This invention relates to risk assessment and management of aspects of a supply chain. More specifically, the invention relates to identification and management of risks in the supply chain, and deployment of risk mitigation.
Domestic and global operating companies are dependent on sustained and on-time delivery of their supply chains. Both sustainability and on-time delivery can be threatened by multiple risk factors outside of the control of such companies. However, knowing these risk factors in advance enables companies to work on risk mitigation plans ahead of any disruptions. Although there are tools available pertaining to supply chains and product delivery, there are performance issues with risk identification and evaluation of the impact of risk situations.
This invention comprises a method, system, and article for risk assessment and management thereof.
In one aspect, a computer implemented method is provided for risk assessment. Risks in a brand commodity supply-chain for delivering a commodity into a brand are identified. The risk identification includes risks for both an intermediate component supply-chain and a final assembly supply-chain. A visible relationship is formed among disparate pieces of information associated with the identified risks. More specifically, the visible relationship includes logically organizing the disparate pieces of information and creating a single holistic image for visualizing risks in the brand commodity supply chain. A relevant supply chain for a risk assessment is identified. In addition, the identified risks for impact evaluation are evaluated. This identification and evaluation includes integrating the identified risks for both the intermediate component supply-chain and the final assembly supply-chain with an aggregation of elements in the supply chains. Finally, key risks in response to the impact evaluation are managed. This management includes deployment of risk mitigation of a risk identified as affecting supply chain sustainability.
In another aspect, a system is provided with tools to support risk assessment and management. A processor is provided in communication with memory. In addition, a functional unit is provided in communication with the memory. The functional unit includes tools to support risk assessment. The tools include, but are not limited to, a risk identification manager, a relationship manager, a supply chain manager, and a director. The risk identification manager functions to identify risks in a brand commodity supply-chain employed to deliver a commodity into a brand. The identified risks include a first risk for an immediate component supply-chain and a second risk for a final assembly supply-chain. The relationship manager is provided in communication with the risk identification manager. More specifically, the relationship manager forms a visible relationship among disparate pieces of information associated with the identified risks. The relationship manager functions to logically organize the disparate pieces of information and to create a single holistic image for risks in the brand commodity supply chain. The supply chain manager is provided in communication with the relationship manager. More specifically, the supply chain manager functions to identify a relevant supply chain for a risk assessment and to evaluate the identified risks for impact evaluation. The supply chain manager integrates the identified risks for both the intermediate component supply-chain and the final assembly supply-chair, with an aggregation of elements in the supply chain. Finally, the director, which is provided in communication with the supply chain manager, functions to manage key risks in response to the impact evaluation. The director deploys risk mitigation of a risk identified as affecting supply chain sustainability.
In a further aspect, a computer program product is provided for risk assessment and management. The computer program product comprises a computer readable storage medium having computer readable program code embodied therewith. Computer readable program code is configured to identify risks in a brand commodity supply chain for delivering a commodity into a brand. The risk identification includes risks for both an intermediate component supply-chain and a final assembly supply-chain. Program code is provided to form a visible relationship among disparate pieces of information associated with the identified risks. More specifically, the program code logically organizes the disparate pieces of information and creates a single holistic image to visualize risks in the brand commodity supply chain. Program code is also provided to identify a relevant supply chain for a risk assessment and to evaluate the identified risks for impact evaluation. The identification and evaluation code includes integrating the identified risks for both the intermediate component supply-chain and the final assembly supply-chain with an aggregation of elements in the supply chains. Finally, program code is provided to manage key risks in response to the impact evaluation, including deployment of risk mitigation for a risk identified as affecting supply chain sustainability.
Other features and advantages of this invention will become apparent from the following detailed description of the presently preferred embodiment of the invention, taken in conjunction with the accompanying drawings.
The drawings referenced herein form a part of the specification. Features shown in the drawings are meant as illustrative of only some embodiments of the invention, and not of all embodiments of the invention unless otherwise explicitly indicated.
It will be readily understood that the components of the present invention, as generally described and illustrated in the Figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the apparatus, system, and method of the present invention, as presented in the Figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention.
The functional unit(s) described in this specification has been labeled with tools in the form of managers and a director. A manager and/or director may be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like. The managers and/or director may also be implemented in software for processing by various types of processors. An identified manager of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be organized as an object, procedure, function, or other construct. Nevertheless, the executables of an identified manager need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the managers and/or director and achieve the stated purpose of the managers and/or director.
Indeed, a manager or director of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different applications, and across several memory devices. Similarly, operational data may be identified and illustrated herein within the manager or director, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, as electronic signals on a system or network.
Reference throughout this specification to “a select embodiment,” “one embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “a select embodiment,” “in one embodiment,” or “in an embodiment” in various places throughout this specification are not necessarily referring to the same embodiment.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided, such as examples of a risk identification manager, a relationship manager, a supply chain manager, a risk category manager, an impact manager, and a director, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be practiced without one or more of the specific details, or with other methods, components, materials, etc. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
The illustrated embodiments of the invention will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and processes that are consistent with the invention as claimed herein.
The total risk assessment method and system described herein focuses on the risk identification and impact evaluation processes, each addressing an appropriate conceptual risk category. Risk mitigation is deployed on migration oriented tools and processes. Risk assessment described herein evaluates, identifies, and manages key risks within a global supply chain. More specifically, risk assessment employs queries and associated responses to capture different aspects of risk in a supply chain. In one embodiment, these queries address risk in countries, hubs, supplier, and supplier sites. The risk assessment method and system uses a likelihood-impact and meantime-to-repair model for calculating risk levels associated with query responses. More specifically, the responses are employed to aggregate the risk per entity and for the entire supply chain. In one embodiment, the queries are employed to assess effectiveness of a supplier's preparation for a pandemic and to determine if mitigation plans are in place to guarantee supply continuity. Accordingly, each entity in the supply chain is individually assessed for each of the identified risk categories and their risk values are rolled up to product level using a likelihood-impact model.
The risk aggregation model is based on the concept of brand-commodity-supply chain (BSC). A BSC is a supply chain which delivers a commodity into a brand for a final assembly. In one embodiment, the BSC is composed of aspects of a supply chain, including but not limited to, country, supplier site, supplier, hub-in, hub-out, and commodity. Each BSC entity is assessed with queries from which probability and impact relating to a potential risk situation is identified. A risk category of the supply chain aspect is related to a question in an associated risk assessment. For example, the risk assessment may be associated with crime. The supply chain includes an intermediate supply chain and a final assembly supply chain. The intermediate supply chain is a supply chain supplying a commodity which is not delivered to a brand for final assembly. Conversely, the final assembly supply chain is a supply chain supplying a commodity which is delivered to a brand for final assembly. Accordingly, both intermediate and final aspects of supply chain and associated delivery are considered for the risk aggregation model.
Different aspects of risk assessments are calculated, including, but not limited to, mean time to repair, assessment of likelihood of risk, assessment of meantime to repair, and assessment of impact. The mean time to repair is an average time of a non-operation status of a supply chain risk category. For example, if it is determined that the non-operation status is for five days, the mean time to repair is 5/365, and translated to 1.4%. The assessment of likelihood of risk includes assignment of a verbally defined risk value to a risk category, e.g. unlikely, very unlikely, etc. The assessment of meantime to repair includes assigning a time to a risk category. In one embodiment, the time may include days per year. The assessment of impact includes assigning a defined impact value to a risk category. In one embodiment, the defined impact may be verbal. Each of the above described assessments may be employed to calculate a likelihood value. More specifically, the assessment of likelihood of risk, meantime to repair, etc. may be transformed into numerical values based upon a set of predefined rule for each risk category.
The likelihood and impact values for individual questions are assigned for each questions, thereby allowing for maximum flexibility. In one embodiment, the following is the base scale for likelihood values on a scale from 0 to 1, e.g. from 0% to 100%:
In one embodiment, the following is the base scale for impact values on a scale from 0 to 1, e.g. from 0% to 100%:
A supply chain risk is assessed in several directions and dimensions, including tactically and operationally, and in view of the passage of time. More specifically, a supply chain risk assessment identifies risks in a brand commodity supply chain for delivering a commodity into a brand. This includes risk identification and assessment for both an intermediate component supply chain and a final assembly supply chain.
As shown in
The assignment of values as shown in
The likelihood value and the impact values are separate numerical values. The likelihood values are defined in Table 1, and the impact values are defined in Table 2. The meantime to repair value is calculated based on the following formula:
x days=y %
y=x/365*100
Accordingly, each of the assessed values is assigned a numerical value.
Once the numerical values have been assessed for each risk category, likelihood and impacts values for each risk category of aspects of the supply chain may be aggregated to an aggregated likelihood of impact value for this aspect.
where, [L; I] denotes the aggregated likelihood-impact value of the aspect; j=1, . . . , n denote the risk categories to be aggregated; lj denotes the likelihood value of risk category j; and ij denotes the impact value of risk category j. Accordingly, based upon this calculation, all aspects of a supply chain are individually aggregated into a pair of likelihood and impact risk values.
An aggregation may be calculated for each supply chain, and in addition an aggregation may be performed across a totality of supply chains supplying a selected commodity.
where, [SL; SI] denotes the aggregated likelihood-impact value for the supply chain, j=1, . . . , n denote the aspects to be aggregated, Lj denotes the aggregated likelihood value of the aspect j, and Ij denotes the aggregated impact value of the aspect j. In one embodiment, aspects of the supply chain include, country, hub supplier, supplier site, and commodity. The aggregation of these aspects reports into a brand. For example, the aggregation of CountryA, HubA, SupplierA, Supplier SiteA, and CommodityA report into BrandA. Accordingly, based upon this calculation, an aggregation of likelihood impact values for each aspect of the supply chain is assessed for a specific brand.
