The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the last years, many companies established fast IT or digital IT units dedicated to build and operate digital customer-facing services. These units adopted agile methods, new tool chains as well as new organizational settings like BizDevOps teams. BizDevOps teams are responsible for continuously (re-)defining business functionality of certain (micro-)services, (re-)developing and running them...
High-level enterprise services are considered as wrappers of business processes and ICT capabilities in enterprise architecture. Enterprise services have distinctive features that are not typically observed in Web services, e.g. signicant portions of the functionality of these services might be executed in a human-mediated fashion. As such, a service level agreement should be described as a mixture...
Re-engineering is essential for maintaining the competitiveness of enterprises. Enterprise re-engineering involves addressing (emergent) changes, re-organizing, outsourcing, realigning, etc. In this paper, we investigate how to re-engineer enterprises by coupling high-level requirements and the data warehouse, leading to a process re-design that makes the business layer of an enterprise more effective...
The purpose of this industrial brief is to introduce an information system named Inventorum, which implements the idea of open innovation. Its aim is to increase cooperation between business and academia and in this way boost economic competitiveness. The system recommends innovations, projects, experts, partners, and conferences to the users based on their profiles. Information is served in three...
Connected and automated driving vehicles have become a present and near future reality. There are already a slowly increasing number of trucks that do autonomous test drives on highways. Level 3 Highway Chauffeur applications are expected to be on the market as early as 2020 and Level 4 Highway Pilot applications are expected to be available around 2025. There is also a drive towards smarter cities...
Enterprise architecture supports a holistic approach used to optimize various activities of a company. Software development companies frequently use a popular agile approach, and the most popular agile methodology is Scrum. A sprint retrospective is a Scrum process which is supposed to enable self-development and improve communication among team members. Unfortunately, the reality is usually different...
Security Information and Event Management (SIEM) solutions are expensive, difficult to handle, and still a further security system without interface to existing Network Access Control (NAC) or other security components of an enterprise. Thus, the research project CLEARER [2] aims at developing a security system, which extends existing NAC systems with SIEM functionality, additional analyzing methods...
Innovation and optimization in software systems can occur from pre-development to post-deployment stages. Companies are increasingly reporting the use of experiments with customers in their systems in the post-deployment stage. Experiments with customers and users are can lead to a significant learning and return-on-investment. Experiments are used for both validation of manual hypothesis testing...
FONCODES is the public body in charge of financing and managing the execution of social-productive projects throughout the Peruvian territory. The objective of social-productive projects within the framework of the National Strategy of the Ministry of Development and Social Inclusion is to generate economic opportunities for rural households living in poverty and extreme poverty. The key processes...
The development of technology which is so rapid requires companies to compete for getting business profit. One of the strategy companies choose is applying good management and having strategic planning in information technology sector. Enterprise Architecture Planning Method is one of strategic planning method for mapping and measuring information architecture which companies need. The purpose of...
The problem of the discovery and marketing of new drugs can be vastly accelerated through High Performance Computing (HPC), molecular modeling techniques, and more specifically by means of the techniques commonly named as computational drug discovery (CDD) and in silico high throughput screening. These techniques usually assume a unique interaction site (active site) between potential drugs and a...
Access control is one of the most challenging issues in Cloud environment, it must ensure data confidentiality through enforced and flexible access policies. The revocation is an important task of the access control process, generally it consists on banishing some roles from the users. Attribute-based encryption is a promising cryptographic method which provides the fine-grained access, which makes...
The industrial world is currently undergoing changes due to increasing digitalization and computerization in companies (Industry 4.0). Existing control and management components and systems located within the upper layers of an enterprise's structure are connected to the shop floor. With the current paradigm shift in manufacturing, the need for more collaboration between personnel with different fields...
Advances in software and hardware technology open up new potential for context-aware vertical social software. Companies are facing the challenge to incorporate these ideas into their existing software solutions. In this paper, we propose a reference architecture for Context-Aware Vertical Social Software platforms to facilitate reuse and enable synergies across different existing and new social software...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
Although that Cloud infrastructures are nowadays available, there is a lack ofadoption by companies. While big companies with large computing devisionsadopted the Cloud paradigm, small and midsize enterprises (SME) with a limitednumber of computer experts were scared by the complexity of the technology and by the huge investement to move to Cloud. But even for SMEs, the migration to Cloud infrastructure...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
A complex Business Transformation Project (BTP) needs a qualified Business Transformation Manager (BTM) to manage the complex implementation phase of the BTP. A BTM must be assisted with the optimal framework for a plethora of BTP's types of problems and phases. Tooling support for such projects is one of the main focuses of the business transformation research project that started in the year 2010...
Cloud Environment allows enterprises to scale their application on demand. Microservice design is a new paradigm for cloud application development which is gaining popularity due to its granular approach and loosely coupled services unlike monolithic design with single code base. Applications developed using microservice design results in better scaling and gives extended flexibility to the developers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.