11,421 research outputs found

    Government cloud computing and the policies of data sovereignty

    Get PDF
    Government cloud services are a new development at the intersection of electronic government and cloud computing which holds the promise of rendering government service delivery more effective and efficient. Cloud services are virtual, dynamic and potentially stateless which has triggered governments' concern about data sovereignty. This paper explores data sovereignty in relation to government cloud services and how national strategies and international policy evolve. It concludes that for countries data sovereignty presents a legal risk which can not be adequately addressed with technology or through contractual arrangements alone. Governments therefore adopt strategies to retain exclusive jurisdiction over government information. --cloud computing,electronic government,data sovereignty,data ownership,information assurance,international data transfers

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    Mediating Role of Trust Brief in SMEs’ Strategic Choice of Cloud Service

    Get PDF
    This study draws on organizational-environmental framework and trust research to investigate SMEs’ transformation toward cloud service. This study regards cloud service transformation as a strategic choice of SMEs and highlights organizations’ trust based rationality. This study develops a research model in which SMEs’ trust belief on cloud service mediates the effects of the organizational-environmental determinants on SMEs’ strategic choice. A survey involving 107 Chinese SMEs was conducted to validate the research model. The results from empirical data provide strong supports on the hypotheses. Theoretical and practical implications are discussed

    Multinational perspectives on information technology from academia and industry

    Get PDF
    As the term \u27information technology\u27 has many meanings for various stakeholders and continues to evolve, this work presents a comprehensive approach for developing curriculum guidelines for rigorous, high quality, bachelor\u27s degree programs in information technology (IT) to prepare successful graduates for a future global technological society. The aim is to address three research questions in the context of IT concerning (1) the educational frameworks relevant for academics and students of IT, (2) the pathways into IT programs, and (3) graduates\u27 preparation for meeting future technologies. The analysis of current trends comes from survey data of IT faculty members and professional IT industry leaders. With these analyses, the IT Model Curricula of CC2005, IT2008, IT2017, extensive literature review, and the multinational insights of the authors into the status of IT, this paper presents a comprehensive overview and discussion of future directions of global IT education toward 2025

    Red Skies in the Morning—Professional Ethics at the Dawn of Cloud Computing

    Get PDF
    The article evaluates risks to clients’ confidential and privileged information when lawyers or law firms store such information in any cloud computing “space” against the requirements of the Model Rules of Professional Conduct and the New York Rules of Professional Conduct. It also evaluates pertinent liability provisions of some of the more commonly used cloud computing services (Amazon.com and Google) against the lawyer’s responsibilities. An interesting portion covers the latest thinking from NIST on cloud computing benefits and risks

    5G Internet of Things: A survey

    Get PDF
    © 2018 The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today's IoT that can boost cellular operations, IoT security, and network challenges and driving the Internet future to the edge. The existing IoT solutions are facing a number of challenges such as large number of connection of nodes, security, and new standards. This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT

    Optimized Pricing Scheme in Cloud Environment Using Dedupication

    Get PDF
    IAAS environment is referred as resources with VM instanSces. Customers can?t utilize all resource, but provide full charge for allocated storage.And in server side, storage are not utilized, so scalability become degraded. Implement best billing cycle for access and utilize the resources. Data Deduplication is becoming increasingly popular in storage systems as a space-efficient approach to data backup. Present SiLo, a near-exact deduplication system.That effectively and complementarily exploits similarity and locality to achieve high duplicate elimination. The data secure storing and sharing of the files

    TOWARDS A BRIGHT FUTURE: ENHANCING DIFFUSION OF CONTINUOUS CLOUD SERVICE AUDITING BY THIRD PARTIES

    Get PDF
    Using cloud services empowers organizations to achieve various financial and technical benefits. Nonetheless, customers are faced with a lack of control since they cede control over their IT resources to the cloud providers. Independent third party assessments have been recommended as good means to counteract this lack of control. However, current third party assessments fail to cope with an ever-changing cloud computing environment. We argue that continuous auditing by third parties (CATP) is required to assure continuously reliable and secure cloud services. Yet, continuous auditing has been applied mostly for internal purposes, and adoption of CATP remains lagging behind. Therefore, we examine the adoption process of CATP by building on the lenses of diffusion of innovations theory as well as conducting a scientific database search and various interviews with cloud service experts. Our findings reveal that relative advantages, a high degree of compatibility and observability of CATP would strongly enhance adoption, while a high complexity and a limited trialability might hamper diffusion. We contribute to practice and research by advancing the understanding of the CATP adop-tion process by providing a synthesis of relevant attributes that influence adoption rate. More im-portantly, we provide recommendations on how to enhance the adoption process
    • …
    corecore