Literatura académica sobre el tema "End-to-end services"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "End-to-end services".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "End-to-end services"

1

Immaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes". International Journal of Science and Research (IJSR) 11, n.º 10 (27 de octubre de 2022): 1459–67. https://doi.org/10.21275/sr221013093711.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Aldington, D. J., H. J. McQuay y R. A. Moore. "End-to-end military pain management". Philosophical Transactions of the Royal Society B: Biological Sciences 366, n.º 1562 (27 de enero de 2011): 268–75. http://dx.doi.org/10.1098/rstb.2010.0214.

Texto completo
Resumen
The last three years have seen significant changes in the Defence Medical Services approach to trauma pain management. This article seeks to outline these changes that have occurred at every level of the casualty's journey along the chain of evacuation, from the point of injury to rehabilitation and either continued employment in the Services or to medical discharge. Particular attention is paid to the evidence for the interventions used for both acute pain and chronic pain management. Also highlighted are possible differences in pain management techniques between civilian and military casualties.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

GUPTA, APARNA y LINGYI ZHANG. "PRICING FOR END-TO-END ASSURED BANDWIDTH SERVICES". International Journal of Information Technology & Decision Making 07, n.º 02 (junio de 2008): 361–89. http://dx.doi.org/10.1142/s021962200800296x.

Texto completo
Resumen
The Internet today mostly offers a simple best-effort mode of service. The capabilities of the Internet will be significantly enhanced if it supports better QoS modes, especially when QoS is provided for end-to-end services. This enhancement requires both technological development and economic mechanisms to support better QoS service modes. In this article, we study a Multi-ISP Overlay Provider's (MOP's) pricing problem for delivering end-to-end services with expected bandwidth assurance. A categorization based pricing scheme is developed, where end-to-end bandwidth services are classified based on the provider's efforts in delivering the services. A nonlinear pricing based model is constructed that interacts with network management infrastructure, responds to customer demand and captures the MOP's contractual relationships with Internet Service Provider (ISP) networks used for creating the MOP's services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Gaikwad, Ms Sayali y Dr R. R. Dube. "Enhancing Email Security - End to End Encryption". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 1026–28. http://dx.doi.org/10.22214/ijraset.2024.59921.

Texto completo
Resumen
Abstract: Nowadays, most of people and organizations use the e-mail for different needs to exchange information between users. E-mail application is an important network application. It is significant when business1, health and educational communities use it for exchange of critical information such as business information, health patient record and so on. over the Internet or internal networks, It allows data and messages to be transferred easily between senders and receivers allowing messages to be received, responded to, stored, forwarded and broadcast among recipients. These extensive capabilities have caused the email to be widely adopted as the official communications method for many organizations. Also common for personal use, electronic mail is available through a diverse number of compatible software clients, and also via web-browser. An existing enterprise email implementation second service model adds security processing. The service provider is responsible for monitoring all threats using email as a channel , and for providing an email user interface (UI) In the enterprise augmentation model, an existing on-premise email deployment is augmented by additional cloud-based services and functionalist. This paper explores identity federation and data loss prevention and describing best practices for evaluating, developing, installing and using cloud-based email security services.1.1Intended Audience Email security services are viewed from two perspectives: the providers of these services and the consumers or purchasers of email security services. key service features is needed for both sides to be aware of and plan for and how these features are used to tackle threats to email security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Calvert, Kenneth L., James Griffioen y Su Wen. "Lightweight network support for scalable end-to-end services". ACM SIGCOMM Computer Communication Review 32, n.º 4 (octubre de 2002): 265–78. http://dx.doi.org/10.1145/964725.633051.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Asthana, Abhaya, Eric J. Bauer, Meenakshi Sharma y Xuemei Zhang. "End-to-end availability considerations for services over IMS". Bell Labs Technical Journal 11, n.º 3 (8 de noviembre de 2006): 199–210. http://dx.doi.org/10.1002/bltj.20189.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Cancela, Héctor, Pablo Rodríguez-Bocca y Bruno Tuffin. "End-to-end availability-dependent pricing of network services". Annals of Operations Research 157, n.º 1 (13 de septiembre de 2007): 61–71. http://dx.doi.org/10.1007/s10479-007-0254-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Abdullah, Wisam Dawood, Ali Abdullah Ali y Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study". Webology 19, n.º 1 (20 de enero de 2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.

Texto completo
Resumen
Network Traffic Monitoring and Analysis (NTMA) is the main element to network management, especially to correctly operate large-scale networks such as the Internet on which modern academic organizations heavily depend. Their traffic use increases significantly because students, staff members, and research labs use them to search information. It is necessary to analyze, measure, and classify this Internet traffic according to the need of different stakeholders such as Internet Service Providers and network administrators. Moreover, bandwidth congestions frequently occur, causing user dissatisfaction. This study tries to find different characterizations such as data over hosts, countries, cities, companies, top-level domains, and servers. In addition, this is a new study to find out different patterns and levels of analysis from the device to its international requests. Our findings show that the highest traffic use is on Mondays and Wednesdays. Web server and DNS server drop in response to fault tolerance. Social networks consume most of the bandwidth, such as 42% Facebook followed by 22% WhatsApp in peak hours. The second most accessed sites are search engines. Google is the most used one. About 59% of the host cities are outside Iraq, in particular USA and the UK. In Amara and Baghdad cities, the requested sites are 51% and 49% overseas. About 40% of the traffic is provided by EarthLink Ltd. Communication Internet services (Iraq), 14% EdgeCast. 12% level3, 9% Facebook, 7% Google, Akamai-as and Microsoft-corp-msn-as-block. This study gives guidelines for network administrators to improve their performance and bandwidth at the educational networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Chengzhi Li y E. W. Knightly. "Coordinated multihop scheduling: a framework for end-to-end services". IEEE/ACM Transactions on Networking 10, n.º 6 (diciembre de 2002): 776–89. http://dx.doi.org/10.1109/tnet.2002.805024.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Fortuna, C. y M. Mohorcic. "Dynamic composition of services for end-to-end information transport". IEEE Wireless Communications 16, n.º 4 (agosto de 2009): 56–62. http://dx.doi.org/10.1109/mwc.2009.5281256.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "End-to-end services"

