The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growing importance of huge amount of data and the data analysis for business agility has prophesied managerial decisions to ensure data security and disaster recovery options. This growing dependency has triggered extensive storage of data and development of ‘high availability’ databases. One of the prevalent practices in the industry is to provide for a data center (DC) where the on-going service...
Due to the development of Geographic Information Systems (GIS), tasks that relied on extensive ranges of time and resources they have been simplified. At present, there are a variety of alternative SIG, hampering the decision making when choosing a suitable GIS for a specific project. Therefore, in this paper a framework that supports decision-making in the selection of GIS in an organization of any...
Cloud computing is an emerging technology that over the internet provides services such as computing infrastructure, network services, applications, business processes, etc. The biggest concern is the security in the cloud computing. Since many solutions provided to secure cloud but since have identified cloud security requirements sporadically and confine could not improve cloud security problems...
Microfinance as a financial institution to fight poverty in rural areas faces challenges to reduce operating costs and to increase effectiveness of their business activities. Information Technology (IT) has emerged as a powerful tool to improve efficiency and effectiveness of business operations, making it viable for the microfinance sector to expand into the rural and low-income area. IT Value implementation...
Commercially popularized with the year 2002 with the launch of Amazon web services cloud computing has changed the way IT services and resources are delivered to the customers. With its varied platforms like SaaS, PaaS and IaaS it has made available resources which was once never available on demand and scalable manner. With the advantages of high scalability and flexibility, excellent reliability...
Programmability is one of the key factors on software defined networks (SDN),once it allows to decouple between data plan and control plan. However, in such context, managing several applications' inputs and outputs is a little explored task on controllers field, which are not in a controlled and organized environment. This article proposes a method to make SDN applications to reach the administrator,...
The long-dreamed vision of “computing as a utility” has finally taken shape in the form of cloud computing. This paradigm shift is the biggest buzz in today's computer world. It can be thought of an evolution of existing technologies rather than a revolution. The basic requirements of cloud are to meet the various needs of enterprise organizations such as scalability, adaptability, extensibility and...
Nowadays, almost all organizations are using Information technology (IT) tools to manage their business. Information systems (IS) organizations involved in these areas are as diverse as system management, advertising, online sales and also maintenance and communication. IS becomes increasingly complex making it difficult to follow the complex growing demands of IT resources requirements. Cloud Computing...
Due to the proliferation of Global Position System (GPS) and smart phone technology, Location-Based Service (LBS) has attained tremendous growth in recent years. Spatial queries retrieving nearest Point-Of-Interests (POI) require actual user locations for services. However, sharing such sensitive personal location information with potentially malicious servers may cause concerns about user privacy...
The demand from IT for the development organizations today are required to reduce capital expense and maximize existing investment. At the same time deliver high quality IT services for large development and testing teams that are geographically dispersed, with better visibility and control. As such, cloud computing with its widely-touted benefits made a convincing case for adoption. The imperative...
Information being the key advantage in today's world, its growth rate and amount requires big data analysis, which is key challenge. Collection and retention of such collected data results in massive growth, which sets the need for infrastructure expansion, replacement and proper disposition of existing data. This important data should not be scrapped or forgotten; instead it should be messaged and...
Increasingly organizations are considering moving their workloads to clouds to take advantage of the anticipated benefits of a more cost effective and agile IT infrastructure. A key component of a cloud service, as it is exposed to the consumer, is the published selection of instance resource configurations (CPU, memory, and disk). The number of instance configurations, as well as the specific values...
The proliferation of desktops requires addressing challenges related to high SLAs for desktop provisioning and increased operational expenses. Virtual Desktop Infrastructure (VDI) is a strategy of providing desktops to the user, where the virtual machines are hosted in a virtualized data center. A VDI implementation is a complex IT project that involves deployment and scaling complexities and high...
IT infrastructures in global corporations are appropriately compared with nervous systems, in which body parts (interconnected datacenters) exchange signals (request responses) in order to coordinate actions (data visualization and manipulation). A priori inoffensive perturbations in the operation of the system or the elements composing the infrastructure can lead to catastrophic consequences. Downtime...
Shared-nothing and shared-disk are the two most common storage architectures of parallel databases in the past two decades. Both two types of systems have their own merits for different applications. However, there are no much efforts in investigating the integration of these two architectures and exploiting their merits together. In this paper, we propose a novel hybrid storage architecture for large-scale...
Growing core counts have highlighted the need for scalable on-chip coherence mechanisms. The increase in the number of on-chip cores exposes the energy and area costs of scaling the directories. Duplicate-tag-based directories require highly associative structures that grow with core count, precluding scalability due to prohibitive power consumption. Sparse directories overcome the power barrier by...
As data center costs rise and space availability diminishes many organizations are investigating the viability of cloud computing for research use. Yet the majority of research investigators have not readily embraced cloud capability, regardless of the potential cost savings. Through interviews, case studies, and up-to-the-minute blog posts from top experts, it is possible to extract a basic framework...
In this paper, we introduce a new scheme for performing IT Risk Management within organizational domains. It adopts a business process-oriented view which integrates risk assessment, vulnerability assessment and risk mitigation into a quantitative framework. Taking the asset dependencies into account, we map business process values to IT hardware components in a hierarchical fashion and combine it...
Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtual machines. However this model has significant drawbacks that it relies on the trusted third party...
This paper deals with software framework that is mainly for large organization where there is no proper security for IT inventory. How can we have a stabilized application which would help IT Admins and Managements to have a clear picture of what are the IT related usages and transactions that are carried out in an Organization? Then would help them frame a proper IT budget every year. To maintain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.