Tuesday, December 24, 2019

Perception is Reality in Virginia Woolfs Mrs. Dalloway

Although the entire novel tells of only one day, Virginia Woolf covers a lifetime in her enlightening novel of the mystery of the human personality. The delicate Clarissa Dalloway, a disciplined English lady, provides the perfect contrast to Septimus Warren Smith, an insane ex-soldier living in chaos. Even though the two never meet, these two correspond in that they strive to maintain possession of themselves, of their souls. On this Wednesday in June of 1923, as Clarissa prepares for her party that night, events during the day trigger memories and recollections of her past, and Woolf offers these bits to the reader, who must then form the psychological and emotional make-up of Mrs. Dalloway in his/her own mind. The reader also learns of†¦show more content†¦However, the personality of Richard alters when Woolf presents his relationship with Clarissa. Suddenly, he appears much less inhibited. True, Richards insecure nature emerges here, too, when he chooses mere flowers as a gift for Clarissa instead of a more personal token of his love. Even though he planned to tell his wife, I love you, he offers the flowers without a word, afraid to be natural and impetuous because of the hesitancy about daring to love one another that he and Clarissa share. Still, Richard seems a different person in his relationship with his wife than with Peter. Now, he appears more of the strong, silent type as opposed to just the silent type. This is because the reader respects him more as the man Clarissa preferred over Peter Walsh. Even in Clarissas thoughts, Richard seems more secure because although he dearly loves her, both he and Clarissa realize that she chose him over Peter Walsh, and thus he seems more confident. Virginia Woolf illustrates the different aspects of Richards nature by comparing and contrasting his relationship with both Peter Walsh and his wife, Clarissa Dalloway. The next character, Peter Walsh, is more complex than Richard because Woolf shows his different sides by comparing and contrasting how he appears to three other characters: Sally, Richard, and Clarissa. Sally Seton, Clarissas friend, knows the fearing and apprehensive side of Peter as he vies for the hand of Clarissa. Sally sees thatShow MoreRelatedParallels Between Mrs Dalloway and The Hours1059 Words   |  5 PagesThe ongoing relationship between the literary movements of modernism and post-modernism is encompassed by the intertextual relationships between Stephen Daldry’s â€Å"The Hours† and Virginia Woolf’s â€Å"Mrs Dalloway†. These relationships communicate the inadequacy of previous writings to convey trauma, cultural crisis and the deep fragmentation within their respective societies. The immediate context of these social dialogues creates a clear division between each text, however the intertextual similaritiesRead More Virginia Woolf1120 Words   |  5 PagesVirginia Woolf In recent times there has been a renewed interest in Virginia Woolf and her work, from the Broadway play, â€Å"Whos Afraid of Virginia Woolf?† to the Academy award nominated film â€Å"The Hours† starring Nicole Kidman. This recent exposure, along with the fact that I have ancestors from England , has sparked my interest in this twentieth century British novelist. During the early part of the twentieth century, artists and writers saw the world in a new way. Famed British novelist VirginiaRead MoreWilliam Woolf s Mrs. Dalloway1730 Words   |  7 Pagesgives the characters, author, and reader the reference point of a shared experience upon which to build a literary work. In the case of Virginia Woolf’s Mrs. Dalloway, this uniting experience was the Great War. The remnants of this conflict can be seen throughout the novel in the lives and experiences of its characters. The integral nature of tragedy in Mrs. Dalloway means that future reimaginings and reframings must also include a uniting tragic event as a means by which to create parallels and showRead MoreThe Hours - Film Analysis12007 Words   |  49 PagesThe Suicide of the Author and his Reincarnation in the Reader: Intertextuality in The Hours by Michael Cunningham Andrea Wild In his novel The Hours, Michael Cunningham weaves a dazzling fabric of intertextual references to Virginia Woolfs works as well as to her biography. In this essay, I shall partly yield to the academic itch to tease out the manifold and sophisticated allusions to the numerous intertexts. My aim, however, is not to point out every single reference to Woolf and her works--suchRead MoreVirginia Woolfs Mrs. Dalloway and Samuel Becketts Waiting for Godot2438 Words   |  10 Pages Virginia Woolf’s Mrs. Dalloway and Samuel Beckett’s Waiting for Godot are representative works of two separate movements in literature: Modernism and Post-Modernism. Defining both movements in their entirety, or arguing whether either work is truly representative of the classifications of Modernism and Post-Modernism, is not the purpose of this paper; rather, the purpose is to carefully evaluate how both works, in the context of both works being