1,557 research outputs found

    Inter-organizational fault management: Functional and organizational core aspects of management architectures

    Full text link
    Outsourcing -- successful, and sometimes painful -- has become one of the hottest topics in IT service management discussions over the past decade. IT services are outsourced to external service provider in order to reduce the effort required for and overhead of delivering these services within the own organization. More recently also IT services providers themselves started to either outsource service parts or to deliver those services in a non-hierarchical cooperation with other providers. Splitting a service into several service parts is a non-trivial task as they have to be implemented, operated, and maintained by different providers. One key aspect of such inter-organizational cooperation is fault management, because it is crucial to locate and solve problems, which reduce the quality of service, quickly and reliably. In this article we present the results of a thorough use case based requirements analysis for an architecture for inter-organizational fault management (ioFMA). Furthermore, a concept of the organizational respective functional model of the ioFMA is given.Comment: International Journal of Computer Networks & Communications (IJCNC

    Semantic-based policy engineering for autonomic systems

    No full text
    This paper presents some important directions in the use of ontology-based semantics in achieving the vision of Autonomic Communications. We examine the requirements of Autonomic Communication with a focus on the demanding needs of ubiquitous computing environments, with an emphasis on the requirements shared with Autonomic Computing. We observe that ontologies provide a strong mechanism for addressing the heterogeneity in user task requirements, managed resources, services and context. We then present two complimentary approaches that exploit ontology-based knowledge in support of autonomic communications: service-oriented models for policy engineering and dynamic semantic queries using content-based networks. The paper concludes with a discussion of the major research challenges such approaches raise

    Extended Fault Taxonomy of SOA-Based Systems

    Get PDF
    Service Oriented Architecture (SOA) is considered as a standard for enterprise software development. The main characteristics of SOA are dynamic discovery and composition of software services in a heterogeneous environment. These properties pose newer challenges in fault management of SOA-based systems (SBS). A proper understanding of different faults in an SBS is very necessary for effective fault handling. A comprehensive three-fold fault taxonomy is presented here that covers distributed, SOA specific and non-functional faults in a holistic manner. A comprehensive fault taxonomy is a key starting point for providing techniques and methods for accessing the quality of a given system. In this paper, an attempt has been made to outline several SBSs faults into a well-structured taxonomy that may assist developers to plan suitable fault repairing strategies. Some commonly emphasized fault recovery strategies are also discussed. Some challenges that may occur during fault handling of SBSs are also mentioned

    Governance, Decentralisation, and Poverty: The Case of Pakistan

    Get PDF
    Human development and human rights share a common vision and purpose: to secure the freedom, well being and dignity of humanity. Human development is as essential for human rights as the latter is for the former. Historical evidence suggests that the more civilised societies were those that gave a higher priority to both, for example, the Greek, the Roman and the enlightened years of early Islam. The freedom from want is perhaps the one inalienable right of humanity which stands between dignity and indignity and which must be mitigated against by both state and individual.1 For the first time in history mankind adopted these and other human rights when the Universal Declaration of Human Rights was adopted by the United Nations in 1948. Today all but one of the six core covenants and conventions have been ratified by at least 140 countries and state sponsored anti-poverty programmes were initiated globally, most with the help of civil society [UNDP (2000)]. The lessons from history clearly establish that for improving the social endowment of the poor the state and the individual are key players, money is a necessary requirement, good governance is critical to success and the participation of each component of society as a whole ensures sustainability and continued benefits beyond the initial attempts to mitigate the impact of poverty. In other words decentralisation is a key element to improve the lot of the people, particularly the poor and the disenfranchised.

