The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Enterprise Resource Planning [ERP] is a widely used system across all organizations regardless the size. The need for making rapid decision based on the analysis of the complex data lead to the use of ERP systems. In the beginning ERP systems were limited to large organizations. Later this trend has changed with the advent of open source ERP systems. With its added advantage, it started to take over...
Information is one of the main resources that every modern organization is based on. A lot of companies introduce electronic document management. At the same time, in order to raise the quality of transport and logistics services, the unions of such organizations become more and more popular. In this article, we consider the main instruments of providing information integrity and availability in electronic...
Cloud computing is the fruit of recent developments in information technology, it provides access to many online services as well as remote computing resources as needed. To be more specific, cloud computing stands today as a satisfactory answer to the problem of storage and computing of data encountered by companies. It provides treatment and accommodation of their digital information via a fully...
This paper describes the design, comparison and evaluation of two software solutions from business intelligence category for the purpose of improving report process in the one of the biggest European steel companies. Industrial companies very often use old information system, which were made many years ago. Management chooses business intelligence solutions and our task was to set up web portals and...
In UAE, there is big investment in contracting business. Our study indicates that local contracting companies suffer from drawbacks in the Information Technology infrastructure concerning system inflexibility, Ineligibility of Data entry operators, process flow and Internet connection at some projects' site offices. This paper attempt to resolve these issues through proposing an Information Sharing...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
This paper presents a remote monitoring system based on the SCADA model (Supervisory Control And Data Acquisition), specifically developed for automated production processes in a food company. The goals defined for this project were the monitoring of three production lines and six silos of raw materials, along with the indication / evaluation of three performance measures demanded by the company:...
The objective of the project was to develop an android based mobile application which is targeted to be used in MICE (Meetings, incentives, conferencing, and exhibitions) applications. A cloud server is set up and is integrated with an iBeacon. The application functions on an Amazon EC2 instance and all the data involved in the App is stored in the cloud database in the form of tables. An iBeacon...
Cloud computing is an internet based computing, providing the on demand services through the internet such as servers, storage disk, different platforms and applications to any business level company or organization. The cloud computing services are ‘Pay based on usage’ based on the agreement between Service Provider of the Cloud and customer. Service Level Agreement(SLA) is a contract, contracted...
Hadoop has become the de-facto big data processing framework. Since the success of Hadoop in large data set processing, more and more companies and organizations tend to build their analysis logics into Hadoop stack and share across different develop teams for cost-effective. Hadoop now undertakes not only the original batch computation but also lowlatency online queries. However the Hard Disk Drive...
The advent of Big Data has brought many challenges and opportunities in distributed systems, which have only amplified with the rate of growth of data. There is a need to rethink the software stack for supporting data intensive computing and big data analytics. Over the past decade, the data analytics applications have turned to finer granular tasks which are shorter in duration and much more in quantity...
This paper presents GitBull tool as a source code hosting web application tailored for the university ecosystem. GitBull introduces the ideology of open source software development. The main aim of GitBull is to fill the gap between how students work on software development projects in university and how software is being developed in the work environment. GitBull helps students use source code versioning...
Data Analysis is a process of inspecting, cleaning, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision making. Using analytical tools during recent years has become a key trend in the acceptance of timely and correct decisions. My contribution describes Business Intelligence (BI) using Microsoft SQL Server 2012. It focuses...
The objective of this research is to develop computer software for recognizing a company logo. The system is called "Logo Recognition System or LRS". There are 2 parts of the LRS, namely: a client part and server part. The client part consists of common device, which is owned by the user, such as a mobile device, tablet and smart phone. On the client part, the LRS provides an easy graphic...
This paper reports on a case study that was conducted in a cloud High Performance Computing (HPC) project one that used very sensitive and confidential data. The study aimed to explore the security challenges and practicalities that occur within a cloud HPC project and to develop a method for making critical security decisions. Action research was used to examine the nuances throughout the project...
To reduce container management costs, ocean carrier companies rent containers from container leasing companies. Two carrier companies can exchange their empty containers between each other at various ports to eliminate the transportation cost of empty containers. To minimize costs, a container leasing company has to find the maximum number of pairs of carrier companies that can exchange containers...
A social media message that is forwarded (e.g., Retweeted in Twitter) by many users may diffuse widely. Such a 'viral' message may have a major impact in the real world. If the content maligns a company, the company must respond as quickly as possible to defend its brand image. Timely knowledge about what kinds of information are diffusing in social media is thus quite important. We have developed...
We have developed very new and innovative technology, but what is the use of that technology if it is harming our environment. The development of technology is not a major concern but producing, using it in a green way would definitely be worth. In a recent time green computing has gained major importance due to increased CO2 Emissions. This paper includes major issue of green computing & how...
The article presents the Argus project. The aim of the project is the development of an automatic photography system. Argus is built on a special hardware system (central server, minicomputers with NFC(Near Field Communication) card readers and cameras) and it is controlled by a specific software system. The software system contains a server, a web application and a desktop application, which is running...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.