To see the other types of publications on this topic, follow the link: Sans Serveur.

Journal articles on the topic 'Sans Serveur'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Sans Serveur.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Walker, Claudette, and Marianne Robinot Cottet-Dumoulin. "Oser sans limite d’âge !" Servir N° 524, no. 6 (November 29, 2023): 54–55. http://dx.doi.org/10.3917/servir.524.0054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Najib, Muhammad, Bambang Purnomosidi D.P, and M. Agung Nugroho. "IMPLEMENTASI SECURITY AUDITOR UNTUK STANDARDISASI INSTALASI SERVER PADA LAYANAN SAAS MENGGUNAKAN CIS BENCHMARK." Cyber Security dan Forensik Digital 5, no. 2 (January 19, 2023): 83–88. http://dx.doi.org/10.14421/csecurity.2022.5.2.3929.

Full text
Abstract:
Pertumbuhan layanan sistem pada era ini semakin banyak dan variatif, termasuk juga adalah layasan SaaS. Pada layanan SaaS kebutuhan sebuah kemanan informasi itu cukup penting dan vital. Salah satu cara meningkatkan keamanan adalah dengan melakukan hardening pada server yang digunakan. Hardening dapat dilakukan jika memiliki data konfigurasi pada sistem dan kontrol terdahap isu-isu kemanan informasi. Penelitian ini bertujuan untuk mengimplementasikan CIS Security untuk mengetahui hasil audit dari CIS Benchmark berupa penilaian sehingga dapat meningkatkan keamanan sistem operasi Centos 6.10 dengan rekomendasi dari CIS Security ini. Sistem ini dibuat bertujuan untuk melakukan audit pada server dengan sistem operasi Centos 6. 10, kemudian hasil dari audit akan ditampilkan dalam data agar lebih mudah dibaca dan dapat dijadikan bahan untuk menjadi evaluasi bagi instalasi layanan SaaS agar lebih baik. Dalam sistem security auditor ini terdapat 2 buah server, masing-masing adalah server testing dan server pool. Server testing adalah server yang akan di audit menggunakan program audit yang disesuaikan dengan CIS Benchmark. Program audit ini ditulis dalam bahasa bash script. Hasil audit dapat dikirimkan ke server pool dan ditampilkan oleh server pool dengan halaman web. Pada server pool ini menggunakan PHP sebagai backend dengan manajemen datanya adalah mysql. Sedangkan menggunakan framework Bootsrap untuk meperindah frontend nya. Untuk enviroment server pool ini dijalankan dengan virtulasisasi docker. Berdasarkan analisa yang dilakukan sehingga diperoleh hasil yaitu sistem security auditor untuk standardisasi instalasi server pada layanan SaaS menggunakan CIS Benchmark. Untuk membangun sebuah security auditor membutuhkan standardisasi yang sudah diakui dunia. CIS Control memiliki kaitan penting dalam implementasi ISO 27001. Dalam sistem security auditor ini dapat memberikan nilai pada setiap hasil audit yang dijalankan pada server testing dengan CIS Benchmark berdasarkan CIS Control. Selain itu sistem ini memberikan ceklist data hasil audit yang dapat digunakan System Administrator untuk mengevaluasi intalasi server pada layanan SaaS. Kata kunci: audit keamanan sistem, CIS benchmark, CIS Control, CIS Security, ISO 27001 ------ The development of system services this year is increasing, especially SaaS services. In SaaS services, the need for information security is quite important. One of the solutions to improve security in the system is to harden the server used. Hardening can be done if you have configuration data on the design and controls for information security issues. This study aims to implement CIS Security to find out the results of an audit from CIS Benchmark in the form of an assessment so that it can improve the security of the Centos 6.10 operating system with recommendations from CIS Security. This research is building a system to conduct an audit on a server with the Centos 6.10 operating system; then, the audit results will be displayed in the data so that it is easier to read and can be used as material for evaluation for better SaaS service installations. In this security auditor system, there are two servers: a testing server and a pool server. Server testing is a server that will be audited using an audit program that is adjusted to the CIS Benchmark. This audit program is written in a bash script language. Audit results can be sent to the pool server and displayed by the pool server with a web page. This server pool uses PHP as the backend, with MySQL as data management. At the same time, use the Bootstrap framework to beautify the front end. The server pool environment is run with docker virtualization. Based on the analysis, the results are a security auditor system for standardizing server installations in SaaS services using CIS Benchmarks. Building a security auditor requires standardization that has been recognized worldwide. CIS Control has an important link in the implementation of ISO 27001. The system can give a value to each audit result run on the testing server with CIS Benchmark based on CIS Control. In addition, this system provides a checklist of audit results data that System Administrators can use to evaluate server installations on SaaS services. Keywords: network security auditing, CIS benchmark, CIS control, CIS security, ISO 27001
APA, Harvard, Vancouver, ISO, and other styles
3

Iranpour, Eiman, and Saeed Sharifian. "An FPGA implemented brain emotional learning intelligent admission controller for SaaS cloud servers." Transactions of the Institute of Measurement and Control 39, no. 10 (May 10, 2016): 1522–36. http://dx.doi.org/10.1177/0142331216644042.

Full text
Abstract:
Dynamic resource allocation in a cloud environment has become possible using virtualization technologies in cloud computing. One of the applications of these technologies is offering various applications by Software-as-a-Service (SaaS) infrastructures. Unfortunately, due to request rate increments in cloud rush hours, the related server cannot serve all the requests according to the service level agreement. Hence, the cloud provider’s quality of service will decrease. Thus a mechanism is required to control the admission rate of requests for cloud servers. In this study, an intelligent controller is designed and implemented on a field-programmable gate array (FPGA) in order to control the admission rate of requests for a SaaS server in the cloud. The controller is based on a brain emotional learning-based intelligent controller (BELBIC). First, an analytical model of a server is proposed and simulated, which shows the behavioural characteristics of a real server. Next, the BELBIC is designed to control the admission rate of the server. Finally, the system is implemented on FPGA hardware and simulated by a synthetic cloud workload in a hardware-in-the-loop manner. In order to compare the performance of the BELBIC, an adaptive neuro-fuzzy inference system (ANFIS) controller in addition to the popular PID controller is provided. The controllers’ efficiencies are compared in terms of server utilization, admission rate, drop rate of requests and the agility of the controllers. The results proved that the BELBIC offers faster rise time compared with the PID controller, which leads to better cloud utilization and a smaller number of dropped requests.
APA, Harvard, Vancouver, ISO, and other styles
4

Schwartze, Christian, Franciska Zander, Sven Kralisch, and Wolfgang-Albert Flügel. "Virtual Appliances for geospatial data management and processing in the Integrated Land Management System (ILMS)." Acta Agraria Debreceniensis, no. 49 (November 13, 2012): 59–62. http://dx.doi.org/10.34101/actaagrar/49/2480.

Full text
Abstract:
Virtualization is increasingly taking on a key role in various system architectures which follow new platform concepts like Software as a Service (SaaS). This trend addresses more instant and short-term environments and comes with new methods and strategies for the distribution of mainly complex application stacks not only in large IT infrastructures. The paper presents how a so called Virtual Appliance can be set up in order to operate in virtual server environments using hypervisor software like Oracle Virtual-Box. Using the example of two server-side components within the Integrated Land Management System (ILMS), it will be shown that the use of state-of-the-art methods, standardized tools and interfaces on servers enables different aspects of environmental system management, analysis and planning.
APA, Harvard, Vancouver, ISO, and other styles
5

Rowe, Timothy. "Contraception orale sans ordonnance? Servez-vous!" Journal of Obstetrics and Gynaecology Canada 30, no. 4 (April 2008): 305–6. http://dx.doi.org/10.1016/s1701-2163(16)32795-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Courtney, Robert C. "Canada GEESE 2: Visualization of Integrated Marine Geoscience Data for Canadian and Proximal Waters." Geoscience Canada 40, no. 2 (August 24, 2013): 141. http://dx.doi.org/10.12789/geocanj.2013.40.0010.

