Query Result Set
Skip Navigation Links
SLIM21 Home
Advanced Search
My Info
Browse
Arrivals
Expected
Reference Items
Journal List
Proposals
Media List
Rules
   ActiveUsers:212Hits:17120348Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CLOUD COMPUTING (12) answer(s).
 
SrlItem
1
ID:   125224


Cloud computing: implementation, management and security / Rittinghouse, John W; Ransome, James F 2013  Book
Rittinghouse, John W Book
0 Rating(s) & 0 Review(s)
Publication Boca Raton, CRC Press, 2013.
Description xxxviii, 301p.Pbk
Standard Number 9781439806807
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057502004.6/RIT 057502MainOn ShelfGeneral 
2
ID:   129739


Cloud computing: the emerging technology and its relevance to the Indian Armed Forces / Shreenivas, P S S   Journal Article
Shreenivas, P S S Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
3
ID:   106661


Cloud computing in the global South: drivers, effects and policy measures / Kshetri, Nir   Journal Article
Kshetri, Nir Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract Cloud computing has started to transform economic activities in the global South. Many businesses are taking advantage of the pay-as-you-go model of the technology, and its scalability and flexibility features, and government agencies in the South have been investing in cloud-related mega-projects. Cloud-based mobile applications are becoming increasingly popular and the pervasiveness of cellphones means that the cloud may transform the way these devices are used. However, findings and conclusions drawn from surveys, studies and experiences of companies on the potential and impact of cloud computing in the developing world are inconsistent. This article reviews cloud diffusion in developing economies and examines some firms in the cloud's supply side in these economies to present a framework for evaluating the attractiveness of this technology in the context of evolving needs, capabilities and competitive positions. It examines how various determinants related to the development and structure of related industries, externality mechanisms and institutional legitimacy affect cloud-related performances and impacts.
        Export Export
4
ID:   121331


Cloud computing in the upstream oil & gas industry: a proposed way forward / Perrons, Robert K; Hems, Adam   Journal Article
Perrons, Robert K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Despite the compelling case for moving towards cloud computing, the upstream oil & gas industry faces several technical challenges-most notably, a pronounced emphasis on data security, a reliance on extremely large data sets, and significant legacy investments in information technology infrastructure-that make a full migration to the public cloud difficult at present. Private and hybrid cloud solutions have consequently emerged within the industry to yield as much benefit from cloud-based technologies as possible while working within these constraints. This paper argues, however, that the move to private and hybrid clouds will very likely prove only to be a temporary stepping stone in the industry's technological evolution. By presenting evidence from other market sectors that have faced similar challenges in their journey to the cloud, we propose that enabling technologies and conditions will probably fall into place in a way that makes the public cloud a far more attractive option for the upstream oil & gas industry in the years ahead. The paper concludes with a discussion about the implications of this projected shift towards the public cloud, and calls for more of the industry's services to be offered through cloud-based "apps."
Key Words Oil and gas  Cloud Computing  Apps 
        Export Export
5
ID:   190001


Collaborative air combat: the technology world behind aircraft / Barone, Marco Giulio   Journal Article
Barone, Marco Giulio Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
6
ID:   144196


Degrees of freedom, dimensions of power / Benkler, Yochai   Article
Benkler, Yochai Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The original Internet design combined technical, organizational, and cultural characteristics that decentralized power along diverse dimensions. Decentralized institutional, technical, and market power maximized freedom to operate and innovate at the expense of control. Market developments have introduced new points of control. Mobile and cloud computing, the Internet of Things, fiber transition, big data, surveillance, and behavioral marketing introduce new control points and dimensions of power into the Internet as a social-cultural-economic platform. Unlike in the Internet's first generation, companies and governments are well aware of the significance of design choices, and are jostling to acquire power over, and appropriate value from, networked activity. If we are to preserve the democratic and creative promise of the Internet, we must continuously diagnose control points as they emerge and devise mechanisms of recreating diversity of constraint and degrees of freedom in the network to work around these forms of reconcentrated power.
        Export Export
7
ID:   187078


