Within the computer science arena, cloud computing has become a major topic of interest. Major computing corporations tout the advantages of such systems, including high reliability, scalability, remote availability, ...
详细信息
Within the computer science arena, cloud computing has become a major topic of interest. Major computing corporations tout the advantages of such systems, including high reliability, scalability, remote availability, and other advantages. Major industries employ these types of systems in their daily business. In the academic arena, cloud computing usage, aside from basic e-mail and web hosting, has been slower to develop. Some universities have outsourced email management and other limited administrative services. Outside of this area, the usage of cloud computing has generally been limited to individual faculty members using remote services. However, with the rapid escalation in cloud computing service availability, this is certain to change. This is not, however, without risk, both at an institutional and individual level. This article addresses four aspects of cloud computing. First, it provides an overview of the services. Two major types of systems will be profiled, including file synchronization systems (DropBox, Ubuntu-One, etc.) and project management systems (GForge). The article will then address the impact upon an individual campus infrastructure. Beyond an IT aspect, the article will address the legal issues of using such a system, including the potential FERPA and DMCA ramifications to the institution and the faculty member. Lastly, a set of recommendations will be provided to faculty members who are interested in using cloud functionality in their teaching work.
A research project at the CERT® program is identifying enterprise architectural patterns to protect against the insider threat to organizations. This paper presents an example of such a pattern-Increased Monitori...
详细信息
Insider threat research at the CERT program has shown that many organizations fall into a vicious cycle of trust and insider threat: organizations do not detect any suspicious insider behavior, so they trust their ins...
详细信息
The context-awareness is a central aspect in the design of pervasive systems, characterizing their ability to adapt its structure and behavior. The context-aware exception handling (CAEH) is an existing approach emplo...
详细信息
A partial periodic pattern is referred to as a set of events that exhibits cyclic behavior over some periods in a time series. Previous studies focused on mining such patterns from constant-length segments that are al...
详细信息
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxon...
详细信息
Developing safe and reliable software is not a luxury but a necessity given our staggering level of dependency on it. Indeed, we have handed over our ability to function day to day to an electronic array or zeros and ...
详细信息
ISBN:
(纸本)9789881404732
Developing safe and reliable software is not a luxury but a necessity given our staggering level of dependency on it. Indeed, we have handed over our ability to function day to day to an electronic array or zeros and ones and we expect, demand and rely on these invisible bits to work without error or fault. However, the process of building such reliable software is far from simple. This paper will examine the practical aspects of the problem as well as solutions that are either used or in the process of being evaluated and/or adopted by an NYC based financial institution to produce safe and reliable software.
The purpose of this study is to investigate the relationship between mobility, ease of use and continuous usage from the use of mobile payment e-wallet. The research method used is through a survey to mobile payment e...
详细信息
software Effort Estimation is a software estimation process as an essential process in software projects. Many studies have been carried out regarding software estimation with various methods, including machine learni...
详细信息
Effectively teaching human-centered design can pose challenges within the undergraduate curriculum as it requires access to users and stakeholders. Service-learning, a growing pedagogy within engineering, offers many ...
详细信息
暂无评论