5 research outputs found

    Pembuatan Aplikasi Sistem Informasi Administrasi Dan Manajemen Proyek Pada CV. SQUAD

    Full text link
    CV. Squad is a company that work on specialist termite and pest control. This company wish to replacing the old system with computerization, because they had a difficulty in dealing with administrative issues because its operation is still manual, e.g. the sales and work schedule. Thus allow for errors in the financial calculation. From the background of these problems, we designed a application that support performance and set project management on CV. Squad. This system is built using PHP as programmer language and MySQL for the database.The results obtained from this application can take notes of purchasing transactions and sales can be done according to the structure and computerize and also complemented with stock card using First In First Out (FIFO) method. Each project also became more structured with monitoring feature on project management. Otherwise, with this application, owner can know some reports like stock report, debt, account receivable report and income statement

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems

    Journal of Law and Administrative Sciences No. 2/2014

    No full text
    corecore