Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Understanding How Organizations Operate Their It Capacity-Management Processes, Joseph Frederick Bauer Nov 2015

Understanding How Organizations Operate Their It Capacity-Management Processes, Joseph Frederick Bauer

Master's Theses and Doctoral Dissertations

There is a lack of understanding of how organizations operate their IT capacity-management processes. Within the body of literature on IT capacity-management there is an abundance of advice for organizations on how to set up or run the processes for IT capacity-management, but very little in the way of describing the processes as performed and operated in organizations out in the field. Using qualitative methods this research sought to gain an understanding of how organizations are operating their IT capacity-management processes in the field. A dozen subjects from 10 organizations were interviewed and the data were analyzed with a grounded …


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


New England Technical Services Librarians Spring 2012 Conference: Ilibrary: Digital Futures For Libraries (May 3, 2012, Worcester, Ma), Andrée J. Rathemacher, Michael A. Cerbo Ii, Julia A. Lovett Oct 2015

New England Technical Services Librarians Spring 2012 Conference: Ilibrary: Digital Futures For Libraries (May 3, 2012, Worcester, Ma), Andrée J. Rathemacher, Michael A. Cerbo Ii, Julia A. Lovett

Julia Lovett

This report discusses the program of the 2012 New England Technical Services Librarians (NETSL) annual spring conference, held on Thursday, May 3 at the College of the Holy Cross in Worcester, Massachusetts, titled “iLibrary: Digital Futures for Libraries.” NETSL is a section of the New England Library Association and a regional group of the American Library Association.


Doing Things Differently In The Cloud: Streamlining Library Workflows To Maximize Efficiency, Vanessa Garofalo Sep 2015

Doing Things Differently In The Cloud: Streamlining Library Workflows To Maximize Efficiency, Vanessa Garofalo

Vanessa A Garofalo

Libraries share many common challenges including ever more complex collections, systems, and workflows, as well as increased user demand. To help manage these challenges, today’s cloud-based library management services are offering workflows that save library staff time and discovery solutions that meet users’ needs. Libraries using these services are seeing drastic reductions in the time it takes to perform routine tasks because of the integration between libraries, applications, partners, and data. As a result of doing things differently, libraries save staff time and money while streamlining workflows and improving efficiency. In short, cloud-based library management services like OCLC’s WorldShare Management …


Scientometric Analysis Of Cloud Computing, Rosy Jan, Wasim Rashid Wani, Obaid Hafiz Aug 2015

Scientometric Analysis Of Cloud Computing, Rosy Jan, Wasim Rashid Wani, Obaid Hafiz

Library Philosophy and Practice (e-journal)

The paper analyses the growth pattern of cloud computing literature during 2009-2013 using web of science database. The cumulative publication output of top ten countries and India in the field accounts to 1879 publications. Total number of citations & high quality papers were also calculated. The growth in the publication is studied through Relative Growth Rate and doubling time. The authorship pattern is measured by different collaboration parameters like collaborative index and modified collaborative coefficient.


Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken Jul 2015

Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken

Faculty Publications

Presented as a Keynote Address to the International Conference on Computing in Engineering and the Sciences in Istanbul, Turkey, on July 30, 2015.

This is an abstract of the speech:

Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee Jan 2015

Regression Analysis Of Cloud Computing Adoption For U.S. Hospitals, Terence H. Lee

Walden Dissertations and Doctoral Studies

Industrial experts agree that cloud computing can significantly improve business and public access to low cost computing power and storage. Despite the benefits of cloud computing, recent research surveys indicated that its adoption in U.S. hospitals is slower than expected. The purpose of this study was to understand what factors influence cloud adoption in U.S. hospitals. The theoretical foundation of the research was the diffusion of innovations and technology-organization-environment framework. The research question was to examine the predictability of cloud computing adoption for U.S. hospitals as a function of 6 influential factors: relative advantage, compatibility, complexity, organizational size, structure, and …


Efficient Algorithms For Secure Outsourcing Of Bilinear Pairings, Xiaofeng Chen, Willy Susilo, Jin Li, Duncan Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang Jan 2015

Efficient Algorithms For Secure Outsourcing Of Bilinear Pairings, Xiaofeng Chen, Willy Susilo, Jin Li, Duncan Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang

Faculty of Engineering and Information Sciences - Papers: Part A

The computation of bilinear pairings has been considered the most expensive operation in pairing-based cryptographic protocols. In this paper, we first propose an efficient and secure outsourcing algorithm for bilinear pairings in the two untrusted program model. Compared with the state-of-the-art algorithm, a distinguishing property of our proposed algorithm is that the (resource-constrained) outsourcer is not required to perform any expensive operations, such as point multiplications or exponentiations. Furthermore, we utilize this algorithm as a subroutine to achieve outsource-secure identity-based encryptions and signatures.