68,822 Hits in 7.0 sec

Resource Access Management for a Utility Hosting Enterprise Applications [chapter]

J. Rolia, X. Zhu, M. Arlitt
2003 Integrated Network Management VIII  
In this paper we introduce a Resource Access Management (RAM) framework for resource utilities that facilitates Class of Service (CoS) based automated resource management.  ...  The framework may be used to offer resources on demand to enterprise applications that have time varying resource needs.  ...  This paper presents a resource access management (RAM) framework for resource utilities that support Grids for enterprise applications.  ... 
doi:10.1007/978-0-387-35674-7_55 fatcat:wn2y6e5lxrbfji5w2xjdtsnxkq

Resource access management for a utility hosting enterprise applications

J. Rolia, X. Zhu, M. Arlitt
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.  
In this paper we introduce a Resource Access Management (RAM) framework for resource utilities that facilitates Class of Service (CoS) based automated resource management.  ...  The framework may be used to offer resources on demand to enterprise applications that have time varying resource needs.  ...  Figure 5 . 5 Best effort server availability Resource Access Management for a Utility Hosting...  ... 
doi:10.1109/inm.2003.1194210 fatcat:xidgro4e4jadbl6dru53yktmc4

A Grid Infrastructure for Utility Computing

Ignacio Llorente, Ruben Montero, Eduardo Huedo, Katia Leal
2006 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06)  
Utility computing is a service provisioning model, which will provide adaptive, flexible and simple access to computing resources, enabling a pay-per-use model for computing similar to traditional utilities  ...  The consumer requires a uniform, secure and reliable functionality to access the utility computing service and the provider requires a scalable, flexible and adaptive infrastructure to provide the service  ...  functionality to access computing resources A grid gateway, i.e. a WS-GRAM service hosting GridWay, may act as the utility computing service, providing a uniform standard interface for the secure and  ... 
doi:10.1109/wetice.2006.7 dblp:conf/wetice/LlorenteMHL06 fatcat:h3m4ygolxne3zbbukd5dmubrdi

Conceptualization of Cloud Computing and its Security Threats, Challenges, Technologies and Application

Gaurav Dhawan
2017 International Journal for Research in Applied Science and Engineering Technology  
Cloud computing is the utilization of computer resources i.e. hardware and software which are delivered as service over a network.  ...  In this paper we also discussed the different technologies and its applications used for cloud computing.  ...  Utility Computing Utility computing is based on Pay per Use model. It offers computational resources on demand as a metered service.  ... 
doi:10.22214/ijraset.2017.4112 fatcat:6qfzzytj3bai7nko6wfswxwedu

Design of an enablement process for on demand applications

K. Chang, A. Dasari, H. Madduri, A. Mendoza, J. Mims
2004 IBM Systems Journal  
As software applications became more complex to manage, enterprise customers began moving these applications out of their premises and hired hosting companies such as IBM to host and manage these applications  ...  The majority of currently hosted applications fall into three (nonutility) hosting models. 1 Utility computing is discussed in the next major subsection. Collocation.  ...  It is installed in a dedicated hosting center or on the customer premises and is used within the enterprise, even if the application is Web-enabled and Internet-accessible.  ... 
doi:10.1147/sj.431.0190 fatcat:gvdrhb255zbotgka3tevnnjsgu

The Business Intelligence Environment [chapter]

David Loshin
2003 Business Intelligence  
The evolution of the SAS 9.2 architecture provides a powerful, distributed, and flexible environment for real-time, responsive analytic and reporting capabilities.  ...  This paper describes how information technology (IT) and SAS administrators can use vendor and open source enterprise systems management products to ascertain the state or status of the SAS 9.2 Enterprise  ...  servers o Client tier applications hosted on a diverse collection of hardware and software environments ENTERPRISE SYSTEMS MANAGEMENT INTEGRATION INTRODUCTION AND OVERVIEW Enterprise systems management  ... 
doi:10.1016/b978-155860916-7/50005-1 fatcat:kw22opcnfzfnxftz2qvpzfclzm

Design of IT Infrastructure Multicloud Management Platform Based on Hybrid Cloud

Wei Cheng, Hanzao Feng, Gaoxiang Liang, Kuruva Lakshmanna
2022 Wireless Communications and Mobile Computing  
Also, the platform information access security management becomes extremely difficult. Therefore, a multicloud management platform for IT infrastructure based on hybrid cloud is designed.  ...  The framework also ensures desensitized access to IT infrastructure resources. Also, a cloud data load balancing adaptation process and IT infrastructure cloud management process are designed.  ...  for the subnode access of "natural resource cloud."  ... 
doi:10.1155/2022/9227948 fatcat:74grnfubr5dexebpyidap7dnum

Comprehensive Research and Application of Cloud Computing in Enterprises

Tao Feng, Yun Cheng
2014 International Journal of Grid and Distributed Computing  
Therefore, in this paper, we introduced the definition of Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies (e.g.  ...  In order to deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing.  ...  Vaquero [1] and "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility" by R. Buyya [9] .  ... 
doi:10.14257/ijgdc.2014.7.6.15 fatcat:aprymz4cmbcylpbnbmtzzy3dne

Facebook Meets the Virtualized Enterprise

Roger Curry, Cameron Kiddle, Nayden Markatchev, Rob Simmonds, Tingxi Tan, Martin Arlitt, Bruce Walker
2008 2008 12th International IEEE Enterprise Distributed Object Computing Conference  
In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting to provide employees with a comprehensive and transparent environment for utilizing applications  ...  In this paper we explore the advantages of using Web 2.0 and cloud computing technologies in an enterprise setting to provide employees with a comprehensive and transparent environment for utilizing applications  ...  IT Model In this section we first explain in more detail our proposed IT model for accessing and hosting applications for enterprises.  ... 
doi:10.1109/edoc.2008.19 dblp:conf/edoc/CurryKMSTAW08 fatcat:gtjquldadzcodlh4l47lzvqpqy

A Proposed Virtualization Technique to Enhance IT Services

Nashaat el-Khameesy, Hossam Abdel Rahman Mohamed
2012 International Journal of Information Technology and Computer Science  
Virtualization provides many benefits, including improved physical resource utilization, improved hardware efficiency, and reduced power and cooling expenses.  ...  Virtualization provides many benefits and greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environmental control, more availability, reduced  ...  and resource utilization statistics of data center elements, such as virtual machines, hosts and clusters • Alarms and Event Management -Tracks and warns users on potential resource over-utilization or  ... 
doi:10.5815/ijitcs.2012.12.02 fatcat:3l5g5grfsrepfoars5evekpcvi

Cloud Computing: A New Paradigm in IT that has the Power to Transform Emerging Markets

San Murugesan
2012 The International Journal on Advances in ICT for Emerging Regions  
Cloud computing offers utility-like availability of computing resources and applications via the Internet at low cost.  ...  It has the power to transform enterprises in emerging markets offering access to advanced IT infrastructure and applications that many of them couldn't afford.  ...  .  -Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that  ... 
doi:10.4038/icter.v4i2.4672 fatcat:j7zvaqnnubelzhrukmzvyedmr4

Evros: A service-delivery platform for extending security coverage and IT reach

Dimitrios Stiliadis, Andrea Francini, Sanjay Kamat, Mansoor Alicherry, Adiseshu Hari, Pramod V. Koppol, Ashok K. Gupta, Dor Skuler
2007 Bell Labs technical journal  
Evros is an always-available, secure service-delivery platform for enterprise remote access and device management.  ...  The Evros management server is a software suite for the management of all Evros components. © 2007 Alcatel-Lucent .  ...  The EFT path is a generic file transfer utility that any enterprise application can resort to.  ... 
doi:10.1002/bltj.20253 fatcat:736p6by5zbfefkdo6bs4qbhcxe

Virtualization in Cloud Computing

Arun Prasath. M, Mrs. T. Sathiyabama
2018 International Journal of Trend in Scientific Research and Development  
Apart of its popularity it has some concerns which are becoming huddles for its wider adoption. In this paper a study has been made on virtualization concerns.  ...  In this internet world cloud computing is raising high by providing everything incense the required resources, applications, software, hardware, computing power to computing infrastructure, business process  ...  Access control policies are to be established and client identities are to be checked. Datacenter platforms, infrastructure and client devices are to be secured by trusted computer policies.  ... 
doi:10.31142/ijtsrd18665 fatcat:f7lekcjhrfa6tghkcun2dmse6e

The AccDC enterprise API for advanced UI automation

Bryan Garaventa
2011 Proceedings of the International Cross-Disciplinary Conference on Web Accessibility - W4A '11  
This paper describes the purpose and functionality of the AccDC Enterprise API for Advanced UI Automation at, which was founded to promote the concept and utilization of Automatically Accessible  ...  INTRODUCTION The AccDC Enterprise API is a scalable dynamic content management system that powers complex behaviors in Rich Internet Applications while ensuring automatic accessibility for Assistive Technology  ...  • Utilizing interchangeable component objects for easy code manageability. • Automatically including accessibility features for screen reader and keyboard only users.  ... 
doi:10.1145/1969289.1969314 dblp:conf/w4a/Garaventa11 fatcat:zew3uots3jdvtmil57rsc6kzee

Virtualization Security: Analysis and Open Challenges

Muhammad Arif, Haroon Shakeel
2015 International Journal of Hybrid Information Technology  
Virtualization is a term that refers to the abstraction of computer resources. Virtualization has many applications within any organization.  ...  With all such advantages, there are also some security and privacy issues for utilizing any form of virtualization.  ...  To secure DMA, I/O memory management units are used to isolate and restrict device access to assigned resource.  ... 
doi:10.14257/ijhit.2015.8.2.22 fatcat:mr2bj3sjgndnvi2354pye5345q
« Previous Showing results 1 — 15 out of 68,822 results