Full text
Abstract:
The Geological Survey of Canada has made most of its holdings of marine geoscience data available online with unrestricted access. These holdings constitute the premier collections of geological and geophysical source data for Canadian and proximal waters. Multibeam bathymetric imagery, analog high resolution seismic and sidescan sonar data, seabed photographs, grain size analyses, and radiocarbon dates can be directly downloaded from NRCan’s Geogratis (http://geogratis.cgdi.gc.ca) servers. KML files allow the user to discover and explore these collections, highlighting the building blocks of marine data downloadable from ftp/http servers.SOMMAIRELa Commission géologique du Canada a mis en ligne la plupart de ses fonds de données géoscientifiques marines et y donne accès sans restriction. Ces fonds constituent des collections de premier choix de données géologiques et géophysiques de base des eaux canadiennes ou proximales. On peut ainsi télécharger des serveurs Géogratis de RNCan (http://geogratis.cgdi.gc.ca) des données d’imagerie bathymétrique par secteurs, des données analogiques séismiques haute résolution et de levé de sonar à balayage latéral, des photographies du fond marin, des analyses granulométriques, et des datations au radiocarbone. Le format KML des fichiers permet aux utilisateurs d’exploiter facilement le contenu de ces collections, en mettant en relief les données marines de base téléchargeables depuis les serveurs FTP/HTTP.
APA, Harvard, Vancouver, ISO, and other styles
7

Adjerad, Raphaële. "À quoi servent les banques centrales sans inflation ?" Idées économiques et sociales N° 188, no. 2 (2017): 35. http://dx.doi.org/10.3917/idee.188.0035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ramalingam, Chithambaramani, and Prakash Mohan. "An Efficient Applications Cloud Interoperability Framework Using I-Anfis." Symmetry 13, no. 2 (February 5, 2021): 268. http://dx.doi.org/10.3390/sym13020268.

Full text
Abstract:
Cloud interoperability provides cloud services such as Software as a Service (SaaS) or customer system to communicate between the cloud providers. However, one of the most important barriers for existing researches was to adopt the application’s or data’s in cloud computing environments so as to obtain efficient cloud interoperability. This paper focuses on reliable cloud interoperability with a heterogeneous cloud computing resource environment with the objective of providing unilateral provision computing capabilities of a cloud server without the help of human interaction and allowing proper utilization of applications and services across various domains by using an effective cloud environment available at runtime. Moreover, the framework uses hybrid squirrel search genetic algorithm (HSSGA) to select the relevant features from a set of extracted features in order to eliminate irrelevant data which provides advantages of low computational time and less memory usage. Thereafter, for a proper selection of cloud server with respect to the selected features, the system has developed the improved adaptive neuro-fuzzy inference system (I-ANFIS) which provides accurate server selection and helps against uncertainties caused by servers or applications. Hence, the experimental result of the proposed framework gives an accuracy of 94.24% and remains more efficient compared to existing frameworks.
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Sarvesh, Anubha Jain, and Astha Pareek. "Designing heuristic driven hybrid optimization algorithms for efficient workflow scheduling in IaaS cloud." Journal of Autonomous Intelligence 7, no. 5 (March 21, 2024): 1024. http://dx.doi.org/10.32629/jai.v7i5.1024.

Full text
Abstract:
<p class="Abstract">Each one of the real resources or hardware like workstations, work ranges, joins, switches, switches, server ranches, and capacity contraptions are fundamental for the establishment. In disseminated computing, all the establishment is virtualized and given to infrastructure as a service. Usually called IaaS. IaaS quickly increments or down with ask and avoids the got to procure genuine servers and distinctive server cultivate establishment; each resource is displayed as a specific help portion. A conveyed computing pro-organization bargains with the establishment, whereas the client presents, plans, and manages programming, counting applications, middleware, and working systems. IaaS dispersed computing offers clients induction to figuring resources like servers, stockpiling, and frameworks organization. Affiliations utilize their possess establishment and applications interior a master organization’s system. For cloud service providers, cloud schedulers automate IT procedures. Schedulers are used by end users to automate jobs, or tasks, that support everything from big data pipelines to machine learning processes to cloud infrastructure. Infrastructure as a service, or IaaS, is a type of cloud computing that uses the internet to provide virtualized computing resources. IaaS is one of the three main types of cloud computing services, along with Platform as a Service (PaaS) and Software as a Service (SaaS). The precise task is assigned to the CPU, the network, and the storage by resource scheduling. The point behind this is the outrageous use of assets. However, both cloud providers and users require well-organized scheduling.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Afif, Nur. "IMPLEMENTASI OPEN MEETINGS MENGGUNAKAN RASPBERRY PI SEBAGAI SERVER." JURNAL INSTEK (INFORMATIKA SAINS DAN TEKNOLOGI) 2, no. 2 (October 30, 2017): 31–40. http://dx.doi.org/10.24252/instek.v2i2.4015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mazaud, Caroline. "L’alternance, pour orienter des jeunes chômeurs sans diplôme." Diversité 180, no. 1 (2015): 61–65. http://dx.doi.org/10.3406/diver.2015.4039.

Full text
Abstract:
Sur la base d’une enquête conduite au sein de trois actions de formation destinées à des jeunes chômeurs sans diplôme, notre article rend compte de fonctions remplies par les stages. Loin d’être révélateurs d’un large éventail des possibles pour le jeune, ils servent avant tout à ajuster ce dernier aux réalités et aux attentes de l’entreprise. Ce processus se renforce et se complexifie dans un contexte de réduction des finances publiques.
APA, Harvard, Vancouver, ISO, and other styles
12

Song, Hai Tao, and Jing Rong Yi. "Primary Discussion on Data Security Management under SaaS Model." Applied Mechanics and Materials 58-60 (June 2011): 441–46. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.441.

Full text
Abstract:
With the fast development of internet, especially the emergence of SaaS, the majority of SME (small and medium-sized enterprises) customers found that the costs of Software application are reduced and its maintenance is easier. These are definitely new challenges which the SaaS model brings to the management of data security. So we need to find out the corresponding strategies to guarantee the high quality of software service. This paper presents a solution that store the data encrypted by the client’s public Key on Server which protected the data is abused by server administrator.
APA, Harvard, Vancouver, ISO, and other styles
13

B.S., Klaudius Jevanda. "REMASTERING LIVE USB UNTUK �LAMP� PADA FAKULTAS SAINS DAN TEKNOLOGI PALEMBANG." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 6, no. 2 (November 1, 2015): 255–62. http://dx.doi.org/10.24176/simet.v6i2.461.

Full text
Abstract:
ABSTRAK Penelitian ini bertujuan untuk membuat distribusi Linux bernama Lubuntu yang memfokuskan diri pada desktop yang ringan serta ditujukan untuk menjadi lingkungan web server yang free dalam bentuk live USB. Dimana, penelitian ini menjelaskan tentang desain dan implementasi dari distribusi Linux Lubuntu itu sendiri yang nantinya bisa terus diperbaiki, disempurnakan dan dimungkinkan untuk dimodifikasi serta dipelajari oleh pihak lain. Lubuntu dikembangkan dengan memodifikasi dari Linux Lubuntu 14.04 dari tahap penambahan program, penghapusan program dan konfigurasi sampai pada tahap pembuatan Live USB untuk LAMP (Linux Apache Mysql PHP) menggunakan metode remastering. Hasil dari penelitian ini berupa Live USB yang berisi tool untuk lingkungan web server. Tool utama dalam Live USB diantaranya adalah phpmyadmin, gimp, inkscape, dan bluefish. Keluaran penelitian ini, diharapkan bisa digunakan sebagai sistem operasi dan dikhususkan dalam lingkungan web server yang nyaman untuk dipergunakan dalam proses belajar mengajar pada matakuliah sistem operasi, pemrograman basis web I, dan pemrograman basis web II di Fakultas Sains dan Teknologi Universitas Katolik Musi Charitas palembang. Kata kunci: linux, web server, LAMP, remastering, live usb.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Zhong, Xianke Wu, and Changjun Jiang. "Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems." Security and Safety 1 (2022): 2022003. http://dx.doi.org/10.1051/sands/2022003.

Full text
Abstract:
Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.
APA, Harvard, Vancouver, ISO, and other styles
15

Lapitkaia, Liudmila. "APPLICATION OF CLOUD TECHNOLOGIES IN ACCOUNTING." MEST Journal 9, no. 1 (January 15, 2021): 90–96. http://dx.doi.org/10.12709/mest.09.09.01.12.

Full text
Abstract:
Traditional accounting in modern conditions of digitalization of the economy requires significant changes in terms of the use of new information tools. One of these opportunities is the use of new information technologies in accounting. These new information technologies include cloud technologies, which are a specific environment (for storing, processing, and protecting information) that combines technical tools, software, communication channels, and technical support. Services that may be based on technology (MCloud) are software as a service (SaaS), infrastructure as services (IaaS), platform as services (PaaS). From the point of view of an accounting organization, the most convenient of these three types of services is the service as a software. Cloud technologies are the storage and processing of information on servers on the Internet. The positive aspects of using cloud technologies include the fact that accountants do not need to purchase, install the program on their computer, maintain it in working order, and ensure data protection and security. All this can be done in the cloud. Cloud storage - is online storage where information is stored on the network on servers provided by an information service provider for the use of customers. At the same time, cloud providers provide services for renting a server from various companies based on cloud technologies. The article analyzes the opportunities that cloud technologies provide in accounting, considers the advantages and disadvantages of using such technologies.
APA, Harvard, Vancouver, ISO, and other styles
16

Bagui, Sikha, and Evorell Fridge. "A Comparison of Fair Sharing Algorithms for Regulating Search as a Service API." Transactions on Networks and Communications 8, no. 6 (February 11, 2021): 16–34. http://dx.doi.org/10.14738/tnc.86.9633.

Full text
Abstract:
Providers of a Search as a Service (SaaS) environment must ensure that their users will not monopolize the service or use more than their fair share of resources. Fair sharing algorithms have long been used in computer networking to balance access to a router or switch, and some of these algorithms have also been applied to the control of queries submitted to search engine APIs. If a search query’s execution cost can be reliably estimated, fair sharing algorithms can be applied to the input of a SaaS API to ensure everyone has equitable access to the search engine. The novelty of this paper lies in presenting a Single-Server Max-Min Fair Deficit Round Robin algorithm, a modified version of the Multi-Server Max-Min Fair Deficit Round Robin algorithm. The Single-Server Max-Min Fair Deficit Round Robin algorithm is compared to three other fair sharing algorithms, token-bucket, Deficit Round Robin (DRR), and Peng and Plale’s [1] Modified Deficit Round Robin (MDRR) in terms of three different usage scenarios, balanced usage, unbalanced usage as well as an idle client usage, to determine which is the most suitable fair sharing algorithm for use in regulating traffic to a SaaS API. This research demonstrated that the Single-Server Max-Min Fair DRR algorithm provided the highest throughput of traffic to the search engine while also maintaining a fair balance of resources among clients by re-allocating unused throughput to clients with saturated queues so a max-min allocation was achieved.
APA, Harvard, Vancouver, ISO, and other styles
17

Sreenivas, V., S. Sriharsha, and C. Narasimham. "A Cloud Model to Implement SaaS." Advanced Materials Research 341-342 (September 2011): 499–503. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.499.

Full text
Abstract:
Cloud computing is a paradigm where tasks are assigned to a combination of connections, software and services accessed over a network. Clouds provide processing power, which is made possible through distributed computing. Cloud computing can be seen as a traditional desktop computing model, where the resources of a single desktop or computer used to complete tasks, and an expansion of the client/server model. The paper describes a model for cloud computing to implement software as a service (SaaS).
APA, Harvard, Vancouver, ISO, and other styles
18

Choi, Kook-Hyun, Yang-Ha Chun, Se-Jeong Park, Jeawon Park, Yongtae Shin, and Jong-Bae Kim. "Method of Calculating the Server Capacity for Cloud Computing for SaaS." International Journal of Software Engineering and Its Applications 9, no. 11 (November 30, 2015): 117–26. http://dx.doi.org/10.14257/ijseia.2015.9.11.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bouhlal, Yosr, Douglas M. Jennewein, Brent Anderson, Joe Reynoldson, Wiem Maamouri, Fayçal Hentati, Rim Amouri, and Carol Lushbough. "Computational Analysis of a Novel SACS Gene Mutation with BioExtract Server." Journal of Molecular Neuroscience 44, no. 1 (March 17, 2011): 53–58. http://dx.doi.org/10.1007/s12031-011-9512-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kaur, Er Mandeep. "A Survey of The Various Techniques for Virtualization in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 52–55. http://dx.doi.org/10.22214/ijraset.2021.38375.

Full text
Abstract:
Abstract: Cloud computing is used to describe the delivery of software, infrastructure and storage devices over the internet. After evolution of the internet, Cloud computing is the next stage. Cloud Computing can simply the way in which the business operates, particularly in terms of needs of hardware. One is able to access and connect the same information but it can be done from anywhere and a more streamed technology installation is enjoyed by organization. VCloud Computing involves the concepts of parallel processing and distributed computing in order to provide the shared resources by means of Virtual Machines(VMs) hosted by physical servers. It is a service oriented design that reduces the cost of access to gather the information of the clients offer greater flexibility and demand based services. The benefits of Cloud Computing are far reaching. It is not a technology solution or server stored in another location but it is business enhanced computing that affects the business positively. Apart of its popularity it has some concerns which are becoming huddles for its wider adoption. A survey of cloud computing and virtual migration is presented in this paper. Keywords: Cloud Computing, Virtualization, SaaS, PaaS, IaaS
APA, Harvard, Vancouver, ISO, and other styles
21

Kaur, Er Mandeep. "A Survey of The Various Techniques for Virtualization in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 52–55. http://dx.doi.org/10.22214/ijraset.2021.38375.

Full text
Abstract:
Abstract: Cloud computing is used to describe the delivery of software, infrastructure and storage devices over the internet. After evolution of the internet, Cloud computing is the next stage. Cloud Computing can simply the way in which the business operates, particularly in terms of needs of hardware. One is able to access and connect the same information but it can be done from anywhere and a more streamed technology installation is enjoyed by organization. VCloud Computing involves the concepts of parallel processing and distributed computing in order to provide the shared resources by means of Virtual Machines(VMs) hosted by physical servers. It is a service oriented design that reduces the cost of access to gather the information of the clients offer greater flexibility and demand based services. The benefits of Cloud Computing are far reaching. It is not a technology solution or server stored in another location but it is business enhanced computing that affects the business positively. Apart of its popularity it has some concerns which are becoming huddles for its wider adoption. A survey of cloud computing and virtual migration is presented in this paper. Keywords: Cloud Computing, Virtualization, SaaS, PaaS, IaaS
APA, Harvard, Vancouver, ISO, and other styles
22

Lecomte, Conrad, and Tania Lecomte. "Au-delà et en deçà des techniques cognitives béhaviorales dans le traitement des troubles graves : les facteurs communs." Dossier : Schizophrénie, délires et thérapie cognitive 24, no. 1 (October 19, 2006): 19–38. http://dx.doi.org/10.7202/031583ar.

