A Survey on Cloud Computing Pillars and Challenges

Total Page:16

File Type:pdf, Size:1020Kb

A Survey on Cloud Computing Pillars and Challenges International Journal of Applied Research 2015; 1(8): 254-258 ISSN Print: 2394-7500 ISSN Online: 2394-5869 A Survey on Cloud Computing Pillars and Challenges Impact Factor: 5.2 IJAR 2015; 1(8): 254-258 www.allresearchjournal.com Robin Kumar, Rajni Kant, Bhawani Sharma Received: 05-05-2015 Accepted: 08-06-2015 Abstract Robin Kumar Nowadays cloud computing is acquiring great deal of attention in users, markets, education and Assistant Professor, publications. Cloud is a group of servers that provide highly scalable services like SaaS, PaaS, IaaS to Department of Mathematics, transform computing in business. Information stored in clouds is accessible from anywhere at any time. A. S. College, Khanna, Punjab. Cloud providers have storage, software and infrastructure facilities to run businesses effectively. Cloud computing is a dominant technology that facilitates businesses to become more connective, scalable, Rajni Kant collaborative, real-time and productive. Cloud computing is based on the concept of virtualization and Assistant Professor, hence eliminates the need of a powerful configuration deployment by providing services at a reasonable Department of Economics, A. price and hence this technology is very helpful for small organizations that cannot afford the cost of S. College, Khanna, Punjab. infrastructure and storage space. This robust technology has shifted the cost of managing hardware, Bhawani Sharma software and computational infrastructure to third parties such as Google, Microsoft, Amazon. By Assistant Professor, shifting the costs of managing computational infrastructure to third parties, cloud computing has made Department of Computer it possible for individuals and small organizations to deploy world-wide services; all they need to pay is Science, R. K. Arya College, the marginal cost of actual resource usage. As all the data is being stored in clouds, security issues Nawanshahr, Punjab. should be addressed properly. All the organizations have concerns about security, privacy, residency, unauthorized access, interception, interruption, modification, fabrication and non-repudiation. Security system of clouds should not be vulnerable to unauthorized data manipulation. By effectively implementing the pillars of cloud computing security of data over clouds could be ensured. This paper describes pillars, service models, deployment models and challenges of cloud computing to provide a better and common understanding of the subject. Keywords: Cloud Computing, SaaS, PaaS, IaaS, Agility, Parallel, Distributed, Scalable, Modular, Service-Oriented 1. Introduction Cloud Computing has changed the way how people use technology without investing in new infrastructure facilities, training new personnel or procuring new software. Cloud is an impactful technology that provides on-demand access to computing resources at a marginal and predictable cost. Cloud computing is a recent dominant technological development widely accepted by organizations, educational institutions and individual users. Cloud computing adds a new dimension to business models by eliminating the need of a powerful physical configuration. Cloud computing allows consumers to use services like software, . platform and infrastructure as a supplement to consumer’s on-premises infrastructure without installation of costly hardware and software. Concept of cloud computing is same as accessing e-mails. Like e-mails, cloud services can be accessed with the help of Internet. Cloud computing is also an Internet-based service. Service providers of cloud process, manage and store the consumer’s data at a remote location. E-mail services provided by yahoo, gmail and rediffmail cloud service providers is a very simple and easily understandable example of cloud service. IT staff can spend valuable time on strategic activities rather than on routing maintenance of e-mail servers. E-mail management and storage is on the cloud, subscribers do not have e-mails on their personal computer rather they can access their e-mails with the help of an Internet connection. Internet connection is the only requirement which an organization need to have in order to access cloud. Correspondence: Consumers of cloud services are required to pay-as-per-usage not more than that. Cloud Robin Kumar Computing is an emerging technology that have a multiplying effect because it provides Assistant Professor, virtualized services like software, platform and infrastructure without physical installation of Department of Mathematics, costly hardware and software. Cloud computing is agile, distributed, modular, parallel, A. S. College, Khanna, Punjab. scalable, service-oriented and secure. ~ 254 ~ International Journal of Applied Research 2. Cloud Deployment Models services like operating system, server software, database A. Public Cloud management system, tools for design and development etc. Public clouds are available for general public. Public cloud’s to create scalable, service-oriented applications with lower infrastructure is available for all the subscribers having an investments. Examples of PaaS vendors are: Amazon EC2, Internet connection and access to cloud space. Public clouds Appistry, AppScale, AT&T, Engine Yard, Enomaly, are more vulnerable than private clouds. Level of efficiency FlexiScale, GCloud3, Gizmox, GoGrid, Google, LongJump, in resource sharing is highest in public clouds. A public Microsoft, Orange Scape, RackSpace, Salesforce.com, cloud does not mean that user’s data is accessible to all; Terremark, Ubuntu, Verizon etc. vendors of public clouds provide an effective access control mechanism to ensure the integrity of data. C. Infrastructure as a service (IaaS) IaaS providers offer services like storage, disaster recovery, B. Private Cloud remote access, backup, file sharing, resources and computing Private clouds are available solely for a single group or power to the customer on pay-per-usage basis. Amazon is the organization. Access to private cloud’s infrastructure is major player in this domain, it offers two products: EC2 limited to that particular group or organization. This (Elastic Compute Cloud) for computing resources and S3 deployment model is implemented solely for an organization (Simple Storage Services) for data storage. Cloud computing and is managed by either organization or third party. Level of provides highly scalable, virtualized, standardized, reliable, security is highest in private clouds. secure and dynamic infrastructure services to facilitate the working of small and large organizations that cannot afford C. Community Cloud the costly infrastructure. Organizations can focus on their Community clouds are shared by several organizations application logic rather than installing their own having similar cloud requirements such as security concerns, infrastructure services. In cloud computing, instead of fixed policies and facilities etc. Organizations having common resources, resources can grow—and shrink–dynamically as concerns opt for community clouds rather than using public requirements shift and the customers pay on the basis of pay- clouds or creating their private clouds. Management of per-usage. Examples of IaaS vendors are: AllenPort, community clouds is very complex. Amazon, AppZero, Boomi, Cast Iron, Citrix Cloud Center (C3), Elastra, IBM, Informatica, New Relic, Novell, D. Hybrid Cloud OpSource, RightScale, Stoneware, Carbonite, Ctera, IBM, Hybrid clouds are combinations of infrastructure of two or Intronis, Robobak, Symantec etc. more clouds that is private, public or community. Organizations may host critical applications with rigorous 4. Pillars of Cloud Computing security on private clouds and applications with less security Pillars are the foundational building blocks of cloud concerns on the public cloud. Hybrid clouds facilitate ― computing. If all the pillars of cloud computing are not cloud burstingǁ which means if an application of private implemented properly then that service cannot be considered cloud needs additional resources, it can use the resources of as cloud computing service. public cloud in case of peak load requirements. This resource sharing facilitates efficient utilization of resources among A. Dynamic Computing Infrastructure different clouds but increases the design complexity. Clouds should provide a standardized, scalable, robust and secure physical infrastructure in a virtualized manner. 3. Cloud Service Models Dynamic means resources should be allocated and released A. Software as a service (SaaS) as per the user’s requirements to match the traffic demand Software is delivered as a service to the customer, which curve. This rapid elasticity of cloud computing facilitates the makes it unnecessary to have a physical copy of the software resources to grow-and-shrink automatically as per the on all the devices of an organization. Some software services customer’s requirements. are free like Google, Hotmail while others are available on a subscription basis. Customers can have access to the B. On-Demand Self-Service software at all the times without worrying about deployment Cloud Computing has changed the way how people use and maintenance of software. In this type of service technology. Cloud computing technology provides customers have least control over the cloud. Examples of convenient on-demand access to a shared pool of resources SaaS vendors are: SAP, Birst, Cloudphysics, Databricks, without human intervention on the cloud service provider’s Hubspot, Netsuite, New Relic, Otixo, Qlik, Qubole, side. Users
Recommended publications
  • Ekonomická Fakulta DIPLOMOVÁ PRÁCE
    TECHNICKÁ UNIVERZITA V LIBERCI Ekonomická fakulta DIPLOMOVÁ PRÁCE 2011 Martin Kolář Technická univerzita v Liberci Ekonomická fakulta Studijní program: M 6209 Systémové inţenýrství a informatika Studijní obor: Manaţerská informatika Možnosti nízkonákladových řešení IS malých a středních podniků s využitím on-line aplikací GOOGLE Low-costs IS solution possibilities for small and medium-sized enterprises using GOOGLE on-line applications DP – EF – KIN – 2011–9 MARTIN KOLÁŘ Vedoucí práce: doc. Ing. Jan Skrbek, Dr. - KIN Konzultant: Ing. Richard Lukeš Počet stran: 158 Počet příloh: 7 Datum odevzdání: 6. 5. 2011 Prohlášení Byl jsem seznámen s tím, ţe na mou diplomovou práci se plně vztahuje zákon č. 121/2000 Sb., o právu autorském, zejména § 60 – školní dílo. Beru na vědomí, ţe Technická univerzita v Liberci (TUL) nezasahuje do mých autorských práv uţitím mé diplomové práce pro vnitřní potřebu TUL. Uţiji-li diplomovou práci nebo poskytnu-li licenci k jejímu vyuţití, jsem si vědom povinnosti informovat o této skutečnosti TUL; v tomto případě má TUL právo ode mne poţadovat úhradu nákladů, které vynaloţila na vytvoření díla, aţ do jejich skutečné výše. Diplomovou práci jsem vypracoval samostatně s pouţitím uvedené literatury a na základě konzultací s vedoucím diplomové práce a konzultantem. V Liberci, 6. 5. 2011 5 Anotace Diplomová práce „Moţnosti nízkonákladových řešení IS malých a středních podniků s vyuţitím on-line aplikací GOOGLE“ pojednává o moderním pojetí tvorby informačních systémů pro firemní segment. Záměrem práce je vymezit moţnosti standardních a inovativních řešení podnikového IS a analyzovat nízkonákladové řešení, realizované formou cloud computingu od společnosti Google. V oblasti teorie se opírá o obecné zásady tvorby IS s ohledem na specifika malých a středních podniků.
    [Show full text]
  • September 2016 M&A and Investment Summary Table of Contents
    September 2016 M&A and Investment Summary Table of Contents 1 Overview of Monthly M&A and Investment Activity 3 2 Monthly M&A and Investment Activity by Industry Segment 8 3 Additional Monthly M&A and Investment Activity Data 40 4 About Petsky Prunier 52 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. 2| M&A and Investment Summary September 2016 M&A and Investment Summary for All Segments Transaction Distribution . A total of 463 deals were announced in September 2016, of which 296 were worth $20.7 billion in aggregate reported value . Software was the most active segment with 148 deals announced —98 of these transactions reported $8.9 billion in value . Marketing Technology was also active with 100 transactions announced, of which 67 were worth a reported $1.2 billion in value . Strategic buyers announced 171 deals (32 reported $7.2 billion in value) . VC/Growth Capital investors announced 267 transactions (244 reported $5.6 billion in value) . Private Equity investors announced 25 deals during the month (seven reported $7.8 billion in value) September 2016 BUYER/INVESTOR BREAKDOWN Transactions Reported Value Strategic Buyout Venture/Growth Capital # % $MM % # $MM # $MM # $MM Software 148 32% $8,878.6 43% 42 $2,369.3 10 $5,407.3 96 $1,102.0 Marketing Technology 100 22% 1,248.5 6% 23 5.6 6 ‐ 71 1,242.9 Digital Media/Commerce
    [Show full text]
  • D1.5 Final Business Models
    ITEA 2 Project 10014 EASI-CLOUDS - Extended Architecture and Service Infrastructure for Cloud-Aware Software Deliverable D1.5 – Final Business Models for EASI-CLOUDS Task 1.3: Business model(s) for the EASI-CLOUDS eco-system Editor: Atos, Gearshift Security public Version 1.0 Melanie Jekal, Alexander Krebs, Markku Authors Nurmela, Juhana Peltonen, Florian Röhr, Jan-Frédéric Plogmeier, Jörn Altmann, (alphabetically) Maurice Gagnaire, Mario Lopez-Ramos Pages 95 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Abstract The purpose of the business working group within the EASI-CLOUDS project is to investigate the commercial potential of the EASI-CLOUDS platform, and the brokerage and federation- based business models that it would help to enable. Our described approach is both ‘top down’ and ‘bottom up’; we begin by summarizing existing studies on the cloud market, and review how the EASI-CLOUDS project partners are positioned on the cloud value chain. We review emerging trends, concepts, business models and value drivers in the cloud market, and present results from a survey targeted at top cloud bloggers and cloud professionals. We then review how the EASI-CLOUDS infrastructure components create value both directly and by facilitating brokerage and federation. We then examine how cloud market opportunities can be grasped through different business models. Specifically, we examine value creation and value capture in different generic business models that may benefit from the EASI-CLOUDS infrastructure. We conclude by providing recommendations on how the different EASI-CLOUDS demonstrators may be commercialized through different business models. © EASI-CLOUDS Consortium. 2 Deliverable 1.5 – Final Business Models for EASI-CLOUDS v1.0 Table of contents Table of contents ...........................................................................................................................
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • CTERA Networks !July 2014 TABLE of CONTENTS !
    ! ! ! ! ! ! ! Leveraging Cloud Storage Technologies for Next Generation File Services ! ! Prepared for: CTERA Networks !July 2014 TABLE OF CONTENTS ! TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 2 UNDERSTANDING THE CHALLENGES 3 The limits of traditional storage 3 The Value of User Experience 4 New Ways to Produce and Collaborate 4 Why The User Experience Is So Important 4 The Cloud Backend 5 Cloud, integration and security 6 THINKING ABOUT A SOLUTION 8 Components of The Solution 8 What Is Object Storage? 8 An Introduction to The CTERA Platform 9 Management and Control Layer 10 Security by Design 11 How it is implemented by CTERA 11 Why it is important for you 12 File Service Gateways (edge devices, endpoint and mobile apps) 12 How it is implemented by CTERA 13 Why it is important for you 14 BOTTOM LINE 15 JUKU 16 Why Juku 16 ! Author 16 Juku consulting srl - [email protected] - http://jukuconsulting.com. !1 EXECUTIVE SUMMARY ! The world is quickly changing and so is the way of doing business. Terms like “distributed enterprise” are no longer enough to describe the new enterprise after cloud and mobile revolutions have changed the rules. Now, the mobile work force counts for the majority of the users and this has direct consequences on how data are created, accessed and have to be managed. It’s probably better talking about the “dispersed enterprise”. Users work on many different devices at the same time, continuously switching from one device to another, and hence document workflows have dramatically changed. Data are accessed from everywhere at anytime by single users and teams: collaboration platforms, starting from file sharing solutions, are fundamental layers of any modern organization.
    [Show full text]
  • All-In-One Cloud Storage Gateways with Integrated Data Protection And
    CTERA C400 / C800 Cloud Attached Storage® Appliances All-in-One Cloud Storage Gateways with Integrated Data Protection and Network Attached Storage Integrated On-Site & Off-Site Data Backup and Disaster Recovery Robust Enterprise-Grade NAS Features Cloud File Sharing and Synchronization Hybrid Storage Appliances with Integrated Cloud Services for SMBs and Branch Offices The C400 and C800 appliances from CTERA Networks combine network attached storage (NAS) functionality with comprehensive data protection, providing fast local backup & recovery integrated with cloud storage for disaster recovery, remote access and file sharing. With the included CTERA backup software, managed agents, remote management capabilities and end-to-end data protection, the C400 and C800 provide a highly cost-effective, easy-to-manage alternative to more expensive, disparate solutions. Lightning-fast on-site backup and restore, with integrated, globally de-duplicated, Hybrid Cloud & On-Premises efficient cloud backup that provides an off-site copy for disaster recovery. Protect the business against data loss and minimize disaster recovery time using a Complete Data Protection single solution – including roaming laptops, remote users, servers and workstations. Full-fledged NAS appliances supporting RAID 5/6 for redundancy, inline volume Robust Network Storage encryption, thin-provisioned snapshots, iSCSI and Active Directory integration. Using the CTERA Portal, service providers and enterprise IT can manage and Central Management monitor any number of CTERA appliances from a unified Web console. Access local and cloud-stored files from anywhere, on locally or over the Web. File-Based Collaboration Share files with project groups and occasional users with email invitations. Synchronize files to and from the cloud between multiple users.
    [Show full text]
  • Everything You Need to Know About Object Storage
    STHome ORAGE MANAGING THE INFORMATION THAT DRIVES THE ENTERPRISE Castagna: Big storage cooking up in labs Toigo: Hyper- SNAPSHOT 1 EDITOR’S NOTE / CASTAGNA consolidation the future Need for more Data storage capacity driving growing faster than Object storage squeezing out NAS most NAS purchases capacity … for now Snapshot 1: Capacity driving most NAS CLOUD BACKUP STORAGE REVOLUTION / TOIGO purchases Tap the cloud to Hyper-consolidated Cloud alternatives ease backup burdens is the future to local backup Snapshot 2: NFS and 10 Gig pre- ferred for new NAS SNAPSHOT 2 HOT SPOTS / SINCLAIR Hadoop’s role in big data storage Users favor venerable When simple storage NFS and 10 Gig for isn’t so simple Sinclair: Simple storage not so new NAS systems simple Matchett: SayEverything hi you need to to the transforma- HADOOP READ-WRITE / MATCHETT tional cloud know about object storage Big data requires The sun rises on About us Object storage is moving out of the cloud to big storage transformational nudge NAS out of enterprise file storage cloud storage services MAY 2016, VOL. 15, NO. 3 STORAGE • MAY 2016 1 EDITOR’S LETTER RICH CASTAGNA Home Castagna: Big storage cooking up in labs Toigo: Hyper- Data storage Not to be confused with bitcoins, each of these coins consolidation (de.eloped at the Uni.ersity of Southampton in the UK) the future growing faster is said to be capable of holding 360 TB of data on a disk Object storage that appears to be only a bit larger than a quarter. That’s a squeezing out NAS than capacity lot of data in a small space, and it makes that 32 GB USB flash dri.e on your keychain seem pretty puny.
