A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resource Access Management for a Utility Hosting Enterprise Applications
[chapter]
2003
Integrated Network Management VIII
In this paper we introduce a Resource Access Management (RAM) framework for resource utilities that facilitates Class of Service (CoS) based automated resource management. ...
The framework may be used to offer resources on demand to enterprise applications that have time varying resource needs. ...
This paper presents a resource access management (RAM) framework for resource utilities that support Grids for enterprise applications. ...
doi:10.1007/978-0-387-35674-7_55
fatcat:wn2y6e5lxrbfji5w2xjdtsnxkq
Resource access management for a utility hosting enterprise applications
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.
In this paper we introduce a Resource Access Management (RAM) framework for resource utilities that facilitates Class of Service (CoS) based automated resource management. ...
The framework may be used to offer resources on demand to enterprise applications that have time varying resource needs. ...
Figure 5 . 5 Best effort server availability
Resource Access Management for a Utility Hosting... ...
doi:10.1109/inm.2003.1194210
fatcat:xidgro4e4jadbl6dru53yktmc4
A Grid Infrastructure for Utility Computing
2006
15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06)
Utility computing is a service provisioning model, which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing similar to traditional utilities ...
The consumer requires a uniform, secure and reliable functionality to access the utility computing service and the provider requires a scalable, flexible and adaptive infrastructure to provide the service ...
functionality to access computing resources A grid gateway, i.e. a WS-GRAM service hosting GridWay, may act as the utility computing service, providing a uniform standard interface for the secure and ...
doi:10.1109/wetice.2006.7
dblp:conf/wetice/LlorenteMHL06
fatcat:h3m4ygolxne3zbbukd5dmubrdi
Conceptualization of Cloud Computing and its Security Threats, Challenges, Technologies and Application
2017
International Journal for Research in Applied Science and Engineering Technology
Cloud computing is the utilization of computer resources i.e. hardware and software which are delivered as service over a network. ...
In this paper we also discussed the different technologies and its applications used for cloud computing. ...
Utility Computing Utility computing is based on Pay per Use model. It offers computational resources on demand as a metered service. ...
doi:10.22214/ijraset.2017.4112
fatcat:6qfzzytj3bai7nko6wfswxwedu
Design of an enablement process for on demand applications
2004
IBM Systems Journal
As software applications became more complex to manage, enterprise customers began moving these applications out of their premises and hired hosting companies such as IBM to host and manage these applications ...
The majority of currently hosted applications fall into three (nonutility) hosting models. 1 Utility computing is discussed in the next major subsection. Collocation. ...
It is installed in a dedicated hosting center or on the customer premises and is used within the enterprise, even if the application is Web-enabled and Internet-accessible. ...
doi:10.1147/sj.431.0190
fatcat:gvdrhb255zbotgka3tevnnjsgu
The Business Intelligence Environment
[chapter]
2003
Business Intelligence
The evolution of the SAS 9.2 architecture provides a powerful, distributed, and flexible environment for real-time, responsive analytic and reporting capabilities. ...
This paper describes how information technology (IT) and SAS administrators can use vendor and open source enterprise systems management products to ascertain the state or status of the SAS 9.2 Enterprise ...
servers o Client tier applications hosted on a diverse collection of hardware and software environments
ENTERPRISE SYSTEMS MANAGEMENT INTEGRATION INTRODUCTION AND OVERVIEW Enterprise systems management ...
doi:10.1016/b978-155860916-7/50005-1
fatcat:kw22opcnfzfnxftz2qvpzfclzm
Design of IT Infrastructure Multicloud Management Platform Based on Hybrid Cloud
2022
Wireless Communications and Mobile Computing
Also, the platform information access security management becomes extremely difficult. Therefore, a multicloud management platform for IT infrastructure based on hybrid cloud is designed. ...
The framework also ensures desensitized access to IT infrastructure resources. Also, a cloud data load balancing adaptation process and IT infrastructure cloud management process are designed. ...
for the subnode access of "natural resource cloud." ...
doi:10.1155/2022/9227948
fatcat:74grnfubr5dexebpyidap7dnum
Comprehensive Research and Application of Cloud Computing in Enterprises
2014
International Journal of Grid and Distributed Computing
Therefore, in this paper, we introduced the definition of Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies (e.g. ...
In order to deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing. ...
Vaquero [1] and "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility" by R. Buyya [9] . ...
doi:10.14257/ijgdc.2014.7.6.15
fatcat:aprymz4cmbcylpbnbmtzzy3dne
Facebook Meets the Virtualized Enterprise
2008
2008 12th International IEEE Enterprise Distributed Object Computing Conference
In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting to provide employees with a comprehensive and transparent environment for utilizing applications ...
In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting to provide employees with a comprehensive and transparent environment for utilizing applications ...
IT Model In this section we first explain in more detail our proposed IT model for accessing and hosting applications for enterprises. ...
doi:10.1109/edoc.2008.19
dblp:conf/edoc/CurryKMSTAW08
fatcat:gtjquldadzcodlh4l47lzvqpqy
A Proposed Virtualization Technique to Enhance IT Services
2012
International Journal of Information Technology and Computer Science
Virtualization provides many benefits, including improved physical resource utilization, improved hardware efficiency, and reduced power and cooling expenses. ...
Virtualization provides many benefits and greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environmental control, more availability, reduced ...
and resource utilization statistics of data center elements, such as virtual machines, hosts and clusters • Alarms and Event Management -Tracks and warns users on potential resource over-utilization or ...
doi:10.5815/ijitcs.2012.12.02
fatcat:3l5g5grfsrepfoars5evekpcvi
Cloud Computing: A New Paradigm in IT that has the Power to Transform Emerging Markets
2012
The International Journal on Advances in ICT for Emerging Regions
Cloud computing offers utility-like availability of computing resources and applications via the Internet at low cost. ...
It has the power to transform enterprises in emerging markets offering access to advanced IT infrastructure and applications that many of them couldn't afford. ...
. -Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that ...
doi:10.4038/icter.v4i2.4672
fatcat:j7zvaqnnubelzhrukmzvyedmr4
Evros: A service-delivery platform for extending security coverage and IT reach
2007
Bell Labs technical journal
Evros is an always-available, secure service-delivery platform for enterprise remote access and device management. ...
The Evros management server is a software suite for the management of all Evros components. © 2007 Alcatel-Lucent . ...
The EFT path is a generic file transfer utility that any enterprise application can resort to. ...
doi:10.1002/bltj.20253
fatcat:736p6by5zbfefkdo6bs4qbhcxe
Virtualization in Cloud Computing
2018
International Journal of Trend in Scientific Research and Development
Apart of its popularity it has some concerns which are becoming huddles for its wider adoption. In this paper a study has been made on virtualization concerns. ...
In this internet world cloud computing is raising high by providing everything incense the required resources, applications, software, hardware, computing power to computing infrastructure, business process ...
Access control policies are to be established and client identities are to be checked. Datacenter platforms, infrastructure and client devices are to be secured by trusted computer policies. ...
doi:10.31142/ijtsrd18665
fatcat:f7lekcjhrfa6tghkcun2dmse6e
The AccDC enterprise API for advanced UI automation
2011
Proceedings of the International Cross-Disciplinary Conference on Web Accessibility - W4A '11
This paper describes the purpose and functionality of the AccDC Enterprise API for Advanced UI Automation at WhatSock.com, which was founded to promote the concept and utilization of Automatically Accessible ...
INTRODUCTION The AccDC Enterprise API is a scalable dynamic content management system that powers complex behaviors in Rich Internet Applications while ensuring automatic accessibility for Assistive Technology ...
• Utilizing interchangeable component objects for easy code manageability.
• Automatically including accessibility features for screen reader and keyboard only users. ...
doi:10.1145/1969289.1969314
dblp:conf/w4a/Garaventa11
fatcat:zew3uots3jdvtmil57rsc6kzee
Virtualization Security: Analysis and Open Challenges
2015
International Journal of Hybrid Information Technology
Virtualization is a term that refers to the abstraction of computer resources. Virtualization has many applications within any organization. ...
With all such advantages, there are also some security and privacy issues for utilizing any form of virtualization. ...
To secure DMA, I/O memory management units are used to isolate and restrict device access to assigned resource. ...
doi:10.14257/ijhit.2015.8.2.22
fatcat:mr2bj3sjgndnvi2354pye5345q
« Previous
Showing results 1 — 15 out of 68,822 results