Results 51 to 60 of about 28,164 (210)

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

The Role of Knowledge‐Based Resources in Leveraging Business Analytics

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT Business analytics enhances managerial decision‐making. To this end, previous research guides firms to combine their tangible business analytics resources, such as data and technology, with intangible knowledge‐based business analytics resources to enable that business analytics supports decision‐making.
Johanna Orjatsalo   +2 more
wiley   +1 more source

Security and Privacy in Cloud Computing: Technical Review

open access: yesFuture Internet, 2021
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of ...
Yunusa Simpa Abdulsalam   +1 more
doaj   +1 more source

Low‐Code and No‐Code Tools: A Valuable Aid or a Potential Threat to Professional Developers?

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background The rapid adoption of low‐code (LC) and no‐code (NC) tools has transformed the software development landscape, offering faster development cycles and enabling non‐programmers to contribute to software creation. Objective This study systematically maps the effects of LC/NC tools on developers, addressing the critical need to ...
Saima Rafi   +2 more
wiley   +1 more source

Solutions of diagnosis of security issues and attacks for storage in cloud computing

open access: yesTikrit Journal of Pure Science, 2018
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet.
Ahmed Ibrahim Turki   +1 more
doaj   +1 more source

Perspectives On Machine Learning Inference Serving in Real‐World Settings

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Introduction As machine learning (ML)‐enabled systems become increasingly prevalent across industries, the engineering challenges of deploying and maintaining them in production have emerged as critical. The existing engineering knowledge base often derives from conceptual frameworks or case studies conducted by large technology companies ...
Dennis Muiruri   +3 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

An Improved Protocol for Verifiable Polynomial Cloud Outsourcing Computation

open access: yesWireless Communications and Mobile Computing, 2022
The cloud computing industry is booming, which involves a large amount of data transmission and calculation, and polynomial calculation is the most basic calculation. Since polynomial calculations have extremely high requirements on the computing power of computing equipment, in most cases, the computing equipment in the user’s hands cannot meet the ...
Jun Ye   +5 more
openaire   +1 more source

A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

open access: yesNature Communications, 2017
Outsourcing computation for genomic data processing offers the ability to allocate massive computing power and storage on demand. Here, Popic and Batzoglou develop a hybrid cloud aligner for sequence read mapping that preserves privacy with competitive ...
Victoria Popic, Serafim Batzoglou
doaj   +1 more source

Authoring Terrestrial Planets with Diffusion Models

open access: yesComputer Graphics Forum, EarlyView.
Abstract To support the design and subsequent generation of terrestrial planets for use in the creative media, we propose a solution that employs a generative model trained on satellite data from planetary bodies with a defined solid surface, such as the Earth and Mars.
Oliver Borg   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy