Cloud
See the latest white papers on how cloud computing and cloud services have transformed the IT industry, from data center services to virtualization, software-as-a-service, infrastructure-as-a-service, platform-as-a service and more.
-
Next Generation Mobile Cloud Gaming
With the proliferation of smart mobile devices and broadband wireless networks, the mobile gaming market is rapidly expanding among younger generations due to its ubiquitous entertainment features. Cloud-based mobile computing is a promising technology to address the inherent restrictions of mobile devices, such as limited battery lifetime and computational capacity....
Provided By Huazhong University of Science & Technology
-
Mediaagility Runs on the Cloud for Less Than $1/Employee/Day
MediaAgility is a Cloud Intelligence company headquartered in the US with offices in India, Singapore and the UK. Founded in early 2011, their mission is to challenge their customers to achieve their moonshots by creating intelligent solutions powered by their rich culture and the cloud. They achieve this through their...
Provided By MediaAgility
-
Business Analytics in the cloud: Driving business innovation through cloud computing and analytics solutions
Read this whitepaper to learn how businesses take advantage of the power of the cloud to build strong analytically oriented teams, adopt new ways to use information and jump ahead of their competition.
Learn more about 'Big Data and Business Analytics' through IBM's latest market leading solutions.Provided By IBM
-
Exploring Heterogeneity of Unreliable Machines for P2p Backup
P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as there is no single bottleneck server) and more reliable (as the machines are geographically...
Provided By University of Wales, Newport
-
Success in the cloud
Knowing the potential benefits of cloud computing, IBM implemented this technology for six workloads—development and test, analytics, storage, collaboration, desktop and production application. And the results have yielded significant financial and operational improvements. IBM shares some key insights through this report, learned after a successful move to cloud, including different...
Provided By IBM
-
Exploring the frontiers of cloud computing: Insights from Platform-as-a-Service pioneers
See more value through the cloud
One of the least understood forms of cloud computing, Platform-as-a-Service (PaaS), is garnering some well-deserved attention. Although it’s a new approach, early adopters are already discovering how it can reduce risks, accelerate speed to market and streamline operations. Read the IBM® white paper...Provided By IBM
-
Sheltered Data Storage Services in Cloud Computing
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Framework for Monitoring and Evaluation of Users in Trusted Cloud
In the cloud computing, due to users directly use and operate the software and OS, and even basic programming environment and network infrastructure which provided by the Cloud Services Providers (CSP), so the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Cost-Effective Hybrid Cloud Framework for HEI's
Cloud computing is provide computing services and network resource sharing with minimum hardware and management requirements where the inattentive infrastructure capacity is highly adoptable. Cloud Computing is a platform that provides educational resources for researchers and enables users being attached like a single machine over the Framework comprises Private and...
Provided By researchgate.net
-
Cloud Security with Virtualized Defense and Reputation-based Trust Management
Internet clouds work as service factories built around web-scale datacenters. The elastic cloud resources and huge datasets processed are subject to security breaches, privacy abuses, and copyright violations. Provisioned cloud resources on-demand is especially vulnerable to cyber attacks. The cloud platforms built by Google, IBM, and Amazon all reveal this...
Provided By University of Southampton
-
Intelligent Agent Based Semantic Web in Cloud Computing Environment
Considering today's web scenario, there is a need of effective and meaningful search over the web which is provided by Semantic Web. Existing search engines are keyword based. They are vulnerable in answering intelligent queries from the user due to the dependence of their results on information available in web...
Provided By Cornell University
-
Logistics Firm Uses Data Visualization Tool to Differentiate Its Service, Win Business
Deliver Australia works with local partners to provide transport solutions across the Australian continent. Its business runs on a Microsoft Office 365 and Windows Azure cloud infrastructure. The company sought a process diagramming tool and chose Microsoft Visio 2013 because it works in a cloud environment. Now, Deliver Australia and...
Provided By Microsoft
-
DocCloud: A Document Recommender System on Cloud Computing With Plausible Deniability
Recommender systems select the most interesting products for costumers based on their interests. The move of a recommender system to a cloud faces many challenges from the perspective of the protection of the participants. Little work has been done regarding secure recommender systems or how to cope with the legal...
Provided By Reed Business Information
-
Digital Forensic Investigation and Cloud Computing
In this paper, the authors aim to be a high-level introduction into fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, how past technological and methodological flaws are...
Provided By University College Cork
-
How to Beat a Cloud Skeptic: Four Steps Towards Rationalizing the Great Cloud Debate
The cloud represents a wholesale shift in the ways in which IT services are delivered. Its presence requires us to re-ask and re-answer may of our organization’s foundational questions. Because the cloud means fundamental changes to the industry, some skeptics will resist the transition. Often this resistance is driven by...
Provided By Quest Software
-
Towards Differential Query Services in Cost-Efficient Clouds
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, the authors address two fundamental issues in such...
Provided By Institute of Electrical & Electronic Engineers
-
A Novel Approach for Handling Security in Cloud Computing Services
The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the...
Provided By Cairo University
-
To Improve Security in Cloud Computing With Intrusion Detection System Using Neural Network
Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber-attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats. In...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Data Migration Across the Clouds
Having an effective and efficient strategy for optimizing long distance data migration is essential for every data center. With the ever increasing demands for the IT needs of businesses it is also important for data centers to deliver data migration cost effectively especially when faced with the demands from remote...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Multi-Trust-OrBAC: Access Control Model for Multi-Organizational Critical Systems Migrated to the Cloud
Security of information systems is a problem chronic, the arrival of cloud computing as a new computing model, feeds the difficulty of implementing effective solutions. Thus more research is currently focused on data security in the cloud, and especially the issue of confidentiality. In this paper, the authors propose a...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Additional Authentication and Authorization Using Registered Email-ID for Cloud Computing
Cloud computing is a new computing paradigm that changes the way of information technology is provided and used. But achieving acceptable level of information security issues are an important aspect and a key factor in the cloud. This paper firstly lists some of the different security issues of the cloud...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Client and Data Confidentiality in Cloud Computing Using Fragmentation Method
In today's world cloud computing has occupied a prior place in the emerging technologies cause of its ease of access at lower costs. According Moore's Law computer technology, through transistors and integrated circuits, along with digital electronic devices, will double every 18 months to two years. It's a steep curve...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Ensuring User Security and Data Integrity in Multi-Cloud
The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi-cloud. Provable data possession is a...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
QoS and Cost Aware Service Brokering Using Pattern Based Service Selection in Cloud Computing
In this paper an effective services selection mechanism has been introduced for creating a practically useful Service Broker. Selection of Services is based on characteristics such as performance, reliability and cost, ranking and integrity are also considered. In Cloud computing a service broker is responsible for routing the user requests...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Password Authentication Scheme Based on Shape and Text for Secure Sharing of PHR Using ABE in Cloud
Information Technology is widely used in health care for efficiently managing the Personal Health Records (PHR) in a cost effective manner. Under this scenario a computing paradigm (cloud computing) where the resources are provided as services will offer a ubiquitous access to medical data. However, there have been wide privacy...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Secret Medical Image Sharing and EPR Data Embedding Scheme over Cloud Computing Environment
The fast development in the term of telecommunication helps on the appearance of variety of modern applications such as the telemedicine where the patients' digital data can transfer over insecure mediums between the doctors for farther diagnosis and dealing with these transmitted data. Therefore, the protection of the exchanged medical...
Provided By Mansoura University
-
Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud
The authors see an increasing demand for in-the-cloud middlebox processing as applications and enterprises want their cloud deployments to leverage the same benefits that such services offer in traditional deployments. Unfortunately, today's cloud middlebox deployments lack the same abstractions for flexible deployment and elastic scaling that have been instrumental to...