representative of their respective traditions, employRead MoreMrs. Dalloway by Virginia Woolf981 Words   |  4 Pagesexpressions of time are categorized into two types of time: external time which labels our presence in reality and internal time which guides our actions, thoughts, and emotion. Naturally, we assume that these times are set in unison to each other, as time is always relative to an observer. But what happens when the times of the external and internal differ? In the novel Mrs. Dalloway by Virginia Woolf, Woo lf begins to explore this question through her unique writing style of free indirect discourseRead More Commerce, Politics and the City in A Room of Ones Own and Mrs. Dalloway2185 Words   |  9 PagesCommerce, Politics and the City in A Room of Ones Own and Mrs. Dalloway      Ã‚  Ã‚  Ã‚   ...At this moment, as so often happens in London, there was a complete lull and suspension of traffic. Nothing came down the street; nobody passed. A single leaf detached itself from the plane tree at the end of the street, and in that pause and suspension fell. Somehow it was like a signal falling, a signal pointing to a force in things which one had overlooked ... Now it was bringingRead More Virginia Woolfs Mrs. Dalloway - A Modern Tragedy Essay3723 Words   |  15 PagesMrs. Dalloway - A Modern Tragedy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚   The narrative of Mrs. Dalloway may be viewed by some as random congealing of various character experience. Although it appears to be a fragmented assortment of images and thought, there is a psychological coherence to the deeply layered novel. Part of this coherence can be found in Mrs. Dalloways psychological tone which is tragic in nature. In her forward to Mrs. Dalloway, Maureen Howard informs us that Woolf was reading both Sophocles and EuripidesRead MoreStream of Consciousness Novel1102 Words   |  5 Pages‘Stream-of-Consciousness’ Technique in Modernist English Fiction (with Special Reference to the Contributions of James Joyce and Virginia Woolf) Arpan Adhikary The term ‘stream of consciousness’ as applied in literary criticism to designate a particular mode of prose narrative was first coined by philosopher William James in his book Principles of Psychology (1890) to describe the uninterrupted flow of perceptions, memories and thoughts in active human psyche. As a literary term, however, it denotes a certain narrativeRead More Mrs. Dalloway2643 Words   |  11 PagesI. Mrs. Dalloway, by Virginia Woolf, was published on May 14, 1925 in London, England. The novel follows Clarissa Dalloway and a variety of other characters throughout the span of one day in their lives in 1923 London. Woolf utilizes a narrative method of writing. With the novel’s structure, the narrator possesses the ability to move inside of a character’s mind and compose her thoughts and emotions immediately as events occur throughout the day. The novel’s main character, Clarissa, is a middle-aged

Monday, December 16, 2019

Roles of Women in the American Civil War Free Essays

string(54) " suffrage was at the Seneca Falls convention in 1848\." The American Civil War was, as all wars are, affected not only by the men fighting on the battlefield, but by the women who served on the home front, in military hospitals, and occasionally next to men on the battlefield. Just as women influenced the war, the war changed the world in which the women lived. The women’s rights movement began shortly before the Civil War, and continued through the war, growing stronger as women were touched by the war, and longed for rights equal to men. We will write a custom essay sample on Roles of Women in the American Civil War or any similar topic only for you Order Now Women supported men by donating supplies to the effort in both the North and the South. Women served as soldiers, worked in military hospitals, and spied to discover valuable information to aid their homeland. Women were a very valuable resource during the war, and the war was very influential on the way women lived their lives in America. Before the Civil War, women’s roles in America were changing. Economic modernization caused the production of items previously made by women to occur outside of the home. In some cases, families needed women to work for wages in or out of the home. [i] In most cases, however, the men left for work while the women stayed at home to tend to the house and raise the children. This caused the existence of â€Å"separate spheres. †[ii] With this shift in production, the purpose of the home changed. Mothers were the source of love and nurturing for the children. When families became more centered on love and affection, midle class families started having fewer children. [iii] This, in turn, caused women to be able to be more active in society, since they were not constantly expecting or nursing a newborn. [iv] In the early and middle 1800s, women moved out of the home and into the public sphere. Many unmarried women had little chance of being planters, and they were not hired in the city. [v] Most commonly, women worked from the home. Occupations that took place