Search results for "pilvi"
showing 10 items of 77 documents
Johdatus pilvipelaamiseen
2012
Rantonen, Kimmo Johdatus pilvipelaamiseen Jyväskylä: Jyväskylän yliopisto, 2012, 23 s. Tietojärjestelmätiede, kandidaatintutkielma Ohjaaja(t): Ojala, Arto Tässä tutkielmassa perehdyttiin pilvipelaamisen ilmiöön. Tutkielman keskeisi-nä tavoitteina oli selvittää, mitä pilvipelaaminen tarkoittaa, mitkä ovat sen taus-tat ja mitä hyötyjä pilvipelaamiseen liittyy. Tutkielmassa pyrittiin myös tarkas-telemaan, miten pilvipelaaminen näkyy liiketoiminnassa tällä hetkellä. Lopuksi pohdittiin, miltä pilvipelaamisen tulevaisuus näyttää. Pilvipelaamisessa on kyse pilvilaskennan soveltamisesta videopeleihin. Pilvilaskennalla viitataan sovelluksiin, joita tarjotaan käyttäjille internetin väli-tyksellä data…
Value Creation and Power Asymmetries in Digital Ecosystems : A Study of a Cloud Gaming Provider
2020
Digital platforms connecting users and service providers have a central role in determining the value creation structure of ecosystems. Platform developers try to achieve a dominant position for the platform with a strong ecosystem around it. The size and attractiveness of the services can attract new users, and growing user volume can bring new co-operative service providers to the service partner network. An interesting question is how the presence of power and potential power asymmetry affect the value creation capability and the structure of a network around a platform? This chapter describes an example of value creation and the influence of power asymmetry in a digital ecosystem built …
Agile logic for SaaS implementation: Capitalizing on marketing automation software in a start-up
2022
The emergence of Software-as-a-Service (SaaS) has facilitated agile technology implementation that focuses on iterative adaptations via learning by doing rather than the realization of a predesigned implementation plan. This study conceptualizes such an agile approach and explicates its operationalization via a four-year qualitative case study of a business-to-business (B2B) start-up firm’s implementation of a HubSpot marketing automation (MA) SaaS. The study shows how agile implementation continuously introduces adaptations to SaaS features and organizational routines for improving their mutual fit given the organization’s goals. The study also contributes to theory by offering a novel fra…
Dynamic aspects of industrial middleware architectures
2011
Vendor lock-in problem in cloud storage
2015
Pilvitallennuspalvelut tuovat datan tallentamiseen ennennäkemättömiä etuja ja niiden hyödyntäminen on, sekä yksittäisillä kuluttajilla, että yrityksillä, yleistymässä. Teknologiassa on kuitenkin vielä ongelmia ilman ratkaisua. Turvallisuus-, sekä yksityisyysseikat ovat tunnetuimpia, ja niitä on tutkittu laajalti. Vähemmälle huomiolle on jäänyt, kuinka vaikeaa on palveluntarjoajan vaihtaminen. Palveluntarjoajan vaihtaminen aiheuttaa aina kustannuksia asiakkaalle. Tilannetta, jossa vaihtokustannukset ovat niin suuret, että ne estävät palveluntarjoajan vaihtamisen, kuvataan termillä "vendor lock-in" (toimittajaloukku). Tämän kandidaatintutkielman tavoitteena on kirjallisuuskatsauksen perusteel…
Financial aspects of business models : reducing costs and increasing revenues in a cloud context
2018
The emergence of cloud computing induces opportunities for software vendors and for organizations with great storage needs. Indeed, software companies have begun to adopt cloud technologies and offer their software as a service to customers instead of selling software products. As a result, their revenue models have changed, and the diversity and complexity of the resulting pricing models have created both opportunities and impediments to competition in the market. On the other hand, due to the exponentially growing volume of digital content, organizations have an increasing demand for storage and need to choose between private, public, and hybrid storage solutions. This decision requires c…
Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives
2015
A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security prob…
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Collaborative Mobile Clouds: An Energy Efficient Paradigm for Content Sharing
2018
On the way toward enabling efficient content distribution, reducing energy consumption and prolonging battery life of mobile equipment, an emerging paradigm, i.e., mobile cloud, which is based on content distribution, was proposed. As a mobile platform that is oriented toward content distribution, mobile cloud is also foreseen as an energy-efficient solution for future wireless networks. The benefits of using CMC for content distribution or distributed computing from social networking perspectives have been studied earlier. In this article, we first present the concepts of CMC and then discuss the energy-efficiency benefits from the system-level point-of-view as well as open challenges in d…