50,749 research outputs found

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Foreign Direct Investments in Business Services: Transforming the VisegrĂĄd Four Region into a Knowledge-based Economy?

    Get PDF
    Foreign direct investments (FDIs) in the service sector are widely attributed an important role in bringing more skill-intensive activities into the Visegrad Four (V4). This region—comprising Poland, the Czech Republic, Hungary and Slovakia—relied heavily on FDIs in manufacturing, which was often found to generate activities with limited skill content. This contribution deconstructs the chaotic concept of “business services” by analysing the actual nature of service sector activities outsourced and offshored to the V4. Using the knowledge-based economy (KBE) as a benchmark, the paper assesses the potential of service sector outsourcing in contributing to regional competitiveness by increasing the innovative capacity. It also discusses the role of state policies towards service sector FDI (SFDI). The analysis combines data obtained from case studies undertaken in service sector outsourcing projects in V4 countries. Moreover, it draws on interviews with senior employees of investment promotion agencies and publicly available data and statistics on activities within the service sector in the region. It argues that the recent inward investments in business services in the V4 mainly utilize existing local human capital resources, and their contribution to the development of the KBE is limited to employment creation and demand for skilled labour

    Why do commercial companies contribute to open source software?

    Get PDF
    This is the post-print version of the Article. The official published version can be accessed from the link belowMany researchers have pointed out that the opensource movement is an interesting phenomenon that is difficult to explain with conventional economic theories. However, while there is no shortage on research on individuals’ motivation for contributing to opensource, few have investigated the commercial companies’ motivations for doing the same. A case study was conducted at three different companies from the IT service industry, to investigate three possible drivers: sale of complimentary services, innovation and open sourcing (outsourcing). We offer three conclusions. First, we identified three main drivers for contributing to opensource, which are (a) selling complimentary services, (b) building greater innovative capability and (c) cost reduction through open sourcing to an external community. Second, while previous research has documented that the most important driver is selling complimentary services, we found that this picture is too simple. Our evidence points to a broader set of motivations, in the sense that all our cases exhibit combinations of the three drivers. Finally, our findings suggest that there might be a shift in how commercial companies view opensource software. The companies interviewed have all expressed a moral obligation to contribute to open source

    Information systems offshore outsourcing: a descriptive analysis

    Get PDF
    Purpose - The present paper has as its aim to deepen in the study of Information Systems Offshore Outsourcing, proposing three essential steps to make this decision: weighing up the advantages and risks of Offshore Outsourcing; analysing the taxonomy of this phenomenon; and determining its current geography. Design/Methodology/Approach - With that objective in mind, it was decided to base the research work on the literature about this topic and the review of reports and statistics coming from different sources (consultants, the press, public institutions, etc.). Findings - Offshore Outsourcing has grown vertiginously in recent years. Its advantages exceed even those of onshore outsourcing, though it also involves greater risks derived from the (cultural and physical) distance existing between customer and provider. Various types of services and customer-provider relationships hide under the umbrella of Offshore Outsourcing; i.e. it is not a homogeneous phenomenon. The main Offshore Outsourcing customers can be found in the USA and Europe, mainly in the UK but also in other countries such as Germany and France. As for provider firms, most of them are located in Asia −outstandingly in India but also in China and Russia. At present, there are important providers scattered in other continents as well. Originality/Value - The conclusions suggest that the range of potential Offshore Outsourcing destinations must be widened and that the search for a provider cannot be based exclusively on cost savings; other considerations such as quality, security and proximity of the provider must also be taken into consideration. That is precisely the reason why the study of new countries like Spain as Offshore Outsourcing destinations is proposed

    Outsourcing and acquisition models comparison related to IT supplier selection decision analysis

    Get PDF
    This paper presents a comparison of acquisition models related to decision analysis of IT supplier selection. The main standards are: Capability Maturity Model Integration for Acquisition (CMMI-ACQ), ISO / IEC 12207 Information Technology / Software Life Cycle Processes, IEEE 1062 Recommended Practice for Software Acquisition, the IT Infrastructure Library (ITIL) and the Project Management Body of Knowledge (PMBOK) guide. The objective of this paper is to compare the previous models to find the advantages and disadvantages of them for the future development of a decision model for IT supplier selection

    A framework and tool to manage Cloud Computing service quality

    Get PDF
    Cloud Computing has generated considerable interest in both companies specialized in Information and Communication Technology and business context in general. The Sourcing Capability Maturity Model for service (e-SCM) is a capability model for offshore outsourcing services between clients and providers that offers appropriate strategies to enhance Cloud Computing implementation. It intends to achieve the required quality of service and develop an effective working relationship between clients and providers. Moreover, quality evaluation framework is a framework to control the quality of any product and/or process. It offers a tool support that can generate software artifacts to manage any type of product and service efficiently and effectively. Thus, the aim of this paper was to make this framework and tool support available to manage Cloud Computing service quality between clients and providers by means of e-SCM.Ministerio de Ciencia e InnovaciĂłn TIN2013-46928-C3-3-RJunta de AndalucĂ­a TIC-578
    • 

    corecore