outside of their home were traditional feminie roles of seamstress, laundress, or nanny. Few women were able to acquire jobs in retail, and women with larger homes could open a boardinghouse. [vi] Women (and children) worked in factories for wages and served humanity, and were generally overlooked by others. [vii] In the North, the manufacturing of cloth items such as clothing moved from the home to factories. Northern women increasingly could purchase thred, cloth, and clothing, while the South had fewer factories, so clothing was made in the home. [viii] Southern women did not question their place in society and admired the traditional way of life on their plantations. [ix] With fewer children and much less work at home, families sent their children to school more, and the public education system changed. The school became responsible for education and social skills. Women became more involved in the schooling system, and most teachers were women. Because of this, women needed to be educated, too. x] Women found work as schoolteachers because the environment was safer and more comfortable than a factory. [xi] Other women worked as private music, dance, or art tutors. They did, however, make low salaries. Though women found employment as teachers and in factories and shops, they longed for a traditional family life. [xii] Education was viewed different in the North and in the South. In th e North, women were expected by intelligent and independent free thinkers, while Southern women were expected to use their intellect to make polie conversation and support their ladylike character. xiii] Increasingly during the Antebellum period, women learned how to read. More families owned books and taught their children how to read. [xiv] Wealthy families may have had private libraries, from which daughters could read a variety of literature to maintain intellectual abilities. [xv] Though more women learned to read, many Southern women remained illiterate – some white women could not even write their own name. [xvi] Young women often preffered romantic novels that described a fantasy life out of her reach, which caused parents to encourage solid, factual literature. Surprisingly, women were interested in learning the things men learned, and yearned for an education equal to that of their husbands and brothers. [xvii] Unfortunately, the advancement of education for Southern women was far behind that for Northern women, and was only available to the rich, leaving poorer girls from farming families feeling more ignorant and belittled. [xviii] Women in the North were becoming increasingly active in the public arena, and hungered for a say in government. Previously, women persuaded their husbands on moral ground and raised moral citizens; now they began taking a tand for themselves, speaking to legislators about their concerns. [xix] The most common way that women participated in society was by serving with churches and joining temperance and antislavery societies. [xx] Some women â€Å"delivered political tirades, denounced officials, gave advice on military strategy from the lecture platform, or participated in violent public demonstrations;† these were the ones that troubled the public. [xxi] One of the most well-known femal lecturers during the civil war, Anna Dickinson, delivered speeches on the conflict between the Union and Confederacy. xxii] Her skills brought overwhelming popularity, fame, and wealth for some time, but her eccentricity and womanly unawareness of business caused her time in the spotlight to be limited. [xxiii] Since many women spoke against slavery, many men assumed that the emancipation of slaves would pull them from the public eye, and keep them back in the home. [xxiv] Many women, however, quietly expressed their opinions through personal writings and private conversations. The war was a very personal event, so women were individually affected by the choices made by their political leaders. In both the North and the South, women criticized leaders and blamed them for the heartbreak of the time. [xxv] As women became increasingly aware of and opinionated about national politics, they yearned more and more for a say in the election of governing officials. [xxvi] The first broad attempt to achieve women’s suffrage was at the Seneca Falls convention in 1848. You read "Roles of Women in the American Civil War" in category "Papers" Nearly two hundred Americans gathered here, led by Elizabeth Cady Stanton, to discuss women’s rights. [xxvii] They drafted and approved the Declaration of Sentiments, which outlined faults in the male-dominated American government, and called for a change. Unfortunately, men continued to claim that a woman’s place was in the home, not politics, and no state would make a law allowing women to vote until several decades later. [xxviii] While the women’s rights movement gained speed in the North, the South prided itself on avoiding issues of feminism. Some Southern women visited the North and attended meeting of women’s right activists, and noted that they disliked the mixing of races and equality of sexes promoted. [xxix] Louisa