Provided By Princeton Software
-
Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing
Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner's loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies,...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment
Cloud forensics under cloud computing an on-demand paradigm becoming a well transformative technology in the computing now a day's grabbing important attention towards pursuing in-depth analysis of security issues, migrations from disasters, outages experienced by many CSP today in cloud environment. In spite of better understanding about the domain this...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Securing User's Data in HDFS
With the advent of technology and increasing growth in volume of data the business are finding the cloud as suitable option to host their data. However, putting the sensitive data on third-party infrastructure poses several security risks to their data utilizing the advantages of the Clouds. Though there are many...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
An Efficient Approach For Integrating Data Mining Into Cloud Computing
Cloud computing and data mining are the two emerging trends now a days in the world of information technology and computing. This paper deals with the study of how data mining is used in cloud computing. Data mining is a process of extracting potentially useful information from raw data, and...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Assuring Data Sharing and Culpability as a Service in Cloud
Cloud computing presents a replacement thanks to supplement the present consumption and delivery model for IT services supported the net, by providing for dynamically accessible and sometimes virtualized resources as a service over the net. Data handling is outsourced by the direct Cloud Service Provider (CSP) to alternative entities within...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment
An increasing number of applications have been proposed and discussed on the cloud computing environment because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever the user want, etc. As more and more sensitive...
Provided By International Association of Computer Science and Information Technology(IACSIT)
-
A Framework for Software-as-a-Service Selection and Provisioning
As cloud computing is increasingly transforming the information technology landscape, organizations and businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them increase business agility and reduce their operational costs. They increasingly demand services that can meet their functional and non-functional requirements. Given the plethora and the...
Provided By United Arab Emirates Computer Emergency Response Team
-
Framework of User Participation for the Interface Design in the SaaS Layer
The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...
Provided By Scientific Research
-
Computational Decoys for Cloud Security
Cloud-based applications benefit from the scalability and efficiency offered by server consolidation and shared facilities. However, the shared nature of cloud infrastructures may introduce threats stemming from the co-location and combination of untrusted components, in addition to typical risks due to the inevitable presence of weaknesses in the infrastructure itself....
Provided By Columbia University
-
IBM Solutions for Cloud and Virtualization in Enterprise Environments
From accelerated service delivery and resource optimization to reduced costs for IT resources, the business benefits of cloud computing and virtualization have spurred many organizations to consider updating their IT infrastructures. But updating traditional physical resources isn't enough. To support the next generation of virtualized and private cloud applications, IT...
Provided By IBM
-
Cloud Computing: A Revolution in Communication
Now-a-days cloud computing is an emerging area and it replace grid computing. Cloud computing elaborate that how to utilize computer resources on network. In fact it is the market model that describes services provided over the internet. In Future, not all but most of the resources are controlled by cloud...
Provided By Creative Commons
-
Cloud on Linux Operating System
The term "Cloud" is analyzed to "Internet". The term "Cloud computing" is based on cloud drawings used in the past to represent telephone networks and later to depict internet. Cloud computing is a internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting...
Provided By Creative Commons
-
Reconstruction of Cloud Contaminated Remote Sensing Images Using Inpainting Strategy
This paper focuses a method for cloud detection and their reconstruction technique. Detecting these portions of an image and then filling in the missing data is an important photo editing work. The filling-in approach such as in-painting techniques, which aim at filling holes in remote sensing images by propagating surrounding...
Provided By Creative Commons
-
Scaling Up Classifiers to Cloud Computers
As the size of available datasets has grown from Megabytes to Gigabytes and now into Terabytes, machine learning algorithms and computing infrastructures have continuously evolved in an effort to keep pace. But at large scales, mining for useful patterns still presents challenges in terms of data management as well as...
Provided By University of Notre Dame
-
All-Pairs: An Abstraction for Data Intensive Computing on Campus Grids
Today, campus grids provide users with easy access to thousands of CPUs. However, it is not always easy for non-expert users to harness these systems effectively. A large workload composed in what seems to be the obvious way by a naive user may accidentally abuse shared resources and achieve very...
Provided By University of Notre Dame
-
Research and Realization of Resource Cloud Encapsulation in Cloud Manufacturing
Resource Cloud Encapsulation (RCE) is one of the key technologies of recourse accessing in Cloud Manufacturing (CM) and the foundation of resource virtualization. Under the analysis of the technologies of resource virtualization in Cloud Manufacturing, a framework of RCE is proposed. With the definition for each layer of the framework,...
Provided By Guilin University Of Electronic Technology
-
Making the Cloud Achievable
A reference guide on cloud computing. Provides an overview of cloud computing and it's benefits and an in-depth look at preparing for the cloud. Also covers the private cloud and the public cloud and how to determine which is right for you.
Provided By CDW & VMware
-
A Service-Oriented Identity Authentication Privacy Protection Method in Cloud Computing
Cloud computing provides elastic, scalable on-demand IT services for individuals and organizations. In the cloud computing, everything is as the service. Cloud clients enjoy convenience and efficiency service, but at the same time encounter new issues. Cloud clients needs to provide authentication information to access to service, which often contains...
Provided By Beijing University Of Technology
-
A Group Tracing and Filtering Tree for REST DDos in Cloud Computing
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or REST-based denial of service attacks. Because mainly...
Provided By Xiamen University
-
A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from denial of service attacks, especially HTTP or XML-Based denial of service attacks. These types...
Provided By Xiamen University
-
A Coordinator for Scaling Elastic Applications Across Multiple Clouds
Cloud computing allows customers to dynamically scale their applications, software platforms, and hardware infrastructures according to negotiated Service Level Agreements (SLAs). However, resources available in a single Cloud data center are limited, thus if a large demand for an elastic application is observed in a given time, a Cloud provider...
Provided By University of Medicine and Pharmacy
-
An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds
As more and more data can be generated at a faster-than-ever rate nowadays, it becomes a challenge to processing large volumes of data for complex data analysis. In order to address performance and cost issues of big data processing on clouds, the authors present a novel design of adaptive workflow...
Provided By University of Medicine and Pharmacy
-
Automated SLA Negotiation Framework for Cloud Computing
A Service Level Agreement (SLA) is a legal contract between parties to ensure the Quality of Service (QoS) is provided to the customers. A SLA negotiation between participants assists in defining the QoS requirements of critical service-based processes. However, the negotiation process for customers is a significant task particularly when...
Provided By University of Medicine and Pharmacy
-
Meeting Application Constraints Efficiently by Deploying Cloud Resources On-Demand
Cloud computing and Infrastructure-as-a-Service providers, such as Amazon Elastic Computing Cloud (EC2), have paved the way towards computing as a utility. The integration of the cloud providers with in-house infrastructure can be used to support on-demand resource provisioning, providing elasticity in modern applications, and making dynamic adaptation of the service...
Provided By University of Medicine and Pharmacy
-
Cloud Computing Security Threats and Responses
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of...
Provided By Azad University
-
A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service
In cloud-computing services, using the SSL/TLS protocol is not enough to ensure data confidentiality. For instance, cloud service providers can see the plaintext after the decryption at the end point of a secure channel. It is wise to introduce an encryption layer between the service client and the communication channel...
Provided By Aichi University of Education
-
Transforming the Interactive Response System to a Cloud Voting Service
The paper describes a new business model for a cloud voting service, which shifts focus from selling specialized equipment and installation to providing Internet services through personal mobile devices. This incremental innovation only requires existing technologies such as general Internet service facility and web/mobile system development. The new cloud voting...
Provided By National University of Kaohsiung
-
Spatial Services in Cloud Environment
Cloud Computing is an approach that provides computation and storage services on-demand to clients over the network, independent of device and location. In the last few years, cloud computing became a trend in information technology with many companies that transfer their business processes and applications in the cloud. Cloud computing...
Provided By University of Manouba
-
Paranoid Android: Zero-Day Protection for Smartphones Using the Cloud
Smartphones have come to resemble PCs in software complexity. Moreover, as they are often used for privacy-sensitive tasks, they are becoming attractive targets for attackers. Unfortunately, they are quite different from PCs in terms of resources, so that PC-oriented security solutions are not always applicable. Worse, common security solutions (such...
Provided By Vrije Universiteit Amsterdam
-
A Social Content Delivery Network for Scientific Cooperation: Vision, Design, and Architecture
Data volumes have increased so significantly that the authors need to carefully consider how they interact with, share, and analyze data to avoid bottlenecks. In contexts such as e-Science and scientific computing, a large emphasis is placed on collaboration, resulting in many well-known challenges in ensuring that data is in...
Provided By Karlsruhe Institute of Technology
-
Network Virtualization for QoS-Aware Resource Management in Cloud Data Centers: A Survey
The increasing popularity of Cloud Computing is leading to the emergence of large virtualized data centers hosting increasingly complex and dynamic IT systems and services. Over the past decade, the efficient sharing of computational resources through virtualization has been subject to intensive research, while network management in cloud data centers...
Provided By Karlsruhe Institute of Technology
-
Towards Truthful Resource Reservation in Cloud Computing
Prudent capacity planning to meet their clients future computational needs is one of the major issues cloud computing providers face today. By offering resource reservations in advance, providers gain insight into the projected demand of their customers and can act accordingly. However, customers need to be given an incentive, e.g....
Provided By Karlsruhe Institute of Technology
-
Elasticity in Cloud Computing: What It Is, and What It Is Not
Originating from the field of physics and economics, the term elasticity is nowadays heavily used in the context of cloud computing. In this context, elasticity is commonly understood as the ability of a system to automatically provision and deprovision computing resources on demand as workloads change. However, elasticity still lacks...
Provided By Karlsruhe Institute of Technology
-
CloudSim: A Toolkit for the Modeling and Simulation of Cloud Resource Management and Application Provisioning Techniques
Cloud computing aims to power the next generation data centers and allows dynamic leasing of their server capabilities to third-party applications and end users. It enables providers in efficiently leasing out their data center capabilities for deploying application services driven by workload and QoS (Quality of Service) requirements. The application...
Provided By University of Medicine and Pharmacy
-
Design and Development of an Adaptive Workflow-Enabled Spatial-Temporal Analytics Framework
Cloud computing is a suitable platform for execution of complex computational tasks and scientific simulations that are described in the form of workflows. Such applications are managed by Workflow Management System (WfMS). Because existing WfMSs are not able to autonomically provision resources to real-time applications and schedule them while supporting...
Provided By University of Medicine and Pharmacy
-
Cost-Effective Provisioning and Scheduling of Deadline-Constrained Applications in Hybrid Clouds
In order to meet distributed application deadlines, Resource Management Systems (RMSs) have to utilize additional resources from public Cloud providers when in-house resources cannot cope with the demand of the applications. As a means to enable this feature, called Cloud Bursting, the RMS has to be able to determine when,...
Provided By University of Medicine and Pharmacy
-
Optimizing Makespan and Reliability for Workflow Applications With Reputation and Look-Ahead Genetic Algorithm
For applications in large-scale distributed systems, it is becoming increasingly important to provide reliable scheduling by evaluating the reliability of resources. However, most existing reputation models used for reliability evaluation ignore the critical influence of task runtime. In addition, most previous work uses list heuristics to optimize the makespan and...
Provided By University of Medicine and Pharmacy
-
Scaling MapReduce Applications Across Hybrid Clouds to Meet Soft Deadlines
Cloud platforms make available a virtually infinite amount of computing resources, which are managed by third parties and are accessed by users on demand in a pay-peruse manner, with quality of service guarantees. This enables computing infrastructures to be scaled up and down accordingly to the amount of data to...
Provided By University of Medicine and Pharmacy
-
The CloudMIG Approach: Model-Based Migration of Software Systems to Cloud-Optimized Applications
Cloud computing provides means for reducing over and under-provisioning through enabling a highly flexible resource allocation. Running an existing software system on a cloud computing basis can involve extensive reengineering activities during the migration. To reduce the correspondent effort, it is often possible to deploy an existing system widely unmodified...
Provided By University of Kerman
-
An Extensible Architecture for Detecting Violations of a Cloud Environment's Constraints During Legacy Software System Migration
By utilizing cloud infrastructures or platforms as services, SaaS providers can counter fluctuating loads through smoothly scaling up and down and therefore improve resource- and cost-efficiency, or transfer responsibility for the maintenance of complete underlying software stacks to a cloud provider, for instance. The authors' model-based approach CloudMIG aims at...
Provided By University of Kerman
-
Cloud Computing Research Challenges
In recent times cloud computing has appeared as a new model for hosting and conveying services over the Internet. This model is striking to business vendors as it eradicates the requirement for users to plan in advance, and it permits the organization to start from low level and then add...
Provided By University of Science and Technology Houari Boumediene
-
TCLOUD: Challenges and Best Practices for Cloud Computing
Cloud computing has achieved an unbelievable adoption response rate but still its infancy stage is not over. It is an emerging paradigm and amazingly gaining popularity. The size of the market shared of the applications provided by cloud computing is still not much behind the expectations. It provides the organizations...