Full text
Abstract:
Résumé Les thérapies cognitives béhaviorales (TCB) ont vu leur succès s'accroître récemment, en particulier dans le traitement des délires chez les personnes souffrant de troubles mentaux graves. Plusieurs questions demeurent sans réponse, particulièrement quant aux ingrédients actifs dans l'efficacité de ce mode d'intervention. Les auteurs proposent une réflexion intégrative où les facteurs communs comme les variables du client, du thérapeute et de la relation, servent de pistes d'exploration et d'explication.
APA, Harvard, Vancouver, ISO, and other styles
23

Eka Suteja, Erna Kumalasari N, and Suwanto Raharjo. "PERANCANGAN SISTEM KEAMANAN JARINGAN UNTUK MENGURANGI KEJAHATAN CYBER MENGGUNAKAN TEKNIK DEMILITARIZED ZONE (DMZ) DAN FIREWALL RULES (Studi Kasus: Laboratorium Basis Data IST AKPRIND)." Jurnal Jarkom 11, no. 2 (December 31, 2022): 20–30. http://dx.doi.org/10.34151/jarkom.v11i2.4785.

Full text
Abstract:
Konsep keamanan jaringan yang terpasang pada salah satu Laboratorium yang berada di Kampus Institut Sains & Teknologi AKPRIND Yogyakarta, lebih tepatnya pada Lab Basis Data. Memiliki kemanan jaringan yang kurang baik, dimana lalulintas data pada jaringan tidak terfilter sehingga sistem internal yang ada dalam hal ini adalah perangkat server tidak memiliki pengamanan selain sistem keamanan built in yang ada pada sistem oprasi. Pengguna yang ngakses jaringan internet menggunakan IP Address yang biasa digunakan mahasiswa praktikan dapat juga memasuki jaringan yang digunakan oleh server secara langsung tanpa filter. Pengumpulan data dalam penelitian ini menggunakan metode observasi dan metode studi keputusan. Sistem yang dibangun dalam keamanan jaringan adalah menggunakan DMZ (Demilitarized Zone) dan Firewall yang merupakan salah satu solusi pengamanan dari jaringan internal. DMZ merupakan interface yang berada diantara area jaringan internal dan eksternal Teknik ini bekerja dengan memisahkan traffic data dengan IP Public internet dan IP Local untuk melindungi server dengan membuat lingkungan khusus dalam jaringan. Hasil dari penelitian menggunakan DMZ dan Firewall pada layanan server. Testing terhadap keamanan dengan mencoba mengakses server yang berada pada area DMZ dan menggunakan tools hack jaringan menggunakan Nmap (Network Mapper) dan hasil testing jaringan komputer Lab Basis Data dapat melakukan filter sehingga lalulintas data server yang ada akan di pisah dari jaringan yang digunakan oleh dosen dan mahasiswa, sehingga server tidak terbebani.
APA, Harvard, Vancouver, ISO, and other styles
24

Wu, Hao, and Qing Yi Hua. "Research on Model-Based User Interface Automatic Generation in SaaS Environment." Advanced Materials Research 850-851 (December 2013): 728–32. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.728.

Full text
Abstract:
A model-based user interface automatic generation development method was presented to adapt for user interface development requirement under SaaS environment. This method deployed abstract interface model, transformation model, specific interface model and final interface in different abstract level at running time. So, the server-end could distribute the user interface to the client-end by one time a widow or page. By a case study, this method can satisfy the demands of user interface under SaaS environment, and it is so simple to study and use.
APA, Harvard, Vancouver, ISO, and other styles
25

Quijoux, Maxime, and Karel Yon. "Servir l’entreprise pour mieux défendre les salarié·es ?" Actes de la recherche en sciences sociales N° 252, no. 2 (June 10, 2024): 48–69. http://dx.doi.org/10.3917/arss.252.0048.

Full text
Abstract:
À partir d’une enquête menée au sein de l’entreprise Decathlon, acteur de la distribution d’articles de sport en France et dans le monde, cet article propose d’éclairer les contours d’un style spécifique de syndicalisme que nous appelons syndicalisme d’entreprise. Ce type de syndicalisme se configure au croisement des dispositifs institutionnels qui font la promotion du dialogue social d’entreprise et des dispositions légitimistes des salarié·es qui investissent les rôles de représentant·es du personnel. Comment le syndicalisme d’entreprise se développe-t-il ? Quelles valeurs défend-il et à quels usages se prête-t-il ? Implique-t-il l’absence de toute forme de conflictualité au travail ? Pour répondre à ces questions, l’enquête s’appuie sur un matériau (entretiens, observations, documents) accumulé dans le cadre d’un projet de recherche collectif portant sur les formes de citoyenneté au travail. Des entretiens menés avec une trentaine de responsables syndicaux et de représentant·es du personnel, affilié·es à divers syndicats (CFTC, UNSA, CFDT et CGT) ou sans étiquette, nous permettent en particulier de saisir certains ressorts, peu étudiés à ce jour, de ce phénomène : l’existence d’une allégeance salariale au projet d’entreprise.
APA, Harvard, Vancouver, ISO, and other styles
26

Jeong, Hwa Young, and Hae Gill Choi. "The Web Service Framework for SaaS in Cloud Computing Environment." Applied Mechanics and Materials 300-301 (February 2013): 664–67. http://dx.doi.org/10.4028/www.scientific.net/amm.300-301.664.

Full text
Abstract:
Software is also an integral part of other major ICT (information communication technology) equipment and devices, such as hardware, network, end-user communications equipment and carrier services. Recently software area has changing their using method from traditional ways to providing their process as a service. That is web service based SaaS in cloud computing. In this research, we consider the framework to process web service on SaaS, cloud computing environment. For this process, the framework has service search agent, service management mediator, UDDI server and web service inform.
APA, Harvard, Vancouver, ISO, and other styles
27

Thomas, Emmanuel, M. Oskar van Deventer, Thomas Stockhammer, Ali C. Begen, Mary-Luc Champel, and Ozgur Oyman. "Application of SAND Technology in DASH-Enabled Content Delivery Networks and Server Environments." SMPTE Motion Imaging Journal 127, no. 1 (January 2018): 48–54. http://dx.doi.org/10.5594/jmi.2017.2762528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nhlapo, Nthabiseng, Ryk J. F. Lues, Edmore Kativu, and Willem H. Groenewald. "Assessing the quality of food served under a South African school feeding scheme: A nutritional analysis." South African Journal of Science 111, no. 1/2 (2015): 1–9. http://dx.doi.org/10.17159/sajs.2015/20140044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nguyen, Hoang Hai, Dae-Yun Shin, Woo-Sung Jung, Tae-Yeol Kim, and Dae-Hyun Lee. "An Integrated IoT Sensor-Camera System toward Leveraging Edge Computing for Smart Greenhouse Mushroom Cultivation." Agriculture 14, no. 3 (March 18, 2024): 489. http://dx.doi.org/10.3390/agriculture14030489.