McCord attacked Northern movement for femal suffrage, claiming that it took away feminity from women. She said women should display their opinion in society only through their male counterparts, not by giving public speeches and voting in elections. McCord stated that â€Å"The true woman . . . preferred caring for her family to tinkering with constitutions. †[xxx] Some women may have agreed with female superiority, but were too scared of change to bring their thoughts forward. [xxxi] Women worked to supply materials to their armies. The United States Sanitary Commission was created only weeks after the beginning of the war by Henry Bellows. He cooperated with Dorothea Dix, who was also working on forming a â€Å"nursing corps,† but Bellows did not want to work with her. Through the course of the war, Northern women worked to provide valuable materials to aid soldiers in war. [xxxii] Some soldiers were accompanied by their wives, who aided soldiers. They worked doing laundry, cooking for soldiers, nursing soldiers in emergency situations, or counseling soldiers during this traumatic time. [xxxiii] These women often cared for the men and boys as if they were her own sons. Many groups of soldiers claimed a woman as its mother figure, and continued to include and honor her long after the war. [xxxiv] While it was easier for a woman to enter the army with a husband and not be questioned too intensely, women who chose to help soldiers independently were often critisized by the public. [xxxv] Many women demonstrated their patriotism by dressing as men and fighting in the army. Even more women thought and wrote, wishing that they could be allowed to fight alongside their male counterparts. xxxvi] Regulations prevented some from attempting to join, others wrote to generals asking permission to volunteer to fight, and there were women who joined battle as a confrontation was occuring, bypassing official enlistment altogether. [xxxvii] The physical examination was a barrier for females – while some were not able to join because of this, other doctors lied on women’s behalf to allow them to join. Still others joined without a physical examination or even official enlistment (women may have joined soldiers and began fighting during a skirmish or battle). xxxviii] Women joined for many different reasons: to be with husbands, brothers, or fathers (though some enlisted secretly, against the wishes of relatives); to leave home; for the money or adventure; patriotism; and some, â€Å"to escape the oppresive social restrictions placed on women in that day and age. †[xxxix] While some joined with family members, others risked the end of family communications by joining. When Ellen Goodridge informed her father that she would fight alongside her fiance, her father disowned her. [xl] Young women dreamed of changing the world, of doing something important, and joining the army could be their chance. They looked up to figures such as Joan of Arc, and wanted to achieve that kind of glory. [xli] The view of people’s enlistment choices varied by gender. While men were looked down upon if they did not fight alongside their brothers, women recieved the same social treatment if they did join the army. [xlii] Women obviously faced difficulties – menstruation, concealing their figure, and the fact of voice and lack of facial hair. To deal with thease complications, women found privacy as many modest men did and posed as adolescent boys, who often made their way into the regiments. xliii] To enhance their masculine reputation, women learned to act like men by playing cards, smoking cigars and chewing tobacco , drinking, and swearing. [xliv] One thing that helped women maintain their disguise was the fact that no soldier expected to find a woman in the ranks; men were not looking for them, so it was easier to remain unnoticed. [xlv] Wounds and hospital treatment was the most common way for a woman’s gender to be discovered. [xlvi] Unfortunately, a woman’s sex was sometimes uncovered before she even set foot on the battlefield – Sarah Collins and Mary Burns, for example. xlvii] Collins, who was of very good health and â€Å"could have easily borne the hardships incident to a soldier’s life,† was an orphaned teenager living in Wisconsin who enlisted with her brother. [xlviii] She was â€Å"detected by the was she put on her shoes and stockings† before being able to support the Union next to her brother. [xlix] Mary Burns, also a Northerner, joined to be with her significant other from Michigan. [l] She was arrested in Detroit, also before fighting next to the man with whome she enlisted. [li] These women fearlessly performed any task asked of them, and fought bravely in a situation where society assumed women would not be able to function, much less fight like the man standing next to her. [lii] Women soldiers readily performed any task given to them, just as if they were a male soldier. It was not uncommon that soldiers were pulled off of the field and asked to work in hospitals. [liii] Some women joined for medical service directly. [liv] Volunteers retrieved wounded from the battlefields