Search results for "cloud computing."

showing 10 items of 325 documents

Agile logic for SaaS implementation: Capitalizing on marketing automation software in a start-up

2022

The emergence of Software-as-a-Service (SaaS) has facilitated agile technology implementation that focuses on iterative adaptations via learning by doing rather than the realization of a predesigned implementation plan. This study conceptualizes such an agile approach and explicates its operationalization via a four-year qualitative case study of a business-to-business (B2B) start-up firm’s implementation of a HubSpot marketing automation (MA) SaaS. The study shows how agile implementation continuously introduces adaptations to SaaS features and organizational routines for improving their mutual fit given the organization’s goals. The study also contributes to theory by offering a novel fra…

agile methodologiesmarketing automationSoftware-as-a-serviceketterät menetelmätMarketingpilvipalvelutmarkkinointicloud computingSMESaaS-palveluttechnology adoptionpienet ja keskisuuret yrityksetdigitaalinen markkinointiJournal of Business Research
researchProduct

Incentive Mechanism for Edge-Computing-Based Blockchain

2020

Blockchain has been gradually applied to different Internet of Things (IoT) platforms. As the efficiency of the blockchain mainly depends on the network computing capability, how to make sure the acquisition of the computational resources and participation of the devices would be the driving force. In this work, we focus on investigating incentive mechanism for rational miners to purchase the computational resources. A edge computing-based blockchain network is considered, where the edge service provider (ESP) can provide computational resources for the miners. Accordingly, we formulate a two-stage Stackelberg game between the miners and ESP. The aim is to investigate Stackelberg equilibriu…

blockchainBlockchainComputer scienceDistributed computingCloud computing02 engineering and technologymininglohkoketjutNash equilibriumcomputingoptimointiOrder (exchange)hash power0202 electrical engineering electronic engineering information engineeringStackelberg competitionpeliteoriaElectrical and Electronic EngineeringEdge computingrewardreportingbusiness.industry020208 electrical & electronic engineeringService provideroptimal incentiveComputer Science ApplicationsIncentiveControl and Systems EngineeringEnhanced Data Rates for GSM EvolutiontiedonlouhintabusinessInformation Systems
researchProduct

Integration of cloud computing tools and knowledge bodies for the management of programming projects

2018

A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…

business.industryComputer scienceBest practiceSoftware developmentInformation technology020207 software engineeringCloud computingContext (language use)02 engineering and technologyBody of knowledgeProduct (business)Engineering management0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessSoftware project management2018 13th Iberian Conference on Information Systems and Technologies (CISTI)
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Experimental BIM applications in Archaeology: a work-flow

2014

In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…

business.industryComputer scienceCloud computingcomputer.software_genreArchaeologyBIM Archaeology Semantic modelling Data export Web documentationField (computer science)Domain (software engineering)Cultural heritageBuilding information modelingRelational database management systemWork flowbusinesscomputerDatabase model
researchProduct

Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures

2015

Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…

business.industryComputer scienceController (computing)Distributed computingFloodlight020206 networking & telecommunicationsCloud computing02 engineering and technologycomputer.software_genreNetwork traffic controlVirtual machineCloud testing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArchitecturebusinessSoftware-defined networkingcomputerComputer network2015 23rd International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
researchProduct

Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage

2012

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in foreseeable future reaching 8ZB already by 2015. Traditionally, in order to cope with the growing demand for storage capacity, organizations proactively built and managed their private storage facilities. Recently, with the proliferation of public cloud infrastructure offerings, many organizations, instead, welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services. The comparative cost-efficiency of these two alternatives depends on a number of factors, among which are e.g. the prices of the public…

business.industryComputer scienceDigital contentmedia_common.quotation_subjectcost modelCloud computingProvisioningEnvironmental economicsInformation repositoryComputer securitycomputer.software_genreOutsourcingstorage servicesService (economics)Converged storageacquisition intervalbusinessCloud storagecomputerverkkotallennusmedia_common2012 IEEE Fifth International Conference on Cloud Computing
researchProduct

AI-enabled adaptive learning systems: A systematic mapping of the literature

2021

Abstract Mobile internet, cloud computing, big data technologies, and significant breakthroughs in Artificial Intelligence (AI) have all transformed education. In recent years, there has been an emergence of more advanced AI-enabled learning systems, which are gaining traction due to their ability to deliver learning content and adapt to the individual needs of students. Yet, even though these contemporary learning systems are useful educational platforms that meet students’ needs, there is still a low number of implemented systems designed to address the concerns and problems faced by many students. Based on this perspective, a systematic mapping of the literature on AI-enabled adaptive le…

business.industryComputer sciencePerspective (graphical)Big dataPsychological interventionCloud computingQA75.5-76.95Data scienceComputer Science ApplicationsEducationVisualizationIdentification (information)Artificial IntelligenceAIElectronic computers. Computer scienceAI-Enabled learning systemsAdaptive learningSystematic mappingbusinessAdaptive learning systemsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

123D Catch: efficiency, accuracy, constraints and limitations in architectural heritage field

2013

Today, the accurate and detailed reconstruction of geometric models of real objects has become a common process. The diffusion of Image-based 3D modeling techniques, through image-based free, low cost and open source software, have increased drastically in the past few years, especially in the sector of Cultural Heritage (Architecture, Archeology, Urban planning). Nevertheless, web based software (ARC3D, 123D Catch, Hyp3D, my3Dscanner) offer another opportunity respect the desktop systems: they use the power of cloud computing to carry out a semi-automatic data processing. In this way is overcome the considerably slowing-down of the computer of hardware-heavy approaches. Our research inves…

business.industryComputer scienceProcess (engineering)Cloud computingImage-based modeling 3D reconstruction Photogrammetry Computer Vision Architectural Heritage3D modelingIndustrial engineeringField (computer science)Cultural heritagePhotogrammetryUrban planningImage-based modelingSettore ICAR/17 - DisegnoArchitecturebusinessSimulation
researchProduct