Establishing Performance Metrics for Managing the Outsourced MIS Project

Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.

2010 ◽  
pp. 1807-1828
Author(s):  
Jeanette Nasem Morgan

This chapter presents the tactics and metrics an organization applies after having made a decision to use outsource providers. Tactics are used to define the nature and specifics of the outsourcing arrangement, as well as to select the contractual basis of the agreement. Organizations that elect to use providers geographically distant from the client site are cautioned to carefully evaluate capabilities, as well as legal and security issues related to external outsourcers. For these purposes, it is critical to align measures of performance compliance in the form of metrics on each MIS outsourcing relationship. When negotiating and establishing the terms of the outsourcing arrangement, management should ensure that appropriate performance metrics are identified and included, as well as flexibility for change is built in to the contract. This chapter addresses some of the methods, as well as some of the metrics that might be used in such contract agreements. The use of contracts and service level agreements are discussed, as well as in depth techniques for conducting validation and background checks on outsource suppliers. Sample outlines for service level agreement preparation and performance specifications are included for the practitioner.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Muhammad Muzamil Aslam ◽  
Liping Du ◽  
Xiaoyan Zhang ◽  
Yueyun Chen ◽  
Zahoor Ahmed ◽  
...  

Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familiarize innovative use cases and performance metrics, such as to offer worldwide coverage, cost efficiency, enhanced spectral, energy improved intelligence, and safety. To reach such requirements, upcoming 6G CRNs will trust novel empowering technologies. Innovative network architecture and transmission technologies and air interface are of excessive position, like multiple accesses, waveform design, multiantenna technologies, and channel coding schemes. (1) To content, the condition should be of worldwide coverage, there will be no limit on 6G to global CR communication networks that may require to be completed with broadcast networks, like satellite communication networks, therefore, attaining a sea integrated communication network. (2) The spectrums overall will be entirely travelled to the supplementary rise connection density data rates in optical frequency bands, millimeter wave (mmWave), sub-6 GHz, and terahertz (THz). (3) To see big datasets created because of tremendously varied CR communication networks, antenna rush, diverse communication scenarios, new provision necessities, wide bandwidth, and 6G CRNs will allow an innovative variety of intelligent applications with the assistance of big data and AI technologies. (4) Need to improve network security when deploying 6G technology in CR networks. 6G is decentralized, intended, intelligent innovative, and distributed network. In this article, we studied a survey of current developments and upcoming trends. We studied the predicted applications, possible technologies, and security issues for 6G CR network communication. We also discussed predicted future key challenges in 6G.


2013 ◽  
pp. 789-804
Author(s):  
Mirjana D. Stojanović ◽  
Vladanka S. Acimovic-Raspopovic ◽  
Slavica Bostjancic Rakas

This chapter aims to provide a critical evaluation of security issues and potential solutions related to the use of free and open enterprise resource planning (FOS ERP) systems in highly dynamic and heterogeneous next generation networks (NGN). The authors first present a brief state of the art with respect to technologies, features and applicability of the existing security solutions for ERP systems. Second, they address security issues in FOS ERP systems. Further, they consider research directions concerning NGN infrastructure security, with a particular focus to the importance of building advanced security management systems. Properly defined service level agreement between the customer and the provider represents a starting point for provisioning of secure services with the required quality. The authors also propose policy-based security management architecture, in a wider context of quality of service management system.


Author(s):  
Mirjana D. Stojanovic ◽  
Vladanka S. Acimovic-Raspopovic ◽  
Slavica Bostjancic Rakas

This chapter aims to provide a critical evaluation of security issues and potential solutions related to the use of free and open enterprise resource planning (FOS ERP) systems in highly dynamic and heterogeneous next generation networks (NGN). The authors first present a brief state of the art with respect to technologies, features and applicability of the existing security solutions for ERP systems. Second, they address security issues in FOS ERP systems. Further, they consider research directions concerning NGN infrastructure security, with a particular focus to the importance of building advanced security management systems. Properly defined service level agreement between the customer and the provider represents a starting point for provisioning of secure services with the required quality. The authors also propose policy-based security management architecture, in a wider context of quality of service management system.


2020 ◽  
Vol 17 (9) ◽  
pp. 3904-3906
Author(s):  
Susmita J. A. Nair ◽  
T. R. Gopalakrishnan Nair

Increasing demand of computing resources and the popularity of cloud computing have led the organizations to establish of large-scale data centers. To handle varying workloads, allocating resources to Virtual Machines, placing the VMs in the most suitable physical machine at data centers without violating the Service Level Agreement remains a big challenge for the cloud providers. The energy consumption and performance degradation are the prime focus for the data centers in providing services by strictly following the SLA. In this paper we are suggesting a model for minimizing the energy consumption and performance degradation without violating SLA. The experiments conducted have shown a reduction in SLA violation by nearly 10%.


2018 ◽  
Vol 11 (2) ◽  
pp. 30-42
Author(s):  
Vinicius Da Silveira Segalin ◽  
Carina Friedrich Dorneles ◽  
Mario Antonio Ribeiro Dantas

Cloud computing is a paradigm that presents many advantages to both costumers and service providers, such as low upfront investment, pay-per-use and easiness of use, delivering/enabling scalable services using Internet technologies. Among many types of services we have today, Database as a Service (DBaaS) is the one where a database is provided in the cloud in all its aspects. Examples of aspects related to DBaaS utilization are data storage, resources management and SLA maintenance. In this context, an important feature, related to it, is resource management and performance, which can be done in many different ways for several reasons, such as saving money, time, and meeting the requirements agreed between client and provider, that are defined in the Service Level Agreement (SLA). A SLA usually tries to protect the costumer from not receiving the contracted service and to ensure that the provider reaches the profit intended. In this paper it is presented a classification based on three main parameters that aim to manage resources for enhancing the performance on DBaaS and guarantee that the SLA is respected for both user and provider sides benefit. The proposal is based upon a survey of existing research work efforts.


Author(s):  
Oshin Sharma ◽  
Hemraj Saini

Cloud computing has revolutionized the working models of IT industry and increasing the demand of cloud resources which further leads to increase in energy consumption of data centers. Virtual machines (VMs) are consolidated dynamically to reduce the number of host machines inside data centers by satisfying the customer's requirements and quality of services (QoS). Moreover, for using the services of cloud environment every cloud user has a service level agreement (SLA) that deals with energy and performance trade-offs. As, the excess of consolidation and migration may degrade the performance of system, therefore, this paper focuses the overall performance of the system instead of energy consumption during the consolidation process to maintain a trust level between cloud's users and providers. In addition, the paper proposed three different heuristics for virtual machine (VM) placement based on current and previous usage of resources. The proposed heuristics ensure a high level of service level agreements (SLA) and better performance of ESM metric in comparison to previous research.


Web Services ◽  
2019 ◽  
pp. 769-787
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


2019 ◽  
Vol 9 (17) ◽  
pp. 3602 ◽  
Author(s):  
Lei Hang ◽  
Do-Hyeun Kim

Recently, technology startups have leveraged the potential of blockchain-based technologies to govern institutions or interpersonal trust by enforcing signed treaties among different individuals in a decentralized environment. However, it is going to be hard enough convincing that the blockchain technology could completely replace the trust among trading partners in the sharing economy as sharing services always operate in a highly dynamic environment. With the rapid expanding of the rental market, the sharing economy faces more and more severe challenges in the form of regulatory uncertainty and concerns about abuses. This paper proposes an enhanced decentralized sharing economy service using the service level agreement (SLA), which documents the services the provider will furnish and defines the service standards the provider is obligated to meet. The SLA specifications are defined as the smart contract, which facilitates multi-user collaboration and automates the process with no involvement of the third party. To demonstrate the usability of the proposed solution in the sharing economy, a notebook sharing case study is implemented using the Hyperledger Fabric. The functionalities of the smart contract are tested using the Hyperledger Composer. Moreover, the efficiency of the designed approach is demonstrated through a series of experimental tests using different performance metrics.


Sign in / Sign up

Export Citation Format

Share Document