14 research outputs found

    SOFTWARE: FROM PRODUCT TO SERVICE THE EVOLUTION OF A MODEL

    Get PDF
    Among the consequences of the Enterprise 2.0 family technologies’ growingpopularity, we can observe the rise of a set of new business models for the use and employment ofsoftware applications, some of them also applicable for infrastructure components. The mostpopular of these models is by far Software as a Service (also called SaaS). SaaS is a softwaredistribution model assuming the software applications are hosted and maintained by the vendor orthe distributor, the user access being granted exclusively by means of the Internet. The paper athand is a literature review and also an action research, meant to provide an objective and unbiasedcomparison of the two major software distribution models, and also to identify the strengths, theweaknesses and the favorite areas of applicability for each model. The paper is a part of a largerresearch performed by the author in the field of Enterprise 2.0 technologies.Organizational knowledge, Enterprise 2.0, Software as a Service, Web 2.0, Semantic Web

    Context-Aware Voip congestion control service

    Get PDF
    Published in The African Journal of Information and Communication, Issue no 11 2010/2011IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state.IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state

    Context-aware VoIP congestion control service

    Get PDF
    IP networks can have difficulty coping with delay-sensitive VoIP traffics during emergency situations caused by fires and related disasters. During emergencies there is a huge increase in voice and video traffic, causing a huge strain on the network. The strain on the network is as a result of both essential and non-essential traffic. In such crisis situations, calls originating from or destined for rescue personnel, such as doctors and police, are considered essential. Any other calls from eyewitnesses and the public are considered non-essential, since they degrade the quality of service for the emergency response teams by consuming the scarce network resources. Providing the rescue team with the quality of service that they require necessitates network access restriction for non-essential traffic. In this paper, the authors present a voice and video service that uses Context-Awareness and Semantic Web technologies to restrict network access to privileged users during crisis situations. The service monitors the network for crisis conditions, enables the network to respond appropriately when a crisis occurs, detects the end of the crisis and reverts to its default state

    Collaborative Shopping Networks: Sharing the Wisdom of Crowds in E-Commerce Environments

    Get PDF
    Social web services have gained enormous popularity over the past years because of a steadily increasing demand for user participation in the whole web sphere. Social networks like MySpace or Facebook and media sites like Flickr or YouTube clearly demonstrate the variety and functionality of social sites. Significantly affected by this trend, online retail and e-commerce environments rapidly changed within the last years. Users were integrated into existing e-shops and mutated from simple buyers to fully integrated customers. Thus, a modern shop visitor can recommend products, leave comments, rate vendors or publish wish lists. This recent phenomenon, called social commerce or social shopping, leads to more customer satisfaction, user participation and social interaction. Accordingly, there is a strong demand for innovative social commerce models and concepts like crowdsourcing, consumer generated content or live shopping. This paper shows the results of an extended analysis of collaborative shopping networks and demonstrates the development of a representative interaction model. An evaluation of social commerce models gave insights into functionalities, interactions and entities of successful social web applications. To create a collaborative shopping network model, conventional web services as well as selected best practice cases were analyzed in detail. To meet the demands of modern consumers, success factors are presented in the final part

    SOCIAL ONLINE SHOPPING: NEUE FORMEN DER INTERAKTION UND KOLLABORATION IM ELECTRONIC COMMERCE DER ZUKUNFT

    Get PDF
    Der große Erfolg von etablierten Social Web Services wie Facebook, Twitter, Wikipedia oder YouTube führte innerhalb der letzten Jahre zu einer massiven Transformation im gesamten Web. Bedingt durch den verstärkten Einsatz von interaktiven und kollaborativen Elementen entwickelte sich parallel dazu der Internetuser von einem passiven Informationskonsumenten zu einem aktiven Inhaltsdistributor. Der anhaltende Trend zur Integration von Social Web Funktionalitäten beinflusst auch maßgeblich die aktuellen Entwicklungen im B2C und C2C Electronic Commerce. Innovative Konzepte im Bereich des Social Online Shopping ermöglichen dem Konsumenten aktive Partizipation und Kommunikation innerhalb interaktiv vernetzter Shopping-Plattformen. Dieser Beitrag veranschaulicht ein innovatives Rahmenwerk für Social Online Shopping-Anwendungen. Die Grundlage für das hier vorgestellte Design bildete eine Analyse von 100 etablierten Services, wobei ein besonderer Schwerpunkt auf vielfältige Integrationsmöglichkeiten und leichte Skalierbarkeit des Modells gelegt wurde. Abschließend werden identifizierte Kernfunktionalitäten, erfolgsversprechende Erlösmodelle und signifikante Metadaten, abgeleitet aus den analysierten Services, präsentiert

    Місце та роль споживацького досвіду в інформаційному cередовищі WWW

    Get PDF
    In the paper the features of user-generated content are described and characteristics that stipulate its social value are defined. The definition of "consumer experience" notion is suggested and the place of this information layer among other layers of subjective user information is definedПриведенные признаки пользовательского информационного наполнения и установлены характеристики, которые обуславливают его общественную ценность. Предлагается определение понятия "потребительского опыта" и определяется место этого информационного пласта среди других пластов субъективной пользовательской информацииНаведені ознаки користувацького інформаційного наповнення та встановлені характеристики, які зумовлюють його суспільну цінність. Пропонується визначення поняття “споживацького досвіду” та визначається місце цього інформаційного пласту серед інших пластів суб’єктивної користувацької інформаці

    Місце та роль споживацького досвіду в інформаційному cередовищі WWW

    Get PDF
    In the paper the features of user-generated content are described and characteristics that stipulate its social value are defined. The definition of "consumer experience" notion is suggested and the place of this information layer among other layers of subjective user information is definedПриведенные признаки пользовательского информационного наполнения и установлены характеристики, которые обуславливают его общественную ценность. Предлагается определение понятия "потребительского опыта" и определяется место этого информационного пласта среди других пластов субъективной пользовательской информацииНаведені ознаки користувацького інформаційного наповнення та встановлені характеристики, які зумовлюють його суспільну цінність. Пропонується визначення поняття “споживацького досвіду” та визначається місце цього інформаційного пласту серед інших пластів суб’єктивної користувацької інформаці

    DFS-based frequent graph pattern extraction to characterize the content of RDF Triple Stores

    Get PDF
    International audienceSemantic web applications often access distributed triple stores relying on different ontologies and maintaining bases of RDF annotations about different domains. Use cases often involve queries which results combine pieces of annotations distributed over several bases maintained on different servers. In this context, one key issue is to characterize the content of RDF bases to be able to identify their potential contributions to the processing of a query. In this paper we propose an algorithm to extract a compact representation of the content of an RDF repository. We first improve the canonical representation of RDF graphs based on DFS code proposed in the literature. We then provide a join operator to significantly reduce the number of frequent graph patterns generated from the analysis of the content of the base, and we reduce the index size by keeping only the graph patterns with maximal coverage. Our algorithm has been tested on different data sets as discussed in conclusion
    corecore