert. Gerard founded The Art of Service consulting business in 2000. Gerard has authored numerous published books to date.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Ca href=\"https:\/\/www.linkedin.com\/in\/gerardblokdijk\" rel=\"nofollow\" style=\"border: 0px; color: #6611cc; cursor: pointer; margin: 0px; padding: 0px; text-decoration: none;\" target=\"_blank\"\u003E\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003Ehttps:\/\/www.linkedin.com\/in\/\u003Cwbr\u003E\u003C\/wbr\u003Egerardblokdijk\u003C\/span\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cdiv class=\"KCE12V-oc-a\" style=\"border: 0px; margin: 0px 0px 0px 44px; padding: 0px 0px 0px 5px;\"\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv class=\"KCE12V-A-b\" style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin-bottom: 0px; margin-left: 39px; margin-right: 0px !important; margin-top: 0px; padding: 0px 0px 0px 5px;\"\u003E\n\u003Cdiv class=\"KCE12V-A-a KCE12V-A-cb\" style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 4px 0px; position: relative;\"\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; margin: 0px; padding: 0px;\"\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; display: inline-block; margin: 0px; padding: 0px;\"\u003E\n\u003C\/div\u003E\n\u003Cspan style=\"font-family: inherit; font-size: large;\"\u003E\n\u003C\/span\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"KCE12V-yc-a\" style=\"border: 0px; height: 34px; margin: 4px 0px 0px; padding: 0px; position: relative;\"\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.comrevo.com\/feeds\/1102070227192753232\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.comrevo.com\/2017\/10\/Cloud-computing-Quick-Fundamental-Checklist.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/913600556879440043\/posts\/default\/1102070227192753232"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/913600556879440043\/posts\/default\/1102070227192753232"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.comrevo.com\/2017\/10\/Cloud-computing-Quick-Fundamental-Checklist.html","title":"Cloud computing Quick Fundamental Checklist - The 57 Questions You Need to ASK To Grow"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-913600556879440043.post-3743477114314109327"},"published":{"$t":"2017-09-18T20:18:00.003+05:30"},"updated":{"$t":"2017-10-06T22:52:11.529+05:30"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Guest Blogging"}],"title":{"type":"text","$t":"Guest Blogging"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Hi, in this post, we have provided a platform for you to publish your own post.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; Write an informative post based on \"Recent Trends in Computer Science \u0026amp; Technology\" and reach to wider base of COMREVO readers.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; To write your post, Click on \u003Cb\u003ENEW TOPIC\u003C\/b\u003E. Then provide title of post in \u003Cb\u003ESubject\u003C\/b\u003E and write details in the\u0026nbsp;Text box\u0026nbsp;provided beneath.\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; You have to log in to your Gmail account to write your post.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ca name='more'\u003E\u003C\/a\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Ciframe frameborder=\"0\" height=\"3000px\" id=\"forum_embed\" scrolling=\"no\" src=\"javascript:void(0)\" width=\"100%\"\u003E\n    \u003Cbr \/\u003E\n\u003C\/iframe\u003E\n\u003Cscript type=\"text\/javascript\"\u003E\n    document.getElementById(\"forum_embed\").src =\n        \"https:\/\/groups.google.com\/forum\/embed\/?place=forum\/guest-blogging\" +\n        \"\u0026showsearch=true\u0026showpopout=false\u0026parenturl=\" + encodeURIComponent(window.location.href);\n     \n\u003C\/script\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.comrevo.com\/feeds\/3743477114314109327\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.comrevo.com\/2017\/09\/guest-blogging.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/913600556879440043\/posts\/default\/3743477114314109327"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/913600556879440043\/posts\/default\/3743477114314109327"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.comrevo.com\/2017\/09\/guest-blogging.html","title":"Guest Blogging"}],"author":[{"name":{"$t":"Parag Jambhulkar"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/13991750622483538113"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"thr$total":{"$t":"0"}}]}});