1

Holmström, Maria. "End-to-end monitoring of mobile services". Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.

Texto completo
Resumen

The growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests.

This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process.

The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services.

The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.

Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Soudais, Guillaume. "End-to-End Service Guarantee for High-Speed Optical Networks". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT027.

Texto completo
Resumen
Poussée par un besoin croissant de bande passante et de performance, le réseau informatique s’est développé de telle sorte que les réseaux OT et de télécommunications cherchent à exploiter cette infrastructure pour leur expansion. Ces trois secteurs ont historiquement été séparés en raison de différentes exigences entre autres en matière de latence, de sa variation et de fiabilité. Pour répondre aux besoins des applications temps critiques, le groupe de travail Time Sensitive Network a développé de nouveaux ensembles de protocoles qui commencent à être mis en œuvre dans des produits commerciaux. D’autres groupes ont proposé des architectures novatrices avec contrôle du temps pour permettre des performances garanties, entre et à l’intérieur des centres de données périphériques. Dans ma thèse, je propose une solution pour transporter les applications temps critiques dans les réseaux existants, car elle ne nécessite pas de changer toute l’architecture. Je montre les avantages de sa mise en œuvre dans les réseaux TSN pour une solution pérenne avec une utilisation améliorée des ressources. Pour transporter le trafic temps critique dans les réseaux existants, je propose de créer un chemin en isolant et en planifiant le trafic temps critique sur un canal avec une latence garantie. Avec cette construction, je développe un algorithme pour effectuer une compensation de la variation de latence, permettant une transmission à la latence constante pour le trafic temps critique. Dans un second temps, je propose une méthode de synchronisation et mets en œuvre un réseau de mesure principalement utilise ici pour la mesure de la latence, m’aidant à obtenir des informations sur la distribution de la latence que mon protocole créé. Enfin, avec un algorithme de compensation de variation de latence amélioré, je démontre de meilleures performances en matière de gigue et étudie le temps de mise en service de notre protocole, permettant l’utilisation des ressources uniquement lorsque le trafic temps critique est présent. Dans ma thèse, je démontre, avec une implémentation FPGA, la réduction de la variation de latence, permettant aux applications des réseaux OT et de télécommunications de fonctionner sur les réseaux existants et augmentés par des normes TSN
Driven by an ever-growing bandwidth and performance need, the IT network has grown such that OT and telecommunications networks are looking to exploit this infrastructure for their expansion. These three sectors have historically been separated due to different requirements, on latency, its variation and on reliability. To answer to time critical application needs, the Time Sensitive Network taskforce has developed new sets of protocols that are starting to be implemented in commercial products. Other groups have proposed novel architecture with time control to enable guaranteed performances between and inside edge datacenters. In my PhD I propose a solution to carry time critical application in legacy networks as it does not require to change the whole architecture. I show the benefits of its implementation in TSN networks for a future-proof solution with improved resource usage. To carry time critical traffic in legacy I propose to create a path by isolating and scheduling time critical traffic on a channel with guaranteed latency. With this construction, I build an algorithm to perform latency variation compensation enabling a constant latency transmission for time critical traffic. In a second time, propose a synchronization scheme and implemented a monitoring network primarily used here for latency monitoring, helping me gain insights on the distribution of latency that my protocol creates. Lastly, with an improved latency compensation algorithm, I demonstrate better jitter performances and study the turn-up time for our protocol enabling resource usage only when time-critical traffic is present. In my PhD I demonstrate, with an FPGA implementation and commercial product, latency variation reduction enabling OT and telecommunications network applications to run on legacy and TSN augmented network
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kyusakov, Rumen. "Efficient Web Services for End-To-End Interoperability of Embedded Systems". Doctoral thesis, Luleå tekniska universitet, EISLAB, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-18129.