    [Show full text]
  • CTERA Endpoint & Remote Server Backup
    BKloud CTERA Endpoint & Remote Server Backup Ecient and Secure Cloud-Enabled Backup for The Dispersed Enterprise Remote Server Backup Bare Metal Endpoint Backup File-Level Agent-based cloud backup for laptops Appliance-based hybrid local and cloud backup for servers and workstations File-level and ‘bare metal’ backup & recovery Source-based encryption, bandwidth optimization and data reduction features End-User Choice of private or public infrastructure, Self-Service vendor-neutral Centralized management, real-time Local/Cloud Mobile Hybrid monitoring and custom alerts Access Scalable, integrates with identity management systems CTERA Backup is a comprehensive data protection solution for laptops, workstations and remote servers. It provides both direct-to-cloud and appliance-based hybrid modes that optimize recovery times and performance, with fully centralized remote management. CTERA Backup can be deployed as a fully private, behind-the-rewall solution in your datacenter, or as a ‘virtual private’ solution leveraging scalable public cloud infrastructure – always allowing you to retain complete control and ownership of your data. www.ctera.com [email protected] 1300 72 74 74 ©2015 CTERA Networks Ltd., All Rights Reserved BKloud Data Protection Features Comprehensive Endpoint Backup for Laptops Automated, scheduled granular le backup Windows, Mac and Linux compatible Select folders to backup or exclude from backup End-user self-service for simple le recovery Hybrid Local & Cloud Backup Back up remote oce servers and workstations using
    [Show full text]
  • All-In-One Network Attached Storage, Backup Appliance and Gateway To
    CTERA C200 Cloud Attached Storage® Appliance All-in-One Network Attached Storage, Backup Appliance and Gateway to Cloud Services Integrated On-Site & Cloud Backup and Recovery Remote Access and Central Management File Sharing on The Local Network and in The Cloud Hybrid 2-Bay Storage Appliance with Integrated Cloud Services for Small Business and Offices Ideal for small businesses and branch offices, the CTERA C200 appliance combines network attached storage (NAS) functionality with comprehensive data protection, providing fast local backup & recovery integrated with cloud storage for backup, remote access and file sharing. With the included CTERA backup software, managed agents, remote management capabilities and end-to-end data protection, the C200 provides a cost-effective, easy-to-manage alternative to more expensive, disparate solutions. Lightning-fast on-site backup and restore, with integrated, globally de-duplicated, Hybrid Cloud & On-Premises efficient cloud backup that provides an off-site copy for disaster recovery. Protect the business against data loss and minimize disaster recovery time using a Complete Data Protection single solution – including roaming laptops, remote users, servers and workstations. Using the CTERA Portal, MSPs and enterprise IT administrators can manage and Central Management monitor any number of CTERA appliances from a unified Web console. Access local and cloud-stored files from anywhere, locally or over the Web. Share File-Based Collaboration files with project groups and occasional users with
    [Show full text]
  • CTERA Reseller Portal Administrator Guide
    Reseller Portal Administrator Guide CTERA Portal November 2015 Version 5.0 Copyright © 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission from CTERA Networks Ltd. Information in this document is subject to change without notice and does not represent a commitment on part of CTERA Networks Ltd. CTERA, C200, C400, C800, C800+, P1200, CloudPlug, NEXT3, Cloud Attached Storage, and Virtual Cloud Drive are trademarks, service marks, or registered trademarks of CTERA Networks Ltd. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. patents, foreign patents, or pending applications. Tip For legal information and for the end user license agreement, refer to Legal Information in this guide. Contents About the CTERA Portal ------------------------------------------------------------------------------- 7 Management Features ---------------------------------------------------------------------------------- 7 Storage Clients -------------------------------------------------------------------------------------------- 8 CTERA Provisioning------------------------------------------------------------------------------------- 10 Getting Started ---------------------------------------------------------------------------------------- 11 Browser Requirements -------------------------------------------------------------------------------- 11 Logging
