12,176 research outputs found

    A Holistic Decision Framework to Avoid Vendor Lock-in for Cloud SaaS Migration

    Get PDF
    Cloud computing offers an innovative business model to enterprise for IT services consumption and delivery. Software as a Service (SaaS) is one of the cloud offerings that attract organisations as a potential solution in reducing their IT cost. However, the vast diversity among the available cloud SaaS services makes it difficult for customers to decide whose vendor services to use or even to determine a valid basis for their selections. Moreover, this variety of cloud SaaS services has led to proprietary architectures and technologies being used by cloud vendors, increasing the risk of vendor lock-in for customers. Therefore, when enterprises interact with SaaS providers within the purview of the current cloud marketplace, they often encounter significant lock-in challenges to migrating and interconnecting cloud. Hence, the complexity and variety of cloud SaaS service offerings makes it imperative for businesses to use a clear and well understood decision process to procure, migrate and/or discontinue cloud services. To date, the expertise and technological solutions to simplify such transition and facilitate good decision making to avoid lock-in risks in the cloud are limited. Besides, little investigation has been carried out to provide a comprehensive decision framework to support enterprises on how to avoid lock-in risks when selecting and implementing cloud-based SaaS solutions within existing environments. Such decision framework is important to reduce complexity and variations in implementation patterns on the cloud provider side, while at the same time minimising potential switching cost for enterprises by resolving integration issues with existing IT infrastructures. This paper proposes a holistic 6-step decision framework that enables an enterprise to assess its current IT landscape for potential SaaS replacement, and provides effective strategies to mitigate vendor lock-in risks in cloud (SaaS) migration. The framework follows research findings and addresses the core requirements for choosing vendor-neutral interoperable and portable cloud services without the fear of vendor lock-in, and architectural decisions for secure SaaS migration. Therefore, the results of this research can help IT managers have a safe and effective migration to cloud computing SaaS environment

    Scalable discovery of hybrid process models in a cloud computing environment

    Get PDF
    Process descriptions are used to create products and deliver services. To lead better processes and services, the first step is to learn a process model. Process discovery is such a technique which can automatically extract process models from event logs. Although various discovery techniques have been proposed, they focus on either constructing formal models which are very powerful but complex, or creating informal models which are intuitive but lack semantics. In this work, we introduce a novel method that returns hybrid process models to bridge this gap. Moreover, to cope with today’s big event logs, we propose an efficient method, called f-HMD, aims at scalable hybrid model discovery in a cloud computing environment. We present the detailed implementation of our approach over the Spark framework, and our experimental results demonstrate that the proposed method is efficient and scalabl

    Towards Smarter Management of Overtourism in Historic Centres Through Visitor-Flow Monitoring

    Get PDF
    Historic centres are highly regarded destinations for watching and even participating in diverse and unique forms of cultural expression. Cultural tourism, according to the World Tourism Organization (UNWTO), is an important and consolidated tourism sector and its strong growth is expected to continue over the coming years. Tourism, the much dreamt of redeemer for historic centres, also represents one of the main threats to heritage conservation: visitors can dynamize an economy, yet the rapid growth of tourism often has negative effects on both built heritage and the lives of local inhabitants. Knowledge of occupancy levels and flows of visiting tourists is key to the efficient management of tourism; the new technologies—the Internet of Things (IoT), big data, and geographic information systems (GIS)—when combined in interconnected networks represent a qualitative leap forward, compared to traditional methods of estimating locations and flows. A methodology is described in this paper for the management of tourism flows that is designed to promote sustainable tourism in historic centres through intelligent support mechanisms. As part of the Smart Heritage City (SHCITY) project, a collection system for visitors is developed. Following data collection via monitoring equipment, the analysis of a set of quantitative indicators yields information that can then be used to analyse visitor flows; enabling city managers to make management decisions when the tourism-carrying capacity is exceeded and gives way to overtourism.Funded by the Interreg Sudoe Programme of the European Regional Development Funds (ERDF

    The Analysis of Data Tampering and Forensics in a Cloud Environment

    Get PDF
    In cloud systems, where sensitive data is stored and processed remotely, data manipulation is a serious security problem. The issues of data tampering in cloud environments are explored in this research, along with the importance of forensic investigation in reducing its effects. We explore several data tampering techniques and illustrate the need for strong security measures to guard against unlawful behavior. This paper also covers forensic analysis methods, tools, and techniques that are crucial in locating, analyzing, and minimizing data tampering instances in cloud systems. The security posture associated with cloud infrastructures can be greatly improved by integrating cutting-edge forensic procedures, ensuring data integrity, confidentiality, and overall system dependability

    Designing Human-Centered Collective Intelligence

    Get PDF
    Human-Centered Collective Intelligence (HCCI) is an emergent research area that seeks to bring together major research areas like machine learning, statistical modeling, information retrieval, market research, and software engineering to address challenges pertaining to deriving intelligent insights and solutions through the collaboration of several intelligent sensors, devices and data sources. An archetypal contextual CI scenario might be concerned with deriving affect-driven intelligence through multimodal emotion detection sources in a bid to determine the likability of one movie trailer over another. On the other hand, the key tenets to designing robust and evolutionary software and infrastructure architecture models to address cross-cutting quality concerns is of keen interest in the “Cloud” age of today. Some of the key quality concerns of interest in CI scenarios span the gamut of security and privacy, scalability, performance, fault-tolerance, and reliability. I present recent advances in CI system design with a focus on highlighting optimal solutions for the aforementioned cross-cutting concerns. I also describe a number of design challenges and a framework that I have determined to be critical to designing CI systems. With inspiration from machine learning, computational advertising, ubiquitous computing, and sociable robotics, this literature incorporates theories and concepts from various viewpoints to empower the collective intelligence engine, ZOEI, to discover affective state and emotional intent across multiple mediums. The discerned affective state is used in recommender systems among others to support content personalization. I dive into the design of optimal architectures that allow humans and intelligent systems to work collectively to solve complex problems. I present an evaluation of various studies that leverage the ZOEI framework to design collective intelligence

    Managing Disaster In select Institutional Libraries in Delhi

    Get PDF
    Abstracts: The present paper seeks to contribute some insights into the different potential disasters that libraries are vulnerable to. The study is primarily built upon a comprehensive review of the literature. Further, the study is divided into two parts; first part, covers different disasters, policies, insurance, and role of the government in managing such disasters. The second part of the study throw light on the level of preparedness for mitigating different disasters, frequency of inspection of the equipment’s, safety guidelines and so on, to lessen the impact of disasters, basic strategies to protect any disaster in the library, frequency of power-backups, technicalities to avoid digital disasters and availability of insurance policy in the libraries. finally, the manuscript also consists of a disaster preparedness model which will be helpful in understanding the librarian to do/have list for their respective libraries
    • 

    corecore