Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Innovation (2)
- Mobile devices (2)
- Technology (2)
- Telecommunications law and policy (2)
- 3-D printing (1)
-
- 4G LTE (1)
- Attacks (1)
- Augmented reality (1)
- Broadband access and deployment (1)
- Broadband technology (1)
- Cable modem service (1)
- Cloud (1)
- Cloud Computing (1)
- Cloud Firewalls (1)
- Cloud Networks (1)
- Cloud Operations (1)
- Cloud Security (1)
- Cloud computing business model (1)
- Cloud computing infrastructure (1)
- Cloud database (1)
- Cloud frameworks (1)
- Cloud process framework (1)
- Cloud research (1)
- Cloud security (1)
- Comparative public policy (1)
- Competition (1)
- Complex (1)
- Computer science (1)
- Copyright (1)
- Cyber Security (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
A Process Framework For Managing Quality Of Service In Private Cloud, Arvind Maskara
A Process Framework For Managing Quality Of Service In Private Cloud, Arvind Maskara
Walden Dissertations and Doctoral Studies
As information systems leaders tap into the global market of cloud computing-based services, they struggle to maintain consistent application performance due to lack of a process framework for managing quality of service (QoS) in the cloud. Guided by the disruptive innovation theory, the purpose of this case study was to identify a process framework for meeting the QoS requirements of private cloud service users. Private cloud implementation was explored by selecting an organization in California through purposeful sampling. Information was gathered by interviewing 23 information technology (IT) professionals, a mix of frontline engineers, managers, and leaders involved in the implementation …
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley
Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley
Journal of Business & Technology Law
No abstract provided.
Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman
Myspace, Inc. V. Graphon Corp.: Ignoring The Basic Premise That 101 Must Come Before 102 And 103, Emmanuel A. Fishelman
Journal of Business & Technology Law
No abstract provided.
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr
Electronic Theses and Dissertations
The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.
Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo
All Faculty Scholarship
Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …