Tending and Trekking towards Composite Oriented Architecture (COA)

Author(s):  
Pethuru Raj Chelliah

With the noteworthy spurt of service orientation (SO) principles, the spur and surge for composition paradigm have taken a fabulous and fruitful dimension and perspective. Composites are emerging and establishing as the promising, proven and potential building-blocks in the pulsating ICT space. Enterprises are very optimistic and sensitive about the shining days of composites in their day-to-day dealings and obligations to their restive partners, government agencies, venerable customers, demanding end-users, and loyal employees. In short, composites are bound to increasingly and illuminatingly participate and contribute towards fulfilling the goals of realizing integrated, optimized, smart and lean business processes that in turn can lead to extended, connected, adaptive, and on-demand businesses. As next-generation ICT is presumed to thrive on spontaneous and seamless collaboration among systems, services, servers, sensors, etc. by sending messages as well as smartly sharing a wider variety of connected and empowered resources, there arises a distinct identity and value for progressive, penetrative and pervasive composites. Already we started to read, hear and experience composite applications, services, and views. As composition is to flower and flourish in a positive fashion, the future IT is definitely on right track. In this chapter, you can find discussions about how rapidly and smoothly services enable business-aligned composites realization. There are sections dealing with prominent composition paradigms, patterns, platforms, processes, practices, products, perspectives, problems and potentials.

2018 ◽  
Vol 26 (4) ◽  
pp. 491-512 ◽  
Author(s):  
Natalia Miloslavskaya

Purpose Nowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match a lot of internal and external compliance regulations such as laws, standards, guidelines, policies, specifications and procedures. An integrated system able to manage information security (IS) for their intranets in the new cyberspace while processing tremendous amounts of IS-related data coming in various formats is required as never before. These data, after being collected and analyzed, should be evaluated in real-time from an IS incident viewpoint, to identify an incident’s source, consider its type, weigh its consequences, visualize its vector, associate all target systems, prioritize countermeasures and offer mitigation solutions with weighted impact relevance. Different security information and event management (SIEM) systems cope with this routine and usually complicated work by rapid detection of IS incidents and further appropriate response. Modern challenges dictate the need to build these systems using advanced technologies such as the blockchain (BC) technologies (BCTs). The purpose of this study is to design a new BC-based SIEM 3.0 system and propose a methodology for its evaluation. Design/methodology/approach Modern challenges dictate the need to build these systems using advanced technologies such as the BC technologies. Many internet resources argue that the BCT suits the intrusion detection objectives very well, but they do not mention how to implement it. Findings After a brief analysis of the BC concept and the evolution of SIEM systems, this paper presents the main ideas on designing the next-generation BC-based SIEM 3.0 systems, for the first time in open access publications, including a convolution method for solving the scalability issue for ever-growing BC size. This new approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. Research limitations/implications The most important area of the future work is to bring this proposed system to life. The implementation, deployment and testing onto a real-world network would also allow people to see its viability or show that a more sophisticated model should be worked out. After developing the design basics, we are ready to determine the directions of the most promising studies. What are the main criteria and principles, according to which the organization will select events from PEL for creating one BC block? What is the optimal number of nodes in the organization’s BC, depending on its network assets, services provided and the number of events that occur in its network? How to build and host the SIEM 3.0 BC infrastructure? How to arrange streaming analytics of block’s content containing events taking place in the network? How to design the BC middleware as software that enables staff to interact with BC blocks to provide services like IS events correlation? How to visualize the results obtained to find insights and patterns in historical BC data for better IS management? How to predict the emergence of IS events in the future? This list of questions can be continued indefinitely for a full-fledged design of SIEM 3.0. Practical implications This paper shows the full applicability of the BC concept to the creation of the next-generation SIEM 3.0 systems that are designed to detect IS incidents in a modern, fully interconnected organization’s network environment. The authors’ attempt to begin with a detailed description of the basics for a BC-based SIEM 3.0 system design is presented, as well as the evaluation methodology for the resulting product. Originality/value The authors believe that their new revolutionary approach makes it possible not to simply modify SIEM systems in an evolutionary manner, but to bring their next generation to a qualitatively new and higher level of IS event management in the future. They hope that this paper will evoke a lively response in this segment of the security controls market from both theorists and direct developers of living systems that will implement the above approach.