Texto completo
Resumen
As the number of Internet-connected devices rapidly grows, it has become ever more challenging to develop and maintain purpose-made tightly integrated distributed embedded systems. Instead, the Internet of Things (IoT) approach, based on standardized interfaces and open communication protocols, enables support for various applications with the possibility of extension to provide additional services that were not necessarily available at the initial deployment.This thesis presents methods and tools for the development of standard-based Web services for the Internet of Things. Some of the key challenges in using Web services on resource-constrained devices are due to the overhead of the communication protocols, which leads to the need for greater network bandwidth, processing power, and memory usage. A common solution to these problems is to use gateways that translate between the protocols used on one end of the connection (i.e. low-capability devices) and those on the other end (i.e. powerful Web servers). However, this increases the overall complexity of the system. The work presented herein answers the following research questions: 1) Is it feasible to deploy standard Web services on IoT systems without using application layer gateways? 2) What are the trade-offs in using Web services for end-to-end interoperability of resource-constrained embedded systems? 3) What levels of efficiency and functionality can be achieved using binary coding schemes for XML data exchange?The research questions are tested by building and evaluating several prototype IoT systems. These evaluations show that the use of Web services requires more powerful hardware (i.e. CPU and RAM) and a larger form factor in exchange for better interoperability compared to the use of ad hoc application protocols. The main challenge in employing embedded Web services is the large size of the messages, which is due to the use of verbose data formats such as XML. Although it is shown that it is possible to deploy XML-based Web services on low-capability devices without application layer gateways, this approach has severe performance limitations. Using the Efficient XML Interchange (EXI) binary coding scheme overcomes some of these limitations by substantially reducing the size of the XML messages. The main outcome of this thesis is the design and implementation of a software toolkit, called EXIP, for building EXI-based embedded Web services.The trade-offs in the use of embedded Web services are likely to change in the near future as the importance of application layer interoperability increases and IoT devices become faster, more energy efficient, and equipped with more memory. The dominating importance of interoperability can be seen in highly heterogeneous systems such as energy management systems (i.e. smart grids), where embedded Web services are already in use today. With this in mind, future research directions and extensions of this work include the development of performance optimization strategies for the EXIP toolkit to foster the expansion of embedded Web services to an even wider range of IoT applications.
Godkänd; 2014; 20140909 (rumkyu); Nedanstående person kommer att disputera för avläggande av teknologie doktorsexamen. Namn: Rumen Kyusakov Ämne: Industriell elektronik/Industrial Electronics Avhandling: Efficient Web Services for End-To-End Interoperability of Embedded Systems Opponent: Dr Frank Golatowski, Institute of Applied Microelements and CE, University of Rostock, Rostock-Warnemüende, Germany Ordförande: Biträdande professor Jens Eliasson, EISLAB, Institutionen för system- och rymdteknik, Luleå tekniska universitetet, Luleå Tid: Tisdag den 4 november 2014, kl. 13:00 Plats: A109, Luleå tekniska universitet
Embeddable EXI implementation in C, Architecture for Service-Oriented Process – Monitoring and Control, Arrowhead
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Papageorgiou, Pavlos. "The measurement manager modular and efficient end-to-end measurement services /". College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8900.

Texto completo
Resumen
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

VIZZARRI, ALESSANDRO. "End to end quality of service quality of experience evaluation for HTTP based services over LTE". Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/203507.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Salz, Jonathan Michael 1979. "TESLA : a transparent, extensible session-layer framework for end-to-end network services". Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87292.

Texto completo
Resumen
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 69-73).
by Jonathan Michael Salz.
M.Eng.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Moyo, Thamsanqa. "An investigation into interoperable end-to-end mobile web service security". Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1137/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Yoro, Wilfried. "Modeling the correlation between the energy consumption and the end-to-end traffic of services in large telecommunication networks". Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0005/document.

Texto completo
Resumen
D’après Cisco, le trafic mobile de données augmentera d’un facteur 7 entre 2016 et 2021. Pour faire face à l’augmentation du trafic, les opérateurs mobile dimensionnent le réseau, ce qui s’accompagne d’une augmentation de sa consommation d’énergie et de son empreinte Carbonne. En outre, les marges financières des opérateurs baissent. Ainsi, le revenu global généré par le secteur des télécommunications a connu une baisse de 4% entre 2014 et 2015 d’après l’union internationale des télécommunications (UIT). Ces préoccupations ont suscité l’intérêt de la communauté scientifique pour la réduction de la consommation électrique des réseaux. Des études dans la littérature estiment l’énergie consommée par les services sur les équipements réseaux en se focalisant sur la consommation variable. La consommation énergétique d’un équipement réseau est composée d’une composante fixe et d’une composante variable. Dans cette thèse, nous partageons la responsabilité des catégories de service dans la consommation fixe du réseau en utilisant la valeur de Shapley. Dans un premier temps, nous considérons un réseau d’accès mobile et partageons la responsabilité des catégories de service qu’il fournit dans la consommation fixe. Nous définissons 5 catégories de service, à savoir, le «Streaming», le Web, le téléchargement, la voix et les autres services de données. En outre, nous traitons le cas de figure où certaines catégories de service sont obligatoires. Etant donné la complexité algorithmique de la valeur de Shapley, nous en proposons une forme approchée qui permet d’en réduire considérablement le temps de calcul. Ensuite, nous considérons le réseau de bout-en-bout, c’est-à-dire, l’accès mobile, l’accès fixe, la collecte, le coeur IP, le coeur mobile, les registres et les plateformes de service. Pour chaque segment, nous partageons la responsabilité des catégories de service dans la consommation fixe en appliquant notre modèle de partage basé sur la valeur de Shapley. L’analyse des résultats montre que le service «Streaming» consomme le plus d’énergie quel que soit le segment de réseau considéré, à l’exception des registres. Pour finir, nous traitons de la modélisation de l’efficacité énergétique des catégories de service. Dans un premier temps, nous calculons l’efficacité énergétique des catégories de service étant donné une station de base avec et sans «sleep mode». Ensuite, nous calculons l’efficacité énergétique des catégories de service étant donné un réseau d’accès mobile et considérant les cas avec et sans catégories de service obligatoires. Aussi étudions-nous les conditions pour ne pas détériorer l’efficacité énergétique du réseau au cours du temps en fonction des scénarios de dimensionnement
Internet traffic is growing exponentially. According to Cisco, mobile data traffic will increase sevenfold between 2016 and 2021, growing at a compound annual growth rate (CAGR) of 47%. In order to improve or keep up with users quality of experience (QoE), mobile carriers upgrade the network with additional equipment. As a consequence, the network carbon footprint increases over time, alongside with its energy consumption. In addition, mobile carriers margins are decreasing. Global telecommunication revenues declined by 4% between 2014 and 2015 based on the international telecommunication union (ITU) figures. These concerns fostered a great interest in the research community for reducing networks energy consumption. In this regard, many works in the literature investigate the energy consumed by services on network equipment for optimization purposes notably, focusing on the variable component of energy consumption. Energy consumption of a network equipment is composed of a variable and a fixed components. The variable component is consumed to serve traffic. The fixed component is consumed irrespective of traffic. In this thesis, our objective is to share the responsibility of service categories in the fixed energy consumption. To do so, we use the Shapley value. First, we consider a radio access network and share the responsibility of the service categories it delivers in the fixed energy consumption. The services are classified into five categories, namely, Streaming, Web, Download, Voice and other data services. In addition, we consider the case when some service categories are mandatory to be provided, such as Voice due to legal constraints for instance. Because the Shapley value has a huge computational complexity, we introduce closed-form expressions in order to significantly reduce it. Next, we consider the end-to-end network and all its segments, that is, the mobile access, the fixed access, the collect, the mobile core, the registers, the IP core and the service platforms. For each segment, we share the responsibility of the service categories in the fixed energy consumption with the Shapley-based model introduced in the preceding chapter. We find that Streaming is the service that consumes the most whatever the network segment, except for registers, as it represents the vast majority of Internet traffic. Eventually, we focus on the service categories energy efficiency. First, we consider a base station and compute the services energy efficiency for the cases with and without sleep mode. Then, we consider a radio access network and compute the services energy efficiency with and without a mandatory player. Moreover, we discuss the conditions to not deteriorate the network energy efficiency over time following different upgrade scenarios
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Yoro, Wilfried. "Modeling the correlation between the energy consumption and the end-to-end traffic of services in large telecommunication networks". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0005.

Texto completo
Resumen
D’après Cisco, le trafic mobile de données augmentera d’un facteur 7 entre 2016 et 2021. Pour faire face à l’augmentation du trafic, les opérateurs mobile dimensionnent le réseau, ce qui s’accompagne d’une augmentation de sa consommation d’énergie et de son empreinte Carbonne. En outre, les marges financières des opérateurs baissent. Ainsi, le revenu global généré par le secteur des télécommunications a connu une baisse de 4% entre 2014 et 2015 d’après l’union internationale des télécommunications (UIT). Ces préoccupations ont suscité l’intérêt de la communauté scientifique pour la réduction de la consommation électrique des réseaux. Des études dans la littérature estiment l’énergie consommée par les services sur les équipements réseaux en se focalisant sur la consommation variable. La consommation énergétique d’un équipement réseau est composée d’une composante fixe et d’une composante variable. Dans cette thèse, nous partageons la responsabilité des catégories de service dans la consommation fixe du réseau en utilisant la valeur de Shapley. Dans un premier temps, nous considérons un réseau d’accès mobile et partageons la responsabilité des catégories de service qu’il fournit dans la consommation fixe. Nous définissons 5 catégories de service, à savoir, le «Streaming», le Web, le téléchargement, la voix et les autres services de données. En outre, nous traitons le cas de figure où certaines catégories de service sont obligatoires. Etant donné la complexité algorithmique de la valeur de Shapley, nous en proposons une forme approchée qui permet d’en réduire considérablement le temps de calcul. Ensuite, nous considérons le réseau de bout-en-bout, c’est-à-dire, l’accès mobile, l’accès fixe, la collecte, le coeur IP, le coeur mobile, les registres et les plateformes de service. Pour chaque segment, nous partageons la responsabilité des catégories de service dans la consommation fixe en appliquant notre modèle de partage basé sur la valeur de Shapley. L’analyse des résultats montre que le service «Streaming» consomme le plus d’énergie quel que soit le segment de réseau considéré, à l’exception des registres. Pour finir, nous traitons de la modélisation de l’efficacité énergétique des catégories de service. Dans un premier temps, nous calculons l’efficacité énergétique des catégories de service étant donné une station de base avec et sans «sleep mode». Ensuite, nous calculons l’efficacité énergétique des catégories de service étant donné un réseau d’accès mobile et considérant les cas avec et sans catégories de service obligatoires. Aussi étudions-nous les conditions pour ne pas détériorer l’efficacité énergétique du réseau au cours du temps en fonction des scénarios de dimensionnement
Internet traffic is growing exponentially. According to Cisco, mobile data traffic will increase sevenfold between 2016 and 2021, growing at a compound annual growth rate (CAGR) of 47%. In order to improve or keep up with users quality of experience (QoE), mobile carriers upgrade the network with additional equipment. As a consequence, the network carbon footprint increases over time, alongside with its energy consumption. In addition, mobile carriers margins are decreasing. Global telecommunication revenues declined by 4% between 2014 and 2015 based on the international telecommunication union (ITU) figures. These concerns fostered a great interest in the research community for reducing networks energy consumption. In this regard, many works in the literature investigate the energy consumed by services on network equipment for optimization purposes notably, focusing on the variable component of energy consumption. Energy consumption of a network equipment is composed of a variable and a fixed components. The variable component is consumed to serve traffic. The fixed component is consumed irrespective of traffic. In this thesis, our objective is to share the responsibility of service categories in the fixed energy consumption. To do so, we use the Shapley value. First, we consider a radio access network and share the responsibility of the service categories it delivers in the fixed energy consumption. The services are classified into five categories, namely, Streaming, Web, Download, Voice and other data services. In addition, we consider the case when some service categories are mandatory to be provided, such as Voice due to legal constraints for instance. Because the Shapley value has a huge computational complexity, we introduce closed-form expressions in order to significantly reduce it. Next, we consider the end-to-end network and all its segments, that is, the mobile access, the fixed access, the collect, the mobile core, the registers, the IP core and the service platforms. For each segment, we share the responsibility of the service categories in the fixed energy consumption with the Shapley-based model introduced in the preceding chapter. We find that Streaming is the service that consumes the most whatever the network segment, except for registers, as it represents the vast majority of Internet traffic. Eventually, we focus on the service categories energy efficiency. First, we consider a base station and compute the services energy efficiency for the cases with and without sleep mode. Then, we consider a radio access network and compute the services energy efficiency with and without a mandatory player. Moreover, we discuss the conditions to not deteriorate the network energy efficiency over time following different upgrade scenarios
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Bou, Diab Wafaa. "End-to-security of real-time services over beyond third generation networks". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0011.

