1,147 Hits in 7.6 sec

A Comparative Cost Analysis of on Premises IT Infrastructure and Cloud-Based Email Services in an Indian Business School

Sumedha Chauhan, Aparna Raman, N.P. Singh
2013 International Journal of Cloud Applications and Computing  
This paper aims to present a comparative analysis of the costs (on premises vs. cloud) for email implementation. Google apps for education have been considered for cloud based email service.  ...  Results show that the net present value (NPV) of cost for on premises infrastructure is more than NPV of cost for cloud based email service.  ...  This research article intends to do a cost comparison of the on premises IT infrastructural solution with the cloud solution for email.  ... 
doi:10.4018/ijcac.2013040103 fatcat:sj5boq2b3rb7dmvpjoeaje4xba

E-Governance Paradigm Using Cloud Infrastructure: Benefits and Challenges

Satyabrata Dash, Subhendu Kumar Pani
2016 Procedia Computer Science  
In recent years cloud computing is one of the most significantly achieved development in the IT industry which gives a platform to use the application in the form of services which is more scalable, reliable  ...  , high performance and relatively low cost as compared to other distributed computing infrastructure.  ...  It gives a platform to use the application in the form of services which is more scalable, reliable, high performance and relatively low cost as compared to other distributed computing infrastructures.  ... 
doi:10.1016/j.procs.2016.05.274 fatcat:4k2ssztj4nfb7ndstngeij3m6q

Era of Cloud Computing: A New Insight to Hybrid Cloud

Aishwarya Srinivasan, Md Abdul Quadir, V. Vijayakumar
2015 Procedia Computer Science  
This research paper is a layout of the literature analysis and it includes the proposals and discussions regarding the cloud computing and its networks.  ...  However, each and every explanation of cloud computing and its terminologies don't reach to a great number of beginners in IT sectors.  ...  Cloud computer came into picture portraying an IT service model, which delivers a set of convenient, on demand and configurable computing services and resources to clients over a network in a self-service  ... 
doi:10.1016/j.procs.2015.04.059 fatcat:arvcm7oz5bfpnfbwsy44rdhuma

E-Learning during COVID-19 Outbreak: Cloud Computing Adoption in Indian Public Universities

Amit Kumar Bhardwaj, Lalit Garg, Arunesh Garg, Yuvraj Gajpal
2021 Computers Materials & Continua  
The scope of the study is limited to public universities (PUs) in India. There are, in total, 465 Indian PUs and among these 304 PUs, (i.e., 65% PUs) are surveyed using questionnaire-based research.  ...  The findings demonstrated the application of an integrated TAM-TOE-DOI framework to assess determining factors of CCA in Indian PUs.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2021.014099 fatcat:v6flslemerap3lxz62lnp75ria

Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review

Rashidah F. Olanrewaju, Burhan ul Islam Khan, Mueen Ul Islam Mattoo, Farhat Anwar, Anis Nurashikin Bt. Nordin, Roohie Naaz Mir, Zainab Noor
2017 Indian Journal of Science and Technology  
The different aids and contributions in this paper are based on the consolidation of research works available in various papers.  ...  Findings: The discoveries from this analysis demonstrate that the adoption of CC in establishments of higher learning can be comprehended through a few factors that have an essential impact on CC adoption  ...  In the same way, the costs implicated by different cloud service providers vary based on the pricing schemes; the applications that are kept running for a longer duration of time and Adoption of Cloud  ... 
doi:10.17485/ijst/2017/v10i36/117641 fatcat:vfvt6zgmdrckjig5or2u7wyxh4

EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud

G. Kumaresan, N.P. Gopalan
2017 International Journal of Engineering and Manufacturing  
Now-a-days, one of the most exciting technology is cloud computing. Accessing dynamically virtualized resources through internet is called as cloud computing.  ...  Security and confidentiality are the major concerns in public cloud. Though EduCloud (Educational Cloud) uses public cloud, moving data from one location to another location may lead to risk.  ...  It may be owned managed and operated by a business, academic or government organizations or some combination of them. It exists on the premises of the cloud provider.  ... 
doi:10.5815/ijem.2017.06.02 fatcat:oht3ot3q4ngtdgu4s2zuzhiudi

A Strategic Value Appropriation Path for Cloud Computing

Abhishek Kathuria, Arti Mann, Jiban Khuntia, Terence J.V. Saldanha, Robert J. Kauffman
2018 Journal of Management Information Systems  
We propose a model encompassing the principles of infrastructure and cloud platform deployment, integration and service orientation, and alignment with business processes that explain the linkage from  ...  toward the development of cloud computing-based service models in order to reliably achieve the desired business outcomes.  ...  We are grateful to participants at the 2016 Americas Conference on Information Systems (AMCIS) for valuable comments on a preliminary version of this paper.  ... 
doi:10.1080/07421222.2018.1481635 fatcat:xscvhepsffc3ngdbrti2hxgku4

Strategy to usher in the next phase of growth in the Indian IT industry

Narendra M. Agrawal, Rajesh Pandit, Divya Menon
2012 IIMB Management Review  
This article, in its first part, assesses the value pyramid of the Indian IT services and in examining the avenues of growth up the value chain, suggests that the industry's involvement in inclusive growth  ...  A discussion with industry practitioners in the second part of the article throws light on the strategies and initiatives being taken in the industry to meet the challenges and opportunities going forward  ...  Fig. 1 1 IT services value pyramid.1 Based on an analysis of the annual reports of Infosys, TCS, Cognizant, WIPRO and HCL.  ... 
doi:10.1016/j.iimb.2012.06.001 fatcat:7wrnqzy7yrebzfyvj4fkubcfg4

Journal of Computer Science IJCSIS June 2021 Full Volume

2021 Zenodo  
The International Journal of Computer Science and Information Security (IJCSIS) is one of the leading open access publisher, with hundreds of papers published each year related to different areas ranging  ...  The aim is to support you to achieve success in your research and scholarly experience.  ...  Control In a cloud computing environment, the level of control a company has is based on the type of service and cloud deployment model you choose.  ... 
doi:10.5281/zenodo.5556913 fatcat:yineojxcujg4jnvqt6i742dhii


Shane Collier
2016 Journal of Information Technology Education: Discussion Cases  
A small consulting business has the opportunity to work with a new age company interested in moving its proprietary psychological software to the cloud.  ...  But if the security of that software is compromised, it could seriously damage the client. Should he proceed?  ...  Acknowledgements This case study is based upon work supported by the National Science Foundation under Grant No. 1043919.  ... 
doi:10.28945/3595 fatcat:c5pmq6ppt5hupntduulkqgfyra


Shane Collier
2016 Muma Case Review  
With an extensive technical and business background, he grew to appreciate the value of cloud computing, along with its impact on business.  ...  How could BtP defend and expand its business while protecting its intellectual property? CReal put an attractive option on the desk of Dave Conseen, Director of Technology at BtP.  ...  Acknowledgements This case study is based upon work supported by the National Science Foundation under Grant No. 1043919.  ... 
doi:10.28945/3555 fatcat:oqgtgj5opjbmxiv7fvma3o5hqa

Emerging Trends in Management, IT and Education

Dr. P S Aithal, Shreepathy R Bhat
2019 Zenodo  
International Conference on Emerging Trends in Management, IT and Education  ...  Cloud computing model provides three variations in its ubiquitous computing service solutions to the business as Software as a Service (SaaS), Infrastructure-as-a-Service (IaaS), and Platform-as-a-Service  ...  The major services in this section are Application Services, Cloud Enablement, Cognizant Infrastructure including Project-based application services, Business process services, Business and technology  ... 
doi:10.5281/zenodo.3492020 fatcat:wytrxibqsjegfi6oouvfjcoiia


Onyechere Ugochukwu Franklin, Mohamed Ismail Z.
2015 International Journal of Information Systems and Engineering  
It can be seen in the literature reviews that the organization who clasps BYOD policy have seen that their employees and students are happier, productive and collaborative.  ...  Henceforth it was conducted with the primary objective of finding the views of respondents from different sectors and institutions.  ...  One of the ideas that has emerged in business world, IT and school environments is BYOD (Bring your own device).  ... 
doi:10.24924/ijise/2015.11/v3.iss1/110.128 fatcat:b54uxseytrfqbhbhm7m4jhgbty


Dr. P.S. Aithal, Prof. Amith D. Menezes
2019 Zenodo  
The Proceedings Book of One Day National Conference  ...  (k) Business planning based on technological capabilities : Patent analysis also allows a researcher to know its business value and hence it is possible to plan a business based on its technological capabilities  ...  For our discussion on doing businesses successfully in base of the pyramid markets sustainability is based on the premise of being able to continue to serve the low income markets and emerging markets.  ... 
doi:10.5281/zenodo.3369601 fatcat:36pzraub2zgx3hxb3gnowzrya4

A Deep Analysis of Cyber Security with Special Reference to the Effect of High-Speed Internet Connectivity on Smart Phones and User Privacy

Vijay Laxmi Kalyani, Arshul Agarwal, Harshita Sharma
2020 Zenodo  
From last few decades there has been a volatile development in the mobile in terms of smart feature and internet connectivity smartphones has virtually replace computer from the normal usage of people  ...  In this paper the authors are throwing some light on this serious issue and some resolution to prevent the same.  ...  Cloud security: A software-based totally tool that protects and video show devices your records within the cloud, to help remove the dangers associated on-premises attacks. 6.  ... 
doi:10.5281/zenodo.4408564 fatcat:6ikrsbie25dw5gsv35njuenrbm
« Previous Showing results 1 — 15 out of 1,147 results