2021 ◽  
Vol 11 (21) ◽  
pp. 9980
Author(s):  
Giulio Salierno ◽  
Letizia Leonardi ◽  
Giacomo Cabri

The technological advancements promote the rise of the fourth industrial revolution, where key terms are efficiency, innovation, and enterprises’ digitalization. Market globalization, product mass customization, and more complex products need to reflect on changing the actual design methods and developing business processes and methodologies that have to be data-driven, AI-assisted, smart, and service-oriented. Therefore, there is a great interest in experimenting with emerging technologies and evaluating how they impact the actual business processes. This paper reports a comparison among the major trends in the digitalization of a Factory of the Future, in conjunction with the two major strategic programs of Industry 4.0 and China 2025. We have focused on these two programs because we have had experience with them in the context of the FIRST H2020 project. European industrialists identify the radical change in the traditional manufacturing production process as the rise of Industry 4.0. Conversely, China mainland launched its strategic plan in China 2025 to promote smart manufacturing to digitalize traditional manufacturing processes. The main contribution of this review paper is to report about a study, conducted and part of the aforementioned FIRST project, which aimed to investigate major trends in applying for both programs in terms of technologies and their applications for the factory’s digitalization. In particular, our analysis consists of the comparison between Digital Factory, Virtual Factory, Smart Manufacturing, and Cloud Manufacturing. We analyzed their essential characteristics, the operational boundaries, the employed technologies, and the interoperability offered at each factory level for each paradigm. Based on this analysis, we report the building blocks in terms of essential technologies required to develop the next generation of a factory of the future, as well as some of the interoperability challenges at a different scale, for enabling inter-factories communications between heterogeneous entities.


2013 ◽  
Vol 8 (1) ◽  
pp. 131-142 ◽  
Author(s):  
Dirk Von Suchodoletz ◽  
Klaus Rechert ◽  
Isgandar Valizada

The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-)client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS) fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a business model and estimate costs to implement and run such a service. The implementations of EaaS will influence future preservation planning in memory institutions, as it shifts the focus on object access workflows.


Author(s):  
Gerald F. Davis ◽  
S.D. Shibulal

We are witnessing the emergence of an information and communication technology (ICT)-enabled platform capitalism in which traditional corporations are being displaced. Railing against traditional firms to rescue capitalism would, under these circumstances, seem like misdirected effort. The “working anarchies” (e.g. Uber, Wikipedia) and “pop-up firms” (e.g. Vizio) of this new world use “labor on demand.” Here too there is risk that platform owners exploit their power and become rapacious. Yet, ICT can enable platform capitalism to create community-based, locally controlled alternatives to corporations and states. Cooperatives and democratic software platforms (e.g. Linux) must be important business forms in the future.


2021 ◽  
Vol 30 (11) ◽  
pp. 878-879
Author(s):  
Daniela Marino ◽  
Vincent Ronfard
Keyword(s):  

Author(s):  
А. Прозоров ◽  
Р. Шнырев ◽  
Д. Волков

Стоимость единицы прибыли неуклонно растет, и для бизнеса пришло время задуматься о цифровых платформах, позволяющих успешно конкурировать в борьбе за платежеспособных клиентов. The cost per unit of profit is steadily increasing, and it is time for businesses to think about digital platforms that allow successfully compete for effective demand by joining the ecosystem, using specialization and theoretically unlimited scaling of business processes. One of the architecture options such a platform that connects the clouds, edge computing and 5G / 6G technologies, — hyperscaler.


Sign in / Sign up

Export Citation Format

Share Document