Full text
Abstract:
Industrial greenhouse mushroom cultivation is currently promising, due to the nutritious and commercial mushroom benefits and its convenience in adapting smart agriculture technologies. Traditional Device-Cloud protocol in smart agriculture wastes network resources when big data from Internet of Things (IoT) devices are directly transmitted to the cloud server without processing, delaying network connection and increasing costs. Edge computing has emerged to bridge these gaps by shifting partial data storage and computation capability from the cloud server to edge devices. However, selecting which tasks can be applied in edge computing depends on user-specific demands, suggesting the necessity to design a suitable Smart Agriculture Information System (SAIS) architecture for single-crop requirements. This study aims to design and implement a cost-saving multilayered SAIS architecture customized for smart greenhouse mushroom cultivation toward leveraging edge computing. A three-layer SAIS adopting the Device-Edge-Cloud protocol, which enables the integration of key environmental parameter data collected from the IoT sensor and RGB images collected from the camera, was tested in this research. Implementation of this designed SAIS architecture with typical examples of mushroom cultivation indicated that low-cost data pre-processing procedures including small-data storage, temporal resampling-based data reduction, and lightweight artificial intelligence (AI)-based data quality control (for anomalous environmental conditions detection) together with real-time AI model deployment (for mushroom detection) are compatible with edge computing. Integrating the Edge Layer as the center of the traditional protocol can significantly save network resources and operational costs by reducing unnecessary data sent from the device to the cloud, while keeping sufficient information.
APA, Harvard, Vancouver, ISO, and other styles
30

Shokeen, Vivek, and Lalit Malik. "Cloud Computing – Data Center – Access from Anywhere." International Journal of Computer Science and Mobile Computing 11, no. 6 (June 30, 2022): 212–19. http://dx.doi.org/10.47760/ijcsmc.2022.v11i06.015.

Full text
Abstract:
Now days we are attached with our electronic gadgets either offline or online in such a way as we breathe, as without breathing we can’t alive, same like these electronics have become a vital part of our daily life. As of now by growing demand of these gadgets either in office work, or in research work or in various technical fields. As the use of computers increases as in day in and day out, the relevant resources that we need also go up. For companies like Oracle, IBM and Microsoft, utilizing the resources and establishing a huge infrastructure or network is not a big issue for these big giants. But for the new startup and small enterprises But when it comes to smaller enterprises, expensiveness becomes a huge factor. At the user or developer end we are facing a lot of issues like hardware disruption, various bugs in software, network errors. So this was such a big hassle for the large community of computer science in all over the world. Cloud Computing offers a quick fix to this situation. This technology has been completely transformed the way in which computing is moved up from PCs and as well as for the single user to enterprise via various servers to a ‘cloud’ of computers e.g: web servers, application servers, database servers and so on. A cloud is a virtualized server grid which can provide the different computing resources through IAAS (Infrastructure as a service),PAAS(platform as a service),SAAS(Software as a service) of their clients. The underlying details of how it is implemented which is not direct to end user. The data and the services provided reside in extensively scalable data centers so anyone can use or access it from any part of the globe. Various big giants like Google, Microsoft, Yahoo, IBM and Amazon have started providing cloud computing services from the individual user either paid or free upto some extent or to other small enterprises, big businesses through various models like B2B,B2C,C2C etc. Amazon, salesforce is the trailblazer in the field of cloud computing. Every big and small enterprise, companies which are doing their businesses online using cloud services for the storing information so that later on they will extract some meaning full insights for the growth of businesses. Cloud Computing is finding use in various areas like web hosting, parallel batch processing, graphics rendering, financial modeling, web crawling, genomics analysis, etc.
APA, Harvard, Vancouver, ISO, and other styles
31

Kurniawan, Iwan. "SISTEM PENCEGAHAN SERANGAN BRUTEFORCE PADA UBUNTU SERVER DENGAN MENGGUNAKAN FAIL2BAN." INFOMATEK 18, no. 2 (September 28, 2017): 89. http://dx.doi.org/10.23969/infomatek.v18i2.496.

Full text
Abstract:
Perkembangan internet yang semakin cepat dengan berbagai macam fungsi dan kebutuhan, menuntut meningkatnya kualitas keamanan jaringan webserver. Terutama dengan semakin terbukanya pengetahuan hacking dan cracking, didukung dengan banyaknya tools yang tersedia dengan mudah dan kebanyakan free, semakin mempermudah para intruder dan attacker untuk melakukan aksi penyusupan ataupun serangan. Masalah timbul ketika sang administrator sedang tidak berada pada posisi siap sedia, misalnya sakit, berada di luar jam kerja, atau adanya kepentingan mendadak, sedangkan serangan terhadap server bisa terjadi kapan saja. Salah satu serangan yang berakibat fatal adalah, serangan bruteforce. Serangan bruteforce pada server memang jarang sekali terjadi, tetapi akibat yang ditimbulkan dari serangan ini adalah penyerang bisa mendapatkan hak akses administrator dan tentu saja membahayakan server. Administrator membutuhkan suatu sistem yang dapat membantu kerjanya. Sebuah sistem yang dapat memberikan hasil laporan apa yang terjadi pada sistem apakah itu sebuah serangan atau penyusupan. Dengan hasil laporan yang di dapat ,administrator akan bertindak lebih jauh untuk mencegah terjadinya serangan di masa yang akan datang.
APA, Harvard, Vancouver, ISO, and other styles
32

Bayazidy, Mansour, Mohammad Maleki, Aras Khosravi, Amir Mohammad Shadjou, Junye Wang, Rabee Rustum, and Reza Morovati. "Assessing Riverbank Change Caused by Sand Mining and Waste Disposal Using Web-Based Volunteered Geographic Information." Water 16, no. 5 (February 29, 2024): 734. http://dx.doi.org/10.3390/w16050734.

Full text
Abstract:
River water is one of the most important natural resources for economic development and environmental sustainability. However, river water systems are vulnerable in some of the densely populated regions across the globe. Intense sand mining and waste disposal can lead to river changes, loose foundations, and biodiversity loss. This study aims to develop a web-based geographic information system (GIS) platform to monitor river channel changes and their impacts on river environments due to sand mining and waste burial. The system integrates open-source software, Windows Server 2012, a web server, and PostgreSQL with PostGIS plugins for efficient mapping and storage of geospatial data and volunteered reporting of location events. Interferometric methods, including SNAP2STAMPS Automated Algorithm, persistent scatterer interferometry (PSI), small baseline subset (SBAS), and Snap software, were used to analyze spatial changes of subsidence from Sentinel-1 satellite data from 2021 to 2023 in the Gadar River in Oshnavieh, Iran. The results showed that the maximum subsidence at the riverbank was −10.1 cm due to sand mining, and the maximum uplift was 8.2 cm due to waste landfilling. The average subsidence was reported to be −5.1 cm. The results emphasize spatial analysis, showcasing material mining’s impact on subsidence trends and underscoring the significance of public participation in monitoring river health. Three parameters—completeness, correctness, and quality—were used to validate the system. Validation results showed completeness, correctness, and quality rates of 94.15%, 92.48%, and 86.63%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
33

Thérien, Gilles. "Les limbes du scénario." Cinémas 9, no. 2-3 (October 26, 2007): 103–21. http://dx.doi.org/10.7202/024789ar.

Full text
Abstract:
RÉSUMÉ Parler de scénario fictif, c'est évoquer un texte au statut « trouble ». S'il existe seul, sans sa source, s'il est sa propre source, ou encore s'il ne s'est jamais réalisé dans un film, il demeure un texte qu'on ne sait comment lire. C'est un texte de nature transitive et, pour décider de sa valeur, il faut évaluer comment s'opère le passage entre la source, événement ou fiction, et sa réalisation, un film. C'est le cas qui est développé dans cet article. Comment passer de la lecture à la « spectature »? Comment respecter les deux médias impliqués sans avoir à inventer une position neutre où tout pourrait se retrouver, s'étudier? La question est d'autant plus difficile que le transit s'opère à partir du domaine privé de la lecture vers le domaine public de la « spectature ». Les Fous de Bassan, roman d'Anne Hébert et le film d'Yves Simoneau qui porte le même titre servent d'exemples.
APA, Harvard, Vancouver, ISO, and other styles
34

Bourgeois-Guérin, Élise, Joséphine Aldebert, and Cécile Rousseau. "L’art et la violence : quels frayages ? Réflexions inspirées d’un projet pilote en prévention de la radicalisation violente chez les jeunes." Sciences & Actions Sociales N° 18, no. 2 (May 5, 2022): 87–102. http://dx.doi.org/10.3917/sas.018.0011.

