Search results:
Found 25
Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
This book therefore proposes a new philosophy of Grid usage: provide virtual computing environments for Grid users. The new methodology could solve the problems currently encountered by Grid computing. It supports desired computing environments for users, which provide customized hardware/software configuration, QoS assurance and manageable functionality. This philosophy also liberates resource providers from the various onerous tasks of resource management.
Choose an application
Small and Medium size Companies (SME) are facing threats on a daily basis. Even if 94% of German SMEs are regularly backing up their data, only 50% use a different datacenter provider for protecting critical business processes with a disaster recovery system. The goal of this thesis is it to describe a new method for providing a disaster recovery system within the Cloud.
Choose an application
This book documents the findings and recommendations of research into the question of how IT laws should develop on the understanding that today’s information and communication technology is shaped by cloud computing, which lies at the foundations of contemporary and future IT as its most widespread enabler. In particular, this study develops on both a comparative and an interdisciplinary axis, i.e. comparatively by examining EU and US law, and on an interdisciplinary level by dealing with law and IT. Focusing on the study of data protection and privacy in cloud environments, the book examines three main challenges on the road towards more efficient cloud computing regulation: understanding the reasons behind the development of diverging legal structures and schools of thought on IT law; ensuring privacy and security in digital clouds; converging regulatory approaches to digital clouds in the hope of more harmonised IT laws in the future.Der Band dokumentiert die Ergebnisse und Empfehlungen einer Analyse zur Frage, wie sich IT-Gesetze entwickeln sollten, unter der Prämisse, dass die heutige und zukünftige Informations- und Kommunikationstechnologie durch Cloud Computing geprägt ist. Insbesondere entwickelt sich diese Untersuchung auf einer vergleichenden und einer interdisziplinären Achse, d.h. als Rechtsvergleich zwischen EU und US-Recht und interdisziplinär zwischen Recht und IT. Die Arbeit konzentriert sich auf den Schwerpunkt vom Datenschutz und Datensicherheit in Cloud-Umgebungen und analysiert drei Hauptherausforderungen auf dem Weg zu einer effizienteren Cloud-Computing-Regulierung: Verständnis der Gründe für die Entwicklung divergierender Rechtsordnungen und Denkschulen zum IT-Recht; Gewährleistung der Privatsphäre und Datenschutz in der Cloud; konvergierende Regulierungsansätze für die Cloud in der Hoffnung auf eine harmonisierte Landschaft von IT-Gesetzen in der Zukunft.
Choose an application
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.
Choose an application
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
anomaly detection --- artificial intelligence --- cloud computing --- data security --- cyber crime --- internet --- network security --- wireless --- web
Choose an application
research agenda for e-Government. When e-Government was first conceived, it was designed upon basic technologies where the emphasis was only on the simple display of government information for citizens to read. Nowadays, e-Government design comprises many complicated modules such as upload and download consoles, two-way interaction consoles between citizens and government agents, integrated government business processes presenting the whole of government, and it does not depend solely on technology. The complexity of e-Government has now evolved to include political, cultural, economic, social and technical dimensions. Bringing all these difficult aspects together is so complicated that it needs carefully planned strategies informed by local contextual characteristics. Rather than giving formulaic definitions and conceptual standpoints on many aspects of e-Government, as is the case in many e-Government publications, this book will explore the frontiers of global knowledge value chains by discussing current and future dimensions of e-Government. For example, the book discusses the concept of data governance by exploring how actual opening up of government data can be achieved, especially in a developing world context. Further, the book posits that opening government data should be followed by the opening up of government business processes in order to peddle the concept of accountability and responsiveness. Much text on data governance has concentrated on articulating the basic definitions surrounding this concept. Another very important topic explored in this book is regarding how the concept of decolonisation can be extended to e-Government by providing practical examples as to how researchers in the developing world can contribute to the advancement of e-Government as a scientific field of enquiry and guide its implementation, thereof. Decolonisation is advocated for in e-Government research so that there is a balance in the inclusion of the Afrocentric knowledge into e-Government advancement other than over-reliance on the Euro-, Asia- and America-centric knowledge value chains (Mbembe 2015). As e-Government is a very expensive undertaking, the issue of funding has excluded African countries and a majority of the developing world from implementing e-Government. Despite funding being a critical cornerstone of e-Government development, there is a dearth of information on this topic. Therefore, this book provides a chapter which discusses traditional and innovative ways of funding e-Government design and implementation which can go a long way in improving e-Government penetration into the developing world. Further, the book explores how intelligent e-Government applications can be designed, especially in resource-constrained countries. A couple of emerging technology innovations such as fog computing and intelligent information technology are explored within the realm of e-Government design.
Applications --- business --- cloud computing --- communication --- context --- corruption --- data --- developing countries --- e-Government --- impact --- socio-economic --- technology
Choose an application
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Cloud computing provides a cheap source of such computing framework for large volume of data for real-time applications. It is, therefore, not surprising to see that cloud computing has become a buzzword in the computing fraternity over the last decade. This book presents some critical applications in cloud frameworks along with some innovation design of algorithms and architecture for deployment in cloud environment. It is a valuable source of knowledge for researchers, engineers, practitioners, and graduate and doctoral students working in the field of cloud computing. It will also be useful for faculty members of graduate schools and universities.
Choose an application
In the era of the Internet of Things and Big Data, Cloud Computing has recently emerged as one of the latest buzzwords in the computing industry. It is the latest evolution of computing, where IT recourses are offered as services. Cloud computing provides on-demand, scalable, device-independent, and reliable services to its users. The exponential growth of digital data bundled with the needs of analysis, processing and storage, and cloud computing has paved the way for a cheap, secure, and omnipresent computing framework allowing for the delivery of enormous computing and storage capacity to a diverse community of end-recipients. Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. The term cloud is often used as a metaphor for the Internet and can be defined as a new type of utility computing that basically uses servers that have been made available to third parties via the Internet.
Choose an application
The analyses and results included in the technical assessment complement the third main study "The German Labour Market in 2030 - Economy and Labour Market in the Digital Age - Forecast 2016" (Original title: Arbeitsmarkt 2030 - Wirtschaft und Arbeitsmarkt im digitalen Zeitalter; Prognose 2016). The authors examine the implications of digitalisation on today's work by means of different individual assessments, taking into account economic, sociological and organisational aspects. Moreover, they provide an overview of existing or planned measures to support digitalisation.
Sociology --- Bildungsstudie --- Bundesministerium für Wirtschaft und Energie --- Cloud computing --- Deutschland --- Digitalisierung --- Informations- und Kommunikationstechnik --- Informationstechnik
Choose an application
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments.The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
Computer Systems Organization and Communication Networks --- Information Systems and Communication Service --- Artificial Intelligence (incl. Robotics) --- Simulation and Modeling --- anomaly detection, anti-fragility, cloud computing, complex adaptive systems, DevOps (Development and Operation), diversity, loose coupling
Listing 1 - 10 of 25 | << page >> |
Sort by
|