3,955 research outputs found

    Leveraging Service Incident Analytics to Determine Cost-Optimal Service Offers

    Get PDF
    In this work we address the challenge for an IT service customer to select the cost-optimal service among different offers by external providers. We describe the customer’s optimization problem by considering the negative monetary impact of potential service incidents on its business. First, we demonstrate that the information currently used in service level agreements may lead to suboptimal customer decisions. Second, we discuss how providers’ private information about the behavior of service delivery environments could be leveraged by the customer when selecting service offers. Third, we propose a procurement auction as a mechanism to optimize total cost for the customer – choosing from different service offers by risk-neutral providers. In introducing this approach, we suggest that customers and providers collaborate to define service performance measures, which allow providers to better tailor service offers to customers’ business requirements

    Machine Learning and AI in Business Intelligence: Trends and Opportunities

    Get PDF
    The integration of machine learning and artificial intelligence (AI) in business intelligence has brought forth a plethora of trends and opportunities. These cutting-edge technologies have revolutionized how businesses analyze data, gain insights, and make informed decisions. One prominent trend is the rise of predictive analytics. Machine learning algorithms can sift through vast amounts of historical data to identify patterns and trends, enabling businesses to make accurate predictions about future outcomes. This empowers organizations to optimize operations, anticipate customer needs, and mitigate risks.  By leveraging business intelligence, companies can uncover hidden patterns, identify opportunities for growth and improvement, optimize business processes, and ultimately make informed decisions that drive their success. Another trend is the adoption of AI-powered chatbots and virtual assistants. The opportunities presented by machine learning and AI in business intelligence are extensive. From automated data analysis and anomaly detection to demand forecasting and dynamic pricing, these technologies empower businesses to optimize processes, reduce costs, and identify new revenue streams. In conclusion, the integration of machine learning and AI in business intelligence offers promising trends and abundant opportunities. By leveraging these technologies, businesses can gain a competitive edge, drive innovation, and unlock new levels of success in the digital era

    A SITUATION AWARENESS DRIVEN DESIGN FOR PREDICTIVE MAINTENANCE SYSTEMS: THE CASE OF OIL AND GAS PIPELINE OPERATIONS

    Get PDF
    The acquisition and processing of events from sensors or enterprise applications in real-time represent an essential part of many application domains such as the Internet of Things (IoT), offering benefits to predict the future condition of equipment to prevent the occurrence of failures. Many organisations already use some form of predictive maintenance to monitor performance or keep track of emerging business situations. However, the optimal design of applications to allow an effective Predictive Mainte-nance System (PMS) capable of analysing and processing large amounts of data is only scarcely exam-ined by Information Systems (IS) research. Due to the number, frequency, and the need for near-real-time evaluation systems must be capable of detecting complex event patterns based on spatial, temporal, or causal relationships on data streams (i.e. via Complex Event Processing). At the same time, however, due to the technical complexity, available systems today are static, since the creation and adaptation of recognisable situations results in slow development cycles. In addition, technical feasibility is only one prerequisite for predictive maintenance. Users must be capable of processing this vast amount of data presented without considerable cognitive effort. Precisely this challenge is even more daunting as op-erational maintenance personnel have to manage business-critical decisions with increasing frequency and short time. Research in Human Factors (HF) suggests Situation Awareness (SA) as a crucial sys-tem’s design paradigm allowing human beings to understand and anticipate the information available effectively. Building on this concept, this paper proposes a PMS for promoting operational decision makers’ Situation Awareness by three design principles (DP): Sensing, Acting, and Tracking. Based on these DPs, we implemented a PMS prototype for a scenario in Oil and Gas pipeline operations. Our finding suggest that the use of SA is of particular interest in realizing effective PMS

    On-Premise AIOps Infrastructure for a Software Editor SME: An Experience Report

    Full text link
    Information Technology has become a critical component in various industries, leading to an increased focus on software maintenance and monitoring. With the complexities of modern software systems, traditional maintenance approaches have become insufficient. The concept of AIOps has emerged to enhance predictive maintenance using Big Data and Machine Learning capabilities. However, exploiting AIOps requires addressing several challenges related to the complexity of data and incident management. Commercial solutions exist, but they may not be suitable for certain companies due to high costs, data governance issues, and limitations in covering private software. This paper investigates the feasibility of implementing on-premise AIOps solutions by leveraging open-source tools. We introduce a comprehensive AIOps infrastructure that we have successfully deployed in our company, and we provide the rationale behind different choices that we made to build its various components. Particularly, we provide insights into our approach and criteria for selecting a data management system and we explain its integration. Our experience can be beneficial for companies seeking to internally manage their software maintenance processes with a modern AIOps approach

    DevOps for Digital Leaders

    Get PDF
    DevOps; continuous delivery; software lifecycle; concurrent parallel testing; service management; ITIL; GRC; PaaS; containerization; API management; lean principles; technical debt; end-to-end automation; automatio

    GPT Models in Construction Industry: Opportunities, Limitations, and a Use Case Validation

    Full text link
    Large Language Models(LLMs) trained on large data sets came into prominence in 2018 after Google introduced BERT. Subsequently, different LLMs such as GPT models from OpenAI have been released. These models perform well on diverse tasks and have been gaining widespread applications in fields such as business and education. However, little is known about the opportunities and challenges of using LLMs in the construction industry. Thus, this study aims to assess GPT models in the construction industry. A critical review, expert discussion and case study validation are employed to achieve the study objectives. The findings revealed opportunities for GPT models throughout the project lifecycle. The challenges of leveraging GPT models are highlighted and a use case prototype is developed for materials selection and optimization. The findings of the study would be of benefit to researchers, practitioners and stakeholders, as it presents research vistas for LLMs in the construction industry.Comment: 58 pages, 20 figure

    Evaluation of Cloud-Based Cyber Security System

    Get PDF
    Cloud-based cyber security systems leverage the power of cloud computing to protect digital assets from cyber threats. By utilizing remote servers and advanced algorithms, these systems provide real-time monitoring, threat detection, and incident response. They offer scalable solutions, enabling businesses to adapt to evolving threats and handle increasing data volumes. Cloud-based security systems provide benefits such as reduced infrastructure costs, continuous updates and patches, centralized management, and global threat intelligence. They protect against various attacks, including malware, phishing, DDoS, and unauthorized access. With their flexibility, reliability, and ease of deployment, cloud-based cyber security systems are becoming essential for organizations seeking robust protection in today's interconnected digital landscape. The research significance of cloud-based cyber security systems lies in their ability to address the growing complexity and scale of cyber threats in today's digital landscape. By leveraging cloud computing, these systems offer several key advantages for researchers and organizations: Scalability: Cloud-based systems can scale resources on-demand, allowing researchers to handle large volumes of data and analyze complex threat patterns effectively. Cost-efficiency: The cloud eliminates the need for extensive on-premises infrastructure, reducing costs associated with hardware, maintenance, and upgrades. Researchers can allocate resources based on their needs, optimizing cost-effectiveness. Real-time monitoring and threat detection: Cloud-based systems provide real-time monitoring of network traffic, enabling quick identification of suspicious activities and potential threats. Researchers can leverage advanced analytics and machine learning algorithms to enhance threat detection capabilities. Collaboration and knowledge sharing: Cloud platforms facilitate collaboration among researchers and organizations by enabling the sharing of threat intelligence, best practices, and research findings. Compliance and regulatory requirements: Cloud platforms often offer built-in compliance features and tools to meet regulatory requirements, assisting researchers in adhering to data protection and privacy standards. Overall, the research significance of cloud-based cyber security systems lies in their ability to provide scalable, cost-effective, and advanced security capabilities, empowering researchers to mitigate evolving cyber threats and protect sensitive data and systems effectively. We will be using Weighted Product Methodology (WPM) which is a decision-making technique that assigns weights to various criteria and ranks alternatives based on their weighted scores. It involves multiplying the ratings of each criterion by their corresponding weights and summing them up to determine the overall score. This method helps prioritize options and make informed decisions in complex situations. Taken of Operational, Technological, Organizational Recorded Electronic Delivery, Recorded Electronic Deliver, Blockchain technology, Database security, Software updates, Antivirus and antimalware The Organizational cyber security measures comes in last place, while Technological cyber security measures is ranked top and Operational measures comes in between the above two in second place. In conclusion, a cloud-based cyber security system revolutionizes the way organizations safeguard their digital assets. By utilizing remote servers, advanced algorithms, and real-time monitoring, it offers scalable and robust protection against evolving threats. With features like threat detection, data encryption, and centralized management, it ensures enhanced security, agility, and efficiency. Embracing a cloud-based approach empowers organizations to stay ahead in the ever-changing landscape of cyber security, effectively safeguarding their critical data and infrastructure

    Distributed Triangle Counting in the Graphulo Matrix Math Library

    Full text link
    Triangle counting is a key algorithm for large graph analysis. The Graphulo library provides a framework for implementing graph algorithms on the Apache Accumulo distributed database. In this work we adapt two algorithms for counting triangles, one that uses the adjacency matrix and another that also uses the incidence matrix, to the Graphulo library for server-side processing inside Accumulo. Cloud-based experiments show a similar performance profile for these different approaches on the family of power law Graph500 graphs, for which data skew increasingly bottlenecks. These results motivate the design of skew-aware hybrid algorithms that we propose for future work.Comment: Honorable mention in the 2017 IEEE HPEC's Graph Challeng

    DevOps for Digital Leaders

    Get PDF
    DevOps; continuous delivery; software lifecycle; concurrent parallel testing; service management; ITIL; GRC; PaaS; containerization; API management; lean principles; technical debt; end-to-end automation; automatio

    Technologies and Applications for Big Data Value

    Get PDF
    This open access book explores cutting-edge solutions and best practices for big data and data-driven AI applications for the data-driven economy. It provides the reader with a basis for understanding how technical issues can be overcome to offer real-world solutions to major industrial areas. The book starts with an introductory chapter that provides an overview of the book by positioning the following chapters in terms of their contributions to technology frameworks which are key elements of the Big Data Value Public-Private Partnership and the upcoming Partnership on AI, Data and Robotics. The remainder of the book is then arranged in two parts. The first part “Technologies and Methods” contains horizontal contributions of technologies and methods that enable data value chains to be applied in any sector. The second part “Processes and Applications” details experience reports and lessons from using big data and data-driven approaches in processes and applications. Its chapters are co-authored with industry experts and cover domains including health, law, finance, retail, manufacturing, mobility, and smart cities. Contributions emanate from the Big Data Value Public-Private Partnership and the Big Data Value Association, which have acted as the European data community's nucleus to bring together businesses with leading researchers to harness the value of data to benefit society, business, science, and industry. The book is of interest to two primary audiences, first, undergraduate and postgraduate students and researchers in various fields, including big data, data science, data engineering, and machine learning and AI. Second, practitioners and industry experts engaged in data-driven systems, software design and deployment projects who are interested in employing these advanced methods to address real-world problems
    • …
    corecore