The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Discovering true needs for computer system performance has always been tricky and time consuming. Data size, number of simultaneous queries and their mutual isolation play key roles in defining need for computer resources. Response time of an average application is crucial from the customer's view. This paper explains the lessons learned from benchmarking of the response time.
Outsourcing the processing of sensitive data is problematic and leads the implementation of procedures and specific authorizations. In this paper we examine the implementation of the decentralization of data in the case of bank data printing and review proposed safeguards to ensure the availability, integrity and confidentiality.
Electronic mail (e-mail) is one of the main ICTs used as a means of communication in the enterprise, it is so used to the point that the question about its acceptance seems more be topical; There is now interest in the changes that it is likely to produce in organizations. By following the method developed by Pierre Barillot (1998) and used by David Autissier (2001), we have tried to understand the...
As cloud-computing technology becomes mature and accepted by the public, more players are joining the game, especially small and medium-sized enterprises (SMEs). It would be essential for SMEs to understand the cloud value network and where the battlefields are in the whole value network so that they can equip themselves strategically. In this research, we will analyse the technology evolution of...
The acquisition of so-called basic inventions which can cover a broader scope is one of most important purposes in research and development of companies and research institutions. However, there have been little quantitative studies on the nature of basic invention. The authors have explored evaluation method for the nature of basic invention. The authors found that claimed inventions can be categorized...
Further functions and enhanced performance requirements made to various information and communication technology (ICT) equipment have improved technical standards and the scale of development in design. Computer aided design (CAD) systems that support those development are becoming increasingly more complicated and extensive than they were several years ago. CAD system engineers have to learn not...
The given work is devoted to a series of issues related to the potential, requirements and appropriate ways to provide a successful outsourcing IT services to university department with marketable IT expertise. University is IT outsourcing partner which could catch special IT related needs and tasks of the companies or business and provide through the students those services for a profitable quantity/price...
A website is essential to publish and access information on the Internet. Website contains different web application programs, which has confidential data that needs to be secured. In business scenarios, company outsources some of their confidential data to other agents, these agents are called as trusted third parties. The owner of the data sends the confidential data to the trusted third party agents...
We all know that the development of science and technology from the middle of the twentieth century has been closely associated with computers. For nearly half a century, computers have been present in the life of my family and have largely determined it. We were not just witnessing the formation of the computer epoch, but also we were active participants in the upcoming era of "second literacy".
The Silicon Valley is home to many successful tech companies and is considered the incubator of innovation. The purpose of this paper is to investigate the circumstances and reasons why the Silicon Valley is so prosperous. After grouping tech companies into six major categories, a variety of parameters, such as revenue, profit, andreturn of investment, were used throughout this analysis to determine...
In this work the authors present and analyze some possibilities of applying the game theory to solve economic problems, primarily microeconomic ones. The first example to illustrate the applications of the game theory gives the solution of alternatives of two companies for computer production in strategic decision-making for using the joint operative system. Alternative possibilities of companies'...
Agile software development by offering new values motivates software companies to use Agile methods instead of traditional methods. However, reviewing the literature shows that leaving traditional methods and moving to Agile methods is subjected to many serious challenges. We have conducted a large-scale research study to empirically discover various aspects of Agile transformation. Our Grounded Theory...
Agile methods are widely used in software companies in recent years. Many software companies are replacing their traditional development methods with Agile methods. Nonetheless, measuring agility that they have achieved has be topic of debate. So far, only a few methods and tools have been proposed to measure the agility of software companies who are moving to agile. The main aim of this paper is...
This paper simulated the game in the policy-processing of grid construction based on the Rubinstein game ideology of bargaining, studied the interaction among main interest groups. The paper also introduced the stakeholder theory to the design of the compensation mechanism, and confirmed the compensation mechanism efficiency through the economic simulation method. This paper points out that in the...
Practice teaching is an important link for the computer major to cultivate the talents in the Application-oriented University. In the process of practice teaching, the teaching target and the methods of training students' engineering ability play a decisive role. This paper on how to cultivate the senior professionals as the goal in the application-oriented undergraduate university, puts forward a...
The vision of 21st century computing is that users can access Internet services over lightweight portable devices rather than via variants of the traditional desktop computer. Consequently, users will have no interest in large, powerful machines. How, then, will computing power be provided? The answer to this question lies in cloud computing. Cloud computing is a recent trend in IT in which computing...
A cyber physical system for smart cloud traffic control is proposed. It is an intellectual (smart) road infrastructure for monitoring and control of traffic in real-time through the use of global systems for positioning and navigation, mobile gadgets and the Internet in order to improve the quality and safety of vehicle movement, as well as for minimizing the time and costs when vehicles are moved...
Electronic waste or e-waste is one of the fast growing problems of the world. E-waste consists of variety of components, containing toxic substances which lead to environment and health hazards if not handled properly. It is important to find out what is the main source of this e-waste with the help of GIS and how we can minimize the e-wastage through green technology. This paper provides a concise...
Secure storage of data and the current availability of data and information are the most important aspects of any ICT (Information and Communications Technology) system. Data storage systems are mandatory components of modern information systems. The term backup refers to creating a backup or copy of data with the aim of restoring the data in case the original data become corrupted and inaccessible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.