Texto completo
Resumen
La sécurité représente un grand défi pour la transmission du trafic temps-réel sur les réseaux IP, l'objectif est d'acquérir le même niveau de sécurité offert par la téléphonie standard sans affecter la performance et la qualité de service. Sécuriser les services multimédia temps-réel sur un réseau IP est un processus complexe; les solutions de sécurité doivent prendre en compte les contraintes temps-réel des services voix et multimédia et leurs mécanismes doivent traiter les attaques possibles et l’overhead associé. La nécessité d’offrir un certain niveau de qualité de service (QoS) résulte souvent de l’utilisation des faibles mécanismes de sécurité. Le problème d’appliquer les mécanismes de sécurité pour les applications sensibles en temps-réel est que la sécurité et l'efficacité sont des exigences contradictoires ; les mécanismes de sécurité dégradent la performance et la QoS de telles applications, c’est principalement car ces mécanismes peuvent être responsables de l'augmentation de la latence et de la perte de paquets ; si la latence est trop élevée elle peut être la contrainte la plus dégénérant de la qualité des communications multimédia temps-réel. D'autre part, l'un des défis majeurs pour les applications temps-réel sur des réseaux mobiles de prochaine génération ou les réseaux au-delà de troisième génération (B3G) est le handover vertical sans-couture (seamless vertical handover). Ces applications sensibles aux latences et à la perte de paquets nécessitent un contrôle de handover rapide et efficace sur les diverses technologies sans fil pour réaliser la continuité de service et la mobilité sans coupure tout en préservant la sécurité et la qualité de service. L'objectif de cette thèse est de fournir une solution de sécurité robuste sans compromis sur la qualité de service et la performance des applications multimédia temps réel. À cause de la nature temps-critique des applications multimédia et leur faible tolérance au délai et à la perte de paquet, de nombreux mécanismes de sécurité mis en oeuvre dans les réseaux de données ne sont pas applicables aux services temps réel. D'abord, nous étudions les mécanismes de sécurité utilisés actuellement pour la protection des applications IP et examinons les différentes solutions de sécurité VPN en présentant leurs avantages et inconvénients. Ensuite, nous analysons les mécanismes de sécurité supportant les services temps réel et permettant de protéger les signalisations et les trafics médias et comparons les différentes solutions afin de trouver une solution de sécurité robuste supportant des applications multimédia sur des réseaux d’accès hétérogènes. Ensuite, nous présentons une nouvelle solution VPN basé sur IPSec permettant d’offrir une sécurité de bout-en-bout pour les applications temps-réel tout en préservant la performance et la Qualité de Service. La solution est basée sur le protocole de sécurité IPSec et travaille indépendamment du réseau sous-jacent, elle offre de chiffrement de bout-en-bout et donc évite les bouchons (bottlenecks) des files d'attente au niveau des routeurs et protège les utilisateurs et les communications multimédia des attaquants de l'intérieur. La méthode de signalisation permet d’établir le tunnel VPN de bout-en-bout sans délai. Nous proposons une nouvelle méthode de routage du trafic média sécurisé sur les réseaux IP, cette méthode réduit l’overhead de traitement à chaque routeur dans le chemin et minimise la latence et la perte de paquet multimédia. Après cela, nous décrivons le défi de la sécurité et les exigences des applications temps réel durant le handover vertical. Les applications temps réel ont besoin d'une solution de gestion de la mobilité qui réalise le handover aussi rapide que possible et offre un handover sans couture sécurisé sans perception du point de vue d’utilisateur. Ensuite, nous présentons la nouvelle solution de gestion de mobilité offrant un handover sans-couture, rapide et sécurisé pour les applications temps réel durant la mobilité entre les réseaux d’accès hétérogènes. Cette solution effectue l’authentification et la protection de l'intégrité durant le processus de handover anticipé, ce qui minimise l’overhead de signalisation et entraîne une réduction significative de la latence de handover et la perte de paquet. La solution permet aussi de résoudre le problème de désynchronisation entre les utilisateurs dû au mécanisme de compression. Un nouveau module entre les domaines E-IDM (Enhanced Inter-Domain Module) est introduit pour assurer la qualité de service et la sécurité de bout-en-bout des applications multimédia temps réel, tout en offrant de handover sécurisé entre les réseaux d'accès hétérogènes
Security presents a big challenge for transmitting real-time traffic over IP networks; the goal is to acquire the same security level offered by the standard telephony without affecting the performance and the quality of service. Securing real-time multimedia services over IP networks is a complex process; the security solutions must take into account the real-time constraints of voice and multimedia services and their mechanisms should address possible attacks and overhead associated with it. The need to provide certain level of Quality of Service (QoS) often results with weak security mechanisms. The problem of applying security mechanism for real-time sensitive applications is that security and efficiency are conflicting requirements and the security mechanisms may degrade the performance and the QoS of such applications. This is mainly because security mechanisms can be responsible for the increased latency and the packet loss; if latency is too high, it can be the most deteriorating constrain for the quality of the real-time multimedia communications. On the other hand, one of the major challenges for real-time applications over extgeneration mobile networks or the Beyond Third Generation Networks (B3G) is the seamless vertical handoff. Such latency and loss sensitive applications require fast and efficient handover control over various wireless technologies to realize service continuity and seamless mobility while preserving the security and the QoS. The aim of this thesis is to provide a robust security solution without compromising the QoS and the performance of the real-time multimedia applications. Because of the timecritical nature of multimedia applications and their low tolerance for disruption and packet loss, many security mechanisms implemented in data networks are not applicable to real-time services. We first investigate the different security mechanisms applying nowadays for protecting IP applications, and examine the various VPN security solutions presenting their advantages and drawbacks. Then, we analyze the mechanisms supporting real-time services and enabling to protect both the signaling and the media traffic, and compare the different
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "End-to-end services"

1

Mohammed, Atiquzzaman, Ivancic William D y NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mohammed, Atiquzzaman, Ivancic William D y NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bai, Haowei. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mohammed, Atiquzzaman, Ivancic William D y NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Worth, Jennifer. Farewell to the East End. London: Phoenix, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

B, Bhasin K. y Lewis Research Center, eds. Enhancing end-to-end performance of information services over Ka-band global satellite networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Lewis Research Center, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

B, Bhasin K. y Lewis Research Center, eds. Enhancing end-to-end performance of information services over Ka-band global satellite networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Lewis Research Center, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

R, Sánchez, ed. End-to-end quality of service over cellular networks: Data services performance and optimization in 2G/3G. Chichester: Wiley, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Gómez, G. End-to-end quality of service over cellular networks: Data services performance and optimization in 2G/3G. Chichester: John Wiley, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Burnett, Margaret. FAR: An end-user language to support cottage e-services. [Corvallis, OR: Oregon State University, Dept. of Computer Science, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "End-to-end services"

1

Cole, Robert. "End-to-end Services". En Computer Communications, 141–60. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Huang, Xiaohui, Yu Lin, Wendong Wang y Shiduan Cheng. "QoSJava: An End-to-End QoS Solution". En Management of Multimedia Networks and Services, 302–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572831_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Cremonesi, Paolo y Giuseppe Serazzi. "End-to-End Performance of Web Services". En Performance Evaluation of Complex Systems: Techniques and Tools, 158–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45798-4_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Dash, Alokika. "End-to-End Data Architecture Considerations for IoT". En Services and Business Process Reengineering, 17–25. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8621-7_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Bissel, Torsten, Manfred Bogen, Christian Bonkowski y Dieter Strecker. "QoS Assessment and Measurement for End-to-End Services". En Quality of Future Internet Services, 194–207. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-39939-9_16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Oberle, Karsten, Davide Cherubini y Tommaso Cucinotta. "End-to-End Service Quality for Cloud Applications". En Economics of Grids, Clouds, Systems, and Services, 228–43. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02414-1_17.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hierrezuelo, Salvador, Alejandro Gil, Juan Guerrero, Raquel Rodríguez, Juan Torreblanca, Mattias Wahlqvist y Gerardo Gómez. "Data Services Architecture and Standardization". En End-to-End Quality of Service over Cellular Networks, 50–102. Chichester, UK: John Wiley & Sons, Ltd, 2006. http://dx.doi.org/10.1002/047001587x.ch3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Christodorescu, Mihai, Matthew Fredrikson, Somesh Jha y Jonathon Giffin. "End-to-End Software Diversification of Internet Services". En Advances in Information Security, 117–30. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0977-9_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Song, Wang-Cheol y Deok-Jae Choi. "Experiences in End-to-End Performance Monitoring on KOREN". En Management of Convergence Networks and Services, 383–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11876601_39.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Ravindran, K. "End-to-End ‘Data Connectivity’ Management for Multimedia Networking". En Management of Multimedia Networks and Services, 190–203. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572831_17.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "End-to-end services"

1

Zhang, Jian y Andrew Moore. "Traffic Trace Artifacts due to Monitoring Via Port Mirroring". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375317.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

"3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services (IEEE Cat. No. 05EX1107)". En Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564458.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

