scholarly journals OpenIaC: Open Infrastructure as Code - The Network is My Computer

Author(s):  
Chunming Rong ◽  
Jiahui Geng ◽  
Thomas J. Hacker ◽  
Haakon Bryhni ◽  
Martin G. Jaatun

Abstract Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. The 5G networks, which can create hyperlocalized services, have highlighted many of the deficiencies of current practices in use today to create and operate information systems. Emerging cloud computing techniques, such as Infrastructure-as-Code (IaC) and elastic computing, o↵er a path for a future re-imagining of how we create, deploy, secure, operate, and retire information systems. In this paper, we articulate the position that a comprehensive new approach is needed for all OSI layers from layer 2 up to applications that are built on underlying principles that include reproducibility, continuous integration/continuous delivery, auditability, and versioning. There are obvious needs to redesign and optimize the protocols from the network layer to the application layer. Our vision seeks to augment existing Cloud Computing and Networking solutions with support for multiple cloud infrastructures and seamless integration of cloud-based microservices. To address these issues, we propose an approach named Open Infrastructure as Code (OpenIaC), which is an attempt to provide a common open forum to integrate and build on advances in cloud computing and blockchain to address the needs of modern information architectures. The main mission of our OpenIaC approach is to provide services based on the principles of Zero Trust Architecture (ZTA) among the federation of connected resources based on Decentralized Identity (DID). Our objectives include the creation of an open-source hub with fine-grained access control for an open and connected infrastructure of shared resources (sensing, storage, computing, 3D printing, etc.) managed by blockchains and federations. Our proposed approach has the potential to provide a path for developing new platforms, business models, and a modernized information ecosystem necessary for 5G networks.

2021 ◽  
Author(s):  
Elivaldo Lozer Fracalossi Ribeiro ◽  
Daniela Barreiro Claro ◽  
Rita Suzana Pitangueira Maciel

Modern information systems are becoming increasingly complex due to the need to combine heterogeneous software. A common understanding of interoperability issues is not a trivial task since complex systems may contain many independent software components. This work presents a Conceptual frAmework for Pragmatic InTeroperAbiLity (CAPITAL) to enhance a pragmatic interoperability unified definition. We evaluate our framework through a modeling and coding guide, a controlled experiment, and applying CAPITAL in the Cloud Computing domain. Results suggest that CAPITAL positively influences the understanding, modeling, and codification of pragmatic interoperability solutions, facilitating pragmatic interoperability standardization opportunities.


Author(s):  
Matteo Turilli ◽  
David Wallom ◽  
Chris Williams ◽  
Steve Gough ◽  
Neal Curran ◽  
...  

Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.


2005 ◽  
Vol 4 (2) ◽  
pp. 626-630 ◽  
Author(s):  
Rini Mahajan ◽  
Dr. Dheerendra Singh

Abstract- Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. It aims to construct a perfect system with powerful computing capability through a large number of relatively low-cost computing entity, and using the advanced business models like SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service) to distribute the powerful computing capacity to end users’ hands. Cloud Computing represents a new computing model that poses many demanding security issues at all levels, e.g., network, host, application, and data levels. The variety of the delivery models presents different security challenges depending on the model and consumers’ Quality of Service (QoS) requirements. Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. This paper introduces the existing issues in cloud computing such as security, privacy, reliability and so on. This paper surveys the security problems of current cloud computing.


2021 ◽  
Vol 13 (3) ◽  
pp. 1021
Author(s):  
Sara Scipioni ◽  
Meir Russ ◽  
Federico Niccolini

To contribute to small and medium enterprises’ (SMEs) sustainable transition into the circular economy, the study proposes the activation of organizational learning (OL) processes—denoted here as multi-level knowledge creation, transfer, and retention processes—as a key phase in introducing circular business models (CBMs) at SME and supply chain (SC) level. The research employs a mixed-method approach, using the focus group methodology to identify contextual elements impacting on CBM-related OL processes, and a survey-based evaluation to single out the most frequently used OL processes inside Italian construction SMEs. As a main result, a CBM-oriented OL multi-level model offers a fine-grained understanding of contextual elements acting mutually as barriers and drivers for OL processes, as possible OL dynamics among them. The multi-level culture construct—composed of external stakeholders’, SC stakeholders’, and organizational culture—identify the key element to activate CBM-oriented OL processes. Main implications are related to the identification of cultural, structural, regulatory, and process contextual elements across the external, SC, and organizational levels, and their interrelation with applicable intraorganizational and interorganizational learning processes. The proposed model would contribute to an improved implementation of transitioning into the circular economy utilizing sustainable business models in the construction SMEs.


2017 ◽  
Vol 30 (2) ◽  
pp. 320-334 ◽  
Author(s):  
Bénédicte Branchet ◽  
Pierre-Yves Sanseau

Purpose Existing research infers that in the information systems (IS) and information technology (IT) fields, a shift may occur between technical and non-technical skills. However, relatively little research has focused on going changes in terms of key skills in the IS suppliers sector. The purpose of this paper is to address this gap by investigating these skills evolution in the IS suppliers domain and discusses their impacts on IS and IT curricula. Design/methodology/approach This paper uses a qualitative method based on 15 semi-structured face-to-face interviews, with highly dedicated operational managers in senior positions in the field. Findings This study identifies, for the IS suppliers, the critical skills, which are basically non-technical, and peripheral skills, which are primarily technical. It then considers the consequences of this change and the necessary adaptations it requires for businesses and training for this field. Practical implications The findings suggest the need to redesign the educational curricula for future managers, and the adaptations required to the work organization, human resource management and business models of firms in the field. Originality/value The paper’s value is twofold. First, it focuses on IS service suppliers, an understudied area (most research examines IS outsourcing from the customer’s standpoint); second, it reveals the shift away from technical toward non-technical skills in a field that is intrinsically technical – a change that may occur more slowly than in other less technical sectors – and the consequences of this change for firms, education and society.


2014 ◽  
Vol 635-637 ◽  
pp. 1866-1870
Author(s):  
Chun Xiao Wang ◽  
Ying Guo ◽  
Jun Wang ◽  
Liang Li

This paper analyzes the main problems in informatization of china's manufacturing industry, and researches an industrial collaborative manufacturing system for large and medium-sized manufacturing enterprises taking advantage of the benefits of cloud computing such as resource integration, elastic computing, mass data, and service integration. The system includes technical support system, business support system, security system and service portal, which providing design collaboration services, production collaboration services, business collaboration services, office collaboration services for enterprises, and forming a complete standard system. This will further promote the innovation of the service model and change of economic growth mode in our country.


2015 ◽  
Author(s):  
Philip A. McGillivary ◽  
Michele Stecca ◽  
Massimo Maresca ◽  
Pierpaolo Baglietto

Sign in / Sign up

Export Citation Format

Share Document