Wednesday, May 20, 2020

Causes of Bank Failure - 6382 Words

WHY BANK FAILS Introduction Banks are the safest place to keep your cash. Nevertheless, bank failures happen from time to time. Here s a look at what causes bank failures and what you can do about them. The main thing to know in a bank failure is that your money is probably safe. If your money is FDIC insured, you probably don’t need to panic. Bank Officers’ Fraud Let us have an example from USA Former TBW CEO Pleads Guilty in $1.5 Billion Bank Fraud Scheme WASHINGTON—Paul Allen, the former chief executive officer (CEO) at Taylor, Bean Whitaker (TBW), pleaded guilty today to making false statements and conspiring to commit bank and wire fraud for his role in a $1.5 billion fraud scheme that contributed to the failure of†¦show more content†¦Colonial Bank never received any TARP funds. In court today, Allen also admitted to making false statements in a letter he sent to the U.S. Department of Housing and Urban Development, through Ginnie Mae, regarding TBW’s audited financial statements for the fiscal year ending on March 31, 2009. In this letter, Allen omitted that the delay in submitting the financial data was attributed to concerns its independent auditor had raised about the financing relationship between TBW and Colonial Bank. Instead, Allen falsely attributed the delay to a new acquisition and TBW’s switch to a compressed 11-month fiscal year. To date, five other individuals have pleaded guilty for their roles in this and related fraud schemes. The case is being prosecuted by Deputy Chief Patrick Stokes and Trial Attorney Robert Zink of the Criminal Division’s Fraud Section and Assistant U.S. Attorneys Charles Connolly and Paul Nathanson of the Eastern District of Virginia. This case was investigated by SIGTARP, the FBI’s Washington Field Office, FDIC-OIG, HUD-OIG, FHFA-OIG, and the IRS Criminal Investigation. The Financial Crimes Enforcement Network (FinCEN) of the Department of the Treasury also provided support in the investigation. This prosecution was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage anShow MoreRelatedThe Great Depression Of 19291049 Words   |  5 Pagesdecreasing and people were unable to sell out their stocks. Which cause the Bank Failure, people want to take their saving out from the banks, but the banks were unable to give back their money about 9,000 banks failed in the 1930s(Martin 1). The unemployment rate keeps rising, people who did not have a job were worried about their saving, afraid to waste their money on goods become very careful on the use of money on goods. This cause the Reduction in Purchasing some business failed. The disaster didRead More Monetary Policy During The Great Depression Essay example1389 Words   |  6 PagesOne of the most important aspects of the Great Depression that stands out in economists’ minds is the sur ge of bank panics and failures during the depression’s onset (1930-1933). However, an institution created with the intention of preventing such a string of disasters failed to fulfill its obligation as a â€Å"lender of last resort.† This is the Fed, and its failure to prevent the early bank panics of the Great Depression is a very interesting economic issue. So why did the Fed fail to fulfill itsRead MoreThe Crisis Of The United States1305 Words   |  6 Pagesinstitutions. Just to name a few of the acquisitions and failures that occurred due to the crisis, Lehman Brothers, Merrill Lynch and Bear Stearns were among the largest investment banks. â€Å"Lehman Brothers declared bankruptcy, Bear Stearns was bought by JP Morgan Chase and Merrill Lynch was bought by Bank of America.† (Chang, 14) Bank of America also purchased Countrywide Financial, which issued approximately 17% of all mortgages in the U.S. market. Some bank holding companies that were greatly affected wereRead MoreIncrease in the Significant Role in Compliance in Financial Service Firms727 Words   |  3 Pagesrisks arising from failure to comply regulations and non-compliance in the financial institutions. Compliance plays an essential role to mitigate risk and protect the business from regulatory fault. Basel Committee on Banking Supervision (2005) defines compliance as an independent function that identifies, assesses, advises on, monitors and reports on the bank’s compliance risk, that is, the risk of legal or regulatory sanctions, financial loss, or loss to reputation a bank may suffer as a resultRead MoreThe Great Depression Of The 1930s Essay1689 Words   |  7 Pagesis important to look at the causes of the bubbles, scale of economic crisis’s, and the economic effects to identify similarities and differences between to the two crisis’, because it helps gather a firm understanding and better prepare us for a future crisis. Causes The Great Depression In America, the Great Depression is one of the defining moments in U.S history. The cause of the Great Depression is complex and due to many unfortunate factors, the most notable cause being the stock market crashRead MoreThe Major Causes And Contributions Of The Great Depression1536 Words   |  7 Pagesthis severe