The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Face to increased competition, SMEs see in the information systems a competitive gain, long-term strategy and sometimes an obligation to deal with competition. These companies seek to meet the needs of different users and digital business requirements by offering computer services of good quality. ITIL is recognized as a framework of good practice for the implementation of IT services with a good...
In the curriculum of the Faculty of Informatics and Management, University of Hradec Kralove, the area of computer networks has been emphasized. The quality of highly professional training programme is provided in cooperation with IT companies so that students got appropriate theoretical and practical professional knowledge and skills and were prepared for new positions recently created on the labour...
The main idea behind Elders-Up! project is to bring the valuable experience of senior adults to start-ups and small companies [1]. The Elders-Up! project will build an ecosystem for collaboration on which European seniors' labour activities continue after retirement, as well as their productivity and usefulness to the society. On the other hand, small companies struggle to create their own production...
Legacy software systems are valuable assets for organisations and are sometimes their main source of incomes. From time to time, renewing legacy software system architecture becomes necessary in order to offer them a new future. Migrating the architecture of a legacy software system is a difficult task. It involves understanding and aggregating a large set of data (the entire source code, dependencies,...
The goal of this paper is to create a hybrid system based on a Multi-Agent Architecture that will investigate the evolution of some prediction strategies (Elliott Wave, Lucas, GANN) along with technical, fundamental and macro-economical analysis methods on stock market indexes and how this information influences the stock market behavior in order to improve the profitability on a short or medium time...
In this paper, a cloud-based collaborative manufacturing network platform is proposed. The platform enables supply network partners situated in different geographic locations to have access to the OEM's planning data allowing to carry out purchase, production and deliver planning activities simultaneously and collaboratively, on any operating system. The proposed solution integrates the OEMs' legacy...
Companies operating in some areas can gather all the data they need with relative ease, more specifically marketing companies, social networks or internet companies to name but a few. However when it comes to analyzing these data, many problems may occur. Insufficient resources that can store all this flood of data or highly significant response time to get the results. In some definitions of Big...
Critical Infrastructures (CIs) are among the main targets of activists, cyber terrorists and state sponsored attacks. To protect itself, a CI needs to build and keep updated a domestic knowledge base of cyber threats. It cannot indeed completely rely on external service providers because information on incidents can be so sensible to impact national security. In this paper, we propose an architecture...
In recent year, the rise of Network Function Virtualization (NFV) and Software-defined Networking (SDN) makes the service chain and application provisioning process much agile and simpler, promoting the development of Service Function Chaining (SFC). Service Function Chaining (SFC) provides flexibility and agility for deploying and managing network services. The most challenging problems in SFC are...
The data managed in a software system is often controlled to behave dependently. Basically, dependent parts of the data can be controlled through their internal connections. However in a real-world system, dependencies among the data and its required behaviors are generally complex and designing its internal structure and control mechanism to satisfy all requirements becomes challenging. To cope with...
Efficient heterogeneous resource management is one of the many challenges Cloud systems exhibit, because it can lead to increasing the profit obtained by Cloud providers by serving more client requests while fulfilling their requirements with the minimum set of resources. In this context, heterogeneous architectures composed by accelerators, and Field Programmable Gate Arrays (FPGAs) in particular,...
Hardware companies conduct extensive testing and verification during the processor design process to reduce the number of errata that persist to the final product. These processes rely on a specification against which to test or verify the design; as a result, they will fail to catch vulnerabilities stemming from errors in the specification itself. In this work we present a model-checking based approach...
Building the right ICT infrastructure for a Smart Grid solution can be essential in order to fulfill the Smart Grid potential. Although in the past decade, energy distribution companies have been listing the Smart Grid design and deployment among their primary concerns, the domain is still in its infancy, with no proper guidelines or reliable best practices for designing and implementing the ICT architecture...
Software testing is designed in various company hierarchy, such as end product/service providers and subcontractors. An end product/service providers generally has a severe responsibility for their software quality, while a subcontractor has a limited responsibility. There can be a hypothesis that there is differences in software quality between service providers and subcontractors. To examine the...
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But...
Software defined networking promises network operators to dramatically simplify network management. It provides flexibility and innovation through network programmability. With SDN, network management moves from codifying functionality in terms of low-level device configuration to building software that facilitates network management and debugging[1]. SDN provides new techniques to solve long-standing...
This system is based on C/S architecture design and development of service-oriented architecture of financial information management system, users can end the system directly through the client-related operations, the user submits a request to the server, the server accesses the database, in order to ensure that the database security, according to the function of the system is divided module testing,...
As chain business corporation is an important organization form in modern market economy system, in this paper we study on how to design and implement the management information system for chain business corporation. Firstly, management information system is designed promote the management level of modern enterprise, provide the useful information, report forms for the manager, and provide the search...
Large software companies need to support continuous and fast delivery of customer value both in the short and long term. However, this can be hindered if both evolution and maintenance of existing systems are hampered by Technical Debt. Although a lot of theoretical work on Technical Debt has been recently produced, its practical management lacks empirical studies. In this paper we investigate the...
Agile development for big data analytics has become the new normal. However, research questions remain: 1) how should a big data system be designed and developed to effectively support advanced analytics? and 2) how should the agile process be adapted for big data analytics development? This article contributes an Architecture-centric Agile Big data Analytics (AABA) development methodology evolved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.