"Copyright page". En Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564460.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

"Workshop co-chairs". En Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564462.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

"Reviewers". En Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564463.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ito, Yoshihiro y Shuji Tasaka. "End-to-End Monitoring of Multidimensional User-Level QoS in Audio-Video IP Transmission". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375312.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Augustin, Brice, Timur Friedman y Renata Teixeira. "Multipath tracing with Paris traceroute". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375313.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tsugawa, Tomoaki, Cao Le Thanh Man, Go Hasegawa y Masayuki Murata. "Inline bandwidth measurements: Implementation difficulties and their solutions". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375314.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Cheng, Guang, Jian Gong y Yongning Tang. "A Hybrid Sampling Approach for Network Flow Monitoring". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375315.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

"Staff or Society listings". En 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375320.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "End-to-end services"

1

Rajkumar, Raj, K. Juvva, A. Molano, S. Oikawa y C. Lee. End-to-End Reservation Services in Real-Time Mach. Fort Belvoir, VA: Defense Technical Information Center, septiembre de 2001. http://dx.doi.org/10.21236/ada397967.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Liu, Jenny. Inclusive Planning to Evaluate Improved Non-Emergency Medical Transportation Services for Patients With End Stage Renal Disease. Portland State University Library, diciembre de 2014. http://dx.doi.org/10.15760/trec.41.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Svynarenko, Radion, Theresa L. Profant y Lisa C. Lindley. Effectiveness of concurrent care to improve pediatric and family outcomes at the end of life: An analytic codebook. Pediatric End-of-Life (PedEOL) Care Research Group, College of Nursing, University of Tennessee, Knoxville, 2022. http://dx.doi.org/10.7290/m5fbbq.

Texto completo
Resumen
Implementation of the section 2302 of the 2010 Patient Protection and Affordable Care Act (ACA) enabled children enrolled in Medicaid/Children's Health Insurance Program with a prognosis of 6 months to live to use hospice care while continuing treatment for their terminal illness. Although concurrent hospice care became available more than a decade ago, little is known about the socio-demographic and health characteristics of children who received concurrent care; health care services they received while enrolled in concurrent care, their continuity, management, intensity, fragmentation; and the costs of care. The purpose of this study was to answer these questions using national data from the Centers of Medicare and Medicaid Services (CMS), which covered the first three years of ACA – from January 1, 2011, to December 31, 2013.The database included records of 18,152 children younger than the age of 20, who were enrolled in Medicaid hospice care in the sampling time frame. Children in the database also had a total number of 42,764 hospice episodes. Observations were excluded if the date of birth or death was missing or participants were older than 21 years. To create this database CMS data were merged with three other complementary databases: the National Death Index (NDI) that provided information on death certificates of children; the U.S. Census Bureau American Community Survey that provided information on characteristics of communities where children resided; CMS Hospice Provider of Services files and CMS Hospice Utilization and Payment files were used for data on hospice providers, and with a database of rural areas created by the Health Resources and Services Administration (HRSA). In total, 130 variables were created, measuring demographics and health characteristics of children, characteristics of health providers, community characteristics, clinical characteristics, costs of care, and other variables.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Svynarenko, Radion, Guoping Huang, Theresa L. Profant y Lisa C. Lindley. Effectiveness of End-of-Life Strategies to Improve Health Outcomes and Reduce Disparities in Rural Appalachia: An Analytic Codebook. Pediatric End-of-Life (PedEOL) Care Research Group, College of Nursing, University of Tennessee, Knoxville, 2023. http://dx.doi.org/10.7290/n89xhm.

Texto completo
Resumen
Appalachia is one of the most medically underserved areas in the nation. The region has provider shortages and limited healthcare infrastructure. Children and adolescents in this area are in poor health and do not receive the needed quality care. Implementation of section 2302 of the 2010 Patient Protection and Affordable Care Act (ACA) enabled children enrolled in Medicaid/Children's Health Insurance Program with a terminal illness to use hospice care while continuing treatment for their terminal illness. In addition to being more comprehensive than standard hospice care, this relatively new type of care is more culturally congruent with the end-of-life values of rural Appalachian families, who often view standard hospice as hastening death. The overall goal of this project was to investigate access to pediatric concurrent hospice care in Appalachia. Our central hypothesis was that concurrent care reduces rural/urban disparities in access to hospice care. Data from the Centers for Medicare and Medicaid Services (CMS) used in this project was used and included 1,788 children who resided in the Appalachian region– from January 1, 2011, to December 31, 2013. Observations with missing birth dates, death dates, and participants older than 21 years were removed from the final sample. Geographic Information Systems (GIS) databases were created to map the boundaries of the Appalachian region, hospice locations, and driving times to them.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Jimenez Mori, Raul Alberto, Tomás Serebrisky y Jorge Enrique Mercado Díaz. What does better mean? Perceptions of Electricity and Water Services in Santo Domingo. Inter-American Development Bank, noviembre de 2015. http://dx.doi.org/10.18235/0007006.

Texto completo
Resumen
Santo Domingo faces one of the poorest electricity and water services among Latin American cities, a situation which has prevailed for decades despite the significant welfare losses associated with such infrastructure deficiencies. In this context, how do households define these services? What areas of improvement would mean the most to them? This paper takes a consumer's centric-approach to address these questions, identifying specific dimensions of quality and reliability by which households perceptually define what better means. Further, preliminary evidence suggests that, regardless the prices of the services, end-user's satisfaction and disposition to pay would significantly increase with quality improvements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Köstner, Nicole y Toste Tanhua. Action Progress Report #3. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d9.4.

