1,245 research outputs found

    Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

    Full text link
    Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud deployments are paramount for institution and organizations of all scales. The availability of a flexible, free open source cloud platform designed with no propriety software and the ability of its integration with legacy systems and third-party applications are fundamental. Open stack is a free and opensource software released under the terms of Apache license with a fragmented and distributed architecture making it highly flexible. This project was initiated and aimed at designing a secured cloud infrastructure called BradStack, which is built on OpenStack in the Computing Laboratory at the University of Bradford. In this report, we present and discuss the steps required in deploying a secured BradStack Multi-node cloud infrastructure and conducting Penetration testing on OpenStack Services to validate the effectiveness of the security controls on the BradStack platform. This report serves as a practical guideline, focusing on security and practical infrastructure related issues. It also serves as a reference for institutions looking at the possibilities of implementing a secured cloud solution.Comment: 38 pages, 19 figures

    Gurobaru kigyo no tame no risuku manejimento o koryoshita tekiogata togo dejitaru akitekucha furemuwaku

    Get PDF

    A Layered Software Architecture for the Management of a Manufacturing Company

    Get PDF
    In this paper we describe a layered software architecture in the management of a manufactur-ing company that intensively uses computer technology. Application tools, new and legacy, after the updating, operate in a context of an open web oriented architecture. The software architecture enables the integration and interoperability among all tools that support business processes. Manufacturing Executive System and Text Mining tools are excellent interfaces, the former both for internal production and management processes and the latter for external processes coming from the market. In this way, it is possible to implement, a computer integrated factory, flexible and agile, that immediately responds to customer requirements.ICT, Service Oriented Architecture, Web Services, Computer-Integrated Factory, Application Software

    Relevant Research Areas in IT Service Management: An Examination of Academic and Practitioner Literatures

    Get PDF
    Practitioners and academics alike have highlighted that information systems (IS) research may currently have limited use and value to practitioners. Further, research provides examples of positive links between management practices prevalent in the media and their influence on societal views. We focus on increasing relevance of future academic research to practitioners by identifying sources of misalignment between practitioner and academic literatures on the topic of information technology service management (ITSM) and by developing a possible research agenda to address these misalignments. We employ an entity annotator and keyword analysis to compare the main topics evident in academic and practitioner literatures on ITSM and focus on those salient in practitioner literature. Our results suggest that the topics of framework co-implementation, regulations, ITSM tools, gamification, and cloud computing all present fertile grounds for relevant research in ITSM and IS more broadly. Thus, our paper offers a unique way for academics to understand how they can best assist practitioners while increasing the relevance of academic research

    Resource optimization‐based software risk reduction model for large‐scale application development

    Get PDF
    Software risks are a common phenomenon in the software development lifecycle, and risks emerge into larger problems if they are not dealt with on time. Software risk management is a strategy that focuses on the identification, management, and mitigation of the risk factors in the software development lifecycle. The management itself depends on the nature, size, and skill of the project under consideration. This paper proposes a model that deals with identifying and dealing with the risk factors by introducing different observatory and participatory project factors. It is as-sumed that most of the risk factors can be dealt with by doing effective business processing that in response deals with the orientation of risks and elimination or reduction of those risk factors that emerge over time. The model proposes different combinations of resource allocation that can help us conclude a software project with an extended amount of acceptability. This paper presents a Risk Reduction Model, which effectively handles the application development risks. The model can syn-chronize its working with medium to large‐scale software projects. The reduction in software failures positively affects the software development environment, and the software failures shall re-duce consequently. © 2021 by the authors. Licensee MDPI, Basel, Switzerland

    Modularity Archetypes and Their Coexistence in Technological Development: The Case of a Telecoms Company from Analogue Voice to 5G

    Get PDF
    Modularity is a key concept in the research and practice of information systems. Yet, it has been variously interpreted. Synthesizing the literature, we inductively develop a two-by-two matrix encapsulating two dualities of modularity: architectural vs. governance dimensions, and bottom-up vs. top-down perspectives. This matrix groups the literatures into four archetypical approaches to modularity (Engineering, Ecosystem, Generative and Logical). We next illustrate these archetypes through a qualitative study of a large global telecommunications firm. Drawing upon archival data and interviews, we show how each of these four approaches to modularity become dominant at different times, but also how they overlap and coexist

    An automated closed-loop framework to enforce security policies from anomaly detection

    Get PDF
    Due to the growing complexity and scale of IT systems, there is an increasing need to automate and streamline routine maintenance and security management procedures, to reduce costs and improve productivity. In the case of security incidents, the implementation and application of response actions require significant efforts from operators and developers in translating policies to code. Even if Machine Learning (ML) models are used to find anomalies, they need to be regularly trained/updated to avoid becoming outdated. In an evolving environment, a ML model with outdated training might put at risk the organization it was supposed to defend. To overcome those issues, in this paper we propose an automated closed-loop process with three stages. The first stage focuses on obtaining the Decision Trees (DT) that classify anomalies. In the second stage, DTs are translated into security Policies as Code based on languages recognized by the Policy Engine (PE). In the last stage, the translated security policies feed the Policy Engines that enforce them by converting them into specific instruction sets. We also demonstrate the feasibility of the proposed framework, by presenting an example that encompasses the three stages of the closed-loop process. The proposed framework may integrate a broad spectrum of domains and use cases, being able for instance to support the decide and the act stages of the ETSI Zero-touch Network & Service Management (ZSM) framework.info:eu-repo/semantics/publishedVersio

    Towards a conceptual framework for developing embassy portals

    Get PDF
    In the past decades, Information and Communication Technologies have significantly changed diplomacy and the way countries manage their international relations through embassies, which are often also responsible for providing a wide range of services to increasingly technology literate citizens. This dissertation proposes a conceptual framework for developing embassy portals, comprised of the following four dimensions: 1) shared infrastructure, 2) integrated platform management, 3) templated content and 4) simplified online services delivery. To prove the feasibility of this conceptual framework, a prototype applied to the Embassy of Guinea-Bissau in Portugal was developed using an open source Content Management System and free Cloud Computing technology. The conceptual framework hereby presented is expected to be of value to governments interested in implementing state-of-the-art portals and websites based on open source technology for their embassies and similar organizations, simultaneously optimizing the resources available and delivering value to their stakeholders.Nas últimas décadas, as Tecnologias de Informação e Comunicação alteraram significativamente a diplomacia e a forma como os países gerem as suas relações internacionais através de embaixadas, que frequentemente são também responsáveis pela prestação de diversos serviços a um público cada vez mais conhecedor das novas tecnologias. Esta dissertação propõe um modelo conceitual para desenvolver portais para embaixadas, que é composto pelas seguintes quatro dimensões: 1) infraestrutura partilhada, 2) gestão integrada da plataforma, 3) conteúdo pré-definido e 4) prestação de serviços online de modo simplificado. Para comprovar a viabilidade do modelo conceitual proposto, um protótipo aplicado à Embaixada da Guiné-Bissau em Portugal foi desenvolvido com base num Sistema de Gestão de Conteúdos de código aberto ("open source") e com recurso a tecnologias gratuitas na "Cloud". Espera-se que o modelo conceitual aqui apresentado seja de valor para governos que tenham interesse em implementar portais e/ou "websites" modernos e baseados em tecnologias "open source" para as suas embaixadas e organizações de estrutura semelhante, simultaneamente otimizando os recursos disponíveis e melhorando a qualidade do serviço prestado

    High Energy Physics Forum for Computational Excellence: Working Group Reports (I. Applications Software II. Software Libraries and Tools III. Systems)

    Full text link
    Computing plays an essential role in all aspects of high energy physics. As computational technology evolves rapidly in new directions, and data throughput and volume continue to follow a steep trend-line, it is important for the HEP community to develop an effective response to a series of expected challenges. In order to help shape the desired response, the HEP Forum for Computational Excellence (HEP-FCE) initiated a roadmap planning activity with two key overlapping drivers -- 1) software effectiveness, and 2) infrastructure and expertise advancement. The HEP-FCE formed three working groups, 1) Applications Software, 2) Software Libraries and Tools, and 3) Systems (including systems software), to provide an overview of the current status of HEP computing and to present findings and opportunities for the desired HEP computational roadmap. The final versions of the reports are combined in this document, and are presented along with introductory material.Comment: 72 page

    Proceedings of the 2nd EICS Workshop on Engineering Interactive Computer Systems with SCXML

    Get PDF
    corecore