Angebote zu "Cloud" (13 Treffer)

Kategorien

Shops

Developing the ServiceNow App Accelerator
54,90 € *
ggf. zzgl. Versand

This book analyses the Platform-as-a-Service provider ServiceNow and documents the creation of a desktop application to mitigate the lack of functionality to import existing data in an automatic manner to the platform. Although ServiceNow tries to win its customers with performing applications provided by them, which handle data in non SQL related data structures, organisations presumably have valuable assets in existing yet most often legacy shadow database IT systems which they cannot leave behind while moving to the cloud. As a result, the migration causes those organisations to gain an additional system they need to keep track of instead of simplifying their IT infrastructure to just use the services provided by the cloud and leaving the old ones behind. The ServiceNow App Accelerator provides a solution with the help of the programming language ooRexx and the BSF4ooRexx framework.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Price Analysis of Value Networks in a Cloud ena...
55,90 € *
ggf. zzgl. Versand

4CaaSt is an advanced everything as a service (XaaS) cloud platform. A complex service in its value network can be composed of several products. There a service provider generates revenue from delivering a service to customers but also has to pay for third party cloud products that its service uses. Several price models can be applied to the 4CaaSt products that can take into consideration the actual usage of its customers. The contribution of this Thesis is as follows: identification of appropriate price models for 4CaaSt products, formalization of revenue, costs and profit in a complex service and support for the price discovery and analysis problem of products in the 4CaaSt cloud marketplace. The solution addresses to support deciders to achieve certain business model goals based on the optimization of the prices in the price model of their products. In addition the solution supports to analyze and visualize revenue and cost flow in the product constellation of a service that result at different pricings. The Business Model Simulator (BMS) Web application has been built therefore. The solution of the BMS to address the optimization task is through a meta-heuristic approach. Hence the BMS simulates optimal pricings according to objective functions through a genetic algorithm.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Placement of SaaS Components in Cloud Computing...
39,90 € *
ggf. zzgl. Versand

The SaaS deployment is the installation to delivery of software services in cloud computing infrastructure. SaaS deployment is initiated by a cloud service provider via a user requesting process, which is generally automated. SaaS is a combination of different type of components, application component, integration component, business component, and storage component. Component placement problem (CPP) concerns with finding the optimum set of VMs on which SaaS components can be placed such that all user requirements should be satisfied and maximizes the profit of the SaaS providers. In CPP, the solution of the problem is subject to a set of resource and SLA constraints. The CPP is presented as a linear programming problem. The CPP has been proven by researchers as an NP-complete, hence the Genetic Algorithm approach has been used to produce sub optimal solution

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Intel Trusted Execution Technology for Server P...
37,44 € *
ggf. zzgl. Versand

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.”   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.”   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid.

Anbieter: Dodax
Stand: 28.02.2020
Zum Angebot
Developing the ServiceNow App Accelerator
88,90 CHF *
ggf. zzgl. Versand

This book analyses the Platform-as-a-Service provider ServiceNow and documents the creation of a desktop application to mitigate the lack of functionality to import existing data in an automatic manner to the platform. Although ServiceNow tries to win its customers with performing applications provided by them, which handle data in non SQL related data structures, organisations presumably have valuable assets in existing yet most often legacy shadow database IT systems which they cannot leave behind while moving to the cloud. As a result, the migration causes those organisations to gain an additional system they need to keep track of instead of simplifying their IT infrastructure to just use the services provided by the cloud and leaving the old ones behind. The ServiceNow App Accelerator provides a solution with the help of the programming language ooRexx and the BSF4ooRexx framework.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
127,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
100,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
100,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 28.02.2020
Zum Angebot
Developing the ServiceNow App Accelerator
48,99 € *
ggf. zzgl. Versand

This book analyses the Platform-as-a-Service provider ServiceNow and documents the creation of a desktop application to mitigate the lack of functionality to import existing data in an automatic manner to the platform. Although ServiceNow tries to win its customers with performing applications provided by them, which handle data in non SQL related data structures, organisations presumably have valuable assets in existing yet most often legacy shadow database IT systems which they cannot leave behind while moving to the cloud. As a result, the migration causes those organisations to gain an additional system they need to keep track of instead of simplifying their IT infrastructure to just use the services provided by the cloud and leaving the old ones behind. The ServiceNow App Accelerator provides a solution with the help of the programming language ooRexx and the BSF4ooRexx framework.

Anbieter: Thalia AT
Stand: 28.02.2020
Zum Angebot