Dissertations / Theses on the topic 'Enterprise computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Enterprise computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Spruth, Wilhelm G. "Enterprise Computing." Universitätsbibliothek Leipzig, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-126859.
Full textNoureddine, Moustafa. "Enterprise adoption oriented cloud computing performance optimization." Thesis, University of East London, 2014. http://roar.uel.ac.uk/4026/.
Full textFrancis, Leonard S. M. Massachusetts Institute of Technology. "Cloud computing : implications for enterprise software vendors (ESV)." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/47862.
Full textIncludes bibliographical references (leaves 67-69).
'Cloud computing', is a broad concept and in general is a term used for internet-based computing resources that are in an unspecified remote location or locations and that are flexible and fungible. Clouds provide a wide range of computing capability available as a service where users are separated from the underlying technology by a set of APIs. These computing capabilities are made available by abstracting at different levels; at the hardware level, development platform or the applications level. Cloud computing is particularly helpful to application developers and IT operations because it allows them to focus on the service/application provided rather than worrying about scaling, failure, maintenance or reliability of these computing resources. By consolidating and sharing computing resources among multiple tenants thus improving utilization, cloud computing brings cost savings to end users. The higher the abstraction level, greater are the benefits resulting from better resource utilization and thus more cost savings, both for providers and end users. As computing resources become cheaper, network connectivity and bandwidth improve both in terms of availability and pricing and human resources becomes expensive, cloud computing is increasingly seen as viable replacement of enterprise owned local IT infrastructure.
(cont.) With the adoption of cloud computing comes a major shift in the underlying architecture of how we develop, deploy, deliver and run applications compared to existing behavior where we run applications on local computing resources and thus increasing pressure on enterprise software vendors to adopt these new business model for software development and new alternate software delivery models that are supported by and derive the benefits of cloud computing. While legacy enterprise software can simply be installed and run on instances on the cloud using cloud based infrastructure services, maximum benefits are realized by end users when these applications itself are provided as a service in the form of a platform or software. To do so, in most cases, legacy enterprise software would have to go through an architecture overhaul to be able to deliver existing functionalities as a platform or software as a service. Enterprise software vendors would also have to change their current business models where large license revenues, high maintenance cost of antiquated versions and heavily invested customers are the standard and move to pay-per-use cloud computing model. This thesis aims to study the implications of 'Cloud Computing' trends on the development, distribution, business models and the business of enterprise software vendors. This thesis tries to chart and predict the progress of trends in computing towards 'cloud computing', connect those trends to enterprise software usage changes and determine the impact on enterprise software vendors.
(cont.) This will help enterprise software vendors to determine what if any strategic options available will help adopt this technological innovation and conform to future enterprise software requirements based on this trend.
by Leonard Francis.
S.M.
Konda, Niranjan. "Evaluating a Reference Enterprise Application as a Teaching Tool in a Distributed Enterprise Computing Class." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1376986294.
Full textMachtinger, Ephraim D. "Designing and Implementing Hard Drive Inventory Policies for Enterprise Computing Solutions." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122571.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019, In conjunction with the Leaders for Global Operations Program at MIT
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 87-88).
Historically, the Storage business unit of the Dell-EMC Infrastructure Solutions Group (ISG) has maintained large inventory buffers to deal with high demand uncertainty and minimize part shortages. High product configurability and complex product structures continue to present challenges to effectively managing component inventory. In addition, many supply and demand planning decisions are contextual rather than process driven, making it difficult to understand precisely how inventory level is influenced by its independent variables. The objective of this project is to develop a set of dynamic inventory policies to enable inventory reduction at ISG while maintaining or improving cycle service levels. Our approach is based on modeling the inventory behavior of the existing supply chain system, and generating inventory policies that more accurately reflect consumption within the system. Three parameterized inventory policies have been built and tested.
We modeled inventory, forecast and actual demand data, used demand classification techniques to selectively adjust policy recommendations for certain drives and validated policy performance by adjusting input parameters. Based on model training for three quarters from August, 2017 to May, 2018 and validation from May, 2018 to August, 2018 our final choice was an order-up-to policy developed by fitting empirical distributions to historical forecast errors and using those distributions to recommend safety stock levels. The policy was applied to 111 CFGs representing 2,758 part numbers. We used August, 2018 to November, 2018 as a test period and applied the policy to observe its performance. Results indicated a 96.40% service level and 36% mean inventory reduction as compared to the baseline, which had a 98.40% service level. The 3.60% loss of service represented 56 shortages.
Of those, we identified 31 that could be eliminated through simple policy refinement, leading to a revised service level of 98.55%. Overall, our results suggest that a mathematical inventory management approach can be used reliably to model the hard drive supply chain, recommend an inventory policy and realize significant inventory reduction opportunities without compromising service level. This thesis concludes by proposing important supply chain system design changes, where several issues at the root of ISG's inventory management challenges reside.
by Ephraim D. Machtinger.
M.B.A.
S.M.
M.B.A. Massachusetts Institute of Technology, Sloan School of Management
S.M. Massachusetts Institute of Technology, Department of Mechanical Engineering
Di, Palermo Vincent. "Social Influence and Organizational Innovation Characteristics on Enterprise Social Computing Adoption." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2026.
Full textFrenn, Evan. "Towards a Trustworthy Thin Terminal for Securing Enterprise Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/300.
Full textBruhn, Jens. "A realistic approach for the autonomic management of component-based enterprise systems." Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/997444517/34.
Full textChiza, Albin Boris Lugerero. "Adoption of cloud computing services amongst the micro-enterprise sector in Cape Town." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2862.
Full textMicro-enterprises play a vital role towards the South Africa’s economic growth by contributing towards job creation. Despite the importance of the role of micro-enterprises, micro-enterprises face several challenges such as lack of finance, lack of skilled workers and lack of technological resources. Previous studies indicate that Information Technology has a distinct role in assisting micro-enterprises overcome several challenges. It is further evidenced in the extant literature that cloud computing, provides a low cost entry for enterprises to support several facets of their business operations. In the current era cloud computing requires a constant as well as fast internet connection and the South African government has various interventions to address the infrastructure divide. However, we have a scant understanding of the adoption challenges amongst micro-enterprises to adopt cloud solutions, which to date feature more prominently amongst larger organisations. This research investigated the factors that influence cloud computing adoption in the micro-enterprise sector in Cape Town. This is a city that promotes the contribution of micro-enterprises to their economic activity, and was such an ideal location to investigate cloud computing adoption amongst the micro-enterprise sector. This research provides a rich understanding of the factors that influence micro-enterprises in Cape Town to adopt cloud computing services and proposes guidelines to encourage micro-enterprises in Cape Town to use cloud services to improve their productivity. The researcher uses the UTAUT model as a framework and a qualitative research methodology to investigate the research question. Data for this research study was collected via face to face interviews with semi-structured questions of ten micro-enterprises and an IT expert. The findings showed that the factors influencing the adoption of cloud computing services are performance expectancy, effort expectancy, social influence, facilitating conditions, lack of training, cost efficiency and reduction of working hours.
Kutil, Ivan. "Google jako enterprise řešení firmy." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-85156.
Full textRunsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.
Full textFernandez, George, and gfernandez@rmit edu au. "A federated approach to enterprise integration." Swinburne University of Technology, 2006. http://adt.lib.swin.edu.au./public/adt-VSWT20060502.113336.
Full textBrehm, Nico. "Föderierte ERP-Systeme auf Basis von Web-Services /." Aachen : Shaker, 2009. http://d-nb.info/993898335/04.
Full textMontesinos-Rosales, Andrea, Sebastian Salas-Villacorta, David Mauricio-Sanchez, and Carlos Raymundo-Ibañez. "Cloud-based open-source enterprise content management model at a SME operating in the manufacturing sector." Association for Computing Machinery, Inc, 2019. http://hdl.handle.net/10757/656282.
Full textEvery year, small- and medium-sized enterprises (SMEs) expand their participation in the Peruvian market, while facing high internal disorganization issues that stifle their growth. This problem is rooted on the fact that the contents generated by these companies are not usually adequately recorded, managed, and exploited, and thus negatively affecting the organization and their competitiveness levels. Now, although most of this issue may be solved through enterprise content management (ECM) solutions, they are not affordable for most SMEs because of their high prices. Within this context, this study proposes the implementation of a cloud-based open-source ECM model at a manufacturing SME in Peru. Through this model, the company was able to access the benefits of an ECM to restructure the way they manage content, gaining 67% more efficiency, establishing a collaboration channel between employees, suppliers, and customers, and reporting a 93% model adaptation rate among staff members.
Revisión por pares
Subramaniam, Balaji. "Metrics, Models and Methodologies for Energy-Proportional Computing." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56492.
Full textPh. D.
Santos, Nuno Miguel Carvalho [Verfasser], and Rodrigo [Akademischer Betreuer] Rodrigues. "Improving trust in cloud, enterprise, and mobile computing platforms / Nuno Miguel Carvalho Santos. Betreuer: Rodrigo Rodrigues." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2013. http://d-nb.info/105367998X/34.
Full textPatterson, Candice. "Information infrastructure for the 21st century apparel enterprise : customer-focused product design and development." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8238.
Full textSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
David, Petr. "Podnikový informační systém v éře cloud computingu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-82020.
Full textBrand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.
Full textENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide guidance during this governance process to address enterprise mobility security risks on a strategic level. Due to the existence of the IT gap these risks are not effectively governed on an operational level as the IT governance frameworks, -models and -standards do not provide enough practical guidance to govern these risks on a technical, operational level. This study provides organisations with practical, implementable guidance to apply during the process of governing these risks in order to address enterprise mobility security risks in an effective manner on both a strategic and an operational level. The guidance given to organisations by the IT governance frameworks, -models and -standards can, however, lead to the governance process being inefficient and costly. This study therefore provides an efficient and cost-effective solution, in the form of a short list of best practices, for the governance of enterprise mobility security risks on both a strategic and an operational level.
AFRIKAANSE OPSOMMING: Ondernemingsmobiliteit kom deesdae as ‘n megatendens in die besigheidswêreld te voorskyn. Talle risiko's ontstaan as gevolg van die gebruik van mobiele toestelle vir sake-verwante take en meeste van hierdie risiko's hou 'n beduidende sekuriteitsbedreiging vir organisasies se inligting in. Organisasies moet dus tydens die risikobestuursproses van wesenlike mobiliteit sekuriteitsrisiko’s die nodige sorg toepas om ‘n doeltreffende proses te verseker ten einde die impak van hierdie risiko’s te beperk. Informasie tegnologie (IT)- risikobestuurraamwerke, -modelle en -standaarde kan op ‘n strategiese vlak leiding gee tydens die risikobestuursproses waarin mobiliteit sekuriteitsrisiko’s aangespreek word. As gevolg van die IT-gaping wat bestaan, word hierdie risiko’s nie effektief op ‘n operasionele vlak bestuur nie aangesien die ITrisikobestuurraamwerke, -modelle en -standaarde nie die nodige praktiese leiding gee om hierdie risiko’s op ‘n tegniese, operasionele vlak te bestuur nie. Om te verseker dat organisasies mobiliteit sekuriteitsrisiko’s op ‘n effektiewe manier op beide ‘n strategiese en operasionele vlak bestuur, verskaf hierdie studie praktiese, implementeerbare leiding aan organisasies wat tydens die bestuursproses van hierdie risiko’s toegepas kan word. Die leiding aan organisasies, soos verskaf in die IT-risikobestuurraamwerke, - modelle en -standaarde, kan egter tot’n ondoeltreffende en duur risikobestuursproses lei. Hierdie studie bied dus 'n doeltreffende, koste-effektiewe oplossing, in die vorm van 'n kort lys van beste praktyke, vir die bestuur van die mobiliteit sekuriteitsrisiko’s op beide 'n strategiese en 'n operasionele vlak.
Kumar, Vibhore. "Enabling scalable self-management for enterprise-scale systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24788.
Full textCommittee Chair: Schwan, Karsten; Committee Member: Cooper, Brian F.; Committee Member: Feamster, Nick; Committee Member: Liu, Ling; Committee Member: Sahai, Akhil.
Pospíšil, Václav. "Analýza použitelnosti cloud computingu pro práci na dálku." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165277.
Full textCorreia, Magda Sofia Coelho. "Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)." Master's thesis, Instituto Superior de Economia e Gestão, 2012. http://hdl.handle.net/10400.5/10499.
Full textAs últimas evoluções tecnológicas na área das TI deram origem ao aparecimento dos conceitos de cloud computing e de software as a service que permitem às empresas aceder a aplicações para a gestão e monitorização do seu negócio normalmente a um baixo custo e á medida das suas necessidades. Este trabalho procura clarificar o conceito de cloud computing e Software as a Service, perceber o que esta alteração na forma de distribuição de um software irá alterar nas organizações e nas implementações de sistemas ERP. Compara as diferenças nas metodologias de implementação, mas também os efeitos tecnológicos e organizacionais que esta nova abordagem trás às empresas.
The latest technological developments in the IT area led to the emergence of the concepts, of cloud computing and software as a service that allow companies to access applications for the management and control of their business at a low cost but also, matching the technological complexity with their process needs. This work intends to clarify the concept of cloud computing and Software as a Service, enlighten, new method of software distribution will change organizations and ERP implementation. This work also compares the difference in implementation methodology, but also the technological and organizational effects that go behind this new approach.
Severin, Mats, Stefan Knutsson, and John Söderberg. "Business in the Cloud : Internationalization of a small enterprise in the age of cloud services." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176088.
Full textEriksson, Peter. "A new approach for Enterprise Application Architecture for Financial Information Systems : An investigation of the architectural implications of adopting serialization and RPC frameworks, NoSQL/hybrid data stores and heterogeneous computing in Financial Information Systems." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169682.
Full textDenna rapport undersöker inverkan av serialiserings- och fjärrproceduranropsramverk (RPC), NoSQL/hybrid data- lagringslöningar samt heterogen beräkning på arkitekturen av finansiella informationssystem. Varje teknologi och dess inverkan analyseras var för sig tillsammans med dess för- och nackdelar för systemutvecklaren. Undersökningen visar att alla tre teknologierna kan av- hjälpa de tekniska utmaningar som finansiella aktörer står inför; men alla medför en komplexitetskostnad.
Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Full textAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Joos, Filip Alexius. "Implementace DMS v malých a středních firmách formou cloudového řešení." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162522.
Full textCailean, Diana Andreea, and Kobra Sharifi. "Mobile ERP : A literature review on the concept of Mobile ERP systems." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-23522.
Full textDenys, Paul. "Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5726.
Full textEngebrethson, Ryan. "COMPARATIVE ANALYSIS OF ERP EMERGING TECHNOLOGIES." DigitalCommons@CalPoly, 2012. https://digitalcommons.calpoly.edu/theses/739.
Full textJuříček, Michal. "ERP formou SaaS a mobilní technologie v logistice." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358958.
Full textPetrík, Vladimír. "Analýza nabídky ERP systémů pro malé a střední podniky formou SaaS v ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-197894.
Full textCai, Zhongtang. "Risk-based proactive availability management." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22581.
Full textCommittee Member: Ahamad, Mustaque; Committee Member: Eisenhauer, Greg; Committee Member: Milojicic, Dejan; Committee Member: Pu, Calton; Committee Member: Schwan, Karsten.
Seaton, Hugh Van. "The Financial Implications and Organizational Cultural Perceptions of Implementing a Performance Management System in a Government Enterprise." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/23.
Full textLee, Min-Wei. "Vacation system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2829.
Full textFialová, Lenka. "Moderní cloudová řešení v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241386.
Full textHill, Bethany. "Digital Divide: Investigating the integration of marketing and ICTs for South African retailers expanding throughout Africa." Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31410.
Full textDimitrov, Dimitar. "Towards cloud application architectural patterns: transfer, evolution, innovation and oblivion." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH. Forskningsmiljö Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27643.
Full textAgarwala, Sandip. "System Support for End-to-End Performance Management." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16171.
Full textKašpar, Jan. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241578.
Full textŠimeček, Martin. "Analýza faktorů ovlivňujících přechod malých a středních podniků na cloudové ECM služby." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-150242.
Full textSýkora, Ondřej. "Modul evidence majetku provozovaný jako služba v ERP pro malé a střední firmy." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124669.
Full textGustafsson, Bennet, and Alexander Orrgren. "Cloud Computing : The Adoption of Cloud Computing for Small and Medium Enterprises." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18505.
