673 research outputs found

    Remarks

    Get PDF

    Remarks

    Get PDF

    Support for Wireless LAN Design

    Get PDF
    As mobile devices become common in mainstream computing, it becomes imperative to effectively design computing architectures that seamlessly and effectively integrate them. Rapid advancements in wireless technology has made it possible to build efficient wireless local area networks (WLANs). Designing WLANs presents some unique challenges. Some heuristics are available for WLAN design, but they represent piecemeal solutions, focusing on a limited set of issues. This paper provides a more comprehensive approach to WLAN design, by providing support for additional tasks in the design process, as well as by providing the designer the option of examining multiple competing options. The approach is developed in modular fashion, thereby permitting the easy substitution of alternative models in any phase of the process. We believe the approach to be useful for WLAN designers, and it provides an apt illustration of design science in information systems research

    Capacity Management for Cloud Computing: A System Dynamics Approach

    Get PDF
    As the demand for cloud computing as a preferred computing architecture grows, the need for effective capacity planning by cloud providers becomes crucial for their long term viability. Situations involving under-capacity and over-capacity represent lost opportunities and increased overhead. Economic conditions play a critical role in determining the capacity, cost, and revenue of cloud-based services. Using a system dynamics approach, this study evaluates the different conditions in cloud ecosystem from a capacity planning and management perspective, with a view to providing cloud service providers guidance for cloud capacity building strategies

    Rebuilding Consumer Trust in eCommerce Relationships

    Get PDF
    Several researchers have studied trust in the electronic commerce context. Much of this work is aimed at establishing initial trust, with some recent research on maintaining on-going trust between consumer and vendor. This paper examines a related aspect of trust in the e-Commerce environment, namely trust violations and their subsequent repair. It draws upon research in professional trust relationships and adapts it to the e-Commerce context. It proposes a conceptual model that relates trust violation characteristics, vendor reconciliation tactics, and individual consumer characteristics as relevant determinants of the consumer\u27s willingness to reconcile. Given the large range of possible trust violations in on-line purchases, and increasing competition among vendors, it becomes imperative for earnest vendors to provide sincere opportunities to repair the trusting relationship with devoted consumers

    Does the \u27Golidlocks Conjecture\u27 Apply to Software Reuse?

    Get PDF
    Adopters of corporate software reuse programs face important decisions with respect to the size of components added to the reuse repository. Large components offer substantial savings when reused but limited opportunity for reuse; small components afford greater opportunity for reuse, but with less payoff. This suggests the possibility of an “optimal” component size, where the reuse benefit is at a maximum. In the software engineering discipline, this relationship – termed the Goldilocks Principle - has been empirically observed in software development, software testing, and software maintenance. This paper examines whether this relationship also applies for software reuse. In order to understand the effects of component size and repository size on the benefits of a reuse program this paper extends an empirically grounded reuse model to assess the effects of component size on reuse savings. The study finds that a variant of the Goldilocks Principle applies with respect to both component and repository size, suggesting that uncontrolled growth of a reuse repository and an inappropriate choice of component size may reduce benefits obtained from reuse

    Application of Ethical Frameworks to IT Offshoring

    Get PDF
    The global outsourcing of information technology (IT) activities, has received increased attention recently, given the controversy it generates. Differing views on IT offshoring prevail. One view claims IT offshoring steals jobs away from the United States economy, while another view maintains IT offshoring creates jobs and improves the overall Unites States economy. Despite the controversy created by IT offshoring, the ethical issues related to IT offshoring have received little attention. In this paper three major normative theories of business ethics: stockholder, stakeholder, and social contract theory will be introduced to examine the impact of IT offshoring from an ethical perspective. The application of these theories to a specific example of IT offshoring is presented in detail. This research represents an early attempt to examine the ethics of IT offshoring and could provide early insights into the IT offshoring decision
    • …
    corecore