Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
RFID tags are widely used in recent years. Discovery service (DS) for RFID Network is a pivotal system that serves the following lookup function: Given the RFID identifier of an object, it returns a list of Internet addresses of servers which offer detailed information about this object. The existing researches on DS have severe drawbacks in being compatible with different RFID standards and scalability...
While mobile devices (such as smartphones, tablets and laptops) allow for more flexible and convenient business operations, they are susceptible of thefts. Surprisingly, mobile devices commonly go stolen at offices. When a mobile device is in the theft's hands, it can compromise the data on the device itself or even the data on corporate servers and networks, which can be accessed using that device...
Traditionally, commercial MMOGs are deployed on large privately owned server clusters with hundreds of computing devices linked through high bandwidth connections. In this scenario, the dynamic and unpredictable workload variability of MMOGs frequently leads to resources being under/over used with negative impact on playability and/or cost-effectiveness. In our research work, we see cloud computing...
In recent years, with growing demands towards big data application, various research on context-awareness has once again become active. This paper proposes a new type of context-aware user authentication that controls the authentication level of users, using the context of “physical trust relationship” that is built between users by visual contact. In our proposal, the authentication control is carried...
Online gaming, a large market with hundreds of millions of active players, is still struggling to scale without risky investments in infrastructure. In this work, we propose a cloudbased platform to massivize online gaming—the challenges and opportunities of scaling on-demand, while paying only for what is used. We discuss the major aspects of cloud-based gaming, virtual-world management, game-data...
Most enterprises today have their own Private Branch Exchange (PBX) systems that enable them to communicate on-premise and with the external or public switch telephone network. Companies that rely on heavy phone calls (especially, debt collectors) find the approach cost effective especially when automation techniques are introduced for auto dialing as a measure to reduce the number of employees who...
Unceasing market request for personalization of consumer goods calls for more and more flexible production technologies, and for increasingly reliable means to gather precise pictures of what each customer desires. Fitting is especially crucial to accomplish personalization in footwear, where the prevailing of manual operations makes production flexibility quite easy, but the close interaction between...
Customer switching behavior refers to the action of a customer switching from one supplier of a product or service to another one. Among competing facilities, this behavior can be described as a customer switching from a facility, providing a certain kind of service, to a similar facility. In reality, customers in congested facilities are more prone to switch. Competitive location model presented...
Secure storage of data and the current availability of data and information are the most important aspects of any ICT (Information and Communications Technology) system. Data storage systems are mandatory components of modern information systems. The term backup refers to creating a backup or copy of data with the aim of restoring the data in case the original data become corrupted and inaccessible...
In a mobile environment, data broadcast paradigm has been recognised as an effective and scalable mechanism to disseminate frequently requested information to a large number of mobile users. This paper presents the design and implementation of a power preserving mobile broadcast system. The broadcast system is designed to serve transitive queries or queries that access related data items belonging...
Many ERP system projects are not evaluated properly after their implementation, including the implementation of promising mobile technologies to improve business performance of companies. Mobile ordering system (MOS) is a system that harnesses the mobility of mobile devices that facilitates salespeople to create sales quotations at any time and any place, enabling them to create orders immediately...
Three approaches exist for a company to migrate its services in the cloud. The first is select the most appropriate commercial cloud provider, such as Microsoft, Amazon, Google or SalesForce, and to rent their resources and deploy its services. These cloud service providers The second approach is to build a private cloud with some of the open source cloud frameworks like Eucalyptus, OpenStack, OpenNebula...
In an attempt to reduce the effect of global warming, tremendous research works are now focusing on greening ICT and greening by ICT. As such several maturity models have been designed to track the progress of an organisation. However, these models are not easily accessible by Small Medium Enterprises due to the high cost involves in consulting. Thus, based upon existing maturity framework, this paper...
Radio Frequency IDentification (RFID) technology plays an important role in deterring counterfeit products. There are, however, many unsolved challenges in designing an effective and efficient RFID system for anti-counterfeiting purpose. The first challenge lies in designing a system which is suitable for standard passive RFID tags, especially EPC C1G2 tags, which are widely used in real-world supply...
Information and communication technology (ICT) negatively influence the environment due to production of very high CO2 emissions. One server rack produces as much emissions in one year as 25 homes. Usually, a mid-size data center contains a couple of hundred server racks. Therefore, "Green" IT and low power consumption networking infrastructures become more and more important for service...
We are seeing the deployment of new types of networks such as sensor networks for environmental and infrastructural monitoring, social networks such as facebook, and e-Health networks for patient monitoring. These networks are producing large amounts of data that need to be stored, processed and analysed. Cloud technology is being used to meet these challenges. However, a key issue is how to provide...
In this paper we report our experiences in designing DE3TO, a tool to support the decisions about the delivery and the deployment models in the process of adoption of a cloud based solution for enterprises. The tool leverages a simple questionnaire to enable a user who is in charge of the decision about the model of deployment and delivery of a cloud service, to receive a score for each of the models...
Big Data is a huge phenomenon of last days. Number of applications using this concept is still increasing and area of implementation is still wider and wider. There are different examples such as transport, health-care, industry or education. This work covers just the field of education or university's environment. Purpose of this work is to identify Big Data sources from university's environment...
Main theme of this paper lies in analysis of existing CRM systems based on their using in business across various kinds of environments, their variations in structure and pros and cons of their using in particular case studies. Based on previous research, proposal of brand new CRM system is made, with special structure based on simple yet efficient solutions, which can be applied in almost every possible...
Cloud computing is emerging as a rapid growing technology in the IT industry. As a large amount of information on individuals and companies are placed in cloud, there is an ultimate need to ensure the safety of the cloud environment. The main issues concerned with cloud are security, privacy, reliability, legal issues, open standard, compliance, freedom, long term viability etc. The various security...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.