Digital sovereignty, geopolitical imaginaries, and the reproduction of European identity / Monsees, Linda; Lambach, Daniel   Journal Article
Lambach, Daniel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract “Digital sovereignty” has emerged as a hot topic in European politics. But although true European digital sovereignty seems unattainable, analysing the digital sovereignty discourse is still useful since it tells us much about European politics. We examine three “projects” which are part of the broader digital sovereignty initiative: 5G, Gaia-X, and the semiconductor industry. This empirical perspective allows for a better understanding of how imaginaries about digital sovereignty play out in these specific tech projects and how these then help to affirm a particular European identity. Methodologically, we focus on how particular geopolitical imaginaries appear in these digital sovereignty projects. Our empirical analysis reveals that Europe’s comparatively weak digital industries are considered a security issue. China and, to a lesser degree, the United States are not only seen as economic rivals but also security threats when it comes to issues such as espionage and data protection. Based on this, we argue that digital sovereignty projects, despite being full of contradictions and tensions, contribute to a distinct EU identity of an agile, future-oriented global player in the digitised economy. This, while not entirely new, is a powerful imaginary even if the proposed idea of “sovereignty” might never be enacted.
        Export Export
8
ID:   162613


Disruptive technologies for the militaries and security / Lele, Ajey 2019  Book
Lele, Ajey Book
0 Rating(s) & 0 Review(s)
Publication Singapore, Springer Nature, 2019.
Description xx, 234p.hbk
Series Smart Innovation, Systems and Technologies; 132
Standard Number 9789811333835
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059560623.45/LEL 059560MainOn ShelfGeneral 
9
ID:   136043


Inter-level spatial cloud compression algorithm / Das Gupta, Pranab Kumar; Pattnaik, Sabyasachi; Nayak, Manojranjan   Article
Das Gupta, Pranab Kumar Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Static images of colour clouds play an important role to predict weather conditions to schedule proof and trial activities, and deploying resources at firing locations and observation posts. In this paper, a new inter-level cloud compression architecture and algorithm has been presented. Distributed architecture suitable for cloud computing has been suggested to implement inter-level compression algorithm (ILCA). Different possibilities between two successive cloud images have been combined to save the images of interest for further processing, ignoring the redundant ones. Vector quantisation technique is briefly discussed to achieve high level of compression. The algorithm presented in this paper can be easily modified to store flying, floating, and moving objects in air, water, and surface, respectively with high level of compression in various defence applications.
        Export Export
10
ID:   167153


Israeli CIO’s journey – From insourcing to outsourcing and back / Aspir, Tal; Gafni, Ruti   Journal Article
Aspir, Tal Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract One of the difficult decisions that a Chief of Information Manager takes is whether to use organisational resources or to contract suppliers, in order to perform information technology (IT) projects. Over the last decade, managers in Israel have moved from insourcing to outsourcing due to different reasons, mainly to reduce costs and focus on their core business. In the last two years, they started to return IT projects, services, and activities back, using new source models. This study examines the tendency of the Israeli IT managers in sourcing decisions in order to understand the problems, application and suitability of various kinds of models.
        Export Export
11
ID:   132138


Relevance of cloud computing for defence / Lele, Ajey; Sharma, Munish   Journal Article
Lele, Ajey Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing. As cloud computing has made inroads in the operations of private sector, it is slated to perform a central role in the functioning of governments and defence and security agencies. Under the aegis of ICT, the emerging cloud computing can find applications in defence sector as it offers numerous advantages over traditional information technology (IT) systems such as scalability, agility and interoperability. The article is an attempt to identify the key defence operations where cloud computing could help in addressing the IT needs while keeping the acquisition and maintenance costs at minimal. It brings in the concerns and challenges lying ahead in the way of adopting cloud computing while taking stock of initiatives taken by the governments of leading militaries of the world.
        Export Export
12
ID:   136041


System analysis and design of armament integrated management system / Appavuraj, R; Das Gupta, Pranab Kumar; Ghosh, Pranab; Samal, P B   Article
Appavuraj, R Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Proof and trial activity in a dynamic test range is a complex, sensitive, and herculean activity. It is a system comprising critical functions that accept various armament inputs and produces proof results as output, processing various critical data and sensitive activities in between. Automation of the existing system is a step for reliable, secure, smooth operation and easy maintainability of the system that makes it synchronized with the latest development of range technology. Understanding the flow of data through these functions requires extensive study to realize different inter-linked activities involved with the functions of this system. This paper presents the flow of activities in the automation of dynamic test range of Proof & Experimental Establishment through context level diagram, process flow diagram, data flow diagram, and entity-relationship diagram. Realization of armament integrated management system will be through resilient and high bandwidth network backbone which is a part of this paper. Cloud computing is the latest development in the information technology. This paper also analyses the appropriate model of cloud computing for porting the system in the cloud.
        Export Export