To see the other types of publications on this topic, follow the link: Business computing.

Dissertations / Theses on the topic 'Business computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Business computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sampathkumaran, Partha B. "Computing the cost of business processes." Diss., Ludwig-Maximilians-Universität München, 2013. http://nbn-resolving.de/urn:nbn:de:bvb:19-158291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ong, Sze Hwei 1979. "Grid computing : business and policy implications." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/30035.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2003.
Includes bibliographical references (leaves 84-86).
The Grid is a distributed computing infrastructure that facilitates the exchange of expertise and resources. It is somewhat analogous to the electric power grid in that it can potentially provide a universal source of IT resources that can have a huge impact on human capabilities and on the entire society. Currently the Grid is being deployed (in limited ways) in some research and academic institutions. As Grid computing technologies mature further, the commercial sector can also benefit. With Grid technologies enabling utility computing, enterprises will be able to access IT resources on-demand in a utility-like way. This thesis gives a brief introduction on Grids and looks back into the history of power grids for lessons learned. It suggests that the Grid and the power grid are both infrastructures and factors of reliability, standardization, universal access and affordability are necessary to ensure the success of any infrastructure. Once the Grid is successful, it can open up new opportunities in the field of utility computing and impact IT provision in the commercial sector. The new utility computing ecosystem would consist of five major players - the Grid resource supplier, the Grid infrastructure supplier, the utility service provider, the re-seller and the end user. Further industry analysis reveals that there are new roles for current players in the traditional IT provision industry and opportunities for new entrants in this new ecosystem. The thesis attempts to identify the characteristics of each of the five major players to help the IT industry better understand the requirements of these new roles. Current players in the IT provision industry would have to decide which of the above roles to play in this new utility computing ecosystem and to re-define their market strategies accordingly. New entrants to the field would likely be players in the telecommunication sector who want a share of this growing pie and whose existing relationship with bandwidth subscribers can be leveraged upon. This thesis concludes with recommendations on several policy issues: Grid standardization for inter-operability, decentralized Grid governance to encourage optimal resource sharing and mechanisms for transcending cultural/organizational barriers inhibiting the commercial adoption of Grid computing.
by Sze Hwei Ong.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
3

Cavicchini, Andrea. "Cloud Computing e Modelli di Business." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/2410/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krikos, Alexis Christopher. "Disruptive technology business models in cloud computing." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59255.

Full text
Abstract:
Thesis (S.M. in System Design and Management)--Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references.
Cloud computing, a term whose origins have been in existence for more than a decade, has come into fruition due to technological capabilities and marketplace demands. Cloud computing can be defined as a scalable and flexible shared computing solution in which third-party suppliers use virtualization technologies to create and distribute computing resources to customers on-demand, via the Internet browser. Cloud computing is steadily replacing more rigid software and services licensing models in both small/medium business (SMB) and in the enterprise. This analysis poses a twofold examination of cloud computing as a disruptive technology. First, cloud computing has replaced existing software and services licensing business models, owing to its scalability, flexibility, and utility-based pricing. Second, as cloud computing takes hold as the prominent computing services business paradigm, other disruptive forces will surface to further integrate and differentiate the cloud computing landscape. These forces include the customer-driven need to create hybrid clouds between private and public cloud domains, vendor-agnostic solutions in the cloud, along with open standards to make cloud computing ubiquitous. Three criteria are assessed in characterizing cloud computing as a disruptive technology (Christensen, 2002).1 First, cloud computing as an innovation, must enable less-skilled and/or less-wealthy individuals to receive the same utility as only the more-skilled and/or more-wealthy intermediaries could formerly attain. Second, cloud computing must target customers at the low end of a market with modest demands on performance, but with a performance trajectory capable of exceeding those demands and thus taking over markets, tier by tier. As a corollary to this second criterion, the cloud computing business model allows the disruptive innovator to achieve attractive returns at prices that are unattractive to the incumbents. Third, an ecosystem in the form of a fully integrated single entity or a set of modular entities is required to successfully support the disruptive innovation. The analysis has shown that cloud computing is replacing traditional outsourcing and premise-based data centers for software applications and services delivery. Scalability, flexibility, virtualization, and cost are essential business drivers. However, current cloud computing solutions, especially in the enterprise, lack sufficient security and customer control. This gives rise to numerous subordinