scholarly journals Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective

2022 ◽  
Vol 41 (1) ◽  
pp. 225-240
Author(s):  
Mwaffaq Abu-Alhaija ◽  
Nidal M. Turab ◽  
AbdelRahman Hamza
2017 ◽  
Vol 12 (1) ◽  
pp. 83-88
Author(s):  
O.V. Darintsev ◽  
A.B. Migranov

In this paper, various variants of decomposition of tasks in a group of robots using cloud computing technologies are considered. The specifics of the field of application (teams of robots) and solved problems are taken into account. In the process of decomposition, the solution of one large problem is divided into a solution of a series of smaller, simpler problems. Three ways of decomposition based on linear distribution, swarm interaction and synthesis of solutions are proposed. The results of experimental verification of the developed decomposition algorithms are presented, the working capacity of methods for planning trajectories in the cloud is shown. The resulting solution is a component of the complex task of building effective teams of robots.


Author(s):  
Chia-Chu Chiang ◽  
Shucheng Yu

Cloud computing provides an innovative technology that enables Software as a Service (SaaS) to its customers. With cloud computing technologies, a suite of program understanding tools is suggested to be deployed in a cloud to aid the generation of test cases for software testing. This cloud-enabled service allows customers to use these tools through an on-demand, flexible, and pay-per-use model. Lastly, the issues and challenges of cloud computing are presented.


Author(s):  
Zaigham Mahmood

Cloud Computing is an attractive paradigm for organisations that have a requirement to process large scalable distributed applications. It allows for self-provisioning of cloud resources to develop and host applications as well as acquire storage and networking resources. Connected Government (c-government) is an area where cloud technologies can be effectively used to achieve the benefits that the cloud paradigm promises. Social Media, Web 2.0 and mobile technologies can all help to further enhance the connected government capabilities. Using such technologies, governments and citizens can engage in real time in the electronic participation of a government's functioning. In this chapter, we introduce the cloud paradigm and then discussing the requirements of c-government, we outline how cloud technologies can help to achieve an open and transparent c-government. The aim is to provide the basics of relationship between c-government and cloud computing to set the scene for other contributions in this volume.


Author(s):  
Louay Karadsheh ◽  
Samer Alhawari

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.


2011 ◽  
Vol 1 (2) ◽  
pp. 29-40 ◽  
Author(s):  
Louay Karadsheh ◽  
Samer Alhawari

Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from traditional computing to cloud computing and the benefit for businesses, cloud computing architecture, cloud computing services classification, and deployment models. Furthermore, this paper discusses the security policies and types of internal risks that a small business might encounter implementing cloud computing technologies. It addresses initiatives towards employing certain types of security policies in small businesses implementing cloud computing technologies to encourage small business to migrate to cloud computing by portraying what is needed to secure their infrastructure using traditional security policies without the complexity used in large corporations.


2016 ◽  
Vol 117 (9/10) ◽  
pp. 644-658 ◽  
Author(s):  
Mayank Yuvaraj

Purpose This paper aims to identify the factors that influence the acceptance and purposeful use of cloud computing technologies in Indian medical libraries. Design/methodology/approach To meet the stated objectives, a three-round Delphi study was carried out; a panel of 32 participants, with expertise and experience of cloud computing in the context of Indian medical libraries, was constituted. Findings During the study, the participants identified about 60 different factors, and a consensus was reached on 42 of these, which were considered to have a direct impact on the levels of acceptance and purposeful use of cloud computing technologies in Indian medical libraries. The study points out significant factors that should be addressed to accelerate the acceptance and purposeful use of cloud computing technologies in Indian medical libraries. Originality/value The study is the first attempt to study the factors responsible for the adoption of cloud computing in Indian medical libraries through the Delphi technique.


Sign in / Sign up

Export Citation Format

Share Document