    [Show full text]
  • City of Irwindale Irwindale 5050 N
    CITY OF IRWINDALE IRWINDALE 5050 N. IRWINDALE AVE., IRWINDALE CA 91706 •PHONE: (626) 430-2200 •FACSIMILE: 962-4209 MARK A. BRECEDA AGENDA FOR THE REGULAR MEETING OF THE MAYOR CITY COUNCIL ALBERT F. AMBRIZ MAYOR PRO TEM SUCCESSOR AGENCY TO THE IRWINDALE COMMUNITY REDEVELOPMENT AGENCY LARRY G. BURROLA HOUSING AUTHORITY COUNCILMEMBER MANUEL R. GARCIA COUNCILMEMBER SEPTEMBER 27, 2017 5:30 P.M. CLOSED SESSION H. MANUEL ORTIZ 6:30 P.M. OPEN SESSION COUNCILMEMBER IRWINDALE CITY HALL/ COUNCIL CHAMBER CLOSED SESSION - CITY HALL CONFERENCE ROOM REGULAR MEETING - CITY HALL COUNCIL CHAMBER Spontaneous Communications: The public is encouraged to address the City Council on any matter listed on the agenda or on any other matter within its jurisdiction. The City Council will hear public comments on items listed on the agenda during discussion of the matter and prior to a vote. The City Council will hear public comments on matters not listed on the agenda during the Spontaneous Communications period. Pursuant to provisions of the Brown Act1 no action may be taken on a matter unless it is listed on the agenda, or unless certain emergency or special circumstances exist. The City Council may direct staff to investigate and/or schedule certain matters for consideration at a future City Council meeting. Americans with Disabilities Act: In compliance with the ADA, if you need special assistance to participate in a City Council meeting or other services offered by this City, please contact City Hall at (626) 430-2200. Assisted listening devices are available at this meeting. Ask the Deputy City Clerk if you desire to use this device.
    [Show full text]
  • Vendor Contract
    Meredith Barton Chief Operating Officer 5/6/2020 NOTICE TO MEMBERS REGARDING ATTRIBUTE RESPONSES TIPS VENDORS RESPOND TO ATTRIBUTE QUESTIONS AS PART OF TIPS COMPETITIVE SOLICITATION PROCESS. THE VENDOR’S RESPONSES TO ATTRIBUTE QUESTIONS ARE INCLUDED HEREIN AS “SUPPLIER RESPONSE.” PLEASE BE ADVISED THAT DEVIATIONS, IF ANY, IN VENDOR’S RESPONSE TO ATTRIBUTE QUESTIONS MAY NOT REFLECT VENDOR’S FINAL ATTRIBUTE RESPONSE, WHICH IS SUBJECT TO NEGOTIATIONS PRIOR TO AWARD. PLEASE CONTACT THE TIPS OFFICE AT 866-839- 8477 WITH QUESTIONS OR CONCERNS REGARDING VENDOR ATTRIBUTE RESPONSE DEVIATIONS. PLEASE KEEP IN MIND THAT TIPS DOES NOT PROVIDE LEGAL COUNSEL TO MEMBERS. TIPS RECOMMENDS THAT YOU CONSULT YOUR LEGAL COUNSEL WHEN EXECUTING CONTRACTS WITH OR MAKING PURCHASES FROM TIPS VENDORS. 200105 Addendum 2 Educate-me.net Supplier Response Event Information Number: 200105 Addendum 2 Title: Technology Solutions, Products and Services Type: Request for Proposal Issue Date: 1/9/2020 Deadline: 2/21/2020 03:00 PM (CT) Contact Information Contact: Kristie Collins Address: Region 8 Education Service Center 4845 US Highway 271 North Pittsburg, TX 75686 Phone: +1 (866) 839-8477 Fax: +1 (866) 839-8472 Email: [email protected] 3DJHRISDJHV 9HQGRU(GXFDWHPHQHW $GGHQGXP Educate-me.net Information Address: 116 Fairfield Road Fairfield, NJ 07004 Phone: (973) 303-4343 Toll Free: (877) 791-4550 By submitting your response, you certify that you are authorized to represent and bind your company. Mark A. Menzella [email protected] Signature Email Submitted at 2/21/2020 2:13:59 PM Requested Attachments Vendor Agreement vendor_agreement.pdf The vendor must download the Vendor Agreement from the attachment tab, fill in the requested information and uploa d the completed agreement.
    [Show full text]