Build proactive threshold policies on the cloud

Discover the impact of purpose, scope, background, consumer control, actions, and constraints

From the developerWorks archives

Judith Myerson

Date archived: November 29, 2016 | First published: May 30, 2011

Often businesses and agencies implement technical, organizational, and business policies to ensure that users comply with the terms in the policy; in other words, to inform cloud computing service consumers and providers what they should do. This is the purpose of a carefully crafted threshold policy — too often, this level of policy does not exist. In this article, the author explains how to craft the policies with examples; follow these templates on purpose, scope, background, consumer control, actions, and constraints to learn to craft resource, user, and data request threshold policies for the cloud.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Cloud computing
ArticleID=660834
ArticleTitle=Build proactive threshold policies on the cloud
publish-date=05302011