Search results for "cloud computing."
showing 10 items of 325 documents
Agile logic for SaaS implementation: Capitalizing on marketing automation software in a start-up
2022
The emergence of Software-as-a-Service (SaaS) has facilitated agile technology implementation that focuses on iterative adaptations via learning by doing rather than the realization of a predesigned implementation plan. This study conceptualizes such an agile approach and explicates its operationalization via a four-year qualitative case study of a business-to-business (B2B) start-up firm’s implementation of a HubSpot marketing automation (MA) SaaS. The study shows how agile implementation continuously introduces adaptations to SaaS features and organizational routines for improving their mutual fit given the organization’s goals. The study also contributes to theory by offering a novel fra…
Incentive Mechanism for Edge-Computing-Based Blockchain
2020
Blockchain has been gradually applied to different Internet of Things (IoT) platforms. As the efficiency of the blockchain mainly depends on the network computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, we focus on investigating incentive mechanism for rational miners to purchase the computational resources. A edge computing-based blockchain network is considered, where the edge service provider (ESP) can provide computational resources for the miners. Accordingly, we formulate a two-stage Stackelberg game between the miners and ESP. The aim is to investigate Stackelberg equilibriu…
Integration of cloud computing tools and knowledge bodies for the management of programming projects
2018
A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
Experimental BIM applications in Archaeology: a work-flow
2014
In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…
Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures
2015
Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…
Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
2012
The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in foreseeable future reaching 8ZB already by 2015. Traditionally, in order to cope with the growing demand for storage capacity, organizations proactively built and managed their private storage facilities. Recently, with the proliferation of public cloud infrastructure offerings, many organizations, instead, welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services. The comparative cost-efficiency of these two alternatives depends on a number of factors, among which are e.g. the prices of the public…
AI-enabled adaptive learning systems: A systematic mapping of the literature
2021
Abstract Mobile internet, cloud computing, big data technologies, and significant breakthroughs in Artificial Intelligence (AI) have all transformed education. In recent years, there has been an emergence of more advanced AI-enabled learning systems, which are gaining traction due to their ability to deliver learning content and adapt to the individual needs of students. Yet, even though these contemporary learning systems are useful educational platforms that meet students’ needs, there is still a low number of implemented systems designed to address the concerns and problems faced by many students. Based on this perspective, a systematic mapping of the literature on AI-enabled adaptive le…
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
2017
With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…
123D Catch: efficiency, accuracy, constraints and limitations in architectural heritage field
2013
Today, the accurate and detailed reconstruction of geometric models of real objects has become a common process. The diffusion of Image-based 3D modeling techniques, through image-based free, low cost and open source software, have increased drastically in the past few years, especially in the sector of Cultural Heritage (Architecture, Archeology, Urban planning). Nevertheless, web based software (ARC3D, 123D Catch, Hyp3D, my3Dscanner) offer another opportunity respect the desktop systems: they use the power of cloud computing to carry out a semi-automatic data processing. In this way is overcome the considerably slowing-down of the computer of hardware-heavy approaches. Our research inves…