The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditionally software development tools, such as compilers, linkers and build engines, were designed for use by individual engineers on dedicated desktop machines. As these tools evolved, they scaled-up by exploiting more powerful development machines. The same tools were adapted for team development to run on small, project-specific clusters by dedicating a server to process a single job at a time...
Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are...
Cloud computing increases the level of connectivity between software applications. IT management applications delivered as a service may need to connect to tens of thousands of endpoint systems. In order to validate the application's reliability and performance at these very large scales, its scalability needs to be tested before being deployed in the cloud. We use an emulation approach, whereby endpoints...
At the present world of IT, ensuring Trust is a very important topic; especially for service oriented systems. In the present trust models, particularly in Certain Trust model the main parameters of the representational model portion are uncertainty and average rating which are based on propositional logic where the possible values for them are considered between 0 and 1. In this paper we have proposed...
Applications stored in the cloud enable users to access and perform tasks in real time, reducing costs in the acquisition of computer resources. Although there are benefits, this paradigm also brings security and privacy risks to users, such as theft of information or identity. This paper proposes a mechanism able to provide privacy protection for users to use applications that address issues of identity,...
Network resources monitoring and management is critical to ensure security and load balance of network and information system, especially in the increasingly extensively used cloud computing and distributed parallel architecture. This paper presents a distributed network resources monitoring solution based on multi-agent and matrix grammar. A distributed multi-agent architecture for network resources...
As the greatest IT revolution since the internet revolution, cloud computing has become the new business platform of the 21st century and an important engine to promote the sound development of the IT industry because of its flexible, high efficient and low consumption characters. Based on analyzing large amount of literatures and reports both home and abroad, this paper summarizes the latest study...
In large organizations or IDCs, different departments always occupy and maintain dedicated resources to satisfy their or their customers' heterogeneous application loads. This situation easily makes the infrastructure management a repeated and inefficient work. Even worse, it is difficult to share the resources owned by different departments even when they are idle, because the application modes on...
One of the scariest aspects of doing business is the failure to come up with the right decision. This is one of the reasons why many businesses have failed because of one small wrong decision. So the aim of this paper is to develop web based business intelligence software as a service to help the enterprise to maximize the profit by analyzing the data and providing detailed graphical view of the business...
Cloud computing is a buzzword terminology applied to several nascent trends in the turbulent landscape of information technology. Computing in the "cloud" alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. In the era of cloud computing, whole lifecycle of telecommunication services, especially service deployment, present new features. In this...
In today' intensely competitive environment, traditional application systems such as ERP, lacks the autonomy and flexibility required by dynamic market. Given that, more and more companies are offering their software by Software as a Service (SaaS) application platform. Most SaaS platforms are implemented by traditional J2EE programming. This paper introduces a new well-designed SaaS application platform...
Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities for outsourcing part of the IT-stack to third parties in order to run their applications. These possibilities are associated with different running costs, so cloud customers have to determine the optimal solution. In this paper, we...
Cloud computing is commonly characterized as a three-layer architecture including IaaS, PaaS and SaaS, while service oriented approach is widely considered as a promising software development method. In this paper, we report our early experience of moving traditional service oriented software development to the cloud computing environment. Our primary goal is to provide instant development, instant...
While the emergence of clouds had lead to a significant paradigm shift in business and research, cloud computing is still in its infancy. Specifically, there is no effective publication and discovery service nor are cloud services easy to use. This paper presents a new technology for offering ease of discovery, selection and use of clusters hosted within clouds. By improving these services, cloud...
In a desktop grid model, the job (computational task) is submitted for execution in the resource only when the resource is idle. There is no guarantee that the job which has started to execute in a resource will complete its execution without any disruption from user activity (such as a keyboard stroke or mouse move) if the desktop machines are used for other purposes. This problem becomes more challenging...
The paper describes our on-going project, termed Unibus, in the context of facilitating fault-tolerant executions of MPI applications on computing chunks in the cloud. In general, Unibus focuses on resource access virtualization and automatic, user-transparent resource provisioning that simplify use of heterogeneous resources available to users. In this work, we present the key Unibus concepts (the...
BPEL is the de facto standard for business process modeling in today's enterprises and is a promising candidate for the integration of business and scientific applications that run in Grid or Cloud environments. In these distributed infrastructures, the occurrence of faults is quite likely. Without sophisticated fault handling, workflows are frequently abandoned due to software or hardware failures,...
More and more companies are outsourcing parts of their business processes to third party providers to exploit the expertise and economies of scale of these third party providers. In the IT field, emerging delivery models for software such as Software as a Service and cloud computing offer the possibility to outsource applications and computing infrastructure and thus enable enterprises to focus on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.