Cloud Infrastructure

Looking at the definition of cloud infrastructure it can be defined as any software or hardware components that are needed for computing requirements in a cloud computing model. When thinking of cloud infrastructure, we have a few main types to talk about. Cloud infrastructure has a physical and virtual framework as well as applications and platform software, and infrastructure management and service creation tools.

The physical infrastructure of cloud computing consists of different physical IT resources. These resources include: storage systems, physical servers, and physical network components. Looking at physical network components we see things such as physical adapters, routers, and switches. Physical servers are generally connected to each other, to different clients, and to different storage systems. Physical servers often connect to specific clients through personal IP networks, IP  SAN, FC SCAN, or FCoE networks. Depending on the cloud service provider that provider may use a physical IT resource from one or numerous data center to provide their clients service.

The virtual infrastructure of cloud computing consists of different resources. These resources include: Identity pools, Resource pools, and Virtual IT resources. Identity pools consists of VLAN ID pools, VSAN ID pools, and MAC address pools. Resource pools include CPU pools, memory pools, storage pools, and network bandwidth pools. Virtual IT resources include: VM network components such as virtual NICs and Virtual Switches and VMs, virtual volumes, and virtual networks.

When looking at different application and platform software different suites might include a business application, migration tools, or an operating systems and database. Migration tools can be used to deploy a consumer’s application. Platform software’s and applications are to be hosted on VMs to then create software-as-a-service (SaaS) and platform-as-a-service (PaaS).

Overlooking all of these components is the cloud infrastructure management. As you may be able to guess this has a responsibly of managing the applications and platform software, virtual infrastructure, and physical infrastructure. This section has a responsibility of handling consumer’s requirements and requests. This then allows consumers to benefit from the services with this system processing the requests of the clients. The cloud management tools can be classified into three different sections. The first tool being the virtual infrastructure management software. This will allow management of both the physical and virtual infrastructure. The second tool is Unified management software. This software has the responsibility of creating any cloud services. The third tool is user access management software. This has a function of allowing the consumer or client to request a cloud service. All of these different software’s have the ability to interact with each other to automate provisioning of the cloud services.


Erl, T., Puttini, R., & Mahmood, Z. (n.d.). Cloud computing: Concepts, technology, & architecture.

Information Renaissance


the activity, spirit, or time of the great revival of art, literature, and learning in Europe beginning in the 14th century and extending to the 17th century, marking the transition from the medieval to the modern world.


Webster Dictionary


As we saw in the Renaissance of the 14th century have seen a similar pattern in today’s technological world. Information has always been yearned for, but now we see a revival in a modern way. Technology is changing the way we all gather, research, and share information. Companies such as Facebook and Google have forever changed the way we receive and view information. Information is easily provided and given at your fingertips with reactions less filtered.

Jay Gillette states that, “Renaissance times are paradoxically times of great human progress and great human conflicts” (p.4). With technological advances on how we share and receive information, we also see concern. Concern with security is currently top of mind for technology users. We have already seen times of great innovation and times of uncertainty. The world has seen this on a grander level with the revelation of foreign data breaches.

We have already entered into the information Renaissance. A time that is bringing exciting new advances that change the way our society is structured, but also a great deal of uncertainty.


Gillette, J. E. (2006). Leadership for the Information Renaissance: Clarity, Challenges, Opportunity. 1-15.Retrieved December 1, 2016.

(n.d.). Retrieved December 01, 2016, from



From the Latin plagiarius meaning kidnapper, seducer, one who kidnaps the child.


In the technology age we are in, copy and paste, is simply done. It’s easier than ever to take a piece of work found on the internet. With the use of sites such as Wikipedia the value of information and original thought is diminishing. The days of opening up a book and wiring word for word another authors work is less common. This information online simply looks as if it does not have an author, but it does. In our society we are facing a new generation growing up with this mindset. By plagiarizing someone else’s work you are victimizing the authors, undercutting your own ability, and making fools of the audience whom reads the plagiarized work. The financial and emotional toll that an author feels after their work is comparable to that of kidnapping a child. For authors who have worked countless weeks, months, sometimes years the finished product is something that is to be proud of.


How do you know your work isn’t plagiarized? To ensure that the work you have created many tools are available. Through my academic work I have found SafeAssign to be helpful. SafeAssign is a program that allows you to submit you work and receive a percentage. The percentage of plagiarized work will be given back as a result. Some common terms and phrases may be included, but SafeAssign will highlight what it’s counting at plagiarized work. In today’s world, being a professional can easily be discredited by using someone else’s work as your own.


Online Etymology Dictionary. (n.d.). Retrieved December 03, 2016, from

Center for Information and Communication Sciences

According to Business Insider, three out of the top five careers with the highest future growth involve technology communication. Technology careers is among the fastest growing career fields for the future. The ability to be able to provide leadership where business and technology meet is needed now more than ever. Center for Information and Communication Sciences (CICS) is a program with a mission to assist professionals with this skill through education, research, and experience.


Center for Information and Communication Sciences has four core values:



We value creativity and seek to find successful outcomes through ingenuity, innovation, problem solving, and resourcefulness.



We value integrity and conduct ourselves with honesty, responsibility and professionalism. The outcome of our actions is marked by quality and trust.



We value communication and recognize that significant accomplishments are possible when we are candid and respectful.



Believing we exist to improve the quality of life of our many constituencies, we value meaningful service and seek long-term benefit of our university, college students, faculty, staff, communities, and industries.


Ball state University is located in Muncie, Indiana and offers the opportunity to grow with CICS. CICS is an 11-month graduate, master’s degree with a 38-credit curriculum. The core courses include:


  • ICS 600 – Survey of Management
  • ICS 601 – Problems in Information and Communication Sciences and Lab
  • ICS 602 – Human Communication: Process and Theory
  • ICS 620 – Telecom Technologies, Standards, and Lab
  • ICS 621 – Information Movement, Management, Storage Technologies, Standards, and Lab
  • ICS 630 – Research Methodologies and Problems Seminar
  • ICS 642 – Regulatory Research in Context/Problems in Information Communication
  • ICS 660 – Human Factors, Needs-Assessment, and User-Driven Design


Each professional has the ability to tailor the degree that best suites the future they would like to be involved in. CICS offers numerous elective courses that allow masters level insight into the chosen subject. Elective courses include:



  • ICS 605 – Interpersonal Management Skills
  • ICS 623 – Integration
  • ICS 624 – Knowledge Management
  • ICS 632 – Problems in Information and Communication Technologies Seminar (2 credit hours)
  • ICS 633 – Systems Analysis and Design
  • ICS 634 – Project Management
  • ICS 635 – Information and Communication Projects (1-2 credit hours)
  • ICS 643 – Social Responsibility in I/C Policy
  • ICS 644 – Technologies, Financial Aspects, and the Economics of Choice
  • ICS 645 – Evolving Database Systems
  • ICS 646 – Management of Telecom/Network
  • ICS 648 – Wireless and Satellite Communications
  • ICS 649 – Comparative Operating Systems
  • ICS 650 – Wireless 2
  • ICS 653 – Issues in Communication Consultation
  • ICS 655 – Special Problems Seminar
  • ICS 661 – Entrepreneurship/Intrapreneurship
  • ICS 662 – Usability Testing
  • ICS 663 – Network Design: The Problems of Moving Voice, Data, and Video
  • ICS 664 – Information Delivery Systems, Selection, Design, and Evaluation
  • ICS 666 – Strategic Planning for Information Technology
  • ICS 667 – Design of Video-Based Learning Systems
  • ICS 675 – Information and Communication Marketing
  • ICS 684 – Information Access and Management of Information Services
  • ICS 691 – Internet, TCP/IP, and Internetworking
  • ICS 692 – Advanced Network Configuration
  • ICS 695 – Independent Study (1-3 credit hours)
  • ICS 696 – Information and Communication Research and Applications (2 credit hours)
  • ICS 698 – Problems in Information Systems
  • ICS 699 – Problems in Information and Communication Management


Kiersz, A. (2015). The 21 best jobs of the future. Retrieved December 06, 2016, from

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

Many of us tend to have the mindset that “Oh it will never happen to me.” The negative is something that is far-fetched and not realistic. Possibly too devastating to even be plausible. “The grid is a network connecting thousands of companies, many of which still put profit before security.” Ted Koppel gives a real depiction of the situation our the United States is in. The level of vulnerability our country is at is concerning because of the lack of defensive measures against it.

No matter what your political views are, we haven’t had a government leader take control and think about the risk of not having a plan for a cyberattack. We have people around the country who are creating their own individual plans for what might happen if we have a cyberattack. Koppel believe that most of the population within our metropolitan areas would have to evacuate. The United States has the skill and people to brainstorm a national security plan for our power grid. Our country would be without power for months leaving us in devastating circumstances.  Our countries water, gas, hospitals, transportation, banking systems, etc. would all cease production to sustain our economy.

Ted Koppel gives us a chance to rethink the way we see our security threats and be able to take the steps necessary against such a devastating situation. This is not a story plot from a SCI-FI movie, this is the current situation that our country is faced with.

Defining Human Communication



“The continuing problem in defining communication for scholarly or scientific purposes stems from the fact that the verb ‘to communicate’ is well established… and therefore not easily captured for scientific use,” Theodore Clevenger.


For most purposes human communication is summed up into language from one living thing to another. Theodore Clevenger’s definition of human communication can be appreciated; however, I would add that it is evolving and growing in new ways.

Many scientists, professional, and colleagues of mine have attempted to put into words a definition of human communication. All of them being in rather vastly different ways. “Human communication takes place when one human wants to transform information about their experiences to another. They do this by using one of three means: non-verbal, verbal, and written,” Nick Doub. I appreciate my colleague, Nicks definition because he sheds light on language that goes beyond language. Human communication can go be through other mediums. I would like to see human communication as black and white, with rules and clear meaning. When something can be processes and perceived in so many ways, it’s impossible to clearly define.


If human communication can be sent and received through so many mediums among different beings a definition can’t simply sum up every aspect. My colleague Matthias Tankersley defines human communication as “found anywhere, through many processes and mediums, to any eligible receiver.” Communication encompasses every aspect in one’s life. Actions, words, gestures, technology all send a level of communication to the world. Some of intentional and some of it without direct force.


Does running through a hallway give a level of human communication? Of course it does. The message being sent is that the subject running doesn’t have time and can’t be bothered. Messages are being sent to everyone around them. Non-verbal communication can include facial expressions, eyes, touching, tone of voice, posture, spatial distance, etc. Everything you do sends a signal to another person willing to receive it. That within itself is human communication.


Tom Peters, author of ‘Thriving on chaos’ states “oddly enough, to listen, precise, is the single best “tool” for empowering large numbers of others. One who listens is able to communicate to the speaker, sending a message that the person speaking has the empowerment. By not saying anything and listening allows others to feel respected and important. Going back to Nick’s definition on human communication, it is when “one human want to transfer information.” Non-verbal is within that scope; therefore, another facet of human communication.


As a graduate of Ball State University, marketing I have encountered mass communication and the messages it potentially sends to people. In ‘Theories of Human Communication,’ Littlejohn and Harold present a simple and often quoted “model of communication: who; says what; in which form. To whom; with what effect?” Studies for decades have been researching the way information is communicated to the masses. Tone, colors, mediums all send a message involving human communication on a grander scale. Joshua Meyrowitz gives three different metaphors that identify communication through media. Medium as a vessel, medium as language, and medium as environment.” With mediums being these characteristics its impossible to ignore that it correlates with human communication. Mass media communication sends just as strong of a message as the person running through the hallway, which is just as strong as verbally asking someone “how are you?”


Human Communication is something that consists or changes your feelings or thoughts. Human Communication can be through a vat variety of different mediums, it’s difficult to define. Every aspect or being is sending a message; therefore, is a form of human communication. With the use of technology, mass media has exploited what human communication has always been doing. Human Communication is something that can’t be defined, but is always present, evolving in a new way. When something can be perceived and processed in so many ways, it’s challenging to define.