and nursed patients as they waited for a surgeon. Women were usually untrained, and had to follw strict regulations. Many soldiers died simply from disease caused by new exposure to the ranks, and thousands died on the battlefield after being left unaided. [lv] Across the Confederacy, societies were formed to gether supplies and volunteers that were sent to Virginia to help wounded soldiers. Women learned to dress wounds efficiently, where they may have fainted at the sight before the war. [lvi] Soldiers and generals were hungry for information about the opposing side. Women sometimes gained insight from Federals through casual conversation, but others were sent north to spy and bring information to Jefferson Davis or General Robert E. Lee. Women carried notes filled with information hidden in hams or in the folds of their skirts. [lvii] Some hid in conspicuous places and acted as faithful members of the opposing side, others rode out after midnight to deliver information to officials. This was sometimes dangerous work – soldiers shot these women from afar to stop them from delivering secret plans or other information. [lviii] As citizens of America, the war undoubtedly impacted women. With the absence of men not experienced previously in America, women’s roles shifted ramatically, in and out of war. When men left, women took their place, and that change could not be reverted when the war was over. The result of the American Civil War – emancipation – also altered women’s home life. ———————– [i] James M. McPherson, Ordeal by Fire: The Civil War and Reconstruction (New York: McGraw Hill Companies, Inc. , 2001), 19. [ii] McPher son, 19. [iii] McPherson, 20. [iv] McPherson, 20. [v] George C. Rable, Civil Wars: Women and the Crisis of Southern Nationalism (Chicago: University of Illinois Press, 1989), 26. [vi] Rable, 27. vii] Mary Elizabeth Massey, Women in the Civil War (Lincoln: University of Nebraska Press, 1994), 153. [viii] Rable, 27. [ix] Rable, 30. [x] McPherson, 20. [xi] Rable, 28. [xii] Rable, 29. [xiii] Rable, 18-19. [xiv] Rable, 17. [xv] Rable, 17. [xvi] Rable, 18. [xvii] Rable, 17-19. [xviii] Rable, 20-22. [xix] Jeanie Attie, Patriotic Toil: Northern Women and the American Civil War (Ithaca and London: Cornell University Press, 1998), 46. [xx] James L. Roark, et al. , The American Promise: A History of United States, 2nd ed. (Boston and New York: Bedford/St Martin’s, 2002), 380. [xxi] Massey, 153. xxii] Massey, 154. [xxiii] Massey, 154-55 [xxiv] Massey, 161. [xxv] Massey, 161. [xxvi] Michael P. Johnson, ed. , Reading the American Past: Selected Historical Documents, Volume I: To 1877, 3rd ed. (Boston and New York: Bedford/St. Martin’s, 2005), 225-26. [xxvii] Johnson, 225-26. [xxviii] Roark, 380. [xxix] Rable, 15-16. [xxx] Rable, 16. [xxxi] Rable, 16-17. [xxxii] Attie, 78. [xxxiii] Massey, 78. [xxxiv] Massey, 78. [xxxv] Massey, 78. [xxxvi] DeAnne Blanton and Lauren M. Cook, They Fought Like Demons: Women Soldiers in the Civil War (New York:Vintage Books, 2002), 25 [xxxvii] Blanton, 25-28. xxxviii] Blanton, 25-28. [xxxix] Blanton, 30-32. [xl] Massey, 80. [xli] Massey, 78. [xlii] Blanton, 30. [xliii] Blanton, 46-50. [xliv] Blanton, 52-53. [xlv] Blanton, 57. [xlvi] Massey, 80. [xlvii] Massey, 80. [xlviii] Blanton, 33, 56. [xlix] Massey, 80. [l] Blanton, 31. [li] Blanton, 124. [lii] Francis Butler Simkins and James Welch Patton, The Women of the Confederacy (Richmond and New York: Garrett and Massie, Incorporated, 1936), 80. [liii] Blanton, 65-66. [liv] Blanton, 65-66. [lv] Simkins, 82-83. [lvi] Simkins, 82-83. [lvii] Simkins, 82-82. [lviii] Simkins, 82-82. How to cite Roles of Women in the American Civil War, Papers

Sunday, December 8, 2019

Information Technology Of AusEd Inc Samples †MyAssignmenthelp.com

Question: Discuss about the Information Technology Of AusEd Inc. Answer: Introduction: Hosting services or web hosting services generally refers to the services which are provided by the service providers for various purposes and some of the services that are included in this hosting packages involves the email hosting and many more. Hosted Applications are considered to be those applications which runs on computer owned by someone and is managed by the hosting providers by making use of the Internet (Abbasi et al. 2012). Hosted application can be categorized into several types and this can be described by making use of several titles like the Software as a Service or SaaS, Hosted terminals Services, Internet application, remote applications, online applications and many more. This report mainly discusses about the benefits and the issues that might be experienced by organizations like AusEd Inc. while procuring a service provider for hosting all its services and applications (Earl, 2012). This report also contains a discussion about the various hosting types that migh t be used by AusEd Inc. for delivering a better service to its clients. Discussion: Hosted application can also be termed as Software as a Service solution which is associated with all the users to execute and operate an entire software application by making use of the