The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The importance of alignment between business and information technology (IT) for generating IT business value has been emphasized in many research papers. Current literature broadly supports that capable and sustainable enterprise architecture is essential to support business processes as well as future agility. In that respect, individuals performing the role of an enterprise architect are at the...
Recently cloud computing technology has gained its popularity on research and development for petroleum explorations. The advances of cloud computing offer flexibility of computing power and storage capacity, provides beneficial technology for this application domain. For instance, the cloud computing technology can effectively reduce the complexity of information collection and control time in the...
Digital business ecosystems are becoming an increasingly popular concept as an open environment for modeling and building interoperable system integration. Business organizations have realized the importance of using standards as a cost-effective method for accelerating business process integration. Small and medium size enterprise (SME) participation in global trade is increasing, however, digital...
Hundreds of companies trying to move their JEE applications to the cloud face different challenges because these applications were developed without considering their deployment in cloud infrastructures. This fact typically generates that those companies have to pay large infrastructure costs in their cloud deployments. In the short-term, those companies have to decide if they should continue paying...
The agent technology arises as a solution that provides flexibility and robustness to address dynamic and complex domains. Such flexibility can be achieved by the adoption of existing agent-based approaches, such as the BDI architecture, which provides agents with the mental attitudes of beliefs, desires and intentions. This architecture is highly customisable, leaving gaps to be fulfilled in particular...
Hadoop has become the de-facto big data processing framework. Since the success of Hadoop in large data set processing, more and more companies and organizations tend to build their analysis logics into Hadoop stack and share across different develop teams for cost-effective. Hadoop now undertakes not only the original batch computation but also lowlatency online queries. However the Hard Disk Drive...
Implementation and formalisation, alongside with creation, adoption and usage of Enterprise Architecture (EA) principles are hot topics of the current years of EA research. However, the EA community, both academic and professional, misses a consensus on the definitions and use of principles. Furthermore, not much research is done in the direction of measuring the impact (e.g. design restriction) of...
Information systems (IS) are frequently modified according to changes in enterprise business and operating models and other internal and external factors that influence the enterprise. The changes are systematically managed following the engineering change management (ECM) process. The main issue in the ECM process is that the IS changes and their impact frequently are not evaluated with respect to...
The operating model is a structural approach of the Enterprise Architecture developed and published in 2006 by Ross & Weill (MIT), and Robertson (IMD) authors. Many international companies have been based on this concept to improve their business models. The main idea of this concept is to identify first the type of process models that the company has, which, according to Ross et al, are basically...
This paper reports on a case study that was conducted in a cloud High Performance Computing (HPC) project one that used very sensitive and confidential data. The study aimed to explore the security challenges and practicalities that occur within a cloud HPC project and to develop a method for making critical security decisions. Action research was used to examine the nuances throughout the project...
B2B is not only a model of cooperation between enterprises. It may also be implemented in companies with a dispersed organizational structure to which construction companies belong. It turns out that B2B systems contribute to an effective implementation of the investments located even in distant geographical locations. The use of Internet technology contributes greatly to the successful exchange of...
Many of the tools used today in semiconductor test engineering are single-point solutions that are concerned with the mechanics of translating test IP between domains and formats. There is no cohesive standardized framework to bind them all together; and workflow and application architecture choices are largely left up to the individual engineer. Learning from the state-of-the-art in other software...
In today's world, almost every individual uses computational machines for their day to day activities. Contribution of Cloud Computing in our day to day life is commendable. Even a common man has the privilege to use cloud services in the form of email, games, storage and etc., because of Cloud Computing. Cloud services tend to be cheaper and affordable with pay as you use policy. Scalability and...
With the abundant on-board resources in smart vehicles, they have been considered major candidates for providing ubiquitous services. Processing and storage resources provided through on-board units along with a variety of sensing and communication capabilities can turn smart vehicles into potential computing engines that can be pooled to serve as powerful vehicular clouds (VCs). Computing tasks can...
With the growth of competition between organizations, the need for efficient processes has become critical. Thus, the performance of supply chains has a direct impact on the profitability of organizations. The picture is no different for the retail industry. Among the activities of the supply chain, the role of supplier selection stands out. During selection, the need could arise for stakeholders...
Now, the cloud storage gateway system is widely used in enterprise systems, which is viewed as a link between the local storage systems and cloud storage providers. Since the gateway system can simplify the interaction with cloud storage services, while boosting performance and reducing cost, more and more enterprises prefer it as their first choice to use cloud storage services. In this article,...
Emerging business models such as digital ecosystems involving collaborative innovation, participatory decision-making and flexible organizational structures are set to significantly affect inter- and intra-enterprise structure and functionality. This has seen the appearance of increasingly complex Service-oriented Architecture (SOA) scenarios featuring various partnership levels, increased resilience...
If companies want to tackle increasing complexity, they often take use of modular system architectures which are seen as important enabler for sharing standardized modules across different development projects. Although numerous examples in systems business can be found where companies established modular architectures, they still face difficulties to reuse standardized architectural elements in a...
The Software & Systems Process Engineering Meta-Model Specification Version 2.0 (SPEM 2.0) is well known in industry and research domains as a process-oriented meta-model and it is often used as baseline meta-model for processes related to software engineering, being largely applied in the context of multidisciplinary projects. Outcomes from two large projects - the European CRYSTAL and the German...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.