17,340 research outputs found
A framework and tool to manage Cloud Computing service quality
Cloud Computing has generated considerable interest in both companies specialized
in Information and Communication Technology and business context in general.
The Sourcing Capability Maturity Model for service (e-SCM) is a capability model for
offshore outsourcing services between clients and providers that offers appropriate strategies
to enhance Cloud Computing implementation. It intends to achieve the required
quality of service and develop an effective working relationship between clients and
providers. Moreover, quality evaluation framework is a framework to control the quality of
any product and/or process. It offers a tool support that can generate software artifacts to
manage any type of product and service efficiently and effectively. Thus, the aim of this
paper was to make this framework and tool support available to manage Cloud Computing
service quality between clients and providers by means of e-SCM.Ministerio de Ciencia e Innovación TIN2013-46928-C3-3-RJunta de AndalucÃa TIC-578
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS
This case study illustrates the potential benefits and risks associated with
the migration of an IT system in the oil & gas industry from an in-house data
center to Amazon EC2 from a broad variety of stakeholder perspectives across
the enterprise, thus transcending the typical, yet narrow, financial and
technical analysis offered by providers. Our results show that the system
infrastructure in the case study would have cost 37% less over 5 years on EC2,
and using cloud computing could have potentially eliminated 21% of the support
calls for this system. These findings seem significant enough to call for a
migration of the system to the cloud but our stakeholder impact analysis
revealed that there are significant risks associated with this. Whilst the
benefits of using the cloud are attractive, we argue that it is important that
enterprise decision-makers consider the overall organizational implications of
the changes brought about with cloud computing to avoid implementing local
optimizations at the cost of organization-wide performance.Comment: Submitted to IEEE CLOUD 201
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification
The past decade has seen an increasing interest in IT outsourcing as it promises companies many economic benefits. In recent years, IT paradigms, such as Software-as-a-Service or Cloud Computing using third-party services, are increasingly adopted. Current studies show that IT security and data privacy are the dominant factors affecting the perceived risk of IT outsourcing. Therefore, we explicitly focus on determining the technological risks related to IT security and quality of service characteristics associated with IT outsourcing. We conducted an extensive literature review, and thoroughly document the process in order to reach high validity and reliability. 149 papers have been evaluated based on a review of the whole content and out of the finally relevant 68 papers, we extracted 757 risk items. Using a successive refinement approach, which involved reduction of similar items and iterative re-grouping, we establish a taxonomy with nine risk categories for the final 70 technological risk items. Moreover, we describe how the taxonomy can be used to support the first two phases of the IT risk management process: risk identification and quantification. Therefore, for each item, we give parameters relevant for using them in an existing mathematical risk quantification model
Recommended from our members
Diverse virtual social networks: Implications for remote software testing teams
This paper evaluates offshore outsourcing in the IT testing industry and determines what conditions determine its success. There is particular focus on the influence of diversity in teams on group relationships. Two studies are described: the first, investigated the perceptions of professional software testers on the critical factors of offshore outsourcing; and the second study looked at the ability for diverse teams to form close working relationships through virtual networks. We find that overt diversity factors inhibit interaction across nationality boundaries. The limitations of virtual networks for fostering personal communications is apparent in preventing group members from overcoming the initial aversion to mix with out-group members, which could be achieved with closer and more personal communications between members with different diversity factors in normal face to face communications. Where software testing teams are outsourced globaly, and must rely on virtual communications, there seems potential for significant difficulties in developing close working relationships, which on the one hand, can be negative for group cohesion, but one the other hand, can be positive for encouraging imparitality
Sedimentology and reservoir properties of tabular and erosive offshore transition deposits in wave-dominated, shallow-marine strata : Book cliffs, USA
Acknowledgements and Funding Funding for this study was provided from the Research Council of Norway (Petromaks project 193059) and the FORCE Safari project. The helicopter-LiDAR data was collected by J. Valet and S. Pitiot of Helimap System SA. Riegl LMS GmbH is acknowledged for software support for the outcrop models, and ROXAR is acknowledged for use of their RMS reservoir modelling package. A. Rittersbacher is acknowledged for processing the heli-LiDAR model. The first author would like to thank O. S. Mulelid-Tynes and G. Henstra for assistance in the field and for valuable discussions. G. Hampson is thanked for insightful comments that significantly improved this manuscriptPeer reviewedPostprin
Managing the outsourcing of information security processes: the 'cloud' solution
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT). Cloud computing (i.e., externalization of one or more IT services) might be a solution for organizations keen to maintain a good level of security. In this paper we discuss whether cloud computing is a valid alternative to in-house security processes and systems drawing on four mini-case studies of higher education institutions in New England, US. Our findings show that the organization’s IT spending capacity affects the choice to move to the cloud; however, the perceived security of the cloud and the perceived in-house capacity to provide high quality IT (and security) services moderate this relationship. Moreover, other variables such as (low) quality of technical support, relatively incomplete contracts, poor defined Service License Agreements (SLA), and ambiguities over data ownership affect the choice to outsource IT (and security) using the cloud. We suggest that, while cloud computing could be a useful means of IT outsourcing, there needs to be a number of changes and improvements to how the service is currently delivered
- …