Provided By University of Science and Technology Houari Boumediene
-
Cloud Computing Based Visual Backchannel for Web Based Events
The cloud computing based Visual Backchannel for web based events as a novel way of following and exploring online conversations about events. Micro blogging communities, such as Twitter, are increasingly used as digital backchannels for timely exchange of brief comments and impressions during political speeches, sport competitions, natural disasters, and...
Provided By International Journal of Computer Science and Information Technologies
-
A Review of Storage and Fault Tolerance Approaches Used in Cloud Computing
Cloud computing has gained significant traction in recent years. Companies such as Google, Amazon and Microsoft have been building massive data centers over the past few years. Spanning geographic and administrative domains, these data centers tend to be built out of commodity desktops with the total number of computers managed...
Provided By International Journal of Computer Science and Information Technologies
-
Clustering Technique to Interpret Numerical Weather Prediction Output Products for Forecast of Cloudburst
With the advent of digital computers and their continuous increasing processing power, the 'Numerical Weather Prediction' (NWP) models which solve a close set of equations of atmospheric model, have been adopted by most of the meteorological services to issue day to day weather forecasts. These forecasts are issued for public...
Provided By International Journal of Computer Science and Information Technologies
-
A Generalized Framework for Building Scalable Load Balancing Architectures in the Cloud
Load Balancing in cloud computing is dissimilar from conventional load balancing techniques, because of the limitations in conventional load balancing techniques if the authors are deployed in the cloud; hence, they are unsuitable for the cloud environment. Since, the cloud is designed to provide scalable infrastructure, it is difficult to...
Provided By International Journal of Computer Science and Information Technologies
-
The Fault Management System Using Amazon EC2: Web Application Deployment on Cloud
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Fault Management System is a key part in Network Management Architecture consists of functions such as detect, isolate, determine the cause and correct the malfunctions in network. The entire application is deployed...
Provided By International Journal of Computer Science and Information Technologies
-
Clonal Selection Method for Virus Detection in a Cloud
The Biological Immune System (BIS) is to protect the human body against attack from the antigen such as virus, bacteria, fungi and other parasites and eliminates it from the infected cells. Artificial Immune System (AIS) are the machine acquiring algorithm that be some of the principles and effort to accept...
Provided By International Journal of Computer Science and Information Technologies
-
Integrating Service Failure and Recovery into Knowledge Management
Service failure and recovery is a well-established area of services research. Research has shown that service recovery is critically important from a managerial perspective in terms of maintaining customer relationships. Yet few firms excel at handling service failures. There are a growing number of managers who claim that customers tend...
Provided By IBIMA Publishing
-
Cloud Computing Development Strengthens Delegated Information Processing as the New Information-Communications Ecosystem
Information-communications systems, consisting of three core categories: information (content), communication mechanism (currently dominated by Internet), and services (data/information processing, content delivery, etc.) were changing over time from the distributed processing to the cloud computing. Current cloud computing development gives the basis for delegated information processing deployment. These systems differentiate from...
Provided By IBIMA Publishing
-
A Community Cloud Platform Model Supporting Cross-Domain Business Collaboration
Cloud computing is becoming a new application model for small and medium-sized enterprises to share hardware and software resources on-demand over the Internet. Despite the flourish of the cloud computing, there are many challenges, including establishing a model to make the cross-domain business collaboration between enterprises possible. In this paper,...
Provided By Shandong Institute of Business And Technology
-
Custom-Made Cloud Enterprise Architecture for Small Medium and Micro Enterprises
Small, Medium, and Micro Enterprises (SMMEs) usually do not have adequate funds to acquire ICT infrastructure and often use cloud computing. In this paper, the authors discuss the implementation of Virtual Enterprises (VE) to enable SMMEs to respond quickly to customers' demands and market opportunities. The virtual enterprise model is...
Provided By University of Zimbabwe
-
An Architecture Based on SOA and Virtual Enterprise Principles: OpenNebula for Cloud Deployment
Today enterprises have to survive in a dynamically changing business environment. Cloud computing presents a new business model where the Information Technology services supporting the business are provided by partners rather than in-house. The idea of cloud computing is on providing information technology resources over the Internet as-a-service to its...
Provided By University of Zimbabwe