The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
ChatOps is an industry practice of conversation-driven development using instant messaging to automate common development or monitoring tasks. It makes team members communicate with each other efficiently to work, learn and create together. We expect ChatOps to have intelligent agents, which can perform predictive operations based on users' activities, in the near future. To enable such intelligent...
The fast expansion of Internet-based multimedia services like Netflix, Skype or YouTube -- the so-called Over-The-Top Services (OTT) -- have increased the quality requirements of these services from the point of view of the user. In this sense, it is important not only to ensure a good Quality of Service (QoS) level -- technical metrics -- but also a high level of Quality of Experience (QoE) -- subjective,...
A Service Level Agreement (SLA) is a contract between a service provider and a consumer which specifies in detail the level of service expected from the service provider, obligations, commitment and objectives. In the cloud computing environment, both the cloud provider and the cloud consumer want to know of a likely service violation before the actual violation occurs and to adjust the scaling of...
This paper focuses on batch environment of an enterprise. We use various data sources such as dependency data, alert and ticket data, and run history data of the jobs in batch systems to build a model of batch operations. We enrich the model with various attributes derived by graph analysis of dependency data, time-series analysis of execution history of jobs, and text and statistical analysis of...
Respiration rate (RR) is one of the important vital signs used for clinical monitoring of neonates in intensive care units. Due to the fragile skin of the neonates, it is preferable to have monitoring systems with minimal contact with the neonate. Recently, several methods have been proposed for contact-free monitoring of vital signs using a video camera. Detection of the chest-and-abdomen region...
We propose a Cloud Advisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. The selection process is based on a set of assurance requirements that...
Metrics and especially metric-based monitoring dashboards provide valuable information and insights for managers in software development organizations. However, implementing and launching a company wide metrics program is very hard and time consuming. This paper describes the history and our experience with the development of a metrics program at Generali Deutschland Informatik Services, a CMMI level...
In this paper we present an architecture for the modeling, collection, and evaluation of long-term histories of deployments of distributed multi-tier applications on federations of Clouds (Multi-Clouds). Our goal is to capture several aspects of application development and deployment lifecycle, including the evolving application structure, requirements, goals, and service level objectives, application...
Malware monetization via fraudulent ad traffic is lucrative and relatively easy. Not surprisingly, there is a higher incidence of malware that monetizes in this way today than in the past. Although this type of attack is not new, current methodologies to make malware-generated ad traffic appear organic, at such large scales, while remaining virtually undetected are novel.
This paper presents a new way of deploying security properties and trust in an open peer-to-peer network. The originality is that the security properties are freely defined by the user and are attached to the exchanged resources that are associated with domains. The paper proposes an implementation of a monitoring agent that looks after an open source peer-to-peer client and detects any attempt of...
The common way to purchase computing capacity is to acquire a fix amount of servers which are hosted in a data center. The reserved amount of resources depends on the maximum demand that could occur. This over provisioning of resources is associated with high costs. Cloud providers promise to reduce the costs while guaranteeing always a good performance for the outsourced services. A reducing of the...
Distributed environments hosting specific and dedicated computing resources are serving nowadays more and more scientific and commercial applications. Finding the right resource in distributed environments in term of performance is not an obvious task. This paper is addressing the issue of selecting the right service deployed in a distributed environment for any applications or workflow engines that...
Topics are collections of words that co-occur frequently in a text corpus. Topics have been found to be effective tools for describing the major themes spanning a corpus. Using such topics to describe the evolution of a software system's source code promises to be extremely useful for development tasks such as maintenance and re-engineering. However, no one has yet examined whether these automatically...
This paper proposes a novel approach to service management and monitoring on the basis of service collaboration relations that can be extracted from service composition history. An undirected and weighted service collaboration network is constructed therefore. On the network, two abstractions are defined: service centrality, which measures a service's collaboration capability comparing to other services...
Component level performance thresholds are widely used as a basic means for performance management. As the complexity of managed systems increases, manual threshold maintenance becomes a difficult task. This may result from a) a large number of system components and their operational metrics, b) dynamically changing workloads, and c) complex dependencies between system components. To alleviate this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.