Full text
Abstract:
La montée de diverses formes de radicalisation violente interpelle à la fois les champs politique et psychosocial. Différents programmes de prévention voient le jour, lesquels s’inspirent notamment des facteurs de risque et de protection face à la radicalisation violente que la littérature sur le sujet identifie. Cet article se penche sur ces facteurs pour ensuite interroger l’éventuelle pertinence d’approches centrées sur l’art dans la prévention de la radicalisation violente. Pour ce faire, les questions soulevées par un projet pilote mené auprès de jeunes attirés par la radicalisation violente et misant sur leur engagement dans des activités artistiques servent d’amorce à la réflexion. Celle-ci mettra en lumière certains enjeux entourant le recours à l’art comme voie d’expression alternative à la violence, en s’attardant notamment aux conditions dans lesquelles ce recours peut être signifiant.
APA, Harvard, Vancouver, ISO, and other styles
35

Ekvad, Martin. "A short introduction to plant variety protection in the European union and the role of the community plant variety office." Pin Code N° 9, no. 3 (July 28, 2021): 8–12. http://dx.doi.org/10.3917/pinc.009.0008.

Full text
Abstract:
Le certificat d’obtention végétale (COV) est un titre de protection de la propriété intellectuelle qui est peu visible et qui a tendance à être méconnu du grand public. Cependant, pour les producteurs et sélectionneurs de plantes, ces titres de protection sont très importants car ils servent à sécuriser les retours sur investissements dans l’innovation végétale. Le but de cet article est d’offrir au lecteur qui n’est pas familiarisé avec le système de protection des obtentions végétales un premier aperçu, sans entrer dans le dédale juridique qui caractérise souvent le droit de la propriété intellectuelle.
APA, Harvard, Vancouver, ISO, and other styles
36

Huda, Yasdinul, Muhammad Adri, and Yoharmen Arnov. "PERANCANGAN APLIKASI CLIENT UNTUK JARINGAN VOIP (VOICE OVER INTERNET PROTOCOL) BERBASIS ANDROID." Jurnal Teknologi Informasi dan Pendidikan 11, no. 1 (April 30, 2018): 81–93. http://dx.doi.org/10.24036/tip.v11i1.99.

Full text
Abstract:
Komunikasi adalah suatu keharusan dalam operasi suatu agen atau perusahaan. Komunikasi murah menggunakan VOIP akan menyediakan biaya agensi atau perusahaan. Dalam komunikasi diperlukan suatu sistem jaringan yang handal dengan konsep client untuk pengguna suatu sistem dan server sebagai pengelola jaringan yang digunakan oleh klien. VOIP memerlukan server menggunakan PC dengan Ubuntu Linux 12.04 LTE atau Linphone sebagai server VOIP (Voice Over Internet Protocol) dan tanda bintang untuk mengatur lalu lintas suara. perangkat lunak android di sisi klien untuk menjadi antarmuka dalam berkomunikasi dengan klien lain yang dirancang menggunakan Android Studio dengan smartphone android setidaknya 4.4.2 (kitkat). Dan membutuhkan koneksi internet melalui WIFI_UNP sebagai media transmisi (tautan) antara server dan klien. WIFI_UNP adalah media internet yang digunakan oleh mahasiswa, dosen, staf dan karyawan Universitas Negeri Padang untuk mendukung proses pembelajaran dan menambah wawasan tentang teknologi atau sains terbaru. Sedangkan tethering hotspot adalah media internet yang berasal dari koneksi internet dari Smartphone yang dibagikan atau didistribusikan ke pengguna lain untuk internet. Aplikasi VOIP Client ini menyediakan dua fungsi utama: Memanggil dan Mengobrol. On Calling akan diberikan izin untuk melakukan panggilan suara dengan memasukkan nama pengguna klien untuk dihubungi atau nomor VOIP yang telah didaftarkan. Sedangkan Obrolan adalah fitur untuk melakukan obrolan teks secara realtime (sesuai waktu yang sebenarnya)
APA, Harvard, Vancouver, ISO, and other styles
37

Ginanjar, Herdiansyah Pratama, and Angga Setiyadi. "PENERAPAN TEKNOLOGI CLOUD COMPUTING PADA KATALOG PRODUK DI BALATKOP JAWA BARAT." Komputa : Jurnal Ilmiah Komputer dan Informatika 9, no. 1 (March 23, 2020): 25–33. http://dx.doi.org/10.34010/komputa.v9i1.3722.

Full text
Abstract:
Balai Pelatihan Tenaga Koperasi dan Usaha Mikro, Kecil dan Menengah (BALATKOP) adalah salah satu Unit Pelaksana Teknis Daerah (UPTD) yang berperan sebagai klinik bisnis dalam menyelesaikan permasalahan Koperasi dan UMKM. Sebagai contoh BALATKOP yang berada di bawah naungan Dinas Koperasi dan UMKM. Pihak BALATKOP menyatakan tidak adanya suatu sistem teknologi informasi komunikasi yang mendukung pelaksanaan kegiatan pelatihan marketing online seperti website katalog produk. Berdasarkan permasalahan yang ada saat ini di BALATKOP, maka dibutuhkan sebuah sistem Cloud Computing E-katalog sebagai layanan pendukungnya. Pembangunan sistem Cloud Computing E-katalog dimulai dengan melakukan analisis sistem yang berjalan di BALATKOP, dilanjutkan dengan melakukan analisis pada arsitektur sistem Cloud Computing E-katalog yang akan dibangun dengan menggunakan tiga model layanan yaitu Software as a Service (Saas), Platform as a Service (PaaS) dan Infrastructure as a Service (IaaS). kemudian melakukan analisis pada alur perancangan teknologi Cloud Computing dan melakukan perancangan basis data (database) hingga perancangan antarmuka. Setelah tahapan anlisis dan desain selesai dilakukan maka tahapan selanjutnya adalah implementasi alur perancangan dari Cloud Computing sebagai sumber daya hardware, network dan storage pada Virtual Private Server (VPS). Kata kunci : Cloud Computing, Software as a Service (Saas), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Virtual Private Server (VPS).
APA, Harvard, Vancouver, ISO, and other styles
38

Andi, Hari Krishnan. "Analysis of Serverless Computing Techniques in Cloud Software Framework." September 2021 3, no. 3 (August 20, 2021): 221–34. http://dx.doi.org/10.36548/jismac.2021.3.004.

Full text
Abstract:
This paper describes briefly about the concept of serverless cloud computing model, its usage in IT industries and its benefits. In the traditional model the developer is responsible for resource allocation, managing servers and owning of servers, and it included three models based upon the service such as IaaS, PaaS and SaaS. In IaaS (Infrastructure as a Service) the content storage and accessing of network is carried out by the cloud provider, SaaS (Software as a Service) here different software’s are provided to the user as a service, PaaS (Platform as a Service), the developer gets access to certain services for carrying out organizing process and run it accordingly. In serverless cloud computing, the developer need not worry about owning, management, and maintenance of servers as it is carried out by the cloud service provider. Hence by using this model, the time that is needed for a system to reach the market is very much reduced and is cost effective. Serverless architecture includes three categories namely, AWS Lambda, Azure, and Google cloud. It also includes certain challenges such as it cannot be used in the case where a process takes longer time to run and it is discussed below in this paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Koskinen, Kaisa. "(Mis)Translating the Untranslatable." Meta 39, no. 3 (September 30, 2002): 446–52. http://dx.doi.org/10.7202/003344ar.

