Intensive Management Mode of IT Resources of Enterprise Group Based on Cloud Services

2013 ◽  
Vol 401-403 ◽  
pp. 1900-1903
Author(s):  
Xu Mei Zhang ◽  
Qiao Ling Fan

The informationalization construction is playing an increasingly important role for the development of enterprise group.However, there are problems that enterprise group has to be faced with, like the rapid growth of data, the continuous increase in purchase and maintenance costs of software and hardware equipment, the overlapping allocation of IT resources and so on. To solve these problems, a hierarchical model of intensive management of IT resources of enterprise group based on cloud services was established, and intensive management modes of software, hardware and knowledge of enterprise group were proposed as well.

Author(s):  
Ajai K. Daniel

The cloud-based computing paradigm helps organizations grow exponentially through means of employing an efficient resource management under the budgetary constraints. As an emerging field, cloud computing has a concept of amalgamation of database techniques, programming, network, and internet. The revolutionary advantages over conventional data computing, storage, and retrieval infrastructures result in an increase in the number of organizational services. Cloud services are feasible in all aspects such as cost, operation, infrastructure (software and hardware) and processing. The efficient resource management with cloud computing has great importance of higher scalability, significant energy saving, and cost reduction. Trustworthiness of the provider significantly influences the possible cloud user in his selection of cloud services. This chapter proposes a cloud service selection model (CSSM) for analyzing any cloud service in detail with multidimensional perspectives.


1989 ◽  
Vol 6 (4) ◽  
pp. 172-174
Author(s):  
Michael E. Ostry ◽  
Thomas H. Nicholls

Abstract Intensive management of larch in the north central and northeastern United States is receiving considerable interest because of the rapid growth of European and Japanese larch and the hybrids between these two species. A needlecast disease caused by the fungus Mycosphaerella laricina has the potential to reduce tree growth and kill highly susceptible trees. Research in Wisconsin and Iowa using six larch species and hybrids has provided data showing the importance of seed source selection in minimizing damage caused by this disease. North. J. Appl. For. 6:172-174, December 1989.


2014 ◽  
Vol 5 (2) ◽  
pp. 20-43 ◽  
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Ludger Goeke ◽  
Selim Güler ◽  
Maritta Heisel

Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of particular interest for SME's. The reason is that using Cloud Resources allows an SME to focus on its core business rather than on IT-resources. However, numerous concerns about the security of cloud computing services exist. Potential cloud customers have to be confident that the cloud services they acquire are secure for them to use. Therefore, they have to have a clear set of security requirements covering their security needs. Eliciting these requirements is a difficult task, because of the amount of stakeholders and technical components to consider in a cloud environment. Therefore, the authors propose a structured, pattern-based method supporting eliciting security requirements and selecting security measures. The method guides potential cloud customers to model the application of their business case in a cloud computing context using a pattern-based approach. Thus, a potential cloud customer can instantiate our so-called Cloud System Analysis Pattern. Then, the information of the instantiated pattern can be used to fill-out our textual security requirements patterns and individual defined security requirement patterns, as well. The presented method is tool-supported. Our tool supports the instantiation of the cloud system analysis pattern and automatically transfers the information from the instance to the security requirements patterns. In addition, they have validation conditions that check e.g., if a security requirement refers to at least one element in the cloud. The authors illustrate their method using an online-banking system as running example.


2014 ◽  
Vol 955-959 ◽  
pp. 3770-3776
Author(s):  
Yu Qi Jiang ◽  
Yang Wang ◽  
Ke Chen

In the past few decades, forestland management have changed in response to the improved patterns of resource use in rural China. Two main questions arise: what factors are to have an impacts on forestland use, and how does forestland management adapt to forestland use changes. Most researches mainly focus on forestland transfer for the forestland use, since forestland transfer has been the effective way of achieving intensive management. The forest tenure reform breeds new management modes and management methods for forestland change as the most basic driving force. However, there are some aspects need to be improved and further discussion is required, including constructing forestry credit system, perfecting mortgage system, and improving assets evaluation system and service mechanism. This paper summarizes the existing studies on forestland use and management from the reform of forestry system, forestland use change and forestland management.


2020 ◽  
Vol 21 (3) ◽  
pp. 349-358
Author(s):  
Vivek Kumar Prasad ◽  
Madhuri D Bhavsar

Internet of Things (IoT) and cloud computing are the expertise captivating the technology. The most astonishing thing is their interdependence. IoT deals with the production of an additional amount of information that requires transmission of data, storage, and huge infrastructural processing power, posing a solemn delinquent. This is where cloud computing fits into the scenario. Cloud computing can be treated as the utility factor nowadays and can be used by pay as you go manner. As a cloud is a multi-tenant approach, and the resources will be used by multiple users. The cloud resources are required to be monitored, maintained, and configured and set-up as per the need of the end-users. This paper describes the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The resource management system coordinates the IT resources among the cloud provider and the end users; accordingly, multiple instances can be created and managed as per the demand and availability of the support in terms of resources. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. The scope of this research paper is to manage the Cloud Computing resources during the peak time and avoid the conditions of the over and under-provisioning proactively.


2020 ◽  
Vol 12 (2) ◽  
pp. 40
Author(s):  
Maurizio Talamo ◽  
Franco Arcieri ◽  
Andrea Dimitri ◽  
Christian H. Schunck

Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the full functionality around X.509 certificates, i.e., for the triad (server name, server address, X.509 server certificate), and demonstrate a mechanism for obtaining fast consensus. The main properties of the solution are that a consensus may be reached even when not all members of the involved PKI participate in a transaction, and that no advanced trust agreement among PKIs is needed. The proposed solution is able to detect PKI attacks and can distinguish errors from attacks, allowing precise management of anomalies.


2012 ◽  
Vol 249-250 ◽  
pp. 533-541
Author(s):  
Gui Yang Jin ◽  
Fu Zai Lv ◽  
Zhan Qin Xiang

Many capital-intensive industries such as iron and steel, energy, refining, petrochemical and manufacturing companies have the pressure of continuous increase in maintenance costs. In recent years, condition based maintenance becomes an important tool for reducing maintenance costs in these industries. It is a very information intensive domain. Good condition based maintenance systems need to integrate multiple heterogeneous data sources. In this paper, we will use ontology to describe the semantics of condition based maintenance concepts. It serves two main purposes: (1) offering a common understanding of the condition based maintenance domain, and (2) the knowledge held in the ontology is machine-readable and explicit, thus making the knowledge easy to be processed and reused.


2013 ◽  
Vol 4 (1) ◽  
pp. 111-113
Author(s):  
Sarvesh Singh ◽  
Anupam Shukla ◽  
Ankit Sharma ◽  
Kalimullah Lone

Now a days cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating these resources locally, such as a college or university network. These resources can include application and services as well as infrastructure and services over the network. Any organization can purchase these resources on as needed basis and avoid the capital expenditure cost of software and hardware. Security is major problem in cloud computing, thus key distribution is important thing for managing security in cloud computing. In this paper we derived a proposed algorithms for managing keys in the cloud and also discuss uses cases for cloud computing.


2019 ◽  
Vol 214 ◽  
pp. 09006
Author(s):  
João Fernandes ◽  
Bob Jones ◽  
Sergey Yakubov ◽  
Andrea Chierici

Helix Nebula Science Cloud (HNSciCloud) has developed a hybrid cloud platform that links together commercial cloud service providers and research organizations’ in-house IT resources via the GEANT network. The platform offers data management capabilities with transparent data access where applications can be deployed with no modifications on both sides of the hybrid cloud and with compute services accessible via eduGAIN [1] and ELIXIR [2] federated identity and access management systems. In addition, it provides support services, account management facilities, full documentation and training. The cloud services are being tested by a group of 10 research organisations from across Europe [3], against the needs of use-cases from seven ESFRI infrastructures [4]. The capacity procured by ten research organisations from the commercial cloud service providers to support these use-cases during 2018 exceeds twenty thousand cores and two petabytes of storage with a network bandwidth of 40Gbps. All the services are based on open source implementations that do not require licenses in order to be deployed on the in-house IT resources of research organisations connected to the hybrid platform. An early adopter scheme has been put in place so that more research organisations can connect to the platform and procure additional capacity to support their research programmes.


Sign in / Sign up

Export Citation Format

Share Document