The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) has moved beyond the hype, with promising applications materializing and industries transforming through digitalization as well as servitization—that is, delivering a service as an integral part of a product. Since the application spread in today’s IoT is wide and is typically structured in market-oriented groups, a system designer needs IoT system design patterns to assist...
The rapid growth in sensor network coverage, aided by the use of smartphones as capable sensing devices, leads to an enormous amount of gathered data from a multitude of different sources. However, generally data from one specific sensor network is only used by a very limited set of users and applications. This wastes a potentially greater usefulness for other, related data sinks that could use this...
In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be participant...
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures.
Reasoning about the impact of change is critical throughout the information technology (IT) architecture lifecycle management processes and this is especially challenging because installed architectures are complex, evolve constantly, and most changes have some global impact. We present an enterprise-interaction ontology for integrated query, analysis, and monitoring that supports features to allow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.