Texto completo
Resumen
The EuroSea project has been running for 4 years by the writing of this report, and this report covers months 33-48 of the action at a time when most tasks are completed and deliverables submitted. However, a few items still need to be finalized as we have experienced delays for a few items, mostly due to COVID, or Brexit, but we expect all of those to be solved before the end of the project by the end of 2023. The progress of the WPs is summarized below, and is described in more detail in the main part of this report. As an innovation action, EuroSea is keeping a close eye on creating impact and on creating services and products that will last past the lifetime of the project. Therefore, we would like to emphasis the registry of impacts that is published on the EuroSea website1. These about 100 areas illustrate the impact that EuroSea has had on improving the European ocean observing and forecasting system. EuroSea has produced a number of targeted services and products for ocean health, operational services and climate, that are tested and used by the stakeholders. (EuroSea Deliverable, D9.4)
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Abdelkafi, Rami. What can Sukuk learn from Social Impact Bonds in the context of COVID crisis? Islamic Development Bank Institute, noviembre de 2021. http://dx.doi.org/10.55780/re24019.

Texto completo
Resumen
Beyond the lack of financial resources, delivery failures are among the main causes of poor public services in developing countries. The incapacity of states in developing countries to perform and to complete tasks entrusted to them is what Andrews et al. (2016) termed as “capability trap”. Their study shows that most developing countries suffer from weak capability states, and out of a sample of 102 developing countries, only 3 would be able to build strong delivery capacity for basic services by the end of the 21st century (Gungadurdoss, 2021).
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Hendrick, Stephen, Hilary Carter y Jason Perlow. 2021 Data and Storage Trends. The Linux Foundation, octubre de 2021. https://doi.org/10.70828/gqyx2842.

Texto completo
Resumen
Enterprise storage trends are all about core IT functions and day-to-day business challenges. 2020, however, was not your typical business year. In the wake of the COVID-19 pandemic, it was clear that the demand for secure and affordable data and storage services was exacerbated, but more insight into the current landscape was needed, especially the role of open source in this equation. The SODA Foundation is an open source project under the Linux Foundation that fosters an ecosystem of open source data management and storage software for data autonomy. SODA offers a neutral forum for cross-project collaboration and integration and provides end-users quality end-to-end solutions. In April of 2021, the SODA Foundation, in partnership with the Linux Foundation, launched a survey to understand evolving data and storage trends that was conducted in English, Chinese, and Japanese-speaking markets — in particular, to identify the current challenges, gaps, and trends for data and storage in the era of Cloud Native, edge, AI, and 5G. The intention is to use this survey data to help guide the SODA Foundation and its surrounding ecosystem on important issues and help its members be better equipped to make decisions, improve their products, and the SODA Foundation to establish new technical directions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Day, St John, Tim Forster y Ryan Schweitzer. Water Supply in Protracted Humanitarian Crises: Reflections on the sustainability of service delivery models. Oxfam, UNHCR, septiembre de 2020. http://dx.doi.org/10.21201/2020.6362.

Texto completo
Resumen
UNHCR estimates that the average time spent by a refugee in a camp is 10 years, while the average refugee camp remains for 26 years. WASH (water, sanitation and hygiene) is a crucial component of humanitarian response and longer-term recovery. Humanitarian agencies and host governments face many challenges in protracted situations and complex long-term humanitarian crises. One key issue is how water supplies should be managed in the long term. Who is best placed to operate and manage WASH services and which delivery model is the most viable? At the end of 2019, there were 15.7 million refugees in protracted situations, representing 77% of all refugees. This report takes stock of the various alternative service delivery models, to enable humanitarian and development agencies to work together to smooth the transition from emergency relief to sustainable services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

P., BASTIAENSEN. Triage in the trenches, for the love of animals : a tribute to veterinarians in the First World War. O.I.E (World Organisation for Animal Health), octubre de 2018. http://dx.doi.org/10.20506/bull.2018.nf.2883.

Texto completo
Resumen
On the occasion of the centenary of the First World War, remembered across the world from 2014 until the end of 2018, many aspects and experiences of this global conflict have been re-examined or brought to light for the first time, as we honour the memory of those estimated 16 million soldiers and civilians who perished in what was then known as the ‘Great War’, or the ‘War to End All Wars’. So many of these died on the infamous fields of Flanders, where Allied and Central Forces dug themselves into trenches for the better part of four years. Over the past few years, new research has brought to light many insights into the plight of animals in this War, which – for the younger readers amongst you – was fought at the dawn of motorised warfare, using anything powered by two or four feet or paws, from the homing pigeons delivering secret messages across enemy lines, to the traction provided by oxen and mules to pull cannons and other heavy artillery, to the horses of the cavalry. Not least among these roles was the supply of animal protein to the troops, whether this came through the specific designation of animals for this purpose or as the result of a failed attempt at delivering any of the above services. Several leading publications today have documented the role (and suffering) of animals in ‘La Grande Guerre’. Less so the role of veterinarians in the ‘War to End All Wars’. Who were they? How many? How were they organised? What did they do, on either side of the enemy lines? The present article is a humble attempt to shed some light on these veterinary colleagues, based on available, mostly grey, literature…
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía