<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=User%3AShawndouglas%2Fsandbox%2Fsublevel32</id>
	<title>User:Shawndouglas/sandbox/sublevel32 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/index.php?action=history&amp;feed=atom&amp;title=User%3AShawndouglas%2Fsandbox%2Fsublevel32"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;action=history"/>
	<updated>2026-04-06T00:16:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52886&amp;oldid=prev</id>
		<title>Shawndouglas: Replaced content with &quot;&lt;div class=&quot;nonumtoc&quot;&gt;__TOC__&lt;/div&gt; {{ombox | type      = notice | style     = width: 960px; | text      = This is sublevel32 of my sandbox, where I play with features and...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52886&amp;oldid=prev"/>
		<updated>2023-08-16T20:36:58Z</updated>

		<summary type="html">&lt;p&gt;Replaced content with &amp;quot;&amp;lt;div class=&amp;quot;nonumtoc&amp;quot;&amp;gt;__TOC__&amp;lt;/div&amp;gt; {{ombox | type      = notice | style     = width: 960px; | text      = This is sublevel32 of my sandbox, where I play with features and...&amp;quot;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:36, 16 August 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;7&lt;/del&gt;.&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2 Key reading and reference material===&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;div class&lt;/ins&gt;=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;quot;nonumtoc&amp;quot;&amp;gt;__TOC__&amp;lt;/div&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{ombox&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;| type      &lt;/ins&gt;= &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;notice&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;| style     &lt;/ins&gt;= &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;width: 960px;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;| text      = This is sublevel32 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see [[User_talk:Shawndouglas|my discussion page]] instead&lt;/ins&gt;.&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;p&amp;gt;&amp;lt;/p&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'''Key reading''':&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Sandbox begins below&lt;/ins&gt;==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;https://www.agilent.com/cs/library/whitepaper/public/whitepaper-cloud-adoption-openlab-5994-0718en-us-agilent.pdf |format&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;PDF |title&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Cloud Adoption for Lab Informatics: Trends, Opportunities, Considerations, Next Steps |author&lt;/del&gt;=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Agilent Technologies |publisher=Agilent Technologies |date=21 February 2019}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.geeksforgeeks.org/vendor-lock-in-in-cloud-computing/ |title=Vendor Lock-in in Cloud Computing |author=anjalibo6rb0 |work=Geeks for Geeks |date=27 January 2023}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/ |format=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://legal.thomsonreuters.com/en/insights/articles/understanding-data-privacy-and-cloud-computing |title=Understand the intersection between data privacy laws and cloud computing |author=Eustice, J.C. |work=Legal Technology, Products, and Services |publisher=Thomson Reuters |date=2018}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://incountry.com/blog/data-residency-laws-by-country-overview/ |title=Data residency laws by country: An overview |author=InCountry Staff |work=InCountry |date=18 November 2021}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://kinsta.com/blog/cloud-security/ |title=A Comprehensive Guide to Cloud Security in 2023 (Risks, Best Practices, Certifications) |author=Jones, E. |work=Kinsta |date=11 August 2023}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |archiveurl=https://web.archive.org/web/20201221150028/https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |title=Top cloud compliance standards and how to use them |author=Kirvan, P. |work=TechTarget SearchCompliance |date=17 December 2020 |archivedate=21 December 2020}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://carnegieendowment.org/2020/11/09/cloud-governance-challenges-survey-of-policy-and-regulatory-issues-pub-83124 |title=Cloud Governance Challenges: A Survey of Policy and Regulatory Issues |author=Levite, A.; Kalwani, G. |publisher=Carnegie Endowment for International Peace |date=09 November 2020}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://carnegieendowment.org/2020/08/31/cloud-security-primer-for-policymakers-pub-82597 |title=Cloud Security: A Primer for Policymakers |author=Maurer, T.; Hinck, G. |publisher=Carnegie Endowment for International Peace |date=31 August 2020}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.cio.com/article/284247/software-as-a-service-why-open-source-is-the-key-to-cloud-innovation.html |title=Why Open Source Is the Key to Cloud Innovation |author=Olavsrud, T. |work=CIO |date=13 April 2012}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.csoonline.com/article/569951/building-stronger-multicloud-security-3-key-elements.html |title=Building stronger multicloud security: 3 key elements |author=Pratt, M.K. |work=CSO |date=14 December 2020}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite journal |title=Addressing Semantics Standards for Cloud Portability and Interoperability in Multi Cloud Environment |journal=Symmetry |author=Ramalingam, C.; Mohan, P. |volume=13 |at=317 |year=2021 |doi=10.3390/sym13020317}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |archiveurl=https://web.archive.org/web/20210308231558/https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |format=PDF |title=Is the Cloud a Safe Place for Your Data?: How Life Science Organizations Can Ensure Integrity and Security in a SaaS Environment |author=Tiller, D. |publisher=IDBS |archivedate=08 March 2021 |date=2019}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.trianz.com/insights/managed-cloud-security-services-how-and-why-it-works |title=How Managed Cloud Security Works, and Why You Might Want It |author=Trianz |date=29 May 2022}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://ncses.nsf.gov/pubs/ncses22213 |title=Digitalization, Cloud Computing, and Innovation in U.S. Businesses |author=Wojan, T.R.; National Center for Science and Engineering Statistics |publisher=National Science Foundation |date=25 August 2022}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'''Reference material''':&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://usa.kaspersky.com/resource-center/definitions/what-is-cloud-security |title=What is Cloud Security? |work=Resource Center |author=AO Kaspersky Lab |date=2023}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.cisecurity.org/insights/blog/secure-cloud-products-and-services-with-new-cis-benchmarks |title=The Beginner’s Guide to Secure Cloud Configurations |work=CIS Blog |author=Center for Internet Security |date=2021}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.mitre.org/news-insights/publication/planning-management-methods-migration-cloud-environment |title=Planning &amp;amp; Management Methods for Migration to a Cloud Environment |author=Kearns, D.K. |publisher=The MITRE Corporation |date=13 January 2018}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.hhs.gov/hipaa/for-professionals/special-topics/health-information-technology/cloud-computing/index.html |title=Guidance on HIPAA &amp;amp; Cloud Computing |author=Office for Civil Rights |work=Health Information Privacy |publisher=U.S. Department of Health &amp;amp; Human Services |date=23 December 2022}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://csrc.nist.gov/pubs/sp/800/190/final |title=SP 800-190 ''Application Container Security Guide'' |author=Souppaya, M.; Morello, J.; Scarfone, K. |publisher=NIST |date=September 2017}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://kubernetes.io/docs/home/ |title=Kubernetes Documentation |author=The Linux Foundation |date=12 July 2023}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-52836:rev-52886 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52836&amp;oldid=prev</id>
		<title>Shawndouglas at 15:19, 16 August 2023</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52836&amp;oldid=prev"/>
		<updated>2023-08-16T15:19:16Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:19, 16 August 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l4&quot;&gt;Line 4:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 4:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.agilent.com/cs/library/whitepaper/public/whitepaper-cloud-adoption-openlab-5994-0718en-us-agilent.pdf |format=PDF |title=Cloud Adoption for Lab Informatics: Trends, Opportunities, Considerations, Next Steps |author=Agilent Technologies |publisher=Agilent Technologies |date=21 February 2019}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.agilent.com/cs/library/whitepaper/public/whitepaper-cloud-adoption-openlab-5994-0718en-us-agilent.pdf |format=PDF |title=Cloud Adoption for Lab Informatics: Trends, Opportunities, Considerations, Next Steps |author=Agilent Technologies |publisher=Agilent Technologies |date=21 February 2019}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.geeksforgeeks.org/vendor-lock-in-in-cloud-computing/ |title=Vendor Lock-in in Cloud Computing |author=anjalibo6rb0 |work=Geeks for Geeks |date=27 January 2023}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/ |format=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/ |format=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://legal.thomsonreuters.com/en/insights/articles/understanding-data-privacy-and-cloud-computing |title=Understand the intersection between data privacy laws and cloud computing |author=Eustice, J.C. |work=Legal Technology, Products, and Services |publisher=Thomson Reuters |date=2018}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://legal.thomsonreuters.com/en/insights/articles/understanding-data-privacy-and-cloud-computing |title=Understand the intersection between data privacy laws and cloud computing |author=Eustice, J.C. |work=Legal Technology, Products, and Services |publisher=Thomson Reuters |date=2018}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://incountry.com/blog/data-residency-laws-by-country-overview/ |title=Data residency laws by country: An overview |author=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Guseyva&lt;/del&gt;, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;V&lt;/del&gt;. |work=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;InCountry &lt;/del&gt;|date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;18 September 2020&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://incountry.com/blog/data-residency-laws-by-country-overview/ |title=Data residency laws by country: An overview |author=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;InCountry Staff |work=InCountry |date=18 November 2021}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://kinsta.com/blog/cloud-security/ |title=A Comprehensive Guide to Cloud Security in 2023 (Risks, Best Practices&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Certifications) |author=Jones, E&lt;/ins&gt;. |work=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Kinsta &lt;/ins&gt;|date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;11 August 2023&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |archiveurl=https://web.archive.org/web/20201221150028/https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |title=Top cloud compliance standards and how to use them |author=Kirvan, P. |work=TechTarget SearchCompliance |date=17 December 2020 |archivedate=21 December 2020}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |archiveurl=https://web.archive.org/web/20201221150028/https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |title=Top cloud compliance standards and how to use them |author=Kirvan, P. |work=TechTarget SearchCompliance |date=17 December 2020 |archivedate=21 December 2020}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://carnegieendowment.org/2020/11/09/cloud-governance-challenges-survey-of-policy-and-regulatory-issues-pub-83124 |title=Cloud Governance Challenges: A Survey of Policy and Regulatory Issues |author=Levite, A.; Kalwani, G. |publisher=Carnegie Endowment for International Peace |date=09 November 2020}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://carnegieendowment.org/2020/11/09/cloud-governance-challenges-survey-of-policy-and-regulatory-issues-pub-83124 |title=Cloud Governance Challenges: A Survey of Policy and Regulatory Issues |author=Levite, A.; Kalwani, G. |publisher=Carnegie Endowment for International Peace |date=09 November 2020}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://carnegieendowment.org/2020/08/31/cloud-security-primer-for-policymakers-pub-82597 |title=Cloud Security: A Primer for Policymakers |author=Maurer, T.; Hinck, G. |publisher=Carnegie Endowment for International Peace |date=31 August 2020}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://carnegieendowment.org/2020/08/31/cloud-security-primer-for-policymakers-pub-82597 |title=Cloud Security: A Primer for Policymakers |author=Maurer, T.; Hinck, G. |publisher=Carnegie Endowment for International Peace |date=31 August 2020}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.protocol.com/manuals/new-enterprise/vendor-lockin-cloud-saas |title=Should we really be worried about vendor lock-in in 2020? |author=Mok, K. |work=Protocol |date=01 December 2020}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.cio.com/article/284247/software-as-a-service-why-open-source-is-the-key-to-cloud-innovation.html |title=Why Open Source Is the Key to Cloud Innovation |author=Olavsrud, T. |work=CIO |date=13 April 2012}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.cio.com/article/284247/software-as-a-service-why-open-source-is-the-key-to-cloud-innovation.html |title=Why Open Source Is the Key to Cloud Innovation |author=Olavsrud, T. |work=CIO |date=13 April 2012}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.csoonline.com/article/569951/building-stronger-multicloud-security-3-key-elements.html |title=Building stronger multicloud security: 3 key elements |author=Pratt, M.K. |work=CSO |date=14 December 2020}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.csoonline.com/article/569951/building-stronger-multicloud-security-3-key-elements.html |title=Building stronger multicloud security: 3 key elements |author=Pratt, M.K. |work=CSO |date=14 December 2020}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite journal |title=Addressing Semantics Standards for Cloud Portability and Interoperability in Multi Cloud Environment |journal=Symmetry |author=Ramalingam, C.; Mohan, P. |volume=13 |at=317 |year=2021 |doi=10.3390/sym13020317}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite journal |title=Addressing Semantics Standards for Cloud Portability and Interoperability in Multi Cloud Environment |journal=Symmetry |author=Ramalingam, C.; Mohan, P. |volume=13 |at=317 |year=2021 |doi=10.3390/sym13020317}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |archiveurl=https://web.archive.org/web/20210308231558/https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |format=PDF |title=Is the Cloud a Safe Place for Your Data?: How Life Science Organizations Can Ensure Integrity and Security in a SaaS Environment |author=Tiller, D. |publisher=IDBS |archivedate=08 March 2021 |date=2019}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |archiveurl=https://web.archive.org/web/20210308231558/https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |format=PDF |title=Is the Cloud a Safe Place for Your Data?: How Life Science Organizations Can Ensure Integrity and Security in a SaaS Environment |author=Tiller, D. |publisher=IDBS |archivedate=08 March 2021 |date=2019}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.trianz.com/insights/managed-cloud-security-services-how-and-why-it-works |title=How Managed Cloud Security Works, and Why You Might Want It |author=Trianz |date=29 &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;March 2021&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.trianz.com/insights/managed-cloud-security-services-how-and-why-it-works |title=How Managed Cloud Security Works, and Why You Might Want It |author=Trianz |date=29 &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;May 2022}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://ncses.nsf.gov/pubs/ncses22213 |title=Digitalization, Cloud Computing, and Innovation in U.S. Businesses |author=Wojan, T.R.; National Center for Science and Engineering Statistics |publisher=National Science Foundation |date=25 August 2022&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Reference material''':&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;'''Reference material''':&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://usa.kaspersky.com/resource-center/definitions/what-is-cloud-security |title=What is Cloud Security? |work=Resource Center |author=AO Kaspersky Lab |date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2021&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://usa.kaspersky.com/resource-center/definitions/what-is-cloud-security |title=What is Cloud Security? |work=Resource Center |author=AO Kaspersky Lab |date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;2023&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;urlhttps&lt;/del&gt;://www.cisecurity.org/insights/blog/secure-cloud-products-and-services-with-new-cis-benchmarks |title=The Beginner’s Guide to Secure Cloud Configurations |work=CIS Blog |author=Center for Internet Security |date=2021}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;url=https&lt;/ins&gt;://www.cisecurity.org/insights/blog/secure-cloud-products-and-services-with-new-cis-benchmarks |title=The Beginner’s Guide to Secure Cloud Configurations |work=CIS Blog |author=Center for Internet Security |date=2021}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.mitre.org/news-insights/publication/planning-management-methods-migration-cloud-environment |title=Planning &amp;amp; Management Methods for Migration to a Cloud Environment |author=Kearns, D.K. |publisher=The MITRE Corporation |date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;December 2017&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.mitre.org/news-insights/publication/planning-management-methods-migration-cloud-environment |title=Planning &amp;amp; Management Methods for Migration to a Cloud Environment |author=Kearns, D.K. |publisher=The MITRE Corporation |date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;13 January 2018&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.hhs.gov/hipaa/for-professionals/special-topics/health-information-technology/cloud-computing/index.html |title=Guidance on HIPAA &amp;amp; Cloud Computing |author=Office for Civil Rights |work=Health Information Privacy |publisher=U.S. Department of Health &amp;amp; Human Services |date=&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;24 November 2020&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://www.hhs.gov/hipaa/for-professionals/special-topics/health-information-technology/cloud-computing/index.html |title=Guidance on HIPAA &amp;amp; Cloud Computing |author=Office for Civil Rights |work=Health Information Privacy |publisher=U.S. Department of Health &amp;amp; Human Services |date=&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;23 December 2022&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://csrc.nist.gov/pubs/sp/800/190/final |title=SP 800-190 ''Application Container Security Guide'' |author=Souppaya, M.; Morello, J.; Scarfone, K. |publisher=NIST |date=September 2017}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://csrc.nist.gov/pubs/sp/800/190/final |title=SP 800-190 ''Application Container Security Guide'' |author=Souppaya, M.; Morello, J.; Scarfone, K. |publisher=NIST |date=September 2017}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://kubernetes.io/docs/home/ |title=Kubernetes Documentation |author=The Linux Foundation |date=12 &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;November 2020&lt;/del&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* {{cite web |url=https://kubernetes.io/docs/home/ |title=Kubernetes Documentation |author=The Linux Foundation |date=12 &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;July 2023&lt;/ins&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-52679:rev-52836 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52679&amp;oldid=prev</id>
		<title>Shawndouglas at 23:04, 27 July 2023</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=52679&amp;oldid=prev"/>
		<updated>2023-07-27T23:04:43Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:04, 27 July 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===7.2 Key reading and reference material===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'''Key reading''':&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.agilent.com/cs/library/whitepaper/public/whitepaper-cloud-adoption-openlab-5994-0718en-us-agilent.pdf |format=PDF |title=Cloud Adoption for Lab Informatics: Trends, Opportunities, Considerations, Next Steps |author=Agilent Technologies |publisher=Agilent Technologies |date=21 February 2019}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/ |format=PDF |title=Top Threats to Cloud Computing: The Egregious 11 |author=Cloud Security Alliance |date=06 August 2019}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://legal.thomsonreuters.com/en/insights/articles/understanding-data-privacy-and-cloud-computing |title=Understand the intersection between data privacy laws and cloud computing |author=Eustice, J.C. |work=Legal Technology, Products, and Services |publisher=Thomson Reuters |date=2018}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://incountry.com/blog/data-residency-laws-by-country-overview/ |title=Data residency laws by country: An overview |author=Guseyva, V. |work=InCountry |date=18 September 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |archiveurl=https://web.archive.org/web/20201221150028/https://searchcompliance.techtarget.com/tip/Top-cloud-compliance-standards-and-how-to-use-them |title=Top cloud compliance standards and how to use them |author=Kirvan, P. |work=TechTarget SearchCompliance |date=17 December 2020 |archivedate=21 December 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://carnegieendowment.org/2020/11/09/cloud-governance-challenges-survey-of-policy-and-regulatory-issues-pub-83124 |title=Cloud Governance Challenges: A Survey of Policy and Regulatory Issues |author=Levite, A.; Kalwani, G. |publisher=Carnegie Endowment for International Peace |date=09 November 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://carnegieendowment.org/2020/08/31/cloud-security-primer-for-policymakers-pub-82597 |title=Cloud Security: A Primer for Policymakers |author=Maurer, T.; Hinck, G. |publisher=Carnegie Endowment for International Peace |date=31 August 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.protocol.com/manuals/new-enterprise/vendor-lockin-cloud-saas |title=Should we really be worried about vendor lock-in in 2020? |author=Mok, K. |work=Protocol |date=01 December 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.cio.com/article/284247/software-as-a-service-why-open-source-is-the-key-to-cloud-innovation.html |title=Why Open Source Is the Key to Cloud Innovation |author=Olavsrud, T. |work=CIO |date=13 April 2012}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.csoonline.com/article/569951/building-stronger-multicloud-security-3-key-elements.html |title=Building stronger multicloud security: 3 key elements |author=Pratt, M.K. |work=CSO |date=14 December 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite journal |title=Addressing Semantics Standards for Cloud Portability and Interoperability in Multi Cloud Environment |journal=Symmetry |author=Ramalingam, C.; Mohan, P. |volume=13 |at=317 |year=2021 |doi=10.3390/sym13020317}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |archiveurl=https://web.archive.org/web/20210308231558/https://storage.pardot.com/468401/1614781936jHqdU6H6/Whitepaper_Is_the_cloud_a_safe_place_for_your_data.pdf |format=PDF |title=Is the Cloud a Safe Place for Your Data?: How Life Science Organizations Can Ensure Integrity and Security in a SaaS Environment |author=Tiller, D. |publisher=IDBS |archivedate=08 March 2021 |date=2019}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.trianz.com/insights/managed-cloud-security-services-how-and-why-it-works |title=How Managed Cloud Security Works, and Why You Might Want It |author=Trianz |date=29 March 2021}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'''Reference material''':&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://usa.kaspersky.com/resource-center/definitions/what-is-cloud-security |title=What is Cloud Security? |work=Resource Center |author=AO Kaspersky Lab |date=2021}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |urlhttps://www.cisecurity.org/insights/blog/secure-cloud-products-and-services-with-new-cis-benchmarks |title=The Beginner’s Guide to Secure Cloud Configurations |work=CIS Blog |author=Center for Internet Security |date=2021}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.mitre.org/news-insights/publication/planning-management-methods-migration-cloud-environment |title=Planning &amp;amp; Management Methods for Migration to a Cloud Environment |author=Kearns, D.K. |publisher=The MITRE Corporation |date=December 2017}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://www.hhs.gov/hipaa/for-professionals/special-topics/health-information-technology/cloud-computing/index.html |title=Guidance on HIPAA &amp;amp; Cloud Computing |author=Office for Civil Rights |work=Health Information Privacy |publisher=U.S. Department of Health &amp;amp; Human Services |date=24 November 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://csrc.nist.gov/pubs/sp/800/190/final |title=SP 800-190 ''Application Container Security Guide'' |author=Souppaya, M.; Morello, J.; Scarfone, K. |publisher=NIST |date=September 2017}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* {{cite web |url=https://kubernetes.io/docs/home/ |title=Kubernetes Documentation |author=The Linux Foundation |date=12 November 2020}}&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-44029:rev-52679 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=44029&amp;oldid=prev</id>
		<title>Shawndouglas: Blanked the page</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=44029&amp;oldid=prev"/>
		<updated>2021-09-06T13:13:14Z</updated>

		<summary type="html">&lt;p&gt;Blanked the page&lt;/p&gt;
&lt;a href=&quot;https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;amp;diff=44029&amp;amp;oldid=39229&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39229&amp;oldid=prev</id>
		<title>Shawndouglas at 19:29, 3 May 2020</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39229&amp;oldid=prev"/>
		<updated>2020-05-03T19:29:34Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 19:29, 3 May 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l37&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Median incubation period'': According to research published in ''Annals of Internal Medicine'', the median (i.e., the central tendency, which is less skewed than average&amp;lt;ref name=&amp;quot;NRCSMedian&amp;quot;&amp;gt;{{cite web |url=https://www.wcc.nrcs.usda.gov/normals/median_average.htm |title=Median vs. Average to Describe Normal |author=National Water and Climate Center |publisher=U.S. Department of Agriculture |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;) incubation period is 5.1 days, with 97.5% of symptomatic carriers showing symptoms within 11.5 days. The authors found this to be compatible with U.S. government recommendations of monitored 14-day self-quarantines if individuals were at risk of exposure.&amp;lt;ref name=&amp;quot;LauerTheInc20&amp;quot;&amp;gt;{{cite journal |title=The Incubation Period of Coronavirus Disease 2019 (COVID-19) From Publicly Reported Confirmed Cases: Estimation and Application |journal=Annals of Internal Medicine |author=Lauer, S.A.; Grantz, K.H.; Bi, Q. et al. |year=2020 |doi=10.7326/M20-0504 |pmid=32150748 |pmc=PMC7081172}}&amp;lt;/ref&amp;gt; However, many people continue to not take self-quarantines and other forms of social distancing seriously&amp;lt;ref name=&amp;quot;PinskerWhatDo20&amp;quot;&amp;gt;{{cite web |url=https://www.theatlantic.com/family/archive/2020/03/convince-family-take-coronavirus-seriously/608356/ |title=What Do You Tell Someone Who Still Won’t Stay Home? |author=Pinsker, J. |work=The Atlantic |date=19 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;KeatingWhenThe20&amp;quot;&amp;gt;{{cite web |url=https://www.buzzfeednews.com/article/shannonkeating/coronavirus-social-distancing-self-isolation-quarantine |title=When The People You Love Can’t Accept That They Need To Stay Home |author=Keating, S. |work=BuzzFeed News |date=17 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JacksonPolice20&amp;quot;&amp;gt;{{cite web |url=https://www.cnn.com/2020/03/31/us/violating-coronavirus-orders-trnd/index.html |title=Police are arresting and fining people for violating social distancing orders |author=Jackson, A. |work=CNN |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;WFLA8Hawaii20&amp;quot;&amp;gt;{{cite web |url=https://www.wfla.com/community/health/coronavirus/hawaii-police-arrest-visiting-tampa-man-for-violating-14-day-quarantine/ |title=Hawaii police arrest visiting Tampa man for violating 14-day quarantine order |author=WFLA 8 On Your Side Staff |work=WFLA News Channel 8 |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, and presymptomatic (and asymptomatic) carriers are thus more prone to spreading the virus.&amp;lt;ref name=&amp;quot;MandavilliInfected20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/03/31/health/coronavirus-asymptomatic-transmission.html |title=Infected but Feeling Fine: The Unwitting Coronavirus Spreaders |author=Mandavilli, A. |work=The New York Times |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MockAsymptom20&amp;quot;&amp;gt;{{cite web |url=https://www.discovermagazine.com/health/asymptomatic-carriers-are-fueling-the-covid-19-pandemic-heres-why-you-dont |title=Asymptomatic Carriers Are Fueling the COVID-19 Pandemic. Here’s Why You Don’t Have to Feel Sick to Spread the Disease |author=Mock, J. |work=Discover |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Median incubation period'': According to research published in ''Annals of Internal Medicine'', the median (i.e., the central tendency, which is less skewed than average&amp;lt;ref name=&amp;quot;NRCSMedian&amp;quot;&amp;gt;{{cite web |url=https://www.wcc.nrcs.usda.gov/normals/median_average.htm |title=Median vs. Average to Describe Normal |author=National Water and Climate Center |publisher=U.S. Department of Agriculture |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;) incubation period is 5.1 days, with 97.5% of symptomatic carriers showing symptoms within 11.5 days. The authors found this to be compatible with U.S. government recommendations of monitored 14-day self-quarantines if individuals were at risk of exposure.&amp;lt;ref name=&amp;quot;LauerTheInc20&amp;quot;&amp;gt;{{cite journal |title=The Incubation Period of Coronavirus Disease 2019 (COVID-19) From Publicly Reported Confirmed Cases: Estimation and Application |journal=Annals of Internal Medicine |author=Lauer, S.A.; Grantz, K.H.; Bi, Q. et al. |year=2020 |doi=10.7326/M20-0504 |pmid=32150748 |pmc=PMC7081172}}&amp;lt;/ref&amp;gt; However, many people continue to not take self-quarantines and other forms of social distancing seriously&amp;lt;ref name=&amp;quot;PinskerWhatDo20&amp;quot;&amp;gt;{{cite web |url=https://www.theatlantic.com/family/archive/2020/03/convince-family-take-coronavirus-seriously/608356/ |title=What Do You Tell Someone Who Still Won’t Stay Home? |author=Pinsker, J. |work=The Atlantic |date=19 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;KeatingWhenThe20&amp;quot;&amp;gt;{{cite web |url=https://www.buzzfeednews.com/article/shannonkeating/coronavirus-social-distancing-self-isolation-quarantine |title=When The People You Love Can’t Accept That They Need To Stay Home |author=Keating, S. |work=BuzzFeed News |date=17 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JacksonPolice20&amp;quot;&amp;gt;{{cite web |url=https://www.cnn.com/2020/03/31/us/violating-coronavirus-orders-trnd/index.html |title=Police are arresting and fining people for violating social distancing orders |author=Jackson, A. |work=CNN |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;WFLA8Hawaii20&amp;quot;&amp;gt;{{cite web |url=https://www.wfla.com/community/health/coronavirus/hawaii-police-arrest-visiting-tampa-man-for-violating-14-day-quarantine/ |title=Hawaii police arrest visiting Tampa man for violating 14-day quarantine order |author=WFLA 8 On Your Side Staff |work=WFLA News Channel 8 |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, and presymptomatic (and asymptomatic) carriers are thus more prone to spreading the virus.&amp;lt;ref name=&amp;quot;MandavilliInfected20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/03/31/health/coronavirus-asymptomatic-transmission.html |title=Infected but Feeling Fine: The Unwitting Coronavirus Spreaders |author=Mandavilli, A. |work=The New York Times |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MockAsymptom20&amp;quot;&amp;gt;{{cite web |url=https://www.discovermagazine.com/health/asymptomatic-carriers-are-fueling-the-covid-19-pandemic-heres-why-you-dont |title=Asymptomatic Carriers Are Fueling the COVID-19 Pandemic. Here’s Why You Don’t Have to Feel Sick to Spread the Disease |author=Mock, J. |work=Discover |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Presymptomatic and asymptomatic virus shedding'': As mentioned in the previous point, carriers can be contagious during the presymptomatic phase of the disease, even while remaining symptom-free.&amp;lt;ref name=&amp;quot;MandavilliInfected20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MockAsymptom20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;YuenSARS20&amp;quot;&amp;gt;{{cite journal |title=SARS-CoV-2 and COVID-19: The most important research questions |journal=Cell &amp;amp; Bioscience |author=Yuen, K.-S.; Fung, S.-Y.; Chan, C.-P.; Jin, D.-Y. |volume=10 |at=40 |year=2020 |doi=10.1186/s13578-020-00404-4 |pmid=32190290 |pmc=PMC7074995}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DiamondAsympt20&amp;quot;&amp;gt;{{cite web |url=https://www.infectioncontroltoday.com/covid-19/asymptomatic-carriers-covid-19-make-it-tough-target |title=Asymptomatic Carriers of COVID-19 Make It Tough to Target |author=Diamond, F. |work=Infection Control Today |date=17 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; This contagion is a result of what's called [[viral shedding]], when the virus moves from cell to cell following successful reproduction. When the virus is in this state, it can be actively found in a carrier's body fluids, excrement, and other sources. Depending on the virus, the virus can then be introduced to another person via those sources. In the case of COVID-19, the route of transmission is still being studied&amp;lt;ref name=&amp;quot;JordanEnviron20&amp;quot;&amp;gt;{{cite web |url=https://news.stanford.edu/2020/03/26/understanding-spread-covid-19/ |title=Environmental engineers at Stanford discuss how to identify factors affecting COVID-19 transmission |author=Jordan, R. |work=Stanford News |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot;&amp;gt;{{cite web |url=https://www.npr.org/2020/03/28/823292062/who-reviews-available-evidence-on-coronavirus-transmission-through-air |title=WHO Reviews 'Current' Evidence On Coronavirus Transmission Through Air |author=Greenfieldboyce, N. |work=NPR |date=28 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, though water droplets (from sneezes, cough, talking, etc.) and potentially even aerosolized water droplets (water droplets from the body that have become fine spray or suspension in the air) are likely sources.&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot; /&amp;gt; This initial uncertainty of transmission routes, along with mixed messages early on about masks and their effectiveness for COVID-19&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;CSTEditorialIgnore31&amp;quot;&amp;gt;{{cite web |url&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;=https://chicago.suntimes.com/2020/3/31/21200144/coronavirus-covid-19-masks-wear-cdc-pritzker-trump-public-health-virus-face-cough-sneeze |title&lt;/del&gt;=https://chicago.suntimes.com/2020/3/31/21200144/coronavirus-covid-19-masks-wear-cdc-pritzker-trump-public-health-virus-face-cough-sneeze |title=Ignore the mixed messages and wear that mask |author=Chicago Sun Times Editorial Board |work=Chicago Sun Times |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MulhollandToMask20&amp;quot;&amp;gt;{{cite web |url=http://www.rfi.fr/en/international/20200329-to-mask-or-not-to-mask-mixed-messages-in-a-time-of-coronavirus-crisis-france-covid-19-spread-droplets |title=To mask or not to mask: mixed messages in a time of crisis |author=Mulholland, J. |work=RFI |date=29 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, makes social distancing an even stronger necessity to limit community transmission of the disease.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Presymptomatic and asymptomatic virus shedding'': As mentioned in the previous point, carriers can be contagious during the presymptomatic phase of the disease, even while remaining symptom-free.&amp;lt;ref name=&amp;quot;MandavilliInfected20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MockAsymptom20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;YuenSARS20&amp;quot;&amp;gt;{{cite journal |title=SARS-CoV-2 and COVID-19: The most important research questions |journal=Cell &amp;amp; Bioscience |author=Yuen, K.-S.; Fung, S.-Y.; Chan, C.-P.; Jin, D.-Y. |volume=10 |at=40 |year=2020 |doi=10.1186/s13578-020-00404-4 |pmid=32190290 |pmc=PMC7074995}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DiamondAsympt20&amp;quot;&amp;gt;{{cite web |url=https://www.infectioncontroltoday.com/covid-19/asymptomatic-carriers-covid-19-make-it-tough-target |title=Asymptomatic Carriers of COVID-19 Make It Tough to Target |author=Diamond, F. |work=Infection Control Today |date=17 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; This contagion is a result of what's called [[viral shedding]], when the virus moves from cell to cell following successful reproduction. When the virus is in this state, it can be actively found in a carrier's body fluids, excrement, and other sources. Depending on the virus, the virus can then be introduced to another person via those sources. In the case of COVID-19, the route of transmission is still being studied&amp;lt;ref name=&amp;quot;JordanEnviron20&amp;quot;&amp;gt;{{cite web |url=https://news.stanford.edu/2020/03/26/understanding-spread-covid-19/ |title=Environmental engineers at Stanford discuss how to identify factors affecting COVID-19 transmission |author=Jordan, R. |work=Stanford News |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot;&amp;gt;{{cite web |url=https://www.npr.org/2020/03/28/823292062/who-reviews-available-evidence-on-coronavirus-transmission-through-air |title=WHO Reviews 'Current' Evidence On Coronavirus Transmission Through Air |author=Greenfieldboyce, N. |work=NPR |date=28 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, though water droplets (from sneezes, cough, talking, etc.) and potentially even aerosolized water droplets (water droplets from the body that have become fine spray or suspension in the air) are likely sources.&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot; /&amp;gt; This initial uncertainty of transmission routes, along with mixed messages early on about masks and their effectiveness for COVID-19&amp;lt;ref name=&amp;quot;GreenfieldboyceWHO20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;CSTEditorialIgnore31&amp;quot;&amp;gt;{{cite web |url=https://chicago.suntimes.com/2020/3/31/21200144/coronavirus-covid-19-masks-wear-cdc-pritzker-trump-public-health-virus-face-cough-sneeze |title=Ignore the mixed messages and wear that mask |author=Chicago Sun Times Editorial Board |work=Chicago Sun Times |date=31 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MulhollandToMask20&amp;quot;&amp;gt;{{cite web |url=http://www.rfi.fr/en/international/20200329-to-mask-or-not-to-mask-mixed-messages-in-a-time-of-coronavirus-crisis-france-covid-19-spread-droplets |title=To mask or not to mask: mixed messages in a time of crisis |author=Mulholland, J. |work=RFI |date=29 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, makes social distancing an even stronger necessity to limit community transmission of the disease.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaning the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how the viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense against the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaning the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how the viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense against the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-39204:rev-39229 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39204&amp;oldid=prev</id>
		<title>Shawndouglas: /* 1. Overview of COVID-19 and its challenges */</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39204&amp;oldid=prev"/>
		<updated>2020-05-01T21:11:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;1. Overview of COVID-19 and its challenges&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:11, 1 May 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==1. Overview of COVID-19 and its challenges==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==1. Overview of COVID-19 and its challenges==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''Please note&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'&lt;/del&gt;'': Information during a pandemic changes, sometime rapidly, in regards to test methods, reported figures, and social situations. Efforts will be made to keep this guide up-to-date as best as possible given time constraints and resources.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;''Please note'': Information during a pandemic changes, sometime rapidly, in regards to test methods, reported figures, and social situations. Efforts will be made to keep this guide up-to-date as best as possible given time constraints and resources.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===1.1 COVID-19: The terminology===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===1.1 COVID-19: The terminology===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l41&quot;&gt;Line 41:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 41:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaning the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how the viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense against the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaning the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how the viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense against the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Cardiovascular issues'': Coronaviruses and their accompanying respiratory infections are known to complicate issues of the cardiovascular system, which in turn may &amp;quot;increase the incidence and severity&amp;quot; of infectious diseases such as SARS and COVID-19.&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot;&amp;gt;{{cite journal |title=Potential Effects of Coronaviruses on the Cardiovascular System |journal=JAMA Cardiology |author=Madjid, M.; Safavi-Naeini, P.; Solomon, S.D. |year=2020 |doi=10.1001/jamacardio.2020.1286 |pmid=32219363}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronaviruses and the cardiovascular system: acute and long-term implications |journal=European Heart Journal |author=Xiong, T.-Y.; Redwood, S.; Prendergast, B.; Chen, M. |at=ehaa231 |year=2020 |doi=10.1093/eurheartj/ehaa231 |pmid=32186331}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DrigginCardio20&amp;quot;&amp;gt;{{cite journal |title=Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the Coronavirus Disease 2019 (COVID-19) Pandemic |journal=Journal of the American College of Cardiology |author=Driggin, E.; Madhavan, M.V.; Bikdeli, B. et al. |year=2020 |doi=10.1016/j.jacc.2020.03.031 |pmid=32201335}}&amp;lt;/ref&amp;gt; While the exact cardiac effect COVID-19 has on patients is still unknown, suspicion is those with &amp;quot;hypertension, diabetes, and diagnosed cardiovascular disease&amp;quot; may be more prone to having cardiovascular complications from the disease.&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot;&amp;gt;{{cite web |url=https://www.the-hospitalist.org/hospitalist/article/219645/coronavirus-updates/cardiac-symptoms-can-be-first-sign-covid-19 |title=Cardiac symptoms can be first sign of COVID-19 |author=Otto, M.A. |work=The Hospitalist |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronavirus Disease 2019 (COVID-19) and Cardiovascular Disease |journal=Circulation |author=Clerkin, K.J.; Fried, J.A.; Raikhelkar, J. et al. |year=2020 |doi=10.1161/CIRCULATIONAHA.120.046941 |pmid=32200663}}&amp;lt;/ref&amp;gt; Current thinking is SARS-CoV-2 either attacks heart tissues, causing myocardial dysfunction, or inevitably causes heart failure through a &amp;quot;cytokine storm,&amp;quot;&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MehtaCOVID20&amp;quot;&amp;gt;{{cite journal |title=COVID-19: Consider cytokine storm syndromes and immunosuppression |journal=The Lancet |author=Mehta, P.; McAuley, D.F.; Brown, M. et al. |volume=395 |issue=10229 |pages=P1033–34 |year=2020 |doi=10.1016/S0140-6736(20)30628-0 |pmid=32192578}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/04/01/health/coronavirus-cytokine-storm-immune-system.html |title=The Coronavirus Patients Betrayed by Their Own Immune Systems |author=Mandavilli, A. |work=The New York Times |date=01 April 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, an overproduction of signaling molecules that promote inflammation by white blood cells (leukocytes).&amp;lt;ref name=&amp;quot;TisoncikInto12&amp;quot;&amp;gt;{{cite journal |title=Into the eye of the cytokine storm |journal=Microbiology and Molecular Biology Reviews |author=Tisoncik, J.R.; Korth, M.J.; Simmons, C.P. et al. |volume=76 |issue=1 |pages=16–32 |year=2012 |doi=10.1128/MMBR.05015-11 |pmid=22390970 |pmc=PMC3294426}}&amp;lt;/ref&amp;gt; What's scary is that like the 1918 Spanish flu, SARS, and other epidemics, some otherwise healthy patients' immune responses are entirely overreactive, leading to acute respiratory distress syndrome (ARDS) or heart failure.&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;BasilioANew20&amp;quot;&amp;gt;{{cite web |url=https://www.mdlinx.com/internal-medicine/article/6590 |title=A new potential risk of COVID-19: Sudden cardiac death |author=Basilio, P. |work=MDLinx |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Additionally, as the disease has progressed, medical professionals have noted abnormal amounts of blood clotting in infected patients, which may or may not be related to overreactive immune systems and underlying health conditions.&amp;lt;ref name=&amp;quot;RettnerMyster20&amp;quot;&amp;gt;{{cite web |url=https://www.livescience.com/coronavirus-blood-clots.html |title=Mysterious blood clots in COVID-19 patients have doctors alarmed |author=Rettner, R. |work=LiveScience |date=23 April 2020 |accessdate=28 April 2020}}&amp;lt;/ref&amp;gt; These uncertainties only add to the level of difficulty of properly treating COVID-19.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Cardiovascular issues'': Coronaviruses and their accompanying respiratory infections are known to complicate issues of the cardiovascular system, which in turn may &amp;quot;increase the incidence and severity&amp;quot; of infectious diseases such as SARS and COVID-19.&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot;&amp;gt;{{cite journal |title=Potential Effects of Coronaviruses on the Cardiovascular System |journal=JAMA Cardiology |author=Madjid, M.; Safavi-Naeini, P.; Solomon, S.D. |year=2020 |doi=10.1001/jamacardio.2020.1286 |pmid=32219363}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronaviruses and the cardiovascular system: acute and long-term implications |journal=European Heart Journal |author=Xiong, T.-Y.; Redwood, S.; Prendergast, B.; Chen, M. |at=ehaa231 |year=2020 |doi=10.1093/eurheartj/ehaa231 |pmid=32186331}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DrigginCardio20&amp;quot;&amp;gt;{{cite journal |title=Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the Coronavirus Disease 2019 (COVID-19) Pandemic |journal=Journal of the American College of Cardiology |author=Driggin, E.; Madhavan, M.V.; Bikdeli, B. et al. |year=2020 |doi=10.1016/j.jacc.2020.03.031 |pmid=32201335}}&amp;lt;/ref&amp;gt; While the exact cardiac effect COVID-19 has on patients is still unknown, suspicion is those with &amp;quot;hypertension, diabetes, and diagnosed cardiovascular disease&amp;quot; may be more prone to having cardiovascular complications from the disease.&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot;&amp;gt;{{cite web |url=https://www.the-hospitalist.org/hospitalist/article/219645/coronavirus-updates/cardiac-symptoms-can-be-first-sign-covid-19 |title=Cardiac symptoms can be first sign of COVID-19 |author=Otto, M.A. |work=The Hospitalist |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronavirus Disease 2019 (COVID-19) and Cardiovascular Disease |journal=Circulation |author=Clerkin, K.J.; Fried, J.A.; Raikhelkar, J. et al. |year=2020 |doi=10.1161/CIRCULATIONAHA.120.046941 |pmid=32200663}}&amp;lt;/ref&amp;gt; Current thinking is SARS-CoV-2 either attacks heart tissues, causing myocardial dysfunction, or inevitably causes heart failure through a &amp;quot;cytokine storm,&amp;quot;&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MehtaCOVID20&amp;quot;&amp;gt;{{cite journal |title=COVID-19: Consider cytokine storm syndromes and immunosuppression |journal=The Lancet |author=Mehta, P.; McAuley, D.F.; Brown, M. et al. |volume=395 |issue=10229 |pages=P1033–34 |year=2020 |doi=10.1016/S0140-6736(20)30628-0 |pmid=32192578}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/04/01/health/coronavirus-cytokine-storm-immune-system.html |title=The Coronavirus Patients Betrayed by Their Own Immune Systems |author=Mandavilli, A. |work=The New York Times |date=01 April 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, an overproduction of signaling molecules that promote inflammation by white blood cells (leukocytes).&amp;lt;ref name=&amp;quot;TisoncikInto12&amp;quot;&amp;gt;{{cite journal |title=Into the eye of the cytokine storm |journal=Microbiology and Molecular Biology Reviews |author=Tisoncik, J.R.; Korth, M.J.; Simmons, C.P. et al. |volume=76 |issue=1 |pages=16–32 |year=2012 |doi=10.1128/MMBR.05015-11 |pmid=22390970 |pmc=PMC3294426}}&amp;lt;/ref&amp;gt; What's scary is that like the 1918 Spanish flu, SARS, and other epidemics, some otherwise healthy patients' immune responses are entirely overreactive, leading to acute respiratory distress syndrome (ARDS) or heart failure.&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;BasilioANew20&amp;quot;&amp;gt;{{cite web |url=https://www.mdlinx.com/internal-medicine/article/6590 |title=A new potential risk of COVID-19: Sudden cardiac death |author=Basilio, P. |work=MDLinx |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Additionally, as the disease has progressed, medical professionals have noted abnormal amounts of blood clotting in infected patients, which may or may not be related to overreactive immune systems and underlying health conditions.&amp;lt;ref name=&amp;quot;RettnerMyster20&amp;quot;&amp;gt;{{cite web |url=https://www.livescience.com/coronavirus-blood-clots.html |title=Mysterious blood clots in COVID-19 patients have doctors alarmed |author=Rettner, R. |work=LiveScience |date=23 April 2020 |accessdate=28 April 2020}}&amp;lt;/ref&amp;gt; These uncertainties only add to the level of difficulty of properly treating COVID-19.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-39203:rev-39204 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39203&amp;oldid=prev</id>
		<title>Shawndouglas at 21:11, 1 May 2020</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39203&amp;oldid=prev"/>
		<updated>2020-05-01T21:11:04Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:11, 1 May 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==1. Overview of COVID-19 and its challenges==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==1. Overview of COVID-19 and its challenges==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;''Please note''': Information during a pandemic changes, sometime rapidly, in regards to test methods, reported figures, and social situations. Efforts will be made to keep this guide up-to-date as best as possible given time constraints and resources.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===1.1 COVID-19: The terminology===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===1.1 COVID-19: The terminology===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-39195:rev-39203 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39195&amp;oldid=prev</id>
		<title>Shawndouglas at 17:32, 1 May 2020</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39195&amp;oldid=prev"/>
		<updated>2020-05-01T17:32:21Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;amp;diff=39195&amp;amp;oldid=39169&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39169&amp;oldid=prev</id>
		<title>Shawndouglas at 22:29, 28 April 2020</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39169&amp;oldid=prev"/>
		<updated>2020-04-28T22:29:11Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;amp;diff=39169&amp;amp;oldid=39166&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39166&amp;oldid=prev</id>
		<title>Shawndouglas at 17:00, 28 April 2020</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=User:Shawndouglas/sandbox/sublevel32&amp;diff=39166&amp;oldid=prev"/>
		<updated>2020-04-28T17:00:39Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:00, 28 April 2020&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l41&quot;&gt;Line 41:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 41:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaining the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense aginst the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Understanding of high viral loads and infectious doses'': Respiratory diseases such as influenza, SARS, and MERS see a correlation between the infectious dose amount and the severity of disease symptoms, meaining the higher the infectious dose, the worse the symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot;&amp;gt;{{cite web |url=https://www.newscientist.com/article/2238819-does-a-high-viral-load-or-infectious-dose-make-covid-19-worse/ |title=Does a high viral load or infectious dose make covid-19 worse? |author=Geddes, L. |work=New Scientist |date=27 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; Similarly, viral load—a quantification of viral genomic fragments—also tends to correlate with clinical symptoms.&amp;lt;ref name=&amp;quot;HijanoClinical19&amp;quot;&amp;gt;{{cite journal |title=Clinical correlation of influenza and respiratory syncytial virus load measured by digital PCR |journal=PLoS One |author=Hijano, D.R.; Brazelton de Cardenas, J.; Maron, G. et al. |volume=14 |issue=9 |at=e0220908 |year=2019 |doi=10.1371/journal.pone.0220908 |pmid=31479459 |pmc=PMC6720028}}&amp;lt;/ref&amp;gt;  However, we are still in the investigative stages of determining if that similarly holds true to COVID-19.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;LiuViral20&amp;quot;&amp;gt;{{cite journal |title=Viral dynamics in mild and severe cases of COVID-19 |journal=The Lancet Infectious Diseases |author=Liu, Y.; Yan, L.-M.; Wan, L. et al. |year=2020 |doi=10.1016/S1473-3099(20)30232-2 |pmid=32199493}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;JoyntUnder20&amp;quot;&amp;gt;{{cite journal |title=Understanding COVID-19: what does viral RNA load really mean? |journal=The Lancet Infectious Diseases |author=Joynt, G.M.; Wu, W.K.K. |year=2020 |doi=10.1016/S1473-3099(20)30237-1}}&amp;lt;/ref&amp;gt; Early research seem to indicate, for example, there is little difference between the viral load of those with mild or no COVID-19 symptoms and those with more severe symptoms.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt; More research must be performed to better understand how viral load infectious dose plays a role in transmission. Given these unknowns, social distancing, wearing masks, and other means of minimizing exposure remain the best defense aginst the disease.&amp;lt;ref name=&amp;quot;GeddesDoesA20&amp;quot; /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Cardiovascular issues'': Coronaviruses and their accompanying respiratory infections are known to complicate issues of the cardiovascular system, which in turn may &amp;quot;increase the incidence and severity&amp;quot; of infectious diseases such as SARS and COVID-19.&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot;&amp;gt;{{cite journal |title=Potential Effects of Coronaviruses on the Cardiovascular System |journal=JAMA Cardiology |author=Madjid, M.; Safavi-Naeini, P.; Solomon, S.D. |year=2020 |doi=10.1001/jamacardio.2020.1286 |pmid=32219363}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronaviruses and the cardiovascular system: acute and long-term implications |journal=European Heart Journal |author=Xiong, T.-Y.; Redwood, S.; Prendergast, B.; Chen, M. |at=ehaa231 |year=2020 |doi=10.1093/eurheartj/ehaa231 |pmid=32186331}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DrigginCardio20&amp;quot;&amp;gt;{{cite journal |title=Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the Coronavirus Disease 2019 (COVID-19) Pandemic |journal=Journal of the American College of Cardiology |author=Driggin, E.; Madhavan, M.V.; Bikdeli, B. et al. |year=2020 |doi=10.1016/j.jacc.2020.03.031 |pmid=32201335}}&amp;lt;/ref&amp;gt; While the exact cardiac effect COVID-19 has on patients is still unknown, suspicion is those with &amp;quot;hypertension, diabetes, and diagnosed cardiovascular disease&amp;quot; may be more prone to having cardiovascular complications from the disease.&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot;&amp;gt;{{cite web |url=https://www.the-hospitalist.org/hospitalist/article/219645/coronavirus-updates/cardiac-symptoms-can-be-first-sign-covid-19 |title=Cardiac symptoms can be first sign of COVID-19 |author=Otto, M.A. |work=The Hospitalist |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronavirus Disease 2019 (COVID-19) and Cardiovascular Disease |journal=Circulation |author=Clerkin, K.J.; Fried, J.A.; Raikhelkar, J. et al. |year=2020 |doi=10.1161/CIRCULATIONAHA.120.046941 |pmid=32200663}}&amp;lt;/ref&amp;gt; Current thinking is SARS-CoV-2 either attacks heart tissues, causing myocardial dysfunction, or inevitably causes heart failure through a &amp;quot;cytokine storm,&amp;quot;&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MehtaCOVID20&amp;quot;&amp;gt;{{cite journal |title=COVID-19: Consider cytokine storm syndromes and immunosuppression |journal=The Lancet |author=Mehta, P.; McAuley, D.F.; Brown, M. et al. |volume=395 |issue=10229 |pages=P1033–34 |year=2020 |doi=10.1016/S0140-6736(20)30628-0 |pmid=32192578}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/04/01/health/coronavirus-cytokine-storm-immune-system.html |title=The Coronavirus Patients Betrayed by Their Own Immune Systems |author=Mandavilli, A. |work=The New York Times |date=01 April 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, an overproduction of signaling molecules that promote inflammation by white blood cells (leukocytes).&amp;lt;ref name=&amp;quot;TisoncikInto12&amp;quot;&amp;gt;{{cite journal |title=Into the eye of the cytokine storm |journal=Microbiology and Molecular Biology Reviews |author=Tisoncik, J.R.; Korth, M.J.; Simmons, C.P. et al. |volume=76 |issue=1 |pages=16–32 |year=2012 |doi=10.1128/MMBR.05015-11 |pmid=22390970 |pmc=PMC3294426}}&amp;lt;/ref&amp;gt; What's scary is that like the 1918 Spanish flu, SARS, and other epidemics, some otherwise healthy patients' immune responses are entirely overreactive, leading to acute respiratory distress syndrome (ARDS) or heart failure.&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;BasilioANew20&amp;quot;&amp;gt;{{cite web |url=https://www.mdlinx.com/internal-medicine/article/6590 |title=A new potential risk of COVID-19: Sudden cardiac death |author=Basilio, P. |work=MDLinx |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Overreactive &lt;/del&gt;immune systems and &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;other inherent&lt;/del&gt;, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;sometimes hidden or undiagnosed conditions that may lead to cardiovascular disruption &lt;/del&gt;only add to the level of difficulty of properly treating COVID-19.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ''Cardiovascular issues'': Coronaviruses and their accompanying respiratory infections are known to complicate issues of the cardiovascular system, which in turn may &amp;quot;increase the incidence and severity&amp;quot; of infectious diseases such as SARS and COVID-19.&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot;&amp;gt;{{cite journal |title=Potential Effects of Coronaviruses on the Cardiovascular System |journal=JAMA Cardiology |author=Madjid, M.; Safavi-Naeini, P.; Solomon, S.D. |year=2020 |doi=10.1001/jamacardio.2020.1286 |pmid=32219363}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronaviruses and the cardiovascular system: acute and long-term implications |journal=European Heart Journal |author=Xiong, T.-Y.; Redwood, S.; Prendergast, B.; Chen, M. |at=ehaa231 |year=2020 |doi=10.1093/eurheartj/ehaa231 |pmid=32186331}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;DrigginCardio20&amp;quot;&amp;gt;{{cite journal |title=Cardiovascular Considerations for Patients, Health Care Workers, and Health Systems During the Coronavirus Disease 2019 (COVID-19) Pandemic |journal=Journal of the American College of Cardiology |author=Driggin, E.; Madhavan, M.V.; Bikdeli, B. et al. |year=2020 |doi=10.1016/j.jacc.2020.03.031 |pmid=32201335}}&amp;lt;/ref&amp;gt; While the exact cardiac effect COVID-19 has on patients is still unknown, suspicion is those with &amp;quot;hypertension, diabetes, and diagnosed cardiovascular disease&amp;quot; may be more prone to having cardiovascular complications from the disease.&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot;&amp;gt;{{cite web |url=https://www.the-hospitalist.org/hospitalist/article/219645/coronavirus-updates/cardiac-symptoms-can-be-first-sign-covid-19 |title=Cardiac symptoms can be first sign of COVID-19 |author=Otto, M.A. |work=The Hospitalist |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot;&amp;gt;{{cite journal |title=Coronavirus Disease 2019 (COVID-19) and Cardiovascular Disease |journal=Circulation |author=Clerkin, K.J.; Fried, J.A.; Raikhelkar, J. et al. |year=2020 |doi=10.1161/CIRCULATIONAHA.120.046941 |pmid=32200663}}&amp;lt;/ref&amp;gt; Current thinking is SARS-CoV-2 either attacks heart tissues, causing myocardial dysfunction, or inevitably causes heart failure through a &amp;quot;cytokine storm,&amp;quot;&amp;lt;ref name=&amp;quot;MadjidPotent20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;XiongCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;OttoCardiac20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;ClerkinCorona20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;MehtaCOVID20&amp;quot;&amp;gt;{{cite journal |title=COVID-19: Consider cytokine storm syndromes and immunosuppression |journal=The Lancet |author=Mehta, P.; McAuley, D.F.; Brown, M. et al. |volume=395 |issue=10229 |pages=P1033–34 |year=2020 |doi=10.1016/S0140-6736(20)30628-0 |pmid=32192578}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot;&amp;gt;{{cite web |url=https://www.nytimes.com/2020/04/01/health/coronavirus-cytokine-storm-immune-system.html |title=The Coronavirus Patients Betrayed by Their Own Immune Systems |author=Mandavilli, A. |work=The New York Times |date=01 April 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt;, an overproduction of signaling molecules that promote inflammation by white blood cells (leukocytes).&amp;lt;ref name=&amp;quot;TisoncikInto12&amp;quot;&amp;gt;{{cite journal |title=Into the eye of the cytokine storm |journal=Microbiology and Molecular Biology Reviews |author=Tisoncik, J.R.; Korth, M.J.; Simmons, C.P. et al. |volume=76 |issue=1 |pages=16–32 |year=2012 |doi=10.1128/MMBR.05015-11 |pmid=22390970 |pmc=PMC3294426}}&amp;lt;/ref&amp;gt; What's scary is that like the 1918 Spanish flu, SARS, and other epidemics, some otherwise healthy patients' immune responses are entirely overreactive, leading to acute respiratory distress syndrome (ARDS) or heart failure.&amp;lt;ref name=&amp;quot;MandavilliTheCoronaCyto20&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;BasilioANew20&amp;quot;&amp;gt;{{cite web |url=https://www.mdlinx.com/internal-medicine/article/6590 |title=A new potential risk of COVID-19: Sudden cardiac death |author=Basilio, P. |work=MDLinx |date=26 March 2020 |accessdate=01 April 2020}}&amp;lt;/ref&amp;gt; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Additionally, as the disease has progressed, medical professionals have noted abnormal amounts of blood clotting in infected patients, which may or may not be related to overreactive &lt;/ins&gt;immune systems and &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;underlying health conditions.&amp;lt;ref name=&amp;quot;RettnerMyster20&amp;quot;&amp;gt;{{cite web |url=https://www.livescience.com/coronavirus-blood-clots.html |title=Mysterious blood clots in COVID-19 patients have doctors alarmed |author=Rettner&lt;/ins&gt;, &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;R. |work=LiveScience |date=23 April 2020 |accessdate=28 April 2020}}&amp;lt;/ref&amp;gt; These uncertainties &lt;/ins&gt;only add to the level of difficulty of properly treating COVID-19.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==References==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Reflist|colwidth=30em}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key limswiki:diff::1.12:old-39165:rev-39166 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shawndouglas</name></author>
	</entry>
</feed>