The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Educational systems of IT-companies typically provide a network space in which students and teachers can come together for teaching and learning. Using the microservice architecture offers advantages in application development.
The use of traffic information in map applications designed for stand-alone navigation devices as well as in mobile devices has become a common trend. This information is often governed by the various service providers with little or non-existent feedback from the users. Using a wide user base it is possible to collect information on traffic conditions faster and more efficiently. Additionally, many...
Patent analysis helps companies understand their intellectual property (IP) portfolio and develop competitive marketing and management strategies. A Technology Function Matrix (TFM) is a critical approach for patent data analytics. This paper develops a generic computer supported TFM construction methodology that can be used for creating patent technical maps for any given domain. The approach is...
Large software companies need a well-managed Software Architecture to support continuous and fast delivery of customer value both in the short and long term. However, this can be hindered if both evolution and maintenance of existing systems are hampered by Architectural Technical Debt. To avoid the accumulation and the costly consequences of ATD, it is critical that the responsibilities to minimize...
As many companies exist for decades, their software systems and IT architectures grow massively with the companies requirements. To avoid failures due to changes to a productive system, new demands often lead to new solutions while neglecting to restructure existing software systems despite a similar purpose of use. As a consequence, the IT complexity of such software systems and IT architectures...
Extracting value from data stored in object stores,such as OpenStack Swift and Amazon S3, can be problematicin common scenarios where analytics frameworks and objectstores run in physically disaggregated clusters. One of the mainproblems is that analytics frameworks must ingest large amountsof data from the object store prior to the actual computation;this incurs a significant resources and performance...
Based on interviews with 20 developers from two case study companies that develop large-scale software-intensive embedded systems, this paper presents the main factors that affect how often developers deliver software to the mainline. Further on, the paper describes the continuous integration behaviors in projects where up to 1,000 developers commit to the same mainline. The main factors that could...
Architectural Technical Debt is regarded as sub-optimal architectural solutions that need to be refactored in order to avoid the payment of a costly interest in the future. However, decisions on if and when to refactor architecture are extremely important and difficult to take, since changing software at the architectural level is quite expensive. Therefore it is important, for software organizations,...
In communication networks such as ISPs, telcos, and mobile network operators (MNOs), determining a correct unit cost for a service with QoS is a crucial task for the future of companies. A well-defined and efficient cost model is an essential tool to analyze network dynamics and in decision-making processes in a network. Also, knowing the real unit cost for a service helps network administrators/operators...
Over the decades, a variety of software development processes have been proposed, each with their own advantages and disadvantages. It is however widely accepted that there is no single process that is perfectly suited to all settings, thus a software process should be molded to the needs of its situational context. In previous work, we have consolidated a substantial body of related research into...
This study aims to design a corporate social network for knowledge sharing within University's operation. Data were collected by investigating into needs required by 576 staffs working in Rajamangala University of Technology. The data were collected from June–September, 2015 and were used as integral part in the design of corporate social network by employing object-oriented system analysis and designing...
With the explosive growth of data capacity, large enterprises increasingly rely on business information systems. A highly informational and data-centralized grid company that engages in high-frequency businesses will face major business failures, incalculable impacts and irreparable damages once data errors occur. The development of an effective high-availability information system has become a hot...
In this paper, we propose and experiment a system architecture which intends to significantly strengthen the security of biometric authentication with respect to the confidentiality(-by-design) of the users' references needed to perform such a function. Our architecture has been designed to ensure that these biometric references are permanently encrypted and that the (single) server processing them...
paper deals with the transition of companies to information systems operated using cloud computing services. The influence on the competitiveness of company and its organizational support is analysed. The developmental trends and their impact on company management are also described. The benefits and drawbacks from the transition to flexible ICT architecture are emphasized. Theoretical framework and...
This report describes a project which creates an upgraded topology based on the Internet service provider (ISP) environment. In the current service provider network, reliability, availability and management have become issues which need to be considered. Many technologies have been presented to solve these issues. This project is based on the virtual environment finished by simulators which are tools...
Aim of this work is to create architecture by using a novel architecture composed from two logical domains - Core Management Domain and SDN/NFV domain. Core Management Domain (CMD) can be used as the means for interconnecting domains implemented and deployed by various network providers, public or private clouds or just by simple devices acting as NFV enabled devices that can create and chain virtualized...
A smarter hyper-connected world means everybody is connected into internet in a smarter way. This paper is pointing to one aspect of lifestyle in a big city community, that is the parking system. Finding a parking lot in a crowded day in a public building such as a mall or supermall is difficult. It will be convenient if one can reserve a parking slot before arriving in that building. This service...
Nowadays mechanical engineering products change from mechatronic systems to Cyber-Physical Systems (CPS). CPS are connected, embedded systems which directly record physical data using sensors and affect physical processes using actuators. They evaluate and save recorded data, use globally available services and interact with operators via multimodal human-machine-interfaces. In context of industrial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.