The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research paper demonstrates the development of methodologies for application monitoring and continuous performance assurance. The proposed approach is derived from the classical continuous improvement concept e.g. PDCA (Plan-Do-Check-Act) cycle, which has been adapted to most of the real industrial and production environments. The approach consists of four phases : Monitor, Analysis, Recommendations...
The focus of this paper is to characterize the behavior of large, evolving networks, in terms of central nodes to identify patterns that may be conducive to persistent threat structures over time and geo-spatial regions. We propose an approach to monitor central nodes to determine Consistency and Inconsistency (CoIn) in their availability across time periods. Our approach also identifies the time...
International standards and references about ITSM, like ISO 20.000 and ITIL, deal with the management of service quality, define SLAs (e.g. availability, response time, etc.), and how to manage them from a process perspective. These definitions can be applied both to a service provided by a single provider under a single Service Level Agreement and, in more complex scenarios, to a service made up...
With the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should been forced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do...
A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It...
This paper researches on physical storage mechanism that is proper for the migration of Data Flow in Storage Node in order to associate physical storage resources with logical data resources. By establishing autonomous storage management model to meet demand of continuing availability and data integrity, we put forward to an autonomous algorithm which can support sustainable and intelligent management...
Replication in distributed environment has become increasingly popular due to its high degree of availability, fault tolerance and enhance the performance of a system. These advantages of replication are important because it enables organizations to provide users with access to current data where and when user needed at anytime or anywhere, even if the users are geographically remote. However, this...
Managing information access in highly dynamic business environments is increasingly challenging. With thousands of employees accessing thousands of applications and data sources, managers strive to ensure the employees can access the information they need to create value while protecting information from misuse. We propose an access governance structure with escalation options, ensuring both flexibility...
IT service management has become both more sophisticated and more critical to the business. We are now in an era in which an IT failure or error can interrupt critical business processes, severely damages a corporation 's image, affects the bottom line, and even impacts a company 's stock valuation. As far as organizations become more reliant on technology, the need for reliable, well managed services...
The developed DnD grid system aims to improve building of distributed computer environments by dedicated and non-dedicated resources. The proposed approach supposes overdimensioned static performance and dynamic underloading of non-dedicated resources. Efficiency, availability and autonomy of such distributed heterogeneous environment depend on platform, application, mapping and resource owner/service...
As information technology becomes more important to build enterprises' competitive advantage, transforming their IT organization from technology provider to service provider by introducing IT service management (ITSM) processes is also becoming imperative. Configuration management is one of processes in ITSM which plays a key role for successful implementing ITSM. In this paper, we give a set of suggested...
Managing information security within an organization is becoming a very complex task. The information security posture assessment is performed by using frameworks, methodologies or standards considering the subject separately. The model proposed within the paper aims to holistically consider all the security dimension. This is because the security level is as strong as the weakest link is. In order...
The objective of this invited talk is to present selected visions of ubiquitous computing and ambient communication based on the notion of the disappearing computer and to reflect on the resulting challenges for designing experiences in future smart environments. Our approach places the human at the centre of our design considerations and is based on exploiting the affordances of real objects by augmenting...
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.