it infrastructure
Recently Published Documents


TOTAL DOCUMENTS

925
(FIVE YEARS 289)

H-INDEX

25
(FIVE YEARS 5)

2022 ◽  
Vol 8 (1) ◽  
pp. 173-177
Author(s):  
A. Voronin

The paper considers a method for assessing the state of an organization’s IT infrastructure using graph theory. The description of the main parameters which can be used to describe the state and assessment of infrastructure is given, the ways of their application are determined.


2022 ◽  
pp. 483-496
Author(s):  
Sapna Sinha ◽  
Vishal Bhatnagar ◽  
Abhay Bansal

From BRICS nations, India is the second largest tourism market after China in Asia. Technological revolution has added new dimensions to the way technologies being used in all the sectors. Also, the use of electronic gadgets leaves trail of data, which is very huge in size, this data (Big Data) is exploited by every sector for providing better services and gaining competitive edge. This trend grabbed the attention of researchers and industry for development of more optimized tools and techniques. There are many general frameworks proposed by industry and researchers for implementation of Big Data in industry but, there is no framework proposed for tourism sector. In this paper, the authors propose unified IT infrastructure framework named as tAdvisor for effective data analytics using Big Data Analytics approach for increasing productivity in tourism sector. Various challenges and issues related with the implementation of Big Data Analytics is also discussed in the paper.


Author(s):  
N. B. Strekalova ◽  
O. I. Podulybina

The article provides an overview of trends in the digital economy that affect the professional training of a modern specialist. The essence of the concept of digitalization and its main components are determined, the author's interpretation of this concept is given. Particular attention is paid to the signs of a digital economy: the presence of a high-tech IT infrastructure, processing of big data based on modern digital technologies, the creation of digital solutions (products, platforms), the design of new business models. A theoretical analysis of scientific literature was carried out and a list of competencies that a specialist in the digital economy should possess was identified. To confirm the results obtained, an analysis of the opinions of employers was carried out, on the basis of which the most significant competencies and professional qualities of a specialist in the digital economy were identified. Based on the results of the analysis of employers' requirements for modern specialists, the tasks of vocational education for the training of a specialist in the digital economy were identified.


Author(s):  
Sayed Abdul Majid Gilani ◽  
Alessio Faccia

Broadband connectivity is now essential to ensure a competitive advantage for any business. The analysis of Scotland’s crucial IT infrastructure contribution supported the authors’ thesis that the Government plays a decisive role in Open Innovation ecosystems. Indeed, IT infrastructures are a clear case of market failure where remote areas will never be served by adequate connectivity without public support. The main contribution is the demonstration that the benefits of public intervention are sometimes required and beneficial to correct market distortions and generate positive spillovers in terms of collaboration in Open Innovation ecosystems. Another relevant contribution is a comprehensive analysis of the consistency of the evolution of the public policies that supported the IT Infrastructure in Scotland. Therefore, pivotal is the study of this case study that can be easily generalised to many other contexts where the Government addressed market failures and, at the same time, contributed to generating collaborative environments.


E-methodology ◽  
2021 ◽  
Vol 7 (7) ◽  
pp. 27-32
Author(s):  
IWONA KLISOWSKA ◽  
MARIOLA SEŃ ◽  
BARBARA GRABOWSKA

Introduction. E-learning has been known and used in many countries for a long time.It is becoming more and more popular. It is a way of teaching remotely, using the latestinformation technology. It can be used in any age group, starting with pre-school teaching.In the era of the SARS-CoV-2 pandemic, remote learning has been mandatory due to theneed to continue the teaching process whilst at the same time reducing the risk of spreading the virus. This has revealed many advantages, but also the disadvantages of this type of teaching.Aim & methods. The aim of the work is to change the advantages and disadvantagesof remote teaching as one of the modern forms of education. The work attempts to showthe problems related to the risks and diffi culties associated with distance learning and theadvantages of the development of information technology. We reviewed recent literatureon e- learning in Poland. We supplemented it with our own observations.Results & Conclusions. Reviewed empirical studies from Poland suggest that the mainadvantages of distance learning are professional development of teachers, intergenerational experience exchange, time saving, the possibility of learning at a pace adapted tothe student, access to a large quantity of teaching materials as well as the development andexpansion of IT infrastructure. The main disadvantages are lack of peer interactions, theneed to spend a lot of time in front of the computer, lack of physical activity, diffi culties inindependent assimilation of new material, lack of direct contact with the teacher, lack ofcomputer equipment and inadequate housing conditions, lower didactic effects, social andeconomic exclusion.E-Learning is an excellent form of learning, due to its many advantages such as timesavings and access to a wide range of materials, but requires a lot of commitment from thelecturers to encourage students to expand their knowledge and on the part of students selfcontrol and motivation.


Author(s):  
Bruce D. REDEKOP

For many organizations, increased cybersecurity training and employee aware-ness building have already played an increasingly significant role in their cyber-security strategies as a means of ensuring their policies are being followed, yet such organizations tend to offer generic, “one size fits all” training and awareness packages that do not sufficiently recognize important differences among employees. Among these are differences in attitude and outlook associated with generational cohorts. Through an examination of how these cohorts view various fac-tors that influence cybersecurity awareness, as well as the cohorts’ receptivity to different training methodologies, organizations can exploit generational characteristics to maximize the effectiveness of cybersecurity training for Baby Boomers, Generation X, Millennials, and imminently, Generation Z. A clear understanding of the intrinsic relationship between end-users and cybersecurity technology can help cybersecurity professionals act effectively to protect organizations’ critical IT infrastructure. Such effectiveness is more important than ever now, as sudden, massive increase in teleworking brought on by the COVID-19 pandemic, as well as the security challenges associated with this shift, will undoubtedly outlast it.


2021 ◽  
Vol 9 (17) ◽  
pp. 182-190
Author(s):  
Oleksandr Kuts ◽  
◽  
Sergii Verbytskyi ◽  
Nataliia Patsera ◽  
Sergii Dmytriyev ◽  
...  

2021 ◽  
Author(s):  
Imen Bouabdallah ◽  
Hakima Mellah

Cloud computing is an opened and distributed network that guarantees access to a large amount of data and IT infrastructure at several levels (software, hardware...). With the increase demand, handling clients’ needs is getting increasingly challenging. Responding to all requesting clients could lead to security breaches, and since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is required to assure cloud safety. In this paper, by implementing multi agent systems in the cloud to handle interactions for the providers, trust is introduced at agent level to filtrate the clients asking for services by using Particle Swarm Optimization and acquaintance knowledge to determine malicious and untrustworthy clients. The selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments show that the model outputs relevant results, and even with a small number of peers, the framework is able to converge to the best solution. The model presented in this paper is a part of ongoing work to adapt interactions in the cloud.


2021 ◽  
Author(s):  
Ozgur Turetken

Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make the main IT facilities vulnerable to disruption (i.e. man-made or natural disasters) are likely to impact the redundant (back-up facilities as well. This complicates the process of selecting redundant facility location(s). The problem is essentially a multi-criteria decision problem, and can be addressed using the location analysis techniques that have been used in other domains in the past. Meanwhile, what make this context somewhat unique are the decision criteria and the rather subjective nature of the decision process. This paper provides a simple decision model for the problem, and illustrates the model with a case where relevant decision criteria are identified and the solution is obtained using a mix of objective and subjective decision techniques. We believe the paper is valuable because it presents an actionable methodology for practitioners involved in BCP. <br>


2021 ◽  
Author(s):  
Ozgur Turetken

Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make the main IT facilities vulnerable to disruption (i.e. man-made or natural disasters) are likely to impact the redundant (back-up facilities as well. This complicates the process of selecting redundant facility location(s). The problem is essentially a multi-criteria decision problem, and can be addressed using the location analysis techniques that have been used in other domains in the past. Meanwhile, what make this context somewhat unique are the decision criteria and the rather subjective nature of the decision process. This paper provides a simple decision model for the problem, and illustrates the model with a case where relevant decision criteria are identified and the solution is obtained using a mix of objective and subjective decision techniques. We believe the paper is valuable because it presents an actionable methodology for practitioners involved in BCP. <br>


Sign in / Sign up

Export Citation Format

Share Document