Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This article presents the project Gloffer (Global Offer). The project focuses on creating a universal solution for presentation, demanding and offering products and services in B2B and B2C environments. It describes the development of the whole project, from the initial idea to the testing and launching in trial operation. The article focuses on the description of target markets and implementations...
Aim of this work is to create architecture by using a novel architecture composed from two logical domains - Core Management Domain and SDN/NFV domain. Core Management Domain (CMD) can be used as the means for interconnecting domains implemented and deployed by various network providers, public or private clouds or just by simple devices acting as NFV enabled devices that can create and chain virtualized...
Several issues of ethics can arise in the development of cloud computing. Cloud computing may seem like a rather unclear term, so we can have a look at the issue and its impact. Cloud computing is basically computer storage like a service that users can use cloud computing to store their files and retrieve them whenever they want, or use the cloud computing's power to edit or collaborate on files,...
For many years, there are tendencies to support collaborative work of companies of the energy sector, but only the arrival of cloud computing open the door for the implementation of these ideas and aspirations. This actually means a transition to advanced business model and platform with possibilities for launching energy efficient convergent services. From currently available cloud deployment models,...
A smarter hyper-connected world means everybody is connected into internet in a smarter way. This paper is pointing to one aspect of lifestyle in a big city community, that is the parking system. Finding a parking lot in a crowded day in a public building such as a mall or supermall is difficult. It will be convenient if one can reserve a parking slot before arriving in that building. This service...
Recently, Network Function Virtualization (NFV) has been getting the attention for reason of operational efficiency, cost savings and service scalability. The NFV can be described as integrating an independent software on the general purposed hardware such as server and switch in order to replace the legacy hardware-based network device. Therefore, NFV can help ensure that carriers can quickly respond...
“Big data” is a term that is widely used by large corporations today. With access to a vast infrastructure and a large collection of personal information that is not publicly available, the United States of America (US) is able to complete researches and projects that are out of the reach of most countries and corporations. This paper will examine three US companies that have successfully utilized...
Innovations around "Big Data" can be characterized in terms of rapid technology development and deployment dynamics. For this purpose, combining "tech mining" (extraction of usable intelligence) from publication and patent databases with tech mining of business-related databases can elucidate activities and interests of business communities regarding Big Data innovation pathways...
Nowadays, due to the high capacity of data and contents produced by a variety of organizations, individuals, and equipment, we are faced with “Big Data” phenomenon, the management, control, and process of which is above the capability of software tools during an endurable and predictable time. Cloud computing provides giant computing resources based on the demand which gains importance through Big...
As its complexity grows, securing a system is harder than it looks. Even with efficient security mechanisms, their configuration remains a complex task. Indeed, the current practice is the hand-made configuration of these mechanisms to protect systems about which we generally lack information. Cloud computing brings its share of new security concerns but it may also be considered as leverage to overcome...
Information and communication technology are the important support technology to effective energy distribution and consumption. With the national power reform and electricity sale opened, the new requirements and goals for user demand side management and response were put forward. The efficient mining and application of consumption data should be the important basis of demand side management and response...
Nowadays, a business process can be a very costly investment for companies because they need to purchase additional resources to ensure the smooth running of their business process. But the problem is that the additional resources are used only for very limited time lapse. Using cloud computing can be beneficial for companies to omit the problem of using additional resources for limited time lapse...
Cloud computing is a model that offers on-demand computational resources to clients as services. In this concept, users are charged based on a pay-per-use business model. Therefore, it dramatically reduces operating costs associated with the maintenance of the local data center. Recently, database is provided as a service to fulfill clients' demand. Following this, companies can rely on a remote database...
As commercial roles for Unmanned Aerial Vehicles (UAVs) become clearer and demand for services provided by them increases, UAVs rely more on new cloud computing services and cooperative coordination to provide mission planning, control, tracking and data processing. This article presents the UAV as a Service (UAVaaS) framework, which ports features commonly found in traditional cloud services, such...
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing...
Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. There are already issues within...
Today's Cloud based render farm usually requires end users to transfer modeling data into the Cloud for rendering and makes the end users to trust the providers of the cloud infrastructure with many security policies. However, the end users have no basis to determine if these Cloud services are trustworthy, except the assurances of the service provider. This brings up a serious security concern on...
In this technological world one of the general method for user to save their data is cloud. Most of the cloud storage company provides some storage space as free to its users. Both individuals and corporate are storing their files in the cloud infrastructure so it becomes a problem for a forensics analyst to perform evidence acquisition and examination. One reason that makes evidence acquisition more...
Achieving cloud security is not a trivial problem and developing and enforcing good cloud security controls is a fundamental requirement if this is to succeed. The very nature of cloud computing can add additional problem layers for cloud security to an already complex problem area. We discuss why this is such an issue, consider what desirable characteristics should be aimed for and propose a novel...
Most personal computers are underutilized in most time. Collaborative cloud computing (CCC) is an emerging paradigm, which can organize and integrate these idle computing or storage resources scattered around the world. In this paradigm, due to individual capacity limitation, multiple participants (nodes) need to cooperate with each other to complete complicated tasks. Considering the heterogeneities...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.