11,030 research outputs found

    Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud: A Review

    Get PDF
    Cloud Computing has been accepted as the next generation architecture of IT Enterprise. The Cloud computing idea offers dynamically scalable resources provisioned as a service over and the Internet Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data and in use. various alternatives available for storage services, while data confidentiality is the solutions for the database as a service pattern are still undeveloped This architecture is supporting purely distributed clients to connect directly to an encrypted cloud database, and to execute simultaneous and independent operations including those modifying the database structure. The Access control policy is set out in which only authorised users are able to decrypt the stored information. This scheme prevents from replay attacks and supports formation, modification, and reading data stored in the cloud. This unique attribute, however, creates many new security challenges which have not been well understood. Security is to protect data from danger and vulnerability. There are various dangers and vulnerabilities to be handle. Various security issues and some of their solution are explained and are concentrating mainly on public cloud security issues and their solutions. Data should always be encrypted in a time when stored and transmitted

    Understanding Small Business Networking and ICTs: Exploring Face-to-Face and ICT-related opportunity creation mediated by Social Capital in East of England Micro-businesses

    Get PDF
    Small businesses that are sole traders or micro-businesses—with few, if any employees notoriously suffer from a ‘liability of smallness’ (Aldrich and Auster 1986), including poor access to various resources. However, many authors argue that the inherent problems of smallness can be overcome with networking and good network connections. Resources, the opportunities to access them and other benefits apparent from networks and networking are readily apparent in the literature. However, few articles, if any, have examined small business networking from the perspective of this study—using in-depth qualitative methods, the theoretical construct of social capital and exploring the increasing role of Information and Communication Technologies (ICTs) in networks and networking—as part of understanding a variety of entrepreneurial opportunities. This article provides much needed empirical insights on how and if ICTs support opportunity creation amongst small businesses within a spatial and social network perspective. Its ‘media ecology’ approach does not over-prioritise the role of ICTs, but instead examines their interrelationships with face-to-face contact—putting technology in its ‘place’. The article focuses on the notion of ‘opportunity creation’ from networks, since this is the outcome critical for the small businesses themselves in order to generate economic benefits for their business. It seeks to provide a higher level, outcomebased framework that helps specify the various sorts of opportunities created by networks for small businesses, based on original ethnographic material and findings from a case study of East of England micro-businesses

    Low Power Processor Architectures and Contemporary Techniques for Power Optimization – A Review

    Get PDF
    The technological evolution has increased the number of transistors for a given die area significantly and increased the switching speed from few MHz to GHz range. Such inversely proportional decline in size and boost in performance consequently demands shrinking of supply voltage and effective power dissipation in chips with millions of transistors. This has triggered substantial amount of research in power reduction techniques into almost every aspect of the chip and particularly the processor cores contained in the chip. This paper presents an overview of techniques for achieving the power efficiency mainly at the processor core level but also visits related domains such as buses and memories. There are various processor parameters and features such as supply voltage, clock frequency, cache and pipelining which can be optimized to reduce the power consumption of the processor. This paper discusses various ways in which these parameters can be optimized. Also, emerging power efficient processor architectures are overviewed and research activities are discussed which should help reader identify how these factors in a processor contribute to power consumption. Some of these concepts have been already established whereas others are still active research areas. © 2009 ACADEMY PUBLISHER
    • …
    corecore