15,535 research outputs found
Algorithms for advance bandwidth reservation in media production networks
Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results
A Research Agenda for Studying Open Source I: A Multi-Level Framework
This paper presents a research agenda for studying information systems using open source software A multi-level research model is developed at five discrete levels of analysis: (1) the artifact; (2) the individual; (3) the team, project, and community; (4) the organization; and (5) society. Each level is discussed in terms of key issues within the level. Examples are based on prior research. In a companion paper, [Niederman, et al 2006], we view the agenda through the lens of referent discipline theories
ClouNS - A Cloud-native Application Reference Model for Enterprise Architects
The capability to operate cloud-native applications can generate enormous
business growth and value. But enterprise architects should be aware that
cloud-native applications are vulnerable to vendor lock-in. We investigated
cloud-native application design principles, public cloud service providers, and
industrial cloud standards. All results indicate that most cloud service
categories seem to foster vendor lock-in situations which might be especially
problematic for enterprise architectures. This might sound disillusioning at
first. However, we present a reference model for cloud-native applications that
relies only on a small subset of well standardized IaaS services. The reference
model can be used for codifying cloud technologies. It can guide technology
identification, classification, adoption, research and development processes
for cloud-native application and for vendor lock-in aware enterprise
architecture engineering methodologies
Risk Management Considerations in Cloud Computing Adoption
Information and Communication Technology (ICT) plays
a pivotal role in enabling organizational capability and
productivity, and in initiating and facilitating innovation
across all industry sectors. In recent years, cloud
computing has emerged as a growing trend because it
serves as an enabler of scalable, flexible and powerful
computing. Consequently, each year significant global
investment is made in migrating to the cloud
environment. However, despite its growing popularity,
several risks and security concerns surround the cloud
computing model. Therefore, understanding an
organization’s readiness and ability to mitigate
associated risks is critical prior to embarking on the
cloud computing journey. One approach to determining
an organization’s ability to effectively migrate to the
cloud is to determine the current maturity of both its
cloud computing capabilities and its risk management
capabilities. As such, the Cloud Computing tool and the
Risk Management (RM) Critical Capability of the IT
Capability Maturity Framework (IT-CMF) are proposed
as effective maturity assessment instruments to enable
organizations to establish future roadmaps that will
improve their maturity with respect to their cloud
computing readiness. Increasing the level of maturity
improves organizational practices surrounding the
identification and mitigation of risks/threats that pertain
to the cloud environment
- …