699,290 research outputs found

    Web 2.0 and micro-businesses: An exploratory investigation

    Get PDF
    This is the author's final version of the article. This article is (c) Emerald Group Publishing and permission has been granted for this version to appear here. Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.This article was chosen as a Highly Commended Award Winner at the Emerald Literati Network Awards for Excellence 2013.Purpose – The paper aims to report on an exploratory study into how small businesses use Web 2.0 information and communication technologies (ICT) to work collaboratively with other small businesses. The study had two aims: to investigate the benefits available from the use of Web 2.0 in small business collaborations, and to characterize the different types of such online collaborations. Design/methodology/approach – The research uses a qualitative case study methodology based on semi-structured interviews with the owner-managers of 12 UK-based small companies in the business services sector who are early adopters of Web 2.0 technologies. Findings – Benefits from the use of Web 2.0 are categorized as lifestyle benefits, internal operational efficiency, enhanced capability, external communications and enhanced service offerings. A 2×2 framework is developed to categorize small business collaborations using the dimensions of the basis for inter-organizational collaboration (control vs cooperation) and the level of Web 2.0 ICT use (simple vs sophisticated). Research limitations/implications – A small number of firms of similar size, sector and location were studied, which limits generalizability. Nonetheless, the results offer a pointer to the likely future use of Web 2.0 tools by other small businesses. Practical implications – The research provides evidence of the attraction and potential of Web 2.0 for collaborations between small businesses. Originality/value – The paper is one of the first to report on use of Web 2.0 ICT in collaborative working between small businesses. It will be of interest to those seeking a better understanding of the potential of Web 2.0 in the small business community.WestFocu

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided

    Taxonomy of P2P Applications

    Get PDF
    Peer-to-peer (p2p) networks have gained immense popularity in recent years and the number of services they provide continuously rises. Where p2p-networks were formerly known as file-sharing networks, p2p is now also used for services like VoIP and IPTV. With so many different p2p applications and services the need for a taxonomy framework rises. This paper describes the available p2p applications grouped by the services they provide. A taxonomy framework is proposed to classify old and recent p2p applications based on their characteristics

    Architectures for smart end-user services in the power grid

    Get PDF
    Abstract-The increase of distributed renewable electricity generators, such as solar cells and wind turbines, requires a new energy management system. These distributed generators introduce bidirectional energy flows in the low-voltage power grid, requiring novel coordination mechanisms to balance local supply and demand. Closed solutions exist for energy management on the level of individual homes. However, no service architectures have been defined that allow the growing number of end-users to interact with the other power consumers and generators and to get involved in more rational energy consumption patterns using intuitive applications. We therefore present a common service architecture that allows houses with renewable energy generation and smart energy devices to plug into a distributed energy management system, integrated with the public power grid. Next to the technical details, we focus on the usability aspects of the end-user applications in order to contribute to high service adoption and optimal user involvement. The presented architecture facilitates end-users to reduce net energy consumption, enables power grid providers to better balance supply and demand, and allows new actors to join with new services. We present a novel simulator that allows to evaluate both the power grid and data communication aspects, and illustrate a 22% reduction of the peak load by deploying a central coordinator inside the home gateway of an end-user

    Exploiting peer group concept for adaptive and highly available services

    Full text link
    This paper presents a prototype for redundant, highly available and fault tolerant peer to peer framework for data management. Peer to peer computing is gaining importance due to its flexible organization, lack of central authority, distribution of functionality to participating nodes and ability to utilize unused computational resources. Emergence of GRID computing has provided much needed infrastructure and administrative domain for peer to peer computing. The components of this framework exploit peer group concept to scope service and information search, arrange services and information in a coherent manner, provide selective redundancy and ensure availability in face of failure and high load conditions. A prototype system has been implemented using JXTA peer to peer technology and XML is used for service description and interfaces, allowing peers to communicate with services implemented in various platforms including web services and JINI services. It utilizes code mobility to achieve role interchange among services and ensure dynamic group membership. Security is ensured by using Public Key Infrastructure (PKI) to implement group level security policies for membership and service access.Comment: The Paper Consists of 5 pages, 6 figures submitted in Computing in High Energy and Nuclear Physics, 24-28 March 2003 La Jolla California. CHEP0
    • 

    corecore