The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile is replacing the existing portable devices such as notebook, laptops for execution of digital applications such as internet cloud and grid processing. As the mobile device is also become smart and portable, they are also taking place of desktop and laptop for application software. As mobile device are smaller and lighter with low power operation, became more popular as they reduced cost of...
Mobile devices are already included in cloud domain which increases the utilization of cloud apps & services. As the mobile operators offers internal service over mobile network user easily set connected to the cloud. Due to availability of cloud more and more applications are deployed on mobile such as email, e-health, social networking apps etc. Due to 24x7 availability of network to mobile...
The deployment and use of Radio Frequency Identification (RFID) technology is growing rapidly across many different industries. Developers apply the technology not only in traditional applications such as asset or inventory tracking, but also in security services such as electronic passports and RFID-embedded credit cards. Within less than a decade, a large number of research papers dealing with security...
Along with wide applications of the powerful MCU in the control fields, the fault-tolerant control system has developed quickly. In some specific occasions, very high security, dependability and usability of the system must be needed, such as in Aero-Space, military, railway, petroleum, chemical industry, electricity and some the important departments and computer control systems working under the...
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. Securing our digital...
Multi-tenant applications are usually cloud based software services which can serve different users at the same time. This is done using single instance of applications by sharing hardware, infrastructure, data storage and virtualization. To achieve multi tenancy different approaches are there at every layer (Application, Data, hardware). Software-as-as-Service (SaaS) is a new approach for developing...
Multi-tenant applications are usually cloud based software services which can serve different users at the same time. This is done using single instance of applications by sharing hardware, infrastructure, data storage and virtualization. To achieve multi tenancy different approaches are there at every layer (Application, Data, hardware). Software-as-as-Service (SaaS) is a new approach for developing...
In recent years, the number of wireless sensor network deployments for real life applications has rapidly increased. Still, the energy problem remains one of the major barriers somehow preventing the complete exploitation of this technology. Sensor nodes are typically powered by batteries with a limited lifetime and, even when additional energy can be harvested from the external environment (e.g.,...
Wireless Sensor Networks (WSNs) need effective security mechanisms because these networks deployed in hostel unattended environments. Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless...
Designing storage architectures for emerging data-intensive applications presents several challenges and opportunities. Tackling these problems requires a combination of architectural optimizations to the storage devices and layers of the memory/storage hierarchy as well as hardware/software techniques to manage the flow of data between the cores and storage. As we move deeper into an era in which...
Software is absolutely necessary in today's business world, where softwares help us in many different ways. For many years, companies have run software with the help of their own infrastructures. In recent years, many companies not prefer to buy traditional software packages, as most of them have migrated to the Software as a service, or ‘SaaS’ business model. As more companies now prefer SaaS, ISVs...
Deploying cloud computing in an enterprise infrastructure brings significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before...
Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing...
The concept of cloud computing is a very vast concept which is very efficient and effective security services. The cloud computing methodology is a conceptual based technology which is used widely now a day. But in data privacy protection and data retrieval control is one of the most challenging research work in cloud computing, because of users secrete data which is to be stored by user. An enterprise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.