economic crisis such as the overproduction of crops and technologies, installment plans, stock speculation through buying on margin, bank failures, and the Dust Bowl. The Depression created endless hardships for many Americans, facing unemployment or low wages and consumer debt. The economy today, still encounters speculation, bank failures, and natural disasters. Overproduction occurred long before the Great Depression. During World War â…  , the United States demanded more agriculturalRead MoreThe Success Of The Great Recession1375 Words   |  6 PagesDepression which took place during the 1930s. The causes of both crises can be said to be similar as both lie in the actions of the federal government. While the crash of the stock market in 1929 is said to be one of the major causes and sometimes even the main cause of the Great Depression, there are also other circumstances that led to this economic crisis. Bank failures during the 1930s also added to decline in the economy. The failure of hundreds of banks caused people to lose their savings and businessesRead MoreRecession and Resulting Banking Failures1071 Words   |  4 Pagesthe 2008 Recession and Resulting Banking Failures Executive Summary The financial crisis of 2008, which caused the most damage in world economies between the years 2007 and 2009, has a long list of potential culprits that helped to initiate the crisis. The global economy has become so entangled that it is isolate a specific first cause or be able to point the blame at any one group in isolation. However, economists now have a whole range of specific causes in which they attribute to the crisis,Read MoreSome Causes of the Credit Crunch Essay979 Words   |  4 Pageshappens during recession. It is important to find out the reasons. Some of the reasons for it are †¢ Decrease in bank capital: After a recession situation banks are not able to match the demand. The demand for loans rises. During the recession period banks incur loss. As a result they are not able to lend in the same way. So, when the demand peaks, banks are not able to generate it. This causes deficiency. It gives arise to a situation where â€Å"not only does the bank’s capital fall but the minimum capitalRead MoreThe Stock Market Crash Of 19291437 Words   |  6 Pagescertain that even many companies placed money in the stock market. In addition, even more problematic, some banks placed their customers money in the stock market (without their consent). With the stock market prices rising, everything seemed fantastic. Many believe incorrectly that the stock market crash of 1929 is the same as the Great Depression when in fact; it was one of the major causes that led to the Great Depression. At first, there was no massive drop. Stock prices began to fluctuate in

Wednesday, May 6, 2020

My Feelings On Various Works of Art Essay examples

I would define art as transferring creativity and imagination into tangible manifestations, whether it is music, paintings, sculptures, drawings, portraits, or dance. Art comes in many colors, themes, sizes, styles, and forms. Much of this, I think, is due to the individual artist’s social interaction, ethnic and cultural background, and social status. This could’ve held true for the past as well, but in today’s world, the amount of time exposed to informational media (television/radio news, computers with internet access) have to be added to the list of influences. I believe that all these can have an influence or impact on how a contemporary artist of today may express him/her self. The great masters of art from the†¦show more content†¦The chandelier is made from used tricycle, lampshade made from welding masks and horseshoes, bicycle and decorations made from used iron. All these items are unique and practical, and the most important thing is they are all free of charge (Thompson Reuters). This is a prime example of what fine art fanciers may consider distasteful, for it is not aesthetically pleasing, but its crude creativity is intriguing. The objects he created were practical and by using discarded materials, he was doing his part to help the local environment. Although Tito’s creations are not beautiful, people who promote Green practices would appreciate what he has done. Beard 3 There are many things that can be characterize as a work of art, all of which include the feelings and moods it evokes, the thoughts and questions it induces, and the affect it has on the senses when the art is experienced, whether it be visual, tactile or auditory. Visual art consists of paintings, frescos, and more recent than former times, photography. Visual art can have the power to grab the imagination and transport the observer into the painting itself, depending on how intriguing and alluring the image or scene may be. There are many paintings throughout history that seem to possess this ability. In Diego Velasquez’s painting, Las Meninas (Maids of Honor), he creates a stirring, uneasy feelingShow MoreRelatedArt Is My Career Choice872 Words   |  4 Pages9/29/16 Expression art is my career choice because my life was always surrounded by art. Signed up for art classes in my middle school. Then took the next step by applying for a visual arts highs school becoming an art major. Not only that, my mother has been behind me, and also my art teachers. Many times I ve been ready to give up and quit. But I always find myself doing art again. Art is something I can not escape. Moving on my personal interest with expression art is not being told whatRead MoreThe Topic Of Visual Arts929 Words   |  4 PagesNicole Pachulski N01073037 PSYC 1000-OYD TOPIC: Visual Arts Topic description: For my Psychology Journal, I have chosen the topic of visual arts. I have been involved in various types of art since I can remember, but drawing and painting are definitely my favourite hobbies and creative outlets. I have experimented with numerous styles of art in my lifetime in order to develop a sense of my own style, and have learned that I enjoy watercolours and mixed media the most. Psychological schools ofRead MoreDescription Of The Quad City Arts Center Gallery818 Words   |  4 PagesI decided to go to the Quad City Arts Center Gallery. This gallery is located at 1715 2nd AVE. Rock Island, IL. When I first pulled up to this gallery I realized that it was very modern. The building had two different establishments on either side in a plaza setting. My first impression of this art exhibit is that it is very clean and roomy. Right when I walked into the building, the lady that was working there was very welcoming. This gallery changes its exhibition every couple of months. The currentRead MoreThe Art Exhibition Of The Piano For More Than 10 Years908 Words   |  4 Pageshas been learning to play the piano for more than 10 years, I not only love music, but also am interested in other various forms of arts. Painting, which is the practice of applying paint, pigment, color or other medium to a surface, is one kind of arts I love. Therefore, instead of having dinne r with friends, I went to the Emporium Center and visited â€Å"The Fall Juried Show: 41st Fall Art Exhibition† at 6 pm on last Friday. It was a rainy day. Walking along the sidewalk in downtown Knoxville with theRead MoreReflection Of The Metromorphosis Of A High School Community1385 Words   |  6 PagesDuring my time as a high school student, I considered myself an artist and was deeply involved with the art community within my school. However ever since I began college and was bombarded with all the new responsibilities and expectations, I have constantly failed to connect with that part of myself once again, and as I sat in my chair at the unveiling of this year’s edition of the student-run magazine Metromorphosis, with a version of it opened within my hands, I felt the artist within me resurfaceRead MoreStates Of Feelings Through Collaboration Or Series1189 Words   |  5 PagesStates of Feelings through Collaboration or Series Everyone has feeling whether they show them or not, and they have a great impact on how, what and why we create art. However, how much of our emotions are shown through our facial expressions? How well can another read those expressions versus how well can we read that same person’s of state of emotion through their art. None the less anger may result in strong gestural painting. Addition to anger any strong emotion can come through in whateverRead MorePablo Helguer An Artist919 Words   |  4 Pagesrange of art and a director of adults and academic programs at the Museum of Modern Art, New York. He has created artworks engaging communities in local or global issues as an artist. Due to his career background, his works includes art educational elements. As a speaker of the conference, he gave a presentation on socially-engaged art, which is the creation of participatory art focusing on social engagement, inviting collaboration with individuals and communities. Socially-engaged art is analogousRead MoreArt Has Perplexed The Minds Of Both Scholars And Laymen1075 Words   |  5 PagesArt has perplexed the minds of both scholars and laymen for centuries due to the inherent complexity derived from its ability to express creativity, convey meaning, and express emotion – all while coming in various forms subject to interpretation from the audience. Rather than debate the definition of art or how it can be used to communicate, I have chosen to focus this essay upon the following question: How does art express emotion? Exploring the connection between art and emotion is an essentialRead MoreNonverbal Communication And Its Effects On The Understanding Of Individual Cultures1339 Words   |  6 Pagescultures, individuals are able to appropriately interact with someone of another culture with different nonverbal norms, such as proxemics. (Heider, 2007, p 109). Nonverbal communication has become an aspect of my daily life, most commonly used while at work. As a pastry chef by trade, I work in an environment where utensils are being banged on pots and pan, ovens are roaring, doors are being slammed, and people are shouting at one another from opposite ends of the kitchen, thereby causing a lot ofRead MoreArt Is An Essential Part Of Life1338 Words   |  6 PagesArt is an essential part of life that has many definitions, characteristics and features but each person has their own meaning of it. In my opinion art is a figurative representation of reality, whereas its main purpose is the communion of a man to the beautiful, sensual and sometimes even to the inexplicable and contradictory. I think that movies, paintings, architectures and other arts should cause a variety of emotions, feelings and thoughts in the souls and minds of people. The fantasy painting

Distributed File System Forensics-Free-Samples-Myassignmenthelp

Question: Discuss Distributed Filesystem Forensics-XtreemFS as a Case Study. Answer: Introduction The amounts of data captured in the recent times have increased at a huge rate. The data are also stored and disseminated in the electronic formats. The distributed file systems are used for storing high volumes of data at a steady pace and also a variety of information can be stored in the systems efficiently in with the help of the technologies such a big data, cloud computing and the other technologies that are associated with them. These technologies posses the capabilities of providing legal advantages for the users. And hence, as a result of this the big data technology is ranked among the top ten technology trends in the recent past (Chua et al., 2103). According to various reports it has been revealed that the big data technology is going to generate about 232 billion dollars from 2011 to 2016 (Casonato et al., 2013). The general definition of the big data technology can be stated as high-volume, -velocity and -variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making. There various type of procedures that are completed with the help of big data technologies and various organizations such as the big businesses and governments of the countries have great responsibilities on them take help of this technology to work efficiently and deliver the requirements on time. In addition to this, the cloud computing systems are also associated with the use of the technologies. There have been many technologies that have been subjected to unethical exploitation and have been used by the mal practitioners for wrong purposes (Butler Choo, 2013). Hence, digital evidences are to be gathered in order to track the criminal activities and restrict them to a certain level. For the performing the investigations a few steps are to be followed; firstly, there is requirement for the gathering of the evidences about the use of the electronic devices for performing the criminal activities. Then the d evice is to be tracked and stopped so the criminal no longer has access to the device and not perform the desired criminal activity. The process of identification of the devices that is used for the criminal activity is known as the digital forensic procedure. This report aims to address the gap in knowledge of the readers about the digital forensic techniques. It addition to this, the need for the digital forensics have also been described in this report. The report contains the information about the in-depth forensic experiment performed on the XtreemFS project. The report provides the details about the experiment environment, directory services, metadata and replication catalog, object storage devices and the collection of the evidences form the distributed file system. Development Experiment Environment For the Experiment environment the reader should be provided with the information about the XtreemFS architecture overview. The XtreemFS is virtual network- provisioned file system that would be used for delivering the file storage services provided for the cloud solution for the systems. It provides various types of key services such as replication and striping. Other similar types of systems similar to the XtreemFS are GlusterFs, Ceph and BeeFS (Gluster, 2014) (Ceph, 2014) (Fraubhofer, 2014). It is important that a strict distinction in between the back end and the front end processes of storage systems. The frontend systems are generally not involved with the storage system. They are generally involved with the collection of the data that are provided by the users on the systems. The backend processes are generally connected to the storage systems. After the collection of the data in the front end of the system the data is stored in the databases with the help of the back end syst ems. In addition to this are various types of online storage systems such as the Drop box, Google Dive and Sky drive systems. The clouds provides also provides various type of services such as the IaaS, PaaS, SaaS, The IaaS is the Infrastructure as a Service, the PaaS is the Platform as a Service and the SaaS is the Software as a Service provided to the users form the cloud providers. In addition to this, it should be noted that the XtreemFS have three main components and they are Directory Service (DIR), the Metadata and Replica Catalog(s) (MRC) and the Object Storage Device(s) (OSD). In addition to this there is the experiment environment overview for the systems. There can be security issues with the systems that are being used in the XtreemFS. There can be users with the root privileges can access quite a high volume of the data stored in the file system. Gaining access to the system the user can harm the system to a large extent. This consists of a number of virtual machine that would be providing the various features for the XtreemFS features such as the DIR, OSD and the client that would be depending on the type of experiment performed on the systems (Almulla, Iraqi Jones, 2013). The virtual machines are generally simplified for the forensic disk image collection and also for the simulation of the cloud configurations. These would help in hosting both the storage functions and also the distributed computations. The clients were also hosted as the Virtual Machines. Directory Services Within the features of the XtreemFS system the first process involves with the Directory Services. The feature helps the systems to store the data that is required for systems to define the data and also locate the various types of technical components of the system (Casanota et al., 2013). It would be beneficiary for the investigator to start from the components of the system and extend till the installation of the system. There are three types of value which are potential for the forensic investigation on the DIR server: Volatile environment metadata: These data generally involve the logical addresses of the different location and also information about various types of nodes and the unique identifiers for the required node. Non-volatile environment metadata: The non-volatile environment metadata that are subjected to change and some of the data might be committed to the non-volatile storage of the systems. The logging data and the backup data are generally considered for this case. Configuration files: The configuration files contain the data that are generally used for the better understanding of the system. Configuration information is generally the information about the network, the list of authentications and the operational information about the systems. The evidence source identification and preservation is an important step for the identification of the anomalies in the systems and for the forensic report about the system. The DIR is used mostly for the identification procedures and the assistance in the preservations of the storage data that is distributed. Hence, the data for investigation present in the XtreemFS is being identified in this step. Hence, before the assessment of the value of DIR the location should be identified. The server would be used for the identification of the file system that is mounted on the system. After the verification the file system goes through further steps of verifications. Once the access to the systems is gained and the location of the files system is gained, the configuration data can be easily obtained. The collection and the examination analysis of the collected data should also be performed by the forensic testing system(Quick, Martini Choo, 2014). These involve the collection of data by the practitioner and also identify the directories present in the systems. In addition to this, various other steps such as the address mapping, services registry and configurations data are to be traced for obtaining the value for the systems. In addition to this, system time and the operation logs for the systems should also be checked. Metadata and replication catalog The Metadata and the replication catalog have the capabilities to store a wide range of metadata that are related to the information about the XtreemFS and the file and the directories that are stored in them (Contrail, 2013). This data can be used in the forensic report to locate the components and also for understanding of files in XtreemFS system. There are three types of value which are potential for the forensic investigation of MRC server: Volatile and non-volatile construct metadata: These data generally involve the metadata that are used for the definition of the internal constructs of the XtremmFS file system. Volatile and Non-volatile file metadata: These data involves the number of data such as the higher level of metadata like number of OSD and the low level metadata such as the filename, size and the date modified by the files. Configuration files: The configuration files contain the data that are generally used for the better understanding of the system. Configuration information is generally the information about the network, the list of authentications and the operational information about the systems. For the evidence preservation and source identification the data gathered from DIR server should be used for the identification of location of servers (Dukaric Juric, 2013). The MRC status page is used for listing the number of configuration directories that are used for the forensic report. They are responsible for authentication service to the virtual file systems. org.xtreemfs.common.auth.NullAuthProvider is the default authentication provider that provides the authentication for the local operating systems. The collection and examination analysis of the MRC data is very critical procedure as it not only provides the evidences but also for the remaking of the XtreemFS condition on the off chance that it is definitely not at present working or completely available. It is additionally basic if a professional tries to recreate records from physical extractions of the pertinent OSD segments (Dykstra Sherman, 2013). There two methods for the collection of the MRC databases. In the experiment it was found that the broad structures of the MRC XML file as follows: The root element is FILESYSTEM; DBVERSION is a numerical identifier of the database version. The next element was VOLUME where ID is the UUID for the volume generated by the XtreemFS system. B NAME is the volume name entered by the user which created the volume. ACPOLICY is the numerical identifier for the Authorization Policy ID is the file ID assigned by XtreemFS for the directory B LOCATION e The UUID of the OSD that stores a stripe/ replica of the file. Object storage Devices The OSDs is the main component for the forensic analysis as the OSD stores the data stripes which permit the professional to recreate the records. The OSD likewise has the ability for a specialist to recoup erased document parts utilizing existing criminological procedures on the fundamental file system (Federici, 2014). The specialist's distinguishing proof and examination of past parts (DIR and MRC) will give the specialist with the data they have to decide the type of OSDs in the system contain the information they are looking to gather and enable the professional to recognize the important individual records on the OSDs. There are two types of value which are potential investigation on OSD server: Non-volatile file metadata: The non-volatile provides the information about the content of the file in the file system. In addition to this, the local metadata and the log data fall into this type of category. Configuration files: The configuration files contain the data that are generally used for the better understanding of the system. Configuration information is generally the information about the network, the list of authentications and the operational information about the systems. Additionally they also contain several authentication data such as the user identification and the passwords for the users. The most important directory for the forensic analysis is the object_dir (Hale, 2013). The default value for the decretive is set to / var / lib / xtreemfs /objs /. This directive can be used for searching of the data for the construction of the forensic report. The object_dir could be mounted on the system where the operating system provides the remote access to the storage of the system (Hooper, Martini Choo, 2013). The OSD HTTP status provides the information on the runtime statistics of the systems, and these are provided in the terms of usage of the system. The collection and the examination analysis of the collected data involve the collection of the OSD data and the procedures may vary according to the requirements of the experiment that is to be performed on the system. The data is generally collected by mounting the file system and the relevant data are collected from the files. The OSD operation log is stored at /var/log/xtreemfs/osd.log and from this the data are collected and are used for analysis. The usefulness information that is obtained will be very case specific and during the implementation of the system the user should use appropriate level of logging and hence, the evidences would be available later when required. Collection of evidences from a distributed file system The collections of evidence from a distributed file system provide overviews of the generic procedure that is used for the collection of evidences for the different components of the XtreemFS filesystem and define the methods for the acquisition of the data from the file system (Patel et al., 2013). This evidence provides the information about the system that a procedure must be taken after to guarantee collection of information and metadata to farthest conceivable degree from a circulated file system environment. In the event that a professional took after existing practice what's more, endeavored to gain a bit stream picture of the storage device (for this situation the OSDs), obviously an extensive measure of metadata (accessible at the MRC) can miss. Metadata put away by DIR likewise be essential as some portion of proof gathering or condition reproduction (Kruger et al., 2014). Various types of situations can arise during these processes. The process consists of the three follow ing sub processes: The directory service where the data are collected examined for the determination of the file system and the knowledge for the location of the file system. There are various ways of implementing this type of procedures (Shartono, Setiawan Irwanto, 2014). Regardless the data for the forensic report should be obtained from the directory of the metadata. The metadata storage uses the directory services for locating metadata server and to identify the files that are of use. The examination of the data would result in the reduction of the quantity of data that is to be analyzed. The data storage is uses the environment metadata that is collected from the directory services and the information that is useful is obtained from the metadata storage (Relvas et al., 2013). After the examination of the data the experiment would have the necessary data to perform the analysis procedure and forensic report can be easily available. Conclusion For conclusion it can be easily said that the chances for the exploitation of the dataset have increased with the advancement in the technologies such as big data and cloud computing. There have been many technologies that have been subjected to unethical exploitation and have been used by the mal practitioners for wrong purposes. Hence, digital evidences are to be gathered in order to track the criminal activities and restrict them to a certain level. For the performing the investigations a few steps are to be followed; firstly, there is requirement for the gathering of the evidences about the use of the electronic devices for performing the criminal activities. The process of identification of the devices that is used for the criminal activity is known as the digital forensic procedure. The need for the digital forensics has been described in this report. This report also aims to address the gap in knowledge of the readers about the digital forensic techniques. The report contains the information about the in-depth forensic experiment performed on the XtreemFS project which is a distributed file system is implemented in environments (Kleineweber, Reinefeld Schutt, 2014). The details about the experiment environment, directory services, metadata and replication catalog, object storage devices and the collection of the evidences form the distributed file system have been provided in this report. In addition to this, the report has been used to provide the details about understanding the technical and the process related issues that is related to the collection of the data for the evidences of the digital systems in the file systems. In addition to this, information about various types of key technical terms such as Directory Services, Metadata Storage and data storage have been provided in this report. The report also displays the importance of forensic procedures and the various types of data can be provided to present them in front of the court of law. Furth er research on the topic involves the validation of the system on which the processes are conducted, and the process that would be used if the research was conducted on the other file systems. The forensic approach for the cloud services is also a field that requires a thorough research. References Almulla S, Iraqi Y Jones A. Cloud forensics: a research perspective. In: 9th International conference on innovations in information technology (IIT); 2013. p. 66-71. Butler A, Choo K-KR. IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: an Australian perspective. Secur J 2013. Casonato R, Beyer MA, Adrian M, Friedman T, Logan D, Buytendijk F, et al. Top 10 technology trends impacting information infrastructure, 2013. G00249318. Gartner; 2013. Ceph. Home Ceph. Inktank Storage; 2014. [viewed 25.07.17] Chua F. Digital Darwinism: thriving in the face of technology change. ; 2013 [viewed 29.07.17]. Contrail. Technology e contrail-project. ; 2013 [viewed 29.07.17]. Dukaric R Juric MB. Towards a unified taxonomy and architecture of cloud frameworks. Future Gener Comput Syst 2013;29(5):1196-210 Dykstra J Riehl D. Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing. Richmond J Law Technol 2013;XIX(1):1-47 Dykstra J Sherman AT. Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. Digit Investig 2013;10(s1):S87-95 Federici C. Cloud data imager: a unified answer to remote acquisition of cloud storage areas. Digit Investig 2014;11(1):30-42. Hale JS. Amazon cloud drive forensic analysis. Digit Investig 2013;10(3): 259-65. Hooper C, Martini B Choo K-KR. Cloud computing and its implications for cybercrime investigations in Australia. Comput Law Secur Rev 2013; 29(2):152-63. Kleineweber C, Reinefeld A Schtt T. QoS-aware storage virtualization for cloud file systems. In: 1st ACM international workshop on programmable file systems; 2014. p. 19-26. Krger J, Grunzke R, Herres-Pawlis S, Hoffmann A, de la Garza L, Kohlbacher O, et al. Performance studies on distributed virtual screening. BioMed Res Int 2014;2014. Martini B Choo K-KR. Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. In: 13th International conference on trust, security and privacy in computing and communications, Beijing, China; 2014. p. 935-42. Patel A, Taghavi M, Bakhtiyari K Jnior JC. An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 2013;36(1):25-41. Petcu D, Macariu G, Panica S Craciun C. Portable cloud applications from theory to practice. Future Gener Comput Syst 2013;29(6): 1417-30. Quick D, Martini B Choo K-KR. Cloud storage forensics. 1st ed. Waltham, MA, USA: Syngress, an imprint of Elsevier; 2014. XtreemFS. XtreemFS - fault-tolerant distributed file system. ; 2013 [viewed 12.07.17].