    Security in Cloud Computing: Evaluation and Integration

    Get PDF
    Au cours de la dernière décennie, le paradigme du Cloud Computing a révolutionné la manière dont nous percevons les services de la Technologie de l’Information (TI). Celui-ci nous a donné l’opportunité de répondre à la demande constamment croissante liée aux besoins informatiques des usagers en introduisant la notion d’externalisation des services et des données. Les consommateurs du Cloud ont généralement accès, sur demande, à un large éventail bien réparti d’infrastructures de TI offrant une pléthore de services. Ils sont à même de configurer dynamiquement les ressources du Cloud en fonction des exigences de leurs applications, sans toutefois devenir partie intégrante de l’infrastructure du Cloud. Cela leur permet d’atteindre un degré optimal d’utilisation des ressources tout en réduisant leurs coûts d’investissement en TI. Toutefois, la migration des services au Cloud intensifie malgré elle les menaces existantes à la sécurité des TI et en crée de nouvelles qui sont intrinsèques à l’architecture du Cloud Computing. C’est pourquoi il existe un réel besoin d’évaluation des risques liés à la sécurité du Cloud durant le procédé de la sélection et du déploiement des services. Au cours des dernières années, l’impact d’une efficace gestion de la satisfaction des besoins en sécurité des services a été pris avec un sérieux croissant de la part des fournisseurs et des consommateurs. Toutefois, l’intégration réussie de l’élément de sécurité dans les opérations de la gestion des ressources du Cloud ne requiert pas seulement une recherche méthodique, mais aussi une modélisation méticuleuse des exigences du Cloud en termes de sécurité. C’est en considérant ces facteurs que nous adressons dans cette thèse les défis liés à l’évaluation de la sécurité et à son intégration dans les environnements indépendants et interconnectés du Cloud Computing. D’une part, nous sommes motivés à offrir aux consommateurs du Cloud un ensemble de méthodes qui leur permettront d’optimiser la sécurité de leurs services et, d’autre part, nous offrons aux fournisseurs un éventail de stratégies qui leur permettront de mieux sécuriser leurs services d’hébergements du Cloud. L’originalité de cette thèse porte sur deux aspects : 1) la description innovatrice des exigences des applications du Cloud relativement à la sécurité ; et 2) la conception de modèles mathématiques rigoureux qui intègrent le facteur de sécurité dans les problèmes traditionnels du déploiement des applications, d’approvisionnement des ressources et de la gestion de la charge de travail au coeur des infrastructures actuelles du Cloud Computing. Le travail au sein de cette thèse est réalisé en trois phases.----------ABSTRACT: Over the past decade, the Cloud Computing paradigm has revolutionized the way we envision IT services. It has provided an opportunity to respond to the ever increasing computing needs of the users by introducing the notion of service and data outsourcing. Cloud consumers usually have online and on-demand access to a large and distributed IT infrastructure providing a plethora of services. They can dynamically configure and scale the Cloud resources according to the requirements of their applications without becoming part of the Cloud infrastructure, which allows them to reduce their IT investment cost and achieve optimal resource utilization. However, the migration of services to the Cloud increases the vulnerability to existing IT security threats and creates new ones that are intrinsic to the Cloud Computing architecture, thus the need for a thorough assessment of Cloud security risks during the process of service selection and deployment. Recently, the impact of effective management of service security satisfaction has been taken with greater seriousness by the Cloud Service Providers (CSP) and stakeholders. Nevertheless, the successful integration of the security element into the Cloud resource management operations does not only require methodical research, but also necessitates the meticulous modeling of the Cloud security requirements. To this end, we address throughout this thesis the challenges to security evaluation and integration in independent and interconnected Cloud Computing environments. We are interested in providing the Cloud consumers with a set of methods that allow them to optimize the security of their services and the CSPs with a set of strategies that enable them to provide security-aware Cloud-based service hosting. The originality of this thesis lies within two aspects: 1) the innovative description of the Cloud applications’ security requirements, which paved the way for an effective quantification and evaluation of the security of Cloud infrastructures; and 2) the design of rigorous mathematical models that integrate the security factor into the traditional problems of application deployment, resource provisioning, and workload management within current Cloud Computing infrastructures. The work in this thesis is carried out in three phases

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    Quality matters: re-formatting the boundaries of care in Czech social care policy

    Get PDF
    This thesis deals with knowledge about the mechanics and effects of quality reforms in public service as advanced by critical policy studies. Critical policy studies have identified managerialism and marketization of public services as key conditions in introducing quality reforms. The argument has been built in opposition to proponents of quality who argue that marketization, when introduced to services, enhances their quality. In contrast, critical studies have shown that quality reforms have restructured organizational contexts of public services where quality acted mainly as a rhetorical figure, and where improvements remain dubious. The real effects of quality reforms, they argue, are increased control over practitioners’ labour process and de-professionalization. This thesis is a case study of a recent Czech social care reform. The Czech case is a case of a quality reform without marketization and managerialism, yet with a similar outcome in the form of managerialised care. As such, the Czech case offers an opportunity to further our knowledge about the mechanics of quality reforms provided we make a methodological step outside the analytics of managerialism. The thesis undertakes this methodological shift by drawing on Actor Network Theory. The question this thesis asks is how could managerialised care be achieved without either marketization or managerialism? Methodologically, the thesis argues that mapping social alliances among policy actors is necessary but in itself not sufficient to explain the outcome. The thesis traces the Czech quality reform from its inception as a policy project at the Ministry of Labour and Social Affairs to its circulation in social care sector. The Czech case shows how articulating quality service in quality standards re-organised care by extending (both conceptually and practically) its boundaries. Care traditionally understood as interactional bodywork was extended horizontally to include practices and forms outside the practitioner-client interaction (such as support planning), and it was extended vertically shifting the agency in care from an equipped practitioner to an equipped service. The contribution of the thesis is twofold. It shows that quality has gained a life in its own outside the managerialist causation model and may not necessarily follow in the footsteps of marketization and managerialism. Mainly, the thesis shows that quality is a complex shibboleth able to re-format the content of practitioner work rather than merely re-structure organizational contexts of public service provision

    Constitutional Impediments to Decentralization in the World\u27s Largest Federal Country

    Get PDF
    Decentralization is often advocated as a means of improving local democracy and enhancing what economists call allocative efficiency. In federal countries, where power is already divided between national and state governments, decentralization involves the devolution of power from state to local governments. The world’s largest federal country, India, took an unusual step to advance decentralization: it passed the 74th Constitutional Amendment Act to confer constitutional status on municipalities. However, India’s efforts to promote the devolution of power through a national urban renewal scheme have not succeeded for three reasons. The first is that India’s decentralization process is incomplete. Political decentralization has been stymied by the language of the constitutional amendment itself; administrative decentralization has been hampered by the comparative advantage of entrenched state-level institutions; and fiscal decentralization has not occurred because financial responsibility—but not significant revenue—has been devolved. The second reason is that decentralization has been undertaken in a top-down manner, which has exacerbated Center-state relations and mitigated the goal of allocative efficiency. Third is the relative weakness of local governance structures, which has created a Catch-22 situation: as long as the local governments lack significant capacity, the states are reluctant to devolve power to them. Additional effort needs to be directed towards an effective model of cooperative federalism. With Prime Minister Narendra Modi poised to create “smart cities” and promote urban renewal, it is critical to understand why India’s prior decentralization efforts have largely failed. The lessons learned over the past decade are an important guide to the future of cities in India as well as in other federal countrie

    Policy change, governance and partnership: Sheffield City Council's leisure services, 1974 to 1999

    Get PDF
    Policy change, governance and partnership: Sheffield City Council's leisure services, 1974 to 199
    corecore