Full textTian, Hongfei 1979. "Grid computing as an integrating force in virtual enterprises." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/85742.
Full textTrivedi, Hrishikesh. "Cloud computing adoption model for governments and large enterprises." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/80675.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 79-81).
Cloud Computing has held organizations across the globe spell bound with its promise. As it moves from being a buzz word and hype into adoption, organizations are faced with question of how to best adopt cloud. Existing frameworks of cloud adoption look at different aspects of cloud but stop short of taking a view of the complete spectrum and suggesting a path. Cloud Computing adoption requires that organizations have readiness on multiple dimensions including Governance, Process Analysis and Improvement, Application Rationalization and Modernization, and Hardware and Software Standardization. Readiness in turn determines how far organizations can go in their cloud programs with key milestones being Proof of Concepts, Infrastructure Service, Virtual Desktop, Platform Service and Enterprise Software as Service. Readiness and Milestones inform us about multiple stages in cloud adoption. The analysis also indicates that certain governance structures are most suitable for cloud adoption. The duration of cloud program for a large organization lies in years, even multiple five year plans. Analyses of case studies indicate all these views and the systems modeling for enterprise software as service, in addition corroborates the likely duration of cloud program. For systems model we have used factors such as Total Non-Cloud Applications, Rationalization and Modernization Rate, Rate of Conversion into Enterprise Software as Service and Budget. The proposed Cloud Computing Adoption Model can help organizations understand what capabilities they need to develop, where they are on the cloud adoption spectrum and how much time it could take to go to cloud.
by Hrishikesh Trivedi.
S.M.
Hellbe, Simon, and Peter Leung. "DIGITAL TRANSFORMATION : HOW APIS DRIVE BUSINESS MODEL CHANGE AND INNOVATION." Thesis, Linköpings universitet, Industriell ekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119506.
Full textEnslin, Zacharias. "Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20116.
Full textENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to. The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented.
AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word. Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
Dhiman, Ashok. "Analysis of on-premise to cloud computing migration strategies for enterprises." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/70796.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 72-73).
In recent years offering and maturity in Cloud Computing space has gained significant momentum. CIOs are looking at Cloud seriously because of bottom line savings and scalability advantages. According to Gartner's survey in early 2010 of 1600 CIOs around the world, Cloud computing and virtualization were on top of their list. This interest has also resulted in slew of products and services from existing IT players as well as new comers which promise to offer many solutions to pave the path towards Cloud computing adoption by enterprises. As organizations get on to the Cloud computing bandwagon they are looking at their current IT setup and looking at the best way they can take advantage of what Cloud has to offer. For a given enterprises, getting on to Cloud might be a complete new start from scratch, a limited deployment of new applications or migration of part of existing applications integrating backwards with on-premise applications. To take advantage of the Cloud, enterprise will need to define their short and long term Cloud strategy. They will need to consider factors specific to their businesses and determine their requirements, risks and benefits. Proper investigation by the enterprise will give them insight in to the benefits and specific strategy they need to follow to gain the said benefits from Cloud. This Thesis analyzes specific strategies which enterprises can adopt, both from business and technology perspective to make sure the migration and integration between on-premise and Cloud happens with minimal disruption to business and results in maximum sustainable cost benefit. It presents the current state of On-Premise IT and Cloud Computing space and then compares them to come up with enterprise specific variables based on which one can make Cloud migration decisions. Finally, Thesis presents the broad frameworks for "migration to Cloud" and confirms the same by interviewing enterprise managers involved in Cloud migration. There are various ways to slice and approach the Cloud migration - but all should take in to consideration the business processes, architecture of existing systems, architecture of available Cloud services, interoperability between on-premise and Cloud applications, maturity of Cloud and standards, short and long term cost savings, sustainability, data/security/regulation, user adoption, available Service Level Agreements (SLAs) and business criticality.
by Ashok Dhiman.
S.M.in Engineering and Management
Dhali, Salauddin. "A study on cloud computing adopton in small and medium enterprises." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20042.
Full textGanta, Sathvik. "A Framework to Incorporate Industry 4.0 into SME to Enhance Resource Planning." Thesis, Mälardalens högskola, Innovation och produktrealisering, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-47421.
Full text