Dissertations / Theses on the topic 'Enterprise computing'

To see the other types of publications on this topic, follow the link: Enterprise computing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Enterprise computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Spruth, Wilhelm G. "Enterprise Computing." Universitätsbibliothek Leipzig, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-126859.

Full text
Abstract:
Das vorliegende Buch entstand aus einer zweisemestrigen Vorlesung „Enterprise Computing“, die wir gemeinsam über viele Jahre als Teil des Bachelor- oder Master-Studienganges an der Universität Leipzig gehalten haben. Das Buch führt ein in die Welt des Mainframe und soll dem Leser einen einführenden Überblick geben. Band 1 ist der Einführung in z/OS gewidmet, während sich Band 2 mit der Internet Integration beschäftigt. Ergänzend werden in Band 3 praktische Übungen unter z/OS dargestellt.
APA, Harvard, Vancouver, ISO, and other styles
2

Noureddine, Moustafa. "Enterprise adoption oriented cloud computing performance optimization." Thesis, University of East London, 2014. http://roar.uel.ac.uk/4026/.

Full text
Abstract:
Cloud computing in the Enterprise has emerged as a new paradigm that brings both business opportunities and software engineering challenges. In Cloud computing, business participants such as service providers, enterprise solutions, and marketplace applications are required to adopt a Cloud architecture engineered for security and performance. One of the major hurdles of formal adoption of Cloud solutions in the enterprise is performance. Enterprise applications (e.g., SAP, SharePoint, Yammer, Lync Server, and Exchange Server) require a mechanism to predict and manage performance expectations in a secure way. This research addresses two areas of performance challenges: Capacity planning to ensure resources are provisioned in a way that meets requirements while minimizing total cost of ownership; and optimization to authentication protocols that enable enterprise applications to authenticate among each other and meet the performance requirements for enterprise servers, including third party marketplace applications. For the first set of optimizations, the theory was formulated using a stochastic process where multiple experiments were monitored and data collected over time. The results were then validated using a real-life enterprise product called Lync Server. The second set of optimizations was achieved by introducing provisioning steps to pre-establish trust among enterprise applications servers, the associated authorisation server, and the clients interested in access to protected resources. In this architecture, trust is provisioned and synchronized as a pre-requisite step 3 to authentication among all communicating entities in the authentication protocol and referral tokens are used to establish trust federation for marketplace applications across organizations. Various case studies and validation on commercially available products were used throughout the research to illustrate the concepts. Such performance optimizations have proved to help enterprise organizations meet their scalability requirements. Some of the work produced has been adopted by Microsoft and made available as a downloadable tool that was used by customers around the globe assisting them with Cloud adoption.
APA, Harvard, Vancouver, ISO, and other styles
3

Francis, Leonard S. M. Massachusetts Institute of Technology. "Cloud computing : implications for enterprise software vendors (ESV)." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/47862.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2009.
Includes bibliographical references (leaves 67-69).
'Cloud computing', is a broad concept and in general is a term used for internet-based computing resources that are in an unspecified remote location or locations and that are flexible and fungible. Clouds provide a wide range of computing capability available as a service where users are separated from the underlying technology by a set of APIs. These computing capabilities are made available by abstracting at different levels; at the hardware level, development platform or the applications level. Cloud computing is particularly helpful to application developers and IT operations because it allows them to focus on the service/application provided rather than worrying about scaling, failure, maintenance or reliability of these computing resources. By consolidating and sharing computing resources among multiple tenants thus improving utilization, cloud computing brings cost savings to end users. The higher the abstraction level, greater are the benefits resulting from better resource utilization and thus more cost savings, both for providers and end users. As computing resources become cheaper, network connectivity and bandwidth improve both in terms of availability and pricing and human resources becomes expensive, cloud computing is increasingly seen as viable replacement of enterprise owned local IT infrastructure.
(cont.) With the adoption of cloud computing comes a major shift in the underlying architecture of how we develop, deploy, deliver and run applications compared to existing behavior where we run applications on local computing resources and thus increasing pressure on enterprise software vendors to adopt these new business model for software development and new alternate software delivery models that are supported by and derive the benefits of cloud computing. While legacy enterprise software can simply be installed and run on instances on the cloud using cloud based infrastructure services, maximum benefits are realized by end users when these applications itself are provided as a service in the form of a platform or software. To do so, in most cases, legacy enterprise software would have to go through an architecture overhaul to be able to deliver existing functionalities as a platform or software as a service. Enterprise software vendors would also have to change their current business models where large license revenues, high maintenance cost of antiquated versions and heavily invested customers are the standard and move to pay-per-use cloud computing model. This thesis aims to study the implications of 'Cloud Computing' trends on the development, distribution, business models and the business of enterprise software vendors. This thesis tries to chart and predict the progress of trends in computing towards 'cloud computing', connect those trends to enterprise software usage changes and determine the impact on enterprise software vendors.
(cont.) This will help enterprise software vendors to determine what if any strategic options available will help adopt this technological innovation and conform to future enterprise software requirements based on this trend.
by Leonard Francis.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
4

Konda, Niranjan. "Evaluating a Reference Enterprise Application as a Teaching Tool in a Distributed Enterprise Computing Class." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1376986294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Machtinger, Ephraim D. "Designing and Implementing Hard Drive Inventory Policies for Enterprise Computing Solutions." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122571.

Full text
Abstract:
Thesis: M.B.A., Massachusetts Institute of Technology, Sloan School of Management, 2019, In conjunction with the Leaders for Global Operations Program at MIT
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019, In conjunction with the Leaders for Global Operations Program at MIT
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 87-88).
Historically, the Storage business unit of the Dell-EMC Infrastructure Solutions Group (ISG) has maintained large inventory buffers to deal with high demand uncertainty and minimize part shortages. High product configurability and complex product structures continue to present challenges to effectively managing component inventory. In addition, many supply and demand planning decisions are contextual rather than process driven, making it difficult to understand precisely how inventory level is influenced by its independent variables. The objective of this project is to develop a set of dynamic inventory policies to enable inventory reduction at ISG while maintaining or improving cycle service levels. Our approach is based on modeling the inventory behavior of the existing supply chain system, and generating inventory policies that more accurately reflect consumption within the system. Three parameterized inventory policies have been built and tested.
We modeled inventory, forecast and actual demand data, used demand classification techniques to selectively adjust policy recommendations for certain drives and validated policy performance by adjusting input parameters. Based on model training for three quarters from August, 2017 to May, 2018 and validation from May, 2018 to August, 2018 our final choice was an order-up-to policy developed by fitting empirical distributions to historical forecast errors and using those distributions to recommend safety stock levels. The policy was applied to 111 CFGs representing 2,758 part numbers. We used August, 2018 to November, 2018 as a test period and applied the policy to observe its performance. Results indicated a 96.40% service level and 36% mean inventory reduction as compared to the baseline, which had a 98.40% service level. The 3.60% loss of service represented 56 shortages.
Of those, we identified 31 that could be eliminated through simple policy refinement, leading to a revised service level of 98.55%. Overall, our results suggest that a mathematical inventory management approach can be used reliably to model the hard drive supply chain, recommend an inventory policy and realize significant inventory reduction opportunities without compromising service level. This thesis concludes by proposing important supply chain system design changes, where several issues at the root of ISG's inventory management challenges reside.
by Ephraim D. Machtinger.
M.B.A.
S.M.
M.B.A. Massachusetts Institute of Technology, Sloan School of Management
S.M. Massachusetts Institute of Technology, Department of Mechanical Engineering
APA, Harvard, Vancouver, ISO, and other styles
6

Di, Palermo Vincent. "Social Influence and Organizational Innovation Characteristics on Enterprise Social Computing Adoption." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2026.

Full text
Abstract:
Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A randomized stepwise multiple linear regression analysis was performed on survey data from 125 C-level executives (i.e., chief information officers and chief technology officers). The analysis found that executives consider perceived relative advantage, organizational commitment, and social computing action as the most significant factors relating to the adoption of ESC. Executives' perceptions about ESC could impact organizational commitment, implementation, and use of such technologies. The findings could make a social contribution within organizations by helping C-level executives understand the degree to which these factors contribute to the ESC adoption. The knowledge from this study may also help organizations derive operational effectiveness, efficiency, and create business value for their clients and society.
APA, Harvard, Vancouver, ISO, and other styles
7

Frenn, Evan. "Towards a Trustworthy Thin Terminal for Securing Enterprise Networks." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/300.

Full text
Abstract:
Organizations have many employees that lack the technical knowledge to securely operate their machines. These users may open malicious email attachments/links or install unverified software such as P2P programs. These actions introduce significant risk to an organization's network since they allow attackers to exploit the trust and access given to a client machine. However, system administrators currently lack the control of client machines needed to prevent these security risks. A possible solution to address this issue lies in attestation. With respect to computer science, attestation is the ability of a machine to prove its current state. This capability can be used by client machines to remotely attest to their state, which can be used by other machines in the network when making trust decisions. Previous research in this area has focused on the use of a static root of trust (RoT), requiring the use of a chain of trust over the entire software stack. We would argue this approach is limited in feasibility, because it requires an understanding and evaluation of the all the previous states of a machine. With the use of late launch, a dynamic root of trust introduced in the Trusted Platform Module (TPM) v1.2 specification, the required chain of trust is drastically shortened, minimizing the previous states of a machine that must be evaluated. This reduced chain of trust may allow a dynamic RoT to address the limitations of a static RoT. We are implementing a client terminal service that utilizes late launch to attest to its execution. Further, the minimal functional requirements of the service facilitate strong software verification. The goal in designing this service is not to increase the security of the network, but rather to push the functionality, and therefore the security risks and responsibilities, of client machines to the network€™s servers. In doing so, we create a platform that can more easily be administered by those individuals best equipped to do so with the expectation that this will lead to better security practices. Through the use of late launch and remote attestation in our terminal service, the system administrators have a strong guarantee the clients connecting to their system are secure and can therefore focus their efforts on securing the server architecture. This effectively addresses our motivating problem as it forces user actions to occur under the control of system administrators.
APA, Harvard, Vancouver, ISO, and other styles
8

Bruhn, Jens. "A realistic approach for the autonomic management of component-based enterprise systems." Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/997444517/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chiza, Albin Boris Lugerero. "Adoption of cloud computing services amongst the micro-enterprise sector in Cape Town." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2862.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2018.
Micro-enterprises play a vital role towards the South Africa’s economic growth by contributing towards job creation. Despite the importance of the role of micro-enterprises, micro-enterprises face several challenges such as lack of finance, lack of skilled workers and lack of technological resources. Previous studies indicate that Information Technology has a distinct role in assisting micro-enterprises overcome several challenges. It is further evidenced in the extant literature that cloud computing, provides a low cost entry for enterprises to support several facets of their business operations. In the current era cloud computing requires a constant as well as fast internet connection and the South African government has various interventions to address the infrastructure divide. However, we have a scant understanding of the adoption challenges amongst micro-enterprises to adopt cloud solutions, which to date feature more prominently amongst larger organisations. This research investigated the factors that influence cloud computing adoption in the micro-enterprise sector in Cape Town. This is a city that promotes the contribution of micro-enterprises to their economic activity, and was such an ideal location to investigate cloud computing adoption amongst the micro-enterprise sector. This research provides a rich understanding of the factors that influence micro-enterprises in Cape Town to adopt cloud computing services and proposes guidelines to encourage micro-enterprises in Cape Town to use cloud services to improve their productivity. The researcher uses the UTAUT model as a framework and a qualitative research methodology to investigate the research question. Data for this research study was collected via face to face interviews with semi-structured questions of ten micro-enterprises and an IT expert. The findings showed that the factors influencing the adoption of cloud computing services are performance expectancy, effort expectancy, social influence, facilitating conditions, lack of training, cost efficiency and reduction of working hours.
APA, Harvard, Vancouver, ISO, and other styles
10

Kutil, Ivan. "Google jako enterprise řešení firmy." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-85156.

Full text
Abstract:
The diploma thesis deals with the topic of cloud computing and its appropriate deployment in small and medium business. The objective of this thesis is to analyze the offer of Google products and to demonstrate measurable benefits of this solution. Introductory part of the thesis summarizes the history of IT and it is looking for the connection between history of IT and the term cloud computing. This term is described in detail with selected cloud computing characteristics. The main part of the thesis deals with analysis of Google services, technologies and platforms, which could be used in enterprise. The matters are viewed not only economically, but also from the technological and security point of view. In practical implementations are demonstrated measurable benefits of deployment to the Google cloud platform. Finally, the thesis provides the summary of platform's advantages and disadvantages with a description of practical advices for small and medium businesses
APA, Harvard, Vancouver, ISO, and other styles
11

Runsewe, Olubisi Atinuke. "A Policy-Based Management Framework for Cloud Computing Security." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31503.

Full text
Abstract:
Cloud Computing has changed how computing is done as applications and services are being consumed from the cloud. It has attracted a lot of attention in recent times due to the opportunities it offers. While Cloud Computing is economical, the security challenges it poses are quite significant and this has affected the adoption rate of the technology. With the potential vulnerabilities being introduced by moving data to the cloud, it has become imperative for cloud service providers to guarantee the security of information, leaving cloud service consumers (e.g., enterprises) with the task of negotiating the terms and conditions of services provided by the cloud service providers as well as trusting them with their data. Although various security solutions used for addressing the security of data within the enterprises are now being applied to the cloud, these security solutions are challenged due to the dynamic, distributed and complex nature of the cloud technology. This thesis proposes a novel Policy-Based Management (PBM) framework capable of achieving cross-tenant authorization, handling dynamic and anonymous users while reducing the security management task to address cloud security. The framework includes an access control model adapted to the cloud environment that adopts features from role-based, task-based and attribute-based access control frameworks for a fine-grained access control. We demonstrate how this framework can be applied to develop an access control system for an enterprise using cloud services. The framework verifies the correctness of access control policies for cloud security through reasoning technique.
APA, Harvard, Vancouver, ISO, and other styles
12

Fernandez, George, and gfernandez@rmit edu au. "A federated approach to enterprise integration." Swinburne University of Technology, 2006. http://adt.lib.swin.edu.au./public/adt-VSWT20060502.113336.

Full text
Abstract:
In order to remain competitive, the integration of their information systems is an imperative for many large organisations. Applications that originally have been developed independently are now required to interoperate to support new or different functions of the enterprise. Although the mechanisms for application interoperation exist provided by the technology, due to the sheer number and complexity of the running systems, integration solutions � centralised or distributed�appropriate at the local level do not translate successfully to the whole enterprise. Centralised integration approaches often satisfy only some of the integration requirements, they are very expensive, and are fraught with danger since they imply an �all or nothing� approach. Distributed approaches, on the other hand, suffer from complexity and scalability problems as the number of system interfaces to be implemented and the number of execution-time invocations grows with the number of component applications. This dissertation makes a contribution to the field of Enterprise Application Integration (EAI) within the framework of distributed systems technology. Based on real-life case studies experience, we present here a federated approach that controls the size and complexity of the integration effort by reusing existing systems as much as possible and reducing the number of interacting applications. Only selected local elements are exposed to the organisational milieu, and a consistent supporting infrastructure is provided to make systems interactions possible. Our approach provides a flexible and scalable strategy to enterprise integration, avoiding the shortcomings of traditional approaches. We respect existing organisational structures, and demonstrate how appropriate federation infrastructure and protocols enable the interoperation of existing systems. The three main facets of enterprise knowledge are systematically incorporated into the integration effort: a) by the use of domain ontologies to support data integration; b) by the development of a methodology to include business rules; and c) by the development of FEW, a federated workflow model to implement the business processes of the organisation.
APA, Harvard, Vancouver, ISO, and other styles
13

Brehm, Nico. "Föderierte ERP-Systeme auf Basis von Web-Services /." Aachen : Shaker, 2009. http://d-nb.info/993898335/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Montesinos-Rosales, Andrea, Sebastian Salas-Villacorta, David Mauricio-Sanchez, and Carlos Raymundo-Ibañez. "Cloud-based open-source enterprise content management model at a SME operating in the manufacturing sector." Association for Computing Machinery, Inc, 2019. http://hdl.handle.net/10757/656282.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
Every year, small- and medium-sized enterprises (SMEs) expand their participation in the Peruvian market, while facing high internal disorganization issues that stifle their growth. This problem is rooted on the fact that the contents generated by these companies are not usually adequately recorded, managed, and exploited, and thus negatively affecting the organization and their competitiveness levels. Now, although most of this issue may be solved through enterprise content management (ECM) solutions, they are not affordable for most SMEs because of their high prices. Within this context, this study proposes the implementation of a cloud-based open-source ECM model at a manufacturing SME in Peru. Through this model, the company was able to access the benefits of an ECM to restructure the way they manage content, gaining 67% more efficiency, establishing a collaboration channel between employees, suppliers, and customers, and reporting a 93% model adaptation rate among staff members.
Revisión por pares
APA, Harvard, Vancouver, ISO, and other styles
15

Subramaniam, Balaji. "Metrics, Models and Methodologies for Energy-Proportional Computing." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/56492.

Full text
Abstract:
Massive data centers housing thousands of computing nodes have become commonplace in enterprise computing, and the power consumption of such data centers is growing at an unprecedented rate. Exacerbating such costs, data centers are often over-provisioned to avoid costly outages associated with the potential overloading of electrical circuitry. However, such over provisioning is often unnecessary since a data center rarely operates at its maximum capacity. It is imperative that we realize effective strategies to control the power consumption of the server and improve the energy efficiency of data centers. Adding to the problem is the inability of the servers to exhibit energy proportionality which diminishes the overall energy efficiency of the data center. Therefore in this dissertation, we investigate whether it is possible to achieve energy proportionality at the server- and cluster-level by efficient power and resource provisioning. Towards this end, we provide a thorough analysis of energy proportionality at the server and cluster-level and provide insight into the power saving opportunity and mechanisms to improve energy proportionality. Specifically, we make the following contribution at the server-level using enterprise-class workloads. We analyze the average power consumption of the full system as well as the subsystems and describe the energy proportionality of these components, characterize the instantaneous power profile of enterprise-class workloads using the on-chip energy meters, design a runtime system based on a load prediction model and an optimization framework to set the appropriate power constraints to meet specific performance targets and then present the effects of our runtime system on energy proportionality, average power, performance and instantaneous power consumption of enterprise applications. We then make the following contributions at the cluster-level. Using data serving, web searching and data caching as our representative workloads, we first analyze the component-level power distribution on a cluster. Second, we characterize how these workloads utilize the cluster. Third, we analyze the potential of power provisioning techniques (i.e., active low-power, turbo and idle low-power modes) to improve the energy proportionality. We then describe the ability of active low-power modes to provide trade-offs in power and latency. Finally, we compare and contrast power provisioning and resource provisioning techniques. This thesis sheds light on mechanisms to tune the power provisioned for a system under strict performance targets and opportunities to improve energy proportionality and instantaneous power consumption via efficient power and resource provisioning at the server- and cluster-level.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
16

Santos, Nuno Miguel Carvalho [Verfasser], and Rodrigo [Akademischer Betreuer] Rodrigues. "Improving trust in cloud, enterprise, and mobile computing platforms / Nuno Miguel Carvalho Santos. Betreuer: Rodrigo Rodrigues." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2013. http://d-nb.info/105367998X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Patterson, Candice. "Information infrastructure for the 21st century apparel enterprise : customer-focused product design and development." Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2015.
ENGLISH ABSTRACT: The consumerisation of mobile technology is driving the mobile revolution and enterprises are forced to incorporate mobile solutions into their business processes in order to remain competitive. While there are many benefits relating to the investment in and use of mobile technology, significant risks are also being introduced into the business. The fast pace of technological innovation and the rate of adoption of mobile technology by employees has, however, created an environment where enterprises are deploying mobile solutions on an ad hoc basis. Enterprises are only addressing the risks as they are occurring and resulting in losses. The key contributing factor to this lack of governance and management is the fact that those charged with governance do not understand the underlying mobile technology components. The purpose of this research is to improve the understanding of the underlying components of mobile technology. The research further proposes to use this understanding to identify the significant risks related to mobile technology and to formulate appropriate internal controls to address these risks. The findings of the research identified the following underlying components of mobile technology: mobile devices; mobile infrastructure, data delivery mechanisms and enabling technologies; and mobile applications. Based on an understanding of the components and subcategories of mobile technology, a control framework was used to identify the significant risks related to each component and subcategory. The significant risks identified included both risks to the users (including interoperability, user experience, connectivity and IT support) as well as risks to the enterprise’s strategies (including continuity, security, cost and data ownership). The research concludes by formulating internal controls that the enterprise can implement to mitigate the significant risks. This resulted in two matrixes that serve as quick-reference guides to enterprises in the identification of significant risks at an enterprise specific mobile technology component level, as well as the relevant internal controls to consider. The matrixes also assist enterprises in determining the best mobile solutions to deploy in their business, given their strategies, risk evaluation and control environment.
AFRIKAANSE OPSOMMING: Die mobiele revolusie word deur die verbruiker van mobiele tegnologie aangedryf en, ten einde kompeterend te bly, word ondernemings gedwing om mobiele tegnologie in hul besigheidsprosesse te implementeer. Terwyl daar baie voordele verbonde is aan die investering in en gebruik van mobiele tegnologie, word die besigheid egter ook blootgestel aan wesenlike risiko’s. Die vinnige tempo waarteen mobiele tegnologie ontwikkel en deur werknemers aangeneem word, het egter ʼn omgewing geskep waarin ondernemings mobiele tegnologie op ʼn ad hoc basis ontplooi. Besighede spreek eers die risiko’s aan nadat dit reeds voorgekom het en verliese as gevolg gehad het. Die hoof bydraende faktor tot die tekort aan beheer en bestuur van mobiele tegnologie is die feit dat diegene verantwoordelik vir beheer, nie onderliggend mobiele tegnologie komponente verstaan nie. Die doel van hierdie navorsing is om die begrip van die onderliggende komponente van mobiele tegnologie te verbeter. Die navorsing poog verder om die wesenlike risiko’s verbonde aan mobiele tegnologie te identifiseer en om toepaslike interne beheermaatreëls te formuleer wat die risiko’s sal aanspreek. Die bevindinge van die navorsing het die volgende onderliggende komponente van mobiele tegnologie geïdentifiseer: mobiele toestelle; mobiele infrastruktuur, data afleweringsmeganismes, en bemagtigende tegnologieë; en mobiele toepassings. Gebaseer op ʼn begrip van die komponente en subkategorieë van mobiele tegnologie, is ʼn kontrole raamwerk gebruik om die wesenlike risiko’s verbonde aan elke komponent en subkategorie van die tegnologie, te identifiseer. Die wesenlike risiko’s sluit beide risiko’s vir die gebruiker (insluitend kontinuïteit, gebruikerservaring, konnektiwiteit en IT ondersteuning) sowel as risiko’s vir die onderneming se strategieë (insluitend kontinuïteit, sekuriteit, koste en data eienaarskap) in. Die navorsing sluit af met die formulering van die beheermaatreëls wat geïmplementeer kan word om die wesenlike risiko’s aan te spreek. Dit het gelei tot twee tabelle wat as vinnige verwysingsraamwerke deur ondernemings gebruik kan word in die identifisering van wesenlike risiko’s op ʼn onderneming-spesifieke tegnologie komponentvlak asook die oorweging van relevante interne beheermaatreëls. Die tabelle help ondernemings ook om die beste mobiele tegnologie vir hul besigheid te implementeer, gebaseer op hul strategie, risiko evaluering en beheeromgewing.
APA, Harvard, Vancouver, ISO, and other styles
19

David, Petr. "Podnikový informační systém v éře cloud computingu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-82020.

Full text
Abstract:
The thesis deals with the latest trend in providing ICT service -- Cloud Computing -- and its possible application in enterprise information systems generally. The aim of the thesis is to evaluate market readiness for Cloud Computing services in order to find out to which extent it is possible to cover enterprise information system, or rather its software applications, on strategic and tactical management levels using the above-mentioned services. To achieve the aim, it is necessary to determine both the Cloud Computing services market and the enterprise information system sphere and then to decide whether Cloud Computing services are able to cover the basic needs of enterprise information systems. The evaluation of the market readiness will be executed in accordance with both the specially created methodology and the defined requirements. Thus the present market readiness rating will be possible to determine. The thesis should show to which extent it is possible to apply Cloud Computing model to the enterprise information systems issue. It will also be possible to find out the factors which support this application the most and, on the other hand, which factors limit this application the most. The thesis will also show which fields are advanced enough, which services we can consider and what we can expect of these services.
APA, Harvard, Vancouver, ISO, and other styles
20

Brand, Johanna Catherina. "The governance of significant enterprise mobility security risks." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85853.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: Enterprise mobility is emerging as a megatrend in the business world. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Organisations should therefore apply due care during the process of governing the significant enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks. Information technology (IT) governance frameworks, -models and -standards can provide guidance during this governance process to address enterprise mobility security risks on a strategic level. Due to the existence of the IT gap these risks are not effectively governed on an operational level as the IT governance frameworks, -models and -standards do not provide enough practical guidance to govern these risks on a technical, operational level. This study provides organisations with practical, implementable guidance to apply during the process of governing these risks in order to address enterprise mobility security risks in an effective manner on both a strategic and an operational level. The guidance given to organisations by the IT governance frameworks, -models and -standards can, however, lead to the governance process being inefficient and costly. This study therefore provides an efficient and cost-effective solution, in the form of a short list of best practices, for the governance of enterprise mobility security risks on both a strategic and an operational level.
AFRIKAANSE OPSOMMING: Ondernemingsmobiliteit kom deesdae as ‘n megatendens in die besigheidswêreld te voorskyn. Talle risiko's ontstaan as gevolg van die gebruik van mobiele toestelle vir sake-verwante take en meeste van hierdie risiko's hou 'n beduidende sekuriteitsbedreiging vir organisasies se inligting in. Organisasies moet dus tydens die risikobestuursproses van wesenlike mobiliteit sekuriteitsrisiko’s die nodige sorg toepas om ‘n doeltreffende proses te verseker ten einde die impak van hierdie risiko’s te beperk. Informasie tegnologie (IT)- risikobestuurraamwerke, -modelle en -standaarde kan op ‘n strategiese vlak leiding gee tydens die risikobestuursproses waarin mobiliteit sekuriteitsrisiko’s aangespreek word. As gevolg van die IT-gaping wat bestaan, word hierdie risiko’s nie effektief op ‘n operasionele vlak bestuur nie aangesien die ITrisikobestuurraamwerke, -modelle en -standaarde nie die nodige praktiese leiding gee om hierdie risiko’s op ‘n tegniese, operasionele vlak te bestuur nie. Om te verseker dat organisasies mobiliteit sekuriteitsrisiko’s op ‘n effektiewe manier op beide ‘n strategiese en operasionele vlak bestuur, verskaf hierdie studie praktiese, implementeerbare leiding aan organisasies wat tydens die bestuursproses van hierdie risiko’s toegepas kan word. Die leiding aan organisasies, soos verskaf in die IT-risikobestuurraamwerke, - modelle en -standaarde, kan egter tot’n ondoeltreffende en duur risikobestuursproses lei. Hierdie studie bied dus 'n doeltreffende, koste-effektiewe oplossing, in die vorm van 'n kort lys van beste praktyke, vir die bestuur van die mobiliteit sekuriteitsrisiko’s op beide 'n strategiese en 'n operasionele vlak.
APA, Harvard, Vancouver, ISO, and other styles
21

Kumar, Vibhore. "Enabling scalable self-management for enterprise-scale systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24788.

Full text
Abstract:
Thesis (Ph.D.)--Computing, Georgia Institute of Technology, 2008.
Committee Chair: Schwan, Karsten; Committee Member: Cooper, Brian F.; Committee Member: Feamster, Nick; Committee Member: Liu, Ling; Committee Member: Sahai, Akhil.
APA, Harvard, Vancouver, ISO, and other styles
22

Pospíšil, Václav. "Analýza použitelnosti cloud computingu pro práci na dálku." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165277.

Full text
Abstract:
Cloud Computing has become a serious participant in ICT in past few years. Technical and economic attributes of Cloud Computing can change a forecast in an organization. These benefits are investigated and putted into large picture of teleworking. In critical moment there is flexibility, which is crucial either for the organization or for the individual. How much is flexibility important is illustrated on the example of organization, that is considering whether the cloud computing and teleworking is the right way for the their future.
APA, Harvard, Vancouver, ISO, and other styles
23

Correia, Magda Sofia Coelho. "Aplicação da plataforma SaaS - Software as a Service em Enterprise Resource Planning (ERP)." Master's thesis, Instituto Superior de Economia e Gestão, 2012. http://hdl.handle.net/10400.5/10499.

Full text
Abstract:
Mestrado em Gestão e Estratégia Industrial
As últimas evoluções tecnológicas na área das TI deram origem ao aparecimento dos conceitos de cloud computing e de software as a service que permitem às empresas aceder a aplicações para a gestão e monitorização do seu negócio normalmente a um baixo custo e á medida das suas necessidades. Este trabalho procura clarificar o conceito de cloud computing e Software as a Service, perceber o que esta alteração na forma de distribuição de um software irá alterar nas organizações e nas implementações de sistemas ERP. Compara as diferenças nas metodologias de implementação, mas também os efeitos tecnológicos e organizacionais que esta nova abordagem trás às empresas.
The latest technological developments in the IT area led to the emergence of the concepts, of cloud computing and software as a service that allow companies to access applications for the management and control of their business at a low cost but also, matching the technological complexity with their process needs. This work intends to clarify the concept of cloud computing and Software as a Service, enlighten, new method of software distribution will change organizations and ERP implementation. This work also compares the difference in implementation methodology, but also the technological and organizational effects that go behind this new approach.
APA, Harvard, Vancouver, ISO, and other styles
24

Severin, Mats, Stefan Knutsson, and John Söderberg. "Business in the Cloud : Internationalization of a small enterprise in the age of cloud services." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176088.

Full text
Abstract:
During the past decade, advances in information technology have facilitated the rapid international expansion of small and medium-sized enterprises (SMEs). Cloud computing has enabled a new wave of firms to offer services on the web regardless of geographic distances. The aim of this study is to explore how cloud computing affect the external variables network and culture in the internationalization process of an SME. In order to explore the impact on these external variables, a qualitative case study is carried out on a business-to-business SME offering cloud services within small and open economies. The findings explain why closeness was important and why the cloud service firm was limited to a gradual internationalization process although the technology has the potential to break this pattern or accelerate it. The results from this study are valuable for scholars since the internationalization process of cloud service firms is an under-researched area. It is also useful for cloud service SMEs when making strategic decisions in the internationalization process.
APA, Harvard, Vancouver, ISO, and other styles
25

Eriksson, Peter. "A new approach for Enterprise Application Architecture for Financial Information Systems : An investigation of the architectural implications of adopting serialization and RPC frameworks, NoSQL/hybrid data stores and heterogeneous computing in Financial Information Systems." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169682.

Full text
Abstract:
This thesis investigates the architectural implications of adopting serialisation and remote procedure call (RPC) frameworks, NoSQL/hybrid data stores and heterogeneous computing in financial information systems. Each tech- nology and its implications is analysed separately together with its benefits and drawbacks for the system implemen- tor. The investigation shows that all three technologies can help alleviate technical challenges facing financial enter- prises; but they all come at a cost of complexity.
Denna rapport undersöker inverkan av serialiserings- och fjärrproceduranropsramverk (RPC), NoSQL/hybrid data- lagringslöningar samt heterogen beräkning på arkitekturen av finansiella informationssystem. Varje teknologi och dess inverkan analyseras var för sig tillsammans med dess för- och nackdelar för systemutvecklaren. Undersökningen visar att alla tre teknologierna kan av- hjälpa de tekniska utmaningar som finansiella aktörer står inför; men alla medför en komplexitetskostnad.
APA, Harvard, Vancouver, ISO, and other styles
26

Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
APA, Harvard, Vancouver, ISO, and other styles
27

Joos, Filip Alexius. "Implementace DMS v malých a středních firmách formou cloudového řešení." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162522.

Full text
Abstract:
This thesis analyzes the field of Document Management Systems (DMS) in Small and medium enterprises (SME). To be more specific, it analyzes ways and opportunities of a transition of the actual company situation to a cloud solution realized by the means of outsourcing. Due to the fact that this transition consists of many steps, some of them are critical for a successful realization, those steps have to be precisely analyzed and afterwards a corresponding solution has to be proposed. This analysis describes in a detail all the connections, which may interfere with each other and which may also interfere with the whole transition. The goals of this thesis are mainly to provide a specialized analysis of the transition to the cloud DMS, analysis of available cloud solutions, their categorization and assessment, description of connections emerging from the use of the cloud DMS in Small and medium enterprises, description of impacts of realized solutions and finally a summary of the analysis into a compact unit designated to be used as a manual for cloud DMS implementation in the Small and medium enterprise.
APA, Harvard, Vancouver, ISO, and other styles
28

Cailean, Diana Andreea, and Kobra Sharifi. "Mobile ERP : A literature review on the concept of Mobile ERP systems." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-23522.

Full text
Abstract:
Mobile Enterprise Resource Planning (ERP) is still a very young topic which is in the pro-cess of developing in practice and research. Reviews of the topic of mobile ERP are lack-ing. The purpose of  this  thesis  is  to  investigate how the concept of “Mobile ERP” has evolved by reviewing scientific articles on the topic from 1998 until June 2013. The total amount of articles we found when using the search term “Mobile ERP” was 246 articles and we could access 129 articles. These are the articles used for the literature review. We found, based on a framework used in previous studies for ERP that there are nine topic categories in which the articles can be divided and each category has a different evolution-ary level compared to the research area of “non-mobile ERP”. Mobile ERP has a signifi-cantly smaller number of results compared to ERP which had 886 articles in Schlichter & Kraemmergaard (2010). The nine topic categories are the following: Implementation of Mobile ERP, Management and Mobile ERP issues, Mobile ERP and Supply Chain Management, Optimisation of Mo-bile ERP, Mobile ERP and education, Studying Mobile ERP, The mobile ERP Market and Industry, The Mobile ERP Tool and Other. The topic with the most articles is “The Mobile ERP tool” followed by the topic “Other”, in which we have included both articles that have no relevance and articles that are very general and which cannot be categorized in only one category clearly. In third place comes “Optimisation of Mobile ERP” followed by “Implementation of Mobile ERP”, “Manage-ment and Mobile ERP issues”, “The Mobile ERP market and industry”, “Mobile ERP and supply chain management”, “Studying Mobile ERP” and last comes “Mobile ERP and ed-ucation” which is the only topic in which we did not manage to categorize any articles.
APA, Harvard, Vancouver, ISO, and other styles
29

Denys, Paul. "Security of Personal Information in Cloud Computing : Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5726.

Full text
Abstract:
The emergence and subsequent growth of Cloud computing has brought with it a great deal of change in the manner in which the world undertakes to compute and store information. This new technology has brought with it immense possibilities as far as processing of information and the pooling of resources is concerned. This potential has also been noticed by the public sector, as Governments all over the world have undertaken to introduce what has come to be known as e-Government, the provisioning of Government services and communications via Web based applications, rather than the traditional means of in person contact and paper based collection of personal information. While the move to Web based Government has been occurring for the last 20 or so years, a new development in this area is the introduction of Cloud computing and Cloud-based computing platforms, most notably Software-as-a-Service (SaaS) in the provisioning of these services. The computing and efficiency potential of this technology cannot be disputed, yet it’s important to recognize that taking advantage of this computing power does come at a price. That price being significant threats to personal privacy and security of personally identifiable information. This thesis will make it easier for government agencies to make informed decisions about whether or not to migrate data and applications into the cloud. The identification and analysis of potential risks to data security and personal information has drawn together key information from a multitude of both academic and industry sources to make such a decision plausible.
APA, Harvard, Vancouver, ISO, and other styles
30

Engebrethson, Ryan. "COMPARATIVE ANALYSIS OF ERP EMERGING TECHNOLOGIES." DigitalCommons@CalPoly, 2012. https://digitalcommons.calpoly.edu/theses/739.

Full text
Abstract:
This Master's Thesis compares technologies used in the architecture of Enterprise Resource Planning (ERP) Systems to evaluate the benefits and advantages of emerging technologies. The emerging technologies, Cloud Computing, Software as a Service (SaaS) and Multi-Tenancy, could significantly alter the current ERP space and become a primary part of ERP Systems of the future. A survey was sent to industry professionals to obtain feedback on their company's ERP Systems and to collect their comments on these new technologies. The survey results and related analysis show that Emerging Cloud ERP Systems outperform Traditional Legacy ERP Systems in all important characteristics - Accessibility, Business Cost, Implementation Time, Mobility, Scalability, Upgradability, and Usability. Cloud Systems were also found to have a shorter implementation time and a larger proportion of Cloud Systems were on the most recent version of software. Furthermore, industry professionals identified Cloud Computing, SaaS and Mobility as the emerging technologies of the coming decade. This thesis demonstrates that there are significant benefits for companies to use ERP Systems that use the emerging technologies and that the shift to Cloud ERP Systems has begun.
APA, Harvard, Vancouver, ISO, and other styles
31

Juříček, Michal. "ERP formou SaaS a mobilní technologie v logistice." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358958.