Multiple supply chains may be employed to supply a selected commodity. More specifically, a commodity may be comprised of multiple components with each component emanating from a separate supply chain.
where, [TSL; TSI] denotes the aggregated likelihood-impact value for the totality supply chains, j=1, . . . , n denote the supply chains to be aggregated, SLj denotes the aggregated likelihood value of the supply chain j, and SIj denotes the aggregated impact value of the supply chain j.
Multiple supply chains may be employed to supply a selected organizational entity. The supply chain may address different commodities or the same commodity.
An organizational entity may be comprised of multiple commodities with each commodity emanating from a separate supply chain for a common brand.
where, [TSL; TSI] denotes the aggregated likelihood-impact value for the totality supply chains, j=1, . . . , n denote the supply chains to be aggregated, SLj denotes the aggregated likelihood value of the supply chain j, SIj denotes the aggregated impact value of the supply chain j. Accordingly, as shown all likelihood of impact risk values of selected supply chains are aggregated into a single likelihood of impact risk value for a brand.
Disruption of one aspect of a supply chain can disrupt the entire supply chain. The following table is an example of assessments and their effect on probability of disruption in the supply chain:
Based on the information provided in Table 3, the likelihood of no impact, i.e. no disruption, for the identified country is (1−P1)*(1−P2)*(1−P3), the likelihood of impact, i.e. disruption, for the identified country is 1−[(1−P1)*(1−P2)*(1−P3)], and the impact in case of disruption is (I1*P1+I2*P2+I3*P3)/(P1+P2+P3). Please see the following table for a quantitative example:
Based on this example and the assessment values provided in Table 1 and Table 2, the likelihood of no disruption is 66%, which is a high probability, the likelihood of disruption is 34%, which is possible, and the impact on distribution is 3.8%, which is unlikely. Risks are assessed for each defined risk category applying to a supply chain, with the assessed risks aggregated with a likelihood and impact value model to provide impact and disruption values.
Each risk is assessed by internal and/or external organizations having knowledge about the associated risks. Changes in an assessed risk level will trigger an alert. The total risk assessment shown herein provides a centralized approach for risk assessment within a company. The risk can be assessed and visualized for the entire supply chain. Risk mitigation plans can be pre-defined ahead of any possible threat to supply sustainability and maintain on-time delivery. Accordingly, the assessment and aggregation provides a robust supply chain to enable continued operation of an organizational entity.
As demonstrated in
A functional unit (1150) is provided with one or more tools to support the implementation of the supply chain risk assessment and management. The functional unit (1150) is shown local to the server (1120). However, in one embodiment, the functional unit (1150) may be local to any of the data centers supporting the supply chain risk assessment. The tools include, but are not limited to, a risk identification manager (1170), a relationship manager (1172), a supply chain manager (1174), a risk category manager (1176), an impact manager (1178), and a director (1180). The risk identification manager (1170) is provided to identify risks in a brand commodity supply-chain employed to deliver a commodity into a brand. The identified risks include a first risk for an immediate component supply-chain and a second risk for a final assembly supply-chain. The relationship manager (1172) is provided in communication with the risk identification manager (1170). More specifically, the relationship manager (1172) functions to form a visible relationship among disparate pieces of information associated with the identified risks. In one embodiment, disparate pieces of information reflect a collection of information from many places. The relationship manager (1172) organizes the disparate pieces of information in a logical manger in order to create a single holistic image for risks in the brand commodity supply chain. The supply chain manager (1174) is provided in communication with the relationship manager (1172). The supply chain manager (1174) functions to identify a relevant supply chain for a risk assessment, and to evaluate the identified risks for impact evaluation.
The supply chain manager (1174) integrates the identified risks for both an intermediate component supply-chain and a final assembly supply-chain, with an aggregation of elements in the supply chain. Finally, the director (1180) is provided in communication with the supply chain manager (1174) to manage key risks in response to the impact evaluation. The director (1180) deploys risk mitigation to a risk identified to affect supply chain sustainability. Accordingly, the managers and directors identify and assess risks in the brand commodity supply chain in order to mitigate the effect of the risks on sustenance of the supply chain.
As outlined above, there are additional managers provided in communication with the functional unit to support risk assessment and management. These managers include, but are not limited to, the risk category manager (1176) and the impact manager (1178). The risk category manager (1176) is provided in communication with the risk identification manager (1170). Each identified risk in the brand commodity supply chain is assigned a numerical measurement. The risk category manager (1176) assess a risk category of an aspect of the supply chain and assigned to each risk category a measurement in the form of a meantime to repair impact or a likelihood of impact. To further address mitigation of risk, the impact manager (1178) is provided in communication with the risk identification manager (1170). The impact manager (1178) individually assesses an impact value for each risk category of the aspect of the supply chain. This assessment includes the impact manager (1178) assigning a meantime to repair and impact value and a likelihood to impact measurement for each risk category of the aspect of the supply chain.
The risk assessment and management may take place on a granular level or a larger macro level. For example, the impact manager (1178) may calculate an individual likelihood value and impact value for each risk category of an aspect of the supply chain. The assessments provided by the impact manager (1178) on the granular level may be employed to provide horizontal and/or vertical aggregation of risk assessment. The impact manager (1178) may provide separate aggregations across a single supply chain, multiple supply chains which supply a selected commodity, and a totality of supply chains which supply an organizational entity. With respect to a single supply chain, the impact manager (1178) aggregates the likelihood of impact values for each risk category to an aggregated likelihood impact values for an aspect of the supply chain. The aspect may include a country, hub, supplier, supplier site, or commodity. With respect to aggregation across a supply chain, the impact manager (1178) aggregates the likelihood impact values from each aspect of the supply chain into an aggregated likelihood impact value for the supply chain. Similarly, with respect to multiple supply chains, the impact manager (1178) aggregates the likelihood impact values of two or more supply chains to an aggregated likelihood impact value for all of the supply chains which supply a selected commodity. Finally, with respect to an organizational entity, the impact manager (1178) aggregates the likelihood impact values of two or more supply chains to an aggregated likelihood impact value for a totality of supply chains which supply the organizational entity. Accordingly, the impact manager (1178) functions to perform the aggregation of the supply chains on a micro and a macro level to provided risk assessment on the various levels in the brand commodity supply chain.
As identified above, the risk identification manager (1170), relationship manager (1172), supply chain manager (1174), risk category manager (1176), impact manager (1178), and director (1180) are shown residing in memory (1124) of the server (1120) local to the first data center (1110). Although in one embodiment, risk identification manager (1170), relationship manager (1172), supply chain manager (1174), risk category manager (1176), impact manager (1178), and director (1180) may reside as hardware tools external to the memory (1124) of server (1120) of the first data center (1110). The identified managers and director (1170)-(1180) may be implemented as a combination of hardware and software, or may be distributed among multiple data centers in the shared pool of resources. Similarly, in one embodiment, the managers and director (1170)-(1180) may be combined into a single functional item that incorporates the functionality of the separate items. As shown herein, each of the managers and director (1170)-(1180) are shown local to one data center. However, in one embodiment they may be collectively or individually distributed across the shared pool of configurable computer resources and function as a unit to assess and manage risks in the supply chain. Accordingly, the managers and director (1170)-(1180) may be implemented as software tools, hardware tools, or a combination of software and hardware tools.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Referring now to
In alternative embodiments, the secondary memory (1212) may include other similar means for allowing computer programs or other instructions to be loaded into the computer system. Such means may include, for example, a removable storage unit (1220) and an interface (1222). Examples of such means may include a program package and package interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units (1220) and interfaces (1222) which allow software and data to be transferred from the removable storage unit (1220) to the computer system.
The computer system may also include a communications interface (1224). Communications interface (1224) allows software and data to be transferred between the computer system and external devices. Examples of communications interface (1224) may include a modem, a network interface (such as an Ethernet card), a communications port, or a PCMCIA slot and card, etc. Software and data transferred via communications interface (1224) are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received by communications interface (1224). These signals are provided to communications interface (1224) via a communications path (i.e., channel) (1226). This communications path (1226) carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, a radio frequency (RF) link, and/or other communication channels.
In this document, the terms “computer program medium,” “computer usable medium,” and “computer readable medium” are used to generally refer to media such as main memory (1210) and secondary memory (1212), removable storage drive (1216), and a hard disk installed in hard disk drive (1214).
Computer programs (also called computer control logic) are stored in main memory (1210) and/or secondary memory (1212). Computer programs may also be received via a communication interface (1224). Such computer programs, when run, enable the computer system to perform the features of the present invention as discussed herein. In particular, the computer programs, when run, enable the processor (1202) to perform the features of the computer system. Accordingly, such computer programs represent controllers of the computer system.
The flowcharts and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowcharts or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. Accordingly, the enhanced cloud computing model supports flexibility with respect to application processing and disaster recovery, including, but not limited to, supporting separation of the location of the data from the application location and selection of an appropriate recovery site.
It will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without departing from the spirit and scope of the invention. Accordingly, the scope of protection of this invention is limited only by the following claims and their equivalents.