clouds. AusEd Inc. should choose a provider who is associated with managing the hosted applications by regular update and patching up with the most stable version. Along with this they should also look into the matter that regular backups are created associated with continuous technical support and customer support. Tyes of hosting that might be used by the Organization: AusEd Inc. The service provider that is to be chosen by AusEd Inc. must allow them to enjoy the access to specific software applications by taking help from the standard protocol which is also known as the Application Service Provider or the ASP. ASP is something which is associated with providing computer based services to the clients by making use of a network (Mackey and Liang 2013). AusEd must also look for a service provider who would be having a subscription based business model which means that they must contain certain options of reducing the cost effectively or looking after the management. This would help AusEd Inc. in saving a lot of time as well (Laan 2017). Two major benefits of the ASPs is that it is low of cost and also freedom from any type of headache related to management or maintenance. ASPs are also associated with the offers like full-time support, regular updates and security management. Some of the common hosting services that might be used by AusEd and what should be considerations that are to be made while selection of the vendors during usage of this services are listed below: Website Hosting: this type of hosting needs a backend resources so as get access globally by making use of worldwide web. All this backend resources are available under the web hosting services and AusEd Inc. must look into the matter that these service provider they are choosing offers services like the space of storage, space for the data center and all other essential resources (Mirheidari Arshad and Khoshkdahan 2012). They should also make it sure that the providers are also providing collocation services so as to make sure that they use the servers an all other essential hardwares on a rental basis. Some of the common website hosting that can be used by AusEd Inc. are listed below: Shared hosting: This can be used by AusEd Inc. so as to make sure that multiple websites of the organization can be hosted on a single server. In this plan the websites generally shares a common pool of resources (Wang and Qian 2012). The organization must make it sure that the service provider that they are going to choose provide this plan as well. Cloud hosting: Service provider should also be chosen according to the cloud hosting facility that they provide. This would help the organizations numerous servers to work as a collective single unit. This would allow the organization to lift the cap off the limits (Cantelon et al. 2017). The requirement for more capacity can be easily fulfilled by increasing the size of the cloud and addition of some extra hardware commodity. But there exists several challenges related to cloud hosting. But despite of that cloud hosting keeps the contents very safe. This is done by distribution of the data about the server across different redundant servers. Along with this the informations that are hosted in the cloud is excluded from the risk of losing important data due to failure of hardware (Alamdari and Zamanifar 2012). AusEd Inc. ca also customize their server if they use the cloud hosting. This type of hosting is much more reliable than any other type of hosting. VPS or Virtual Private Server: This would help in augmentation of the efficiency as the virtualization technology helps in acting as a multiple server (Han et al. 2012). This would help in partitioning of the computer resources which would be offering a better privacy for the individual clients and more security as compared to the plans of shared web hosting. Email Hosting: AusEd Inc. can buy their own domain name which would help them in using emails at their own business domain. So they must choose a service provider who allows them to have their own email domain (Wang and Qian 2012). This mail hosting would be associated with streamlining of the mail servers and this would be done by offering certain resources that are required for sending or receiving of emails along with carrying out of other activities which are related to themanagement of emails. Hosted terminal Services: AusEd Inc. is a large service which is having a multiple site and wants to work on a same database so they might take the advantage of this service. This is would be enabling the Client application to get installed on the server which is near to the database and this would be displaying the output form the application on the users desktop located at a remote site. So this would be appearing as if it was installed on the PC (Dadkhah and Sutikno 2015). Benefits of hosted applications: AusEd Inc. can be benefited in three ways by using the hosted applications and this includes the security, convenience and the cost. When AusEd Inc. makes use of the hosted applications on hosted terminal service platform business then they would be