Full text
Abstract:
This thesis is focused on the use of enterprise information systems (ERP) provided as a service (SaaS) together with mobile technologies in an enterprise with logistics activities. The goal of the thesis is to find out whether a Czech market offers the ERP provided as a service suitable for needs of the model enterprise. This is achieved by specifying a set of criteria and following comparison and evaluation of the chosen ERP systems in two phases. The result is one chosen system which suits the best to specified criteria and therefore the needs of the model enterprise. Subsequently for the chosen system (and its offered func-tionalities) possibilities of its use with mobile technologies are described for model enterprise processes.
APA, Harvard, Vancouver, ISO, and other styles
32

Petrík, Vladimír. "Analýza nabídky ERP systémů pro malé a střední podniky formou SaaS v ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-197894.

Full text
Abstract:
The aim of this work is the issue of Enterprise Resource Planning offered by way of Systems as a service and the suitability of this implementation for small and medium enterprises. Theoretical part describes the genesis and development of Enterprise Resource Planning, their functionality and purpose. There's also specified the term Cloud computing, its principles, advantages and disadvantages and options of distribution. One of the principles of the distribution, System as a Service is described in detail, including the necessary Service-level agreement, and its capabilities in providing Enterprise Resource Planning. The practical part of the work consists of developing a comprehensive overview of the Czech market of Enterprise Resource Planning offered in the form of rent System as a Service. This list is analyzed from the perspective of a key customer for this product, namely Small and medium enterprises. The last part of this work consists of obtaining customer references and supplier experiences from already realized projects.
APA, Harvard, Vancouver, ISO, and other styles
33

Cai, Zhongtang. "Risk-based proactive availability management." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22581.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008.
Committee Member: Ahamad, Mustaque; Committee Member: Eisenhauer, Greg; Committee Member: Milojicic, Dejan; Committee Member: Pu, Calton; Committee Member: Schwan, Karsten.
APA, Harvard, Vancouver, ISO, and other styles
34

Seaton, Hugh Van. "The Financial Implications and Organizational Cultural Perceptions of Implementing a Performance Management System in a Government Enterprise." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/23.

Full text
Abstract:
Successful organizations continually seek ways to improve productivity, reduce and control costs, and increase efficiency. Governmental entities also are driven by the need for increased efficiency and accountability in public service for their constituents.There is a continuing need for better tools and a number of government entities have turned to performance management systems due to their promise of improvement in various areas of productivity and accountability. This research focused on one such system, Six Sigma, which has recently experienced widespread adoption in industry in the United States, internationally, and in some government organizations. In this study Six Sigma was compared and contrasted with several performance management systems, and its effects and organizational cultural impacts on one organization were examined.The study investigated the financial implications and perceptions of organizational cultural change resulting from the Six Sigma system implementation in a large government enterprise. The first part of the study used the organization’s published financial information from 1997 through 2006 to determine whether there was a tangible financial benefit of implementing Six Sigma. The analysis indicated that the financial implications were statistically significant and quantified them as material and relevant to the organization’s two major business units.The second component of the research explored differences in organizational culture and attitudes among and between selected employee groups through the use of interviews and a survey instrument. Interviews were also conducted with a purposive sample of the executives who were involved in the decisions to implement Six Sigma. The Organizational Culture Inventory© and Organizational Effectiveness Inventory™ survey instruments were used to measure the organizational culture perceptions of the employee groups. Discriminant function analysis results suggested that the various groups shared a common organizational culture, which supports the null hypothesis that there were no differences in the organizational cultural perceptions among the organizational groups investigated.
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Min-Wei. "Vacation system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2829.

Full text
Abstract:
The purpose of this project was to explore the use of Web services to solve enterprise computing problems. XML-based Web services allow complex information systems to be subdivided. In order to explore this architectural paradigm, two systems were built: an employee records sytem, and a vacation system.
APA, Harvard, Vancouver, ISO, and other styles
36

Fialová, Lenka. "Moderní cloudová řešení v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241386.

Full text
Abstract:
This diploma thesis deals with the use of the cloud in a particular company. The main objective is to select a system that enables sharing and synchronizing data between employees and to prepare a proposal to deploy the system with regard to specific needs of the analyzed company. As part of the work is also the situation analysis, opportunity study and risk analysis.
APA, Harvard, Vancouver, ISO, and other styles
37

Hill, Bethany. "Digital Divide: Investigating the integration of marketing and ICTs for South African retailers expanding throughout Africa." Master's thesis, Faculty of Commerce, 2019. http://hdl.handle.net/11427/31410.

Full text
Abstract:
Information Communication Technologies are increasingly used in organisations’ market expansion strategies. These Information communication technologies provide organisations with opportunities such as ease of communication and movement of resources, making the entry into new markets a faster and less resource heavy process. When expanding throughout the African continent, the challenge presented in using this approach is that many African markets have underdeveloped information communication technology infrastructure. In considering this barrier, the extent to which information communication technology enables market expansion throughout the African continent is the topic which has been fully analysed and discussed. An exploratory research design and a qualitative method have been used in this study. The subjects of the data collection were three key individuals selected from a large South African retailer. These three individuals job roles spanned across the marketing and IT departments and were influential in the organisation’s expansion efforts throughout Africa. The findings of this study show that the levels of information communication technology infrastructure vary vastly from country to country on the African continent, noting South Africa, Kenya, Nigeria, Zambia and Botswana as the more advanced nations with the Democratic Republic of Congo and Uganda lagging in development. The findings also show that for retailers, the retail focused technology available in South Africa is not yet available in other African nations which causes challenges in offering the same value to consumers across the board. However, the finding show that the development of cloud-based systems has assisted in the widespread use of technologies without the need of heavy investments into physical locations.
APA, Harvard, Vancouver, ISO, and other styles
38

Dimitrov, Dimitar. "Towards cloud application architectural patterns: transfer, evolution, innovation and oblivion." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH. Forskningsmiljö Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-27643.

Full text
Abstract:
Recently, cloud computing has been gaining more and more popularity. Misunderstanding, misusing and underutilizing the cloud offerings, though, both from business and technical perspective still poses a threat to the success of cloud projects. On the technical side, one of the main reasons for success or failure is often the architectural design of the system – if a system is not architected the “cloud way”, using cloud’s special characteristics, the business benefits of such a system are often questionable at best. Software architecture through architectural patterns – reusable generic solutions to classes of problems – has for long been a good way to overcome the challenges of software architecture. This paper focuses on establishing the grounds and highlighting the differences of the knowledge transfer regarding architectural patterns from building pre-cloud (“traditional”) software systems to building cloud-native systems. The following 3 research questions drive this research: RQ1.     How does the existing knowledge on architectural patterns relate to the cloud computing environment? RQ2.     Which characteristics of architectural patterns make them suitable for the cloud environment? RQ3.     How can architectural pattern evolution be documented effectively for usage in the practice? In order to answer these 3 research questions and considering their focus is on utility i.e. creating a model which can be directly used in practice, the research uses design science research methodology (Peffers, et al., 2007-8). The emphasis in this methodology is iteratively building artefact(s) which can be improved and proven through practice that they actually help solving the problem at hand. This research contributes with building 4 inter-connected artefacts: a cloud applicability taxonomy of architectural patterns (CATAP) showing how applicable to a cloud environment an architectural pattern is and why; a pattern-to-characteristics mapping showing how using an architectural pattern affects the resulting system in traditional and cloud environments; a pattern form documenting the architectural patterns and the findings about them in the previous two artefacts; a wiki site, APE Wiki, which makes the results available to the public for reference and discussion and improvement. This research has a few interesting findings. First of all, the current architectural pattern knowledge seems to be very mature as no pattern has been found to have significantly evolved because of cloud – the architectural patterns are really generic and very flexible and only their effect on system characteristics has changed with the environment switch. On the other hand, a few new patterns were discovered and documented, which confirms the need for special attention to the new environment. Apart from that, the pattern-to-characteristics mapping provides interesting insights into which characteristics are most important for cloud and where there is a gap which may need to be filled. This paper presents both the process and the results of the research as equally important as replicating and extending this research could help in maturing the results and the knowledge about architecting systems for cloud thus increasing the chances of success of cloud projects.
APA, Harvard, Vancouver, ISO, and other styles
39

Agarwala, Sandip. "System Support for End-to-End Performance Management." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16171.

Full text
Abstract:
This dissertation introduces, implements, and evaluates the novel concept of "Service Paths", which are system-level abstractions that capture and describe the dynamic dependencies between the different components of a distributed enterprise application. Service paths are dynamic because they capture the natural interactions between application services dynamically composed to offer some desired end user functionality. Service paths are distributed because such sets of services run on networked machines in distributed enterprise data centers. Service paths cross multiple levels of abstraction because they link end user application components like web browsers with system services like http providing communications with embedded services like hardware-supported data encryption. Service paths are system-level abstractions that are created without end user, application, or middleware input, but despite these facts, they are able to capture application-relevant performance metrics, including end-to-end latencies for client requests and the contributions to these latencies from application-level processes and from software/hardware resources like protocol stacks or network devices. Beyond conceiving of service paths and demonstrating their utility, this thesis makes three concrete technical contributions. First, we propose a set of signal analysis techniques called ``E2Eprof' that identify the service paths taken by different request classes across a distributed IT infrastructure and the time spent in each such path. It uses a novel algorithm called ``pathmap' that computes the correlation between the message arrival and departure timestamps at each participating node and detect dependencies among them. A second contribution is a system-level monitoring toolkit called ``SysProf', which captures monitoring information at different levels of granularity, ranging from tracking the system-level activities triggered by a single system call, to capturing the client-server interactions associated with a service paths, to characterizing the server resources consumed by sets of clients or client behaviors. The third contribution of the thesis is a publish-subscribe based monitoring data delivery framework called ``QMON'. QMON offers high levels of predictability for service delivery and supports utility-aware monitoring while also able to differentiate between different levels of service for monitoring, corresponding to the different classes of SLAs maintained for applications.
APA, Harvard, Vancouver, ISO, and other styles
40

Kašpar, Jan. "Posouzení informačního systému firmy a návrh změn." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241578.

Full text
Abstract:
The Master‘s thesis deals with the design of information system of the company KLAS Nekoř a.s. Based on the analysis, I will present suggestions to improve information system of the company. Master‘s thesis assesses the current situation of the information system of the company and establishes requirements for the selection of the optimal solution. It also describes the steps for the implementation of a new information system in the company KLAS Nekoř a.s.
APA, Harvard, Vancouver, ISO, and other styles
41

Šimeček, Martin. "Analýza faktorů ovlivňujících přechod malých a středních podniků na cloudové ECM služby." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-150242.

Full text
Abstract:
This thesis deals with a specific area of cloud computing - Enterprise Content Management services and their adoption among small and medium-sized businesses. The main goal is to identify and analyse factors affecting the expansion of cloud ECM services among SMBs. Secondary goals include definition of basic concepts, introduction of benefits and risks, definition of a suitable category, presentation of several products from this category, analysis of cloud computing adoption surveys, identification and analysis of main adoption barriers, description of products with focus on identified barriers and compilation of a set of recommendations for cloud service providers. These goals were achieved by studying literature, searching and analyzing cloud computing adoption surveys and consulting with professionals. This thesis contributes to the field with mapping of real world companies' opinions into practical recommendations for cloud computing vendors. Other contributions include definition of product parameters that are important when making a cloud ECM adoption decision, presentation of current market situation and how individual producers deal with main customers' barriers. Benefits for customers include cloud ECM market overview and showing which facts are worth their notice.
APA, Harvard, Vancouver, ISO, and other styles
42

Sýkora, Ondřej. "Modul evidence majetku provozovaný jako služba v ERP pro malé a střední firmy." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124669.

Full text
Abstract:
This diploma thesis deals with a comparison of available "as a service" solutions for enterprise asset records for small and medium businesses in the Czech market. The aim is to find solutions that would best suit the needs of companies to acquire a new system as a service module such as elimination of large initial investment into selected solution and extensive funding for its maintenance. The thesis introduces concepts such as ERP ASP, SaaS, Cloud computing, SLA and their characteristics in the theoretical part of the thesis, which is in the first two chapters. The practical part -- third and fourth chapter -- deals with the practical analysis of current business process property records, finding the gaps and the call for essential criteria for the selection of a new solution. It also search for available solutions in the Czech Republic and analyzes their characteristics at the base of pre-selected criteria and peer comparison. The fifth and last chapter deals with the calculation and evaluation of the suitability and subsequent recommendations for the selection of a particular solution. The thesis draws data from publicly available information provided by suppliers of "as a service" modules solutions for enterprise asset records management.
APA, Harvard, Vancouver, ISO, and other styles
43

Gustafsson, Bennet, and Alexander Orrgren. "Cloud Computing : The Adoption of Cloud Computing for Small and Medium Enterprises." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18505.

Full text
Abstract:
The objective with this research was to investigate and understand the adoption of cloud computing and to find the process of adopting cloud services. The method used to collect data was interviews. To find both the users and the providers perspective two cases were investigated, one user case and one provider case. The results were divided into two parts, the first a number of categories that were found when comparing the user case to the provider case, the second a process that describes the adoption of cloud computing. The categories in the first part of the results are; decision process, definition of cloud computing, integration and security, adoption and future development. When analyzing the results we came to the conclusion that both users and providers are striving for simplicity, security and to move the responsibility away from the user. The adoption of cloud computing is not as complex as many organizations have thought and by moving the applications and hardware out of the organization the user can focus on its core strategies.
APA, Harvard, Vancouver, ISO, and other styles
44

Tian, Hongfei 1979. "Grid computing as an integrating force in virtual enterprises." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/85742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Trivedi, Hrishikesh. "Cloud computing adoption model for governments and large enterprises." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/80675.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 79-81).
Cloud Computing has held organizations across the globe spell bound with its promise. As it moves from being a buzz word and hype into adoption, organizations are faced with question of how to best adopt cloud. Existing frameworks of cloud adoption look at different aspects of cloud but stop short of taking a view of the complete spectrum and suggesting a path. Cloud Computing adoption requires that organizations have readiness on multiple dimensions including Governance, Process Analysis and Improvement, Application Rationalization and Modernization, and Hardware and Software Standardization. Readiness in turn determines how far organizations can go in their cloud programs with key milestones being Proof of Concepts, Infrastructure Service, Virtual Desktop, Platform Service and Enterprise Software as Service. Readiness and Milestones inform us about multiple stages in cloud adoption. The analysis also indicates that certain governance structures are most suitable for cloud adoption. The duration of cloud program for a large organization lies in years, even multiple five year plans. Analyses of case studies indicate all these views and the systems modeling for enterprise software as service, in addition corroborates the likely duration of cloud program. For systems model we have used factors such as Total Non-Cloud Applications, Rationalization and Modernization Rate, Rate of Conversion into Enterprise Software as Service and Budget. The proposed Cloud Computing Adoption Model can help organizations understand what capabilities they need to develop, where they are on the cloud adoption spectrum and how much time it could take to go to cloud.
by Hrishikesh Trivedi.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
46

Hellbe, Simon, and Peter Leung. "DIGITAL TRANSFORMATION : HOW APIS DRIVE BUSINESS MODEL CHANGE AND INNOVATION." Thesis, Linköpings universitet, Industriell ekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119506.

Full text
Abstract:
Over the years, information technology has created opportunities to improve and extend businesses and to start conducting business in new ways. With the evolution of IT, all businesses and industries are becoming increasingly digitized. This process, or coevolution, of IT and business coming together is called digital transformation. One of the recent trends in this digital transformation is the use of application programmable interfaces (APIs). APIs are standardized digital communication interfaces, used for communication and exchange of information between systems, services and devices (such as computers, smartphones and connected machines). API communication is one of the foundational building blocks in recent disruptive technology trends such as mobile and cloud computing. The purpose of this study is to gain an understanding of the business impact that is created in digital transformation related to the use of APIs. To investigate this novel area, an exploratory study is performed where a frame of reference with an exploratory framework is created based on established academic literature. The exploratory framework consists of three main parts which cover the research questions, including Business Drivers, Business Model Change & Innovation and Challenges & Limitations related to API-enabled digital transformation. The framework is used to gather empirical data consisting of two types, interviews (primary data) and contemporary reports (secondary data). Interviews are performed with API-utilizing companies, consulting firms and IT solution providers and contemporary reports are published by consulting and technology research and advisory firms. Two main business drivers are identified in the study. The first is Understanding & Satisfying Customer Needs which is derived from companies experiencing stronger and changing demands for automated, personalized value-adding services. This requires higher degree of integration across channels and organizations. The second driver is Business Agility, which derives from higher requirements on adapting to changing environments while maintaining operational efficiency. Cost Reduction is also mentioned as a third and secondary driver, as a positive side-effect in combination with the other drivers. The identified impact on business models is that business model innovation is mostly happening in the front-end of business model towards customers. Several examples also exist of purely API-enabled businesses that sell services or manage information exchanges over APIs. The challenges and limitations identified are mostly classic challenges of using IT in businesses and not specific to use of APIs, where the general consensus is that IT and business need to become more integrated, and that strategy and governance for API-initiatives need to be established.
APA, Harvard, Vancouver, ISO, and other styles
47

Enslin, Zacharias. "Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprises." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20116.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to. The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented.
AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word. Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
APA, Harvard, Vancouver, ISO, and other styles
48

Dhiman, Ashok. "Analysis of on-premise to cloud computing migration strategies for enterprises." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/70796.

Full text
Abstract:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 72-73).
In recent years offering and maturity in Cloud Computing space has gained significant momentum. CIOs are looking at Cloud seriously because of bottom line savings and scalability advantages. According to Gartner's survey in early 2010 of 1600 CIOs around the world, Cloud computing and virtualization were on top of their list. This interest has also resulted in slew of products and services from existing IT players as well as new comers which promise to offer many solutions to pave the path towards Cloud computing adoption by enterprises. As organizations get on to the Cloud computing bandwagon they are looking at their current IT setup and looking at the best way they can take advantage of what Cloud has to offer. For a given enterprises, getting on to Cloud might be a complete new start from scratch, a limited deployment of new applications or migration of part of existing applications integrating backwards with on-premise applications. To take advantage of the Cloud, enterprise will need to define their short and long term Cloud strategy. They will need to consider factors specific to their businesses and determine their requirements, risks and benefits. Proper investigation by the enterprise will give them insight in to the benefits and specific strategy they need to follow to gain the said benefits from Cloud. This Thesis analyzes specific strategies which enterprises can adopt, both from business and technology perspective to make sure the migration and integration between on-premise and Cloud happens with minimal disruption to business and results in maximum sustainable cost benefit. It presents the current state of On-Premise IT and Cloud Computing space and then compares them to come up with enterprise specific variables based on which one can make Cloud migration decisions. Finally, Thesis presents the broad frameworks for "migration to Cloud" and confirms the same by interviewing enterprise managers involved in Cloud migration. There are various ways to slice and approach the Cloud migration - but all should take in to consideration the business processes, architecture of existing systems, architecture of available Cloud services, interoperability between on-premise and Cloud applications, maturity of Cloud and standards, short and long term cost savings, sustainability, data/security/regulation, user adoption, available Service Level Agreements (SLAs) and business criticality.
by Ashok Dhiman.
S.M.in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
49

Dhali, Salauddin. "A study on cloud computing adopton in small and medium enterprises." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20042.

Full text
Abstract:
Innovation of new technology and its adoption contributes not only increasing the businessvalues but as well facilities the business growth and agility to an organization. Cloudcomputing provides hiring, renting and provisioning exclusive use of IT services as ondemand,pay-per-use basis via Internet. This emergence technology has shifted the competitiveIT-landscapes by providing a new computational platform for effective, creativeand deliverable business value model. However, many small organizations are reluctantto deploy their IT platform to Cloud due to the diverse adoption barriers cloud suffers.Despite this the promising attributes CC offers such as of IT operational cost reduction,accessibility and instant deployment makes it a vital embarking point to adopt this technologyespecially small and medium base enterprises (SME). Since SMEs are exploringthe possibilities of adopting this technology, it is imperative for them to critically evaluatethe feasibility of this technology for their specific businesses. This paper aims to investigatecloud adoption factors which might pursue pertaining or embarking cloud integrationamong SME’s. An on line web based survey instrument using questionnaires was used toconduct the study. The conclusive findings of the study suggests that Cloud computinghas the potential to transform the existing business operation, increase the business valuesand agility, customer relationship also promote sustainable competitive business edgefor SMEs while reducing the IT capital expenditure investment cost. The findings willassist IT managers/Chief Technology and /or Information Officers(CTO/CIO) representsthe SMEs for considering a possible adoption approach to cloud services.
APA, Harvard, Vancouver, ISO, and other styles
50

Ganta, Sathvik. "A Framework to Incorporate Industry 4.0 into SME to Enhance Resource Planning." Thesis, Mälardalens högskola, Innovation och produktrealisering, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-47421.

Full text
Abstract:
Small and Medium-sized Enterprises (SMEs) have grown steadily in recent years.  SMEs generate 59.7 % of value-added and 65.5 % of employment in the ‘non-financial business economy’ in Sweden. It's important for the success of SMEs to be ready to provide high product availability to customers at minimal operation costs. The challenges faced by SMEs are tougher in global competition. There is a rapid growth in the industrial revolution to deal with the challenges as well as competition. This work mainly focuses on implementing resource planning (RP) and adapting to the latest technologies of Industry 4.0 into SMEs to face the challenges. But incorporating Industry 4.0 in a major struggle in the SMEs.  The thesis provides a view of Resource Planning implementation. The authors describe the resource planning implementation techniques and define the requirements for its successful implementation. Resource Planning (RP) adoption factors have been studied quite extensively over the years. However, this master thesis tries to investigate the less explored area of resource planning. Relatively a smaller amount of research has been conducted, when it comes to implementation of Industry 4.0 technologies especially in Small and Medium-sized Enterprises (SMEs).  Industry 4.0 provides new paradigms for the industrial management of SMEs. Supported by a growing number of new technologies, this concept appears more flexible and less expensive than traditional enterprise information systems. This paper presents a literature review of existing applied research covering different Industry 4.0 issues about SMEs. Furthermore, the analysis is done to understand the correlation between the identified factors of Industry 4.0 technologies. The research findings indicate that the use of IoT and Cloud computing are major advantages for resource planning in an SME. The results from the analysis are presented in a framework designed for the future adaptation of these technologies. Despite the research limitations, the findings show a high advantage. Finally, the author suggests a future scope of research.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography