<!DOCTYPE html>
<html>
<head>
<title>Edge Computing Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
text-align:center;
font-size:10px;
color:#333;
width:600px !important;
margin:0px auto;
font-family:Verdana, Arial, Helvetica, san-serif;
}
#aweber_rem a {
text-decoration:none;
}
#aweber_rem a:hover {
text-decoration:underline;
}
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
<tbody>
<tr>
<td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
<div style="font-size:12px; text-align:right"><span style="font-family:verdana"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></span><br />
<span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/PMRntDanPW763BBezzIhxlcQ/M892Qs5NMzlhcx8P892Wbcl9BA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span></div>
<div style="font-size:14px; text-align:right">
<div style="font-size:12px; text-align:center">
<hr />
<p><span style="color:#000000"><span style="font-size:24px"><strong>Edge Computing<br />
Standard Requirements Toolkit</strong></span></span></p>
</div>
<p style="text-align:center"><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>
<ul>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Security and authentication technologies, allied to event logging, in the cloud computing environment can help auditors as they deal with issues related to workflow were those who entered, approved, changed or otherwise touched data authorized to do so, on an individual, group or role-related basis?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Extensibility: extensibility could be a huge challenge at the edge of the network, unlike a mobile system, the things in the IoT could be very dynamic. When the owner purchases a new thing, can it be easily added to the current service without any problem?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Cloud resources can be used for DoDs or defacement attacks against businesses. Which part(s) of your organization that have fully switched to cloud solutions could be more vulnerable to corresponding attacks?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If your organization practices a strict privacy policy and only allows its databases to be accessed by its own affiliates can you trust the affiliates to protect my information at this same level?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How might we classify current cloud computing offerings across a spectrum, and how do the technical and business challenges differ depending on where in the spectrum a particular offering lies?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Critical success factor is that appropriate governance needs to be in place. Is an appropriate organizational structure in place to manage your organization facing the cloud computing solution?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Business Considerations. Business considerations include the overall organizational readiness for using cloud computing. Is the application owner willing and comfortable with a cloud platform?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Data classification: how sensitive is the data that will be placed in the cloud (e.g., confidential, critical, public) and what controls should be in place to ensure it is properly protected?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Have you defined Charging, Privacy, Authentication, Integrity, Interoperability and Management of data at different levels and between various vendors within the edge computing architecture?</span></span><br />
</li>
<li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How does controlled data sharing between services and devices work within the multistakeholder, multi-location context of applications that take advantage of edge computing infrastructure?</span></span><br />
<div style="text-align:left"> </div>
</li>
</ul>
</div>
<div style="text-align:center">
<p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/PMRntDanPW763BBezzIhxlcQ/M892Qs5NMzlhcx8P892Wbcl9BA"><img align="right" alt="" height="900" src="https://cdn11.bigcommerce.com/s-ilcoov/images/stencil/1280x1280/products/155290/188693/Edge_Computing_TKFC__52353.1535574672.jpg?c=2&imbypass=on" style="margin:5px" width="600" /></a> </span></span></p>
<p><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/PMRntDanPW763BBezzIhxlcQ/M892Qs5NMzlhcx8P892Wbcl9BA"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span> </span></span></p>
</div>
<hr />
<p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/PMRntDanPW763BBezzIhxlcQ/M892Qs5NMzlhcx8P892Wbcl9BA" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>
<div style="text-align:center">
<div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
</span></span></div>
<div style="text-align:center"><br />
<span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ZnuLxvYg763PUWHomvhgw6yg/M892Qs5NMzlhcx8P892Wbcl9BA"><img alt="" height="200" src="https://artofservice.s3.amazonaws.com/Toolkit_Subscription.png" width="600" /></a></span><br />
</span></span>
<p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework: <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/ZZ0pFpd0siUTMGuUvR3b6A/M892Qs5NMzlhcx8P892Wbcl9BA">https://www.nist.gov/cyberframework/industry-resources</a></p>
<span style="color:#000000"><span style="font-family:verdana"> </span></span>
<hr /></div>
<div style="text-align: center;"><br />
<span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>
<p> </p>
<span style="color:#000000"> </span></div>
</div>
</td>
</tr>
<tr>
<td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px">
<p> </p>
<p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>
<p> </p>
<p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/M892Qs5NMzlhcx8P892Wbcl9BA" >Manage Subscription</a> </p>
<p> </p>
</td>
</tr>
</tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/M892Qs5NMzlhcx8P892Wbcl9BA/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>