able to get all the convenience and the flexibility that would be offered by the cloud computing environment. Which means that AusEd Inc. would be capable of using all their services from any part of the world by making use of the Internet (Gampala Inuganti and Muppidi 2012). Along with this, the whole infrastructure would be maintained by the hosting service provider they choose so there is no need of worrying about the IT. The service provider that they are going to choose must be geared up fully so as to manage the whole infrastructure on a large scale along with a built-in redundancy and managed backups, updates, patches as well as anti-virus. In case of making any type of changes there is only need of making changes in the server not on every PC which would be saving time and money as well (Hobfeld et al. 2012). By use of the Hosted applications there hardly exists any type of up-front costs. Hosted applications are very easily deployed as compared to that of the conventional software due to the fact that there is no need of upfront installations. Along with the there is also a minimal requirement of integration and this would be helping AusEd Inc. a lot in moving forward toward sits business. The risks due to corruption of the local systems also becomes low due to the fact that all this application are designed in such a way that they can be accessed only by the use of web browsers and the operating systems. Conclusion: The report helps in concluding to the fact there is an essential need of considering certain aspects while procuring service provider while hosted application service. There exists numerous amount of choices for this organization and certain questions needs to be asked to the service provider before using their service. Some of those questions includes asking the service provide for demonstration of another similar deployment which AusEd Inc. wants, asking the service provider if they have an option of trying before using so as to understand the whole thing, Does the service provider offers any type of contractual flexibility and price protection, if the service provider is having a Service-Level Agreement and if they are having a history of Service-Level Performance or not, if they offer Operational Transparency or not, if they Offer Multitenancy, if they are having any type of Comprehensive Disaster Recovery Plan or not, if they meet all the critical security and the compliance req uirements or not, if AusEd Inc. is capable of configuring the solutions provided by the service provider or not and lastly if the service provider provides any type of Robust integration or not. But the best way of hosting the application is by making use of cloud hosting which is very much popular as well as cost effective and the issues rising due to various threat can also be tackled in a very easy way if the cloud service provider remains updated and cautious at all times. References: Abbasi, Z., Mukherjee, T., Varsamopoulos, G. and Gupta, S.K., 2012. DAHM: A green and dynamic web application hosting manager across geographically distributed data centers.ACM Journal on Emerging Technologies in Computing Systems (JETC),8(4), p.34. Alamdari, J.F. and Zamanifar, K., 2012, December. A reuse distance based precopy approach to improve live migration of virtual machines. InParallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on(pp. 551-556). IEEE. Cantelon, M., Harter, M., Holowaychuk, T.J. and Rajlich, N., 2017.Node. js in Action. Manning Publications. Dadkhah, M. and Sutikno, T., 2015. Phishing or hijacking? Forgers hijacked DU journal by copying content of another authenticate journal.Indonesian Journal of Electrical Engineering and Informatics (IJEEI),3(3), pp.119-120. Earl, D.A., 2012. STRUCTURE HARVESTER: a website and program for visualizing STRUCTURE output and implementing the Evanno method.Conservation genetics resources,4(2), pp.359-361. Gampala, V., Inuganti, S. and Muppidi, S., 2012. Data security in cloud computing with elliptic curve cryptography.International Journal of Soft Computing and Engineering (IJSCE),2(3), pp.138-141. Han, R., Guo, L., Ghanem, M.M. and Guo, Y., 2012, May. Lightweight resource scaling for cloud applications. InCluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on(pp. 644-651). IEEE. Hobfeld, T., Schatz, R., Varela, M. and Timmerer, C., 2012. Challenges of QoEmanagement for cloud applications.IEEE Communications Magazine,50(4). Laan, S., 2017.IT Infrastructure Architecture-Infrastructure Building Blocks and Concepts Third Edition. Lulu. com. Mackey, T.K. and Liang, B.A., 2013. Global reach of direct-to-consumer advertising using social media for illicit online drug sales.Journal of medical Internet research,15(5). Mirheidari, S.A., Arshad, S. and Khoshkdahan, S., 2012, June. Performance evaluation of shared hosting security methods. InTrust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on(pp. 1310-1315). IEEE. Tavis, M. and Fitzsimons, P., 2012.Web application hosting in the AWS cloud. ISBN 978-0-9805768-3-2, Site Point. Wang, R. and Qian, X., 2012.OpenSceneGraph 3 cookbook. Packt Publishing Ltd.