Full text
Abstract:
Résumé Bien que le déconstructionnisme déclare la traduction impossible à réaliser, il peut être utile aux études traductologiques. Par exemple, il servira d'outil pour résoudre certaines oppositions classiques entre traduction mot à mot et traduction libre, texte original et texte traduit. Sans prétendre vouloir bâtir une nouvelle théorie de la traduction à partir du déconstructionnisme, l'auteur démontre que certains faits qui paraissent évidents et préordonnés dans les théories ne le sont pas nécessairement, qu'ils sont basés sur des jugements de valeur et des idéologies dominantes et qu'il est important d'être conscient des présupposés qui servent de point d'appui aux théories.
APA, Harvard, Vancouver, ISO, and other styles
40

Decreuse, Bruno. "Dépendance temporelle, hétérogénéité et coûts de licenciement." Articles 77, no. 2 (February 5, 2009): 191–206. http://dx.doi.org/10.7202/602349ar.

Full text
Abstract:
RÉSUMÉ Ce travail propose un mécanisme nouveau permettant d’expliquer la présence de dépendance temporelle dans les risques individuels de sortie du chômage. Lorsque les chômeurs sont ex ante hétérogènes et que leur compétence est imparfaitement observable, le licenciement des moins doués est un phénomène endogène qu’ils s’efforcent de masquer. La durée de chômage véhicule alors une information sur la qualité du travailleur considéré, dont les firmes se servent pour jauger de son employabilité. Une baisse des coûts de licenciement peut faire basculer l’économie d’un équilibre avec chômage, mais sans exclusion, à une économie caractérisée par l’exclusion des chômeurs de longue durée.
APA, Harvard, Vancouver, ISO, and other styles
41

bhatta, Mr Goutam, and Dr Manish pandey. "A CASE STUDY ON HYBRID CLOUD APPROACH TO AUTOMATE THE CLOUD SERVICES BASED ON DECISION SUPPORT SYSTEM." GENESIS 8, no. 3 (September 10, 2021): 49–64. http://dx.doi.org/10.47211/tg.2021.v08i03.010.

Full text
Abstract:
In general word, cloud computing is accessing and storing applications or data over the Internet rather than on computer’s hard disk. Cloud computing is a term that refers to the usage of shared computing resources as an alternative to having programmes run on local servers. This paper explained the comparative study of various cloud services techniques i.e., PaaS, IaaS, and SaaS. Cloud computing combines many computing services and servers to provide their total capacity accessible on an on-demand, pay-per-cycle basis. Cloud computing, like many other technology services, has provided several advantages.
APA, Harvard, Vancouver, ISO, and other styles
42

Paneru, Dinesh Raj, Madhu B. R., and Santosh Naik. "A SURVEY FOR ENERGY EFFICIENCY IN CLOUD DATA CENTERS." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 63–68. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3353.

Full text
Abstract:
Services such as Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS) are provided by Cloud Computing. Subscription based computing resources and storage is offered in cloud. Cloud Computing is boosted by Virtualization technology. To move running applications or VMs starting with one physical machine then onto the next, while the customer is associated is named as Live VM migration. VM migration is empowered by means of Virtualization innovation to adjust stack in the server farms. Movement is done fundamentally to deal with the assets progressively. Server Consolidation’s main goal is to expel the issue of server sprawl. It tries to pack VMs from daintily stacked host on to fewer machines to satisfy assets needs. On other hand Load balancing helps in distributing workloads across multiple computing resources. Also in the presence of low loaded machines it avoids machines from getting overloaded and maintains efficiency. To balance the load across the systems in various cases, live migration technique is used with the application of various algorithms. The movement of virtual machines from completely stacked physical machines to low stacked physical machines is the instrument to adjust the entire framework stack. When we are worried about the energy consumption in Cloud Computing, VM consolidation & Server Consolidation comes into scenario in Virtual Machine movement method which itself implies that there is low energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
43

Sutanto, Agus. "Cloud Manufacturing: Tinjauan Literatur dan Pengembangan Layanannya untuk Perencanaan Fasilitas Produksi." Jurnal Optimasi Sistem Industri 13, no. 2 (April 21, 2016): 725. http://dx.doi.org/10.25077/josi.v13.n2.p725-742.2014.

Full text
Abstract:
Cloud Manufacturing is an advanced manufacturing model which provides services by utilizing a shared resource pool such as computers, servers, networking, Internet and application softwares. The term Cloud Manufacturing in the engineering literature is still fairly new. it comes from the term Cloud Computing which is earlier known as Internet services on demand. Here includes Software as a Service (SaaS) along with infrastructure, platform and other delieveries as a service. First introduced by F. Tao in 2011, Cloud Manufacturing combines the latest technologies such as cloud computing, internet of thing, manufacturing object virtualizations and service-oriented computing services. The advanced manufacturing service models related to this terminology will be described as literatur reviews in this paper. At the end of this paper was given a case study of the application of the Cloud Manufacturing for designing a web-based production facilities layout as a cloud software as a service for the users.Keywords: Cloud Manufacturing, layout, production facilities, web-basedAbstrakCloud Manufacturing dapat dikatakan sebagai sebuah model manufaktur yang berorientasikan pada penyediaan jasa dengan memanfaatkan sebuah resource pool yang dipakai secara bersama seperti komputer, server, jejaringan, internet dan perangkat lunak aplikasi. Istilah Cloud Manufacturing berasal dari istilah Cloud Computing yang lebih dahulu terkenal, sebagai suatu layanan perangkat lunak bagi pengguna (Software as a Service/ SaaS) dan perangkat keras yang memungkinkan penyediaan layanan tersebut. Istilah Cloud Manufacturing dalam berbagai literatur keteknikan terbilang masih baru. Pertama dicetuskan oleh F. Tao di tahun 2011, cloud manufacturing mengkombinasikan berbagai teknologi terkini seperti cloud computing, internet of thing, virtualisasi obyek manufaktur dan teknologi komputasi berorientasi pada pelayanan jasa. Perjalanan model manufaktur ini hingga literatur terakhir yang terkait akan dijelaskan pada tulisan ini. Pada bagian akhir dari tulisan ini diberikan sebuah gambaran studi kasus penerapan Cloud Manufacturing pada layanan untuk perencanaan fasilitas produksi berbasis Web, terutama untuk rancangan tataletak produksi, sebagai suatu layanan cloud perangkat lunak bagi pengguna.Kata kunci: Cloud Manufacturing, tataletak, fasilitas produksi, berbasis Web
APA, Harvard, Vancouver, ISO, and other styles
44

Imam, Mohamed Osman, Adil Yousif, and Mohammed Bakri Bashir. "A Proposed Software as a Service (SaaS) Toolkit for Cloud Multi- Tenancy." Computer Engineering and Applications Journal 5, no. 2 (June 22, 2016): 37–46. http://dx.doi.org/10.18495/comengapp.v5i2.170.

Full text
Abstract:
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. It is a construct that allows you to access applications that actually reside at locations other than your computer or other Internet-connected devices. Software as a Service (SaaS) is a software delivery model in which software resources are accessed remotely by users over the internet. Enterprises prefer using SaaS because of its low cost. SaaS requires sharing of application servers among multiple tenants for low operational costs. Several SaaS Toolkits are available and used to develop cloud SaaS applications. However, most of these Toolkits are very complex. This paper aims to build a new simple and easy SaaS Toolkit to develop SaaS applications and to avoid the difficulties and complexity in the current cloud SaaS Toolkits. The proposed Toolkit is based on java virtual machine and the popular web programming languages HTML and PHP. To evaluate the proposed Toolkit an empirical study has been conducted. The result of the empirical study revealed that the proposed Toolkit outperforms the current Toolkits in terms of complexity, understandability and learnability.
APA, Harvard, Vancouver, ISO, and other styles
45

Mishra, Satyendra Kumar. "Variant.ai." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 24, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31573.

Full text
Abstract:
This research paper presents a novel approach to developing a Software as a Service (SaaS) AI platform aimed at revolutionizing user interactions through dynamic conversations facilitated by an advanced AI conversation model. The platform prioritizes user-centric design, leveraging cutting-edge technologies to ensure a seamless and visually engaging experience. Key features include an emphasis on visual excellence through meticulous UI design and animations, as well as robust data integrity measures implemented for secure user data management. The platform also emphasizes operational resilience, with effective server error handling mechanisms in place to enhance user experience. Additionally, the integration of a Conversation Generation Tool, powered by advanced AI models, further enhances user engagement by enabling interactive and dynamic conversations. This research contributes to the advancement of SaaS platforms by demonstrating innovative approaches to user-centric design and AI integration. Key Words: Software as a Service (SaaS), Dynamic conversations, Advanced AI models, Conversation Generation Tool
APA, Harvard, Vancouver, ISO, and other styles
46

Amrullah, Agit, Agung Nugroho, and Zekriansyah Ramadhan. "PERBANDINGAN KINERJA WEB SERVER PADA PENYEDIA LAYANAN CLOUD MICROSOFT AZURE DAN AMAZON WEB SERVICES." Jurnal Informatika Teknologi dan Sains 5, no. 1 (February 8, 2023): 92–97. http://dx.doi.org/10.51401/jinteks.v5i1.2487.

Full text
Abstract:
Webserver adalah hal yang sangat penting sebagai layanan yang dibutuhkan agar klien dapat mengakses WWW (World Wide Web) menggunakan web browser mereka. Apache dan nginx adalah software web server yang paling banyak dipakai didunia, selain karena integrasinya yang mudah ke berbagai panel web seperti Cpanel, kedua software ini memiliki kestabilan yang mempuni dalam menanangani permintaan klien. Microsoft Azure dan Amazon Web Services sebagai salah satu penyedia layanan Cloud Computing Software As Service (SaaS) dan Platform As Service (PaaS), memiliki performa yang berbeda untuk implementasi pada web server. Penelitian ini bertujuan dalam melakukan analisa kinerja webserver apache dan nginx pada platform Microsoft Azure dan Amazon Web Services (AWS). Dari analisa yang dilakukan bahwasanya webserver Apache lebih unggul dengan margin persentase rata-rata sebesar 7% diplatform Microsoft Azure dan Nginx lebih unggul di platform Microsoft Azure dengan margin persentase sebesar 8,21%.
APA, Harvard, Vancouver, ISO, and other styles
47

Harsono, Harsono. "FAKTOR-FAKTOR YANG MEMPENGARUHI SISTEM INFORMASI BERBASIS KOMPUTER: SISTEM OPERASI, SERVER, DAN PROGRAMMER (LITERATURE REVIEW EXECUTIVE SUPPORT SISTEM FOR BUSINESS)." JURNAL MANAJEMEN PENDIDIKAN DAN ILMU SOSIAL 3, no. 2 (July 9, 2022): 583–93. http://dx.doi.org/10.38035/jmpis.v3i2.1121.

Full text
Abstract:
Penulisan bermaksud untuk mengetahui faktor yang mempengaruhi SIM pada suatu perusahaan atau instansi. Suatu lembaga yang didukung penuh Sistem informasi menejemen yang kuat akan menghasilkan produk yang memuaskan karena SIM merupakan sistem perencanaan bagian dari pengendalian internal suatu bisnis yang meliputi pemanfaatan manusia, dokumen, teknologi, dan prosedur oleh akuntansi manajemen untuk memecahkan masalah dengan segala aspek kompleksitasnya. SIM juga harus di dukung oleh Sistem operasi dan server yang tangguh pula karena perangkat lunak sistem yang mengatur sumber daya dari perangkat keras dikendalkan oleh sistem operasi, demikian pula sang pengguna tidak dapat menjalankan program aplikasi pada komputer mereka, kecuali program booting.sementara server adalah atau dalam bahasa Indonesia biasa disebut peladen merupakan suatu sistem komputer yang memiliki layanan khusus berupa penyimpanan data. Data yang disimpan melalui server berupa informasi dan beragam jenis dokumen yang kompleks. Sedang programer Layanan tersebut ditujukan khusus untuk client yang berkebutuhan dalam menyediakan informasi untuk pengguna atau pengunjungnya. Programer adalah proses menulis, menguji dan memperbaiki, dan memelihara kode yang membangun suatu program komputer. Kode ini ditulis dalam berbagai bahasa pemrograman.Alhasil dengan faktor faktor yang mempengaruhi SIM tersebut bisa di simpulkan bhwa sim merupakan sistem informasi yang memegang kunci keberhasilan produk baik barang maupun jasa.
APA, Harvard, Vancouver, ISO, and other styles
48

Tunggadewi, Desty Anggita. "Efektifitas Proses Pembelajaran Daring Mahasiswa Fakultas Teknik dan Sains Universitas Nasional Jakarta Selama Pandemi Covid-19." Jurnal Literasi Digital 1, no. 1 (March 31, 2021): 56–63. http://dx.doi.org/10.54065/jld.1.1.2021.11.

Full text
Abstract:
Tujuan dari penelitian ini adalah mengetahui efektifitas perkuliahan daring selama pandemi Covid-19 pada mahasiswa Fakultas Teknik dan Sains Universitas Nasional. Metode yang digunakan dalam penelitian ini adalah kualitatif yaitu menghasilkan dan mengolah data yang sifatnya deskriptif (bukan angka). Sementara alat pengumpulan data menggunakan panduan wawancara terstruktur. Dalam wawancara terstruktur, daftar pertanyaan yang akan diajukan kepada responden sudah dipersiapkan dengan baik guna mendapatkan informasi tentang efektifitas perkuliahan daring selama pandemi Covid-19 pada mahasiswa fakultas teknik dan sains Universitas Nasional. Dalam penelitian ini, terdapat delapan responden yang merupakan mahasiswa fakultas teknik dan sains Universitas Nasional. Hasil wawancara diperoleh informasi bahwa perkuliahan daring yang berlangsung selama pandemi Covid-19 kurang efektif dan memiliki beberapa kendala yaitu web kuliah sudah cukup baik namun ada beberapa hal yang harus diperbaiki yaitu meningkatkan kualitas server web kuliah. Web kuliah kurang efektif untuk mata kuliah praktikum. Mahasiswa tidak cukup paham jika dosen hanya memberikan materi kuliah dalam bentuk power point saja tanpa memberikan penjelasan secara detail. Terlebih untuk Fakultas Teknik dan Sains yang memiliki mata kuliah eksak. Media pembelajaran yang digunakan selama perkuliahan daring adalah powerpoint, youtube dan video conference.
APA, Harvard, Vancouver, ISO, and other styles
49

Moser, Walter. "Transmettre et communiquer. Chassés-croisés conceptuels à partir de Régis Debray." Transmettre, no. 5 (August 10, 2011): 191–206. http://dx.doi.org/10.7202/1005499ar.

Full text
Abstract:
Dans son récent texte intitulé « Communiquer moins, transmettre plus », le médiologue Régis Debray oppose les actes de transmettre et de communiquer. Selon lui, l’hégémonie du communiquer ferait de nous des nomades doués d’une ubiquité médiatique, mais sans mémoire ni histoire. Pour y remédier, nous devrions renforcer la transmission. Notre exploration conceptuelle de « transmettre » montre que cette dichotomie est intenable. Il appert en particulier que les médias, moyens de communication, servent aussi à la transmission et, loin de n’être que des opérateurs de la discontinuité et d’une présentéité superficielle, ils comportent leur propre continuité historique et, dans l’acte de remédiation, se donnent leur propre profondeur temporelle.
APA, Harvard, Vancouver, ISO, and other styles
50

González Fasani, Ana Mónica. "Llamados a servir: los hospitalarios de San Juan de Dios en Zacatecas, México en el siglo XVII." Hispania Sacra 59, no. 120 (November 5, 2007): 537–62. http://dx.doi.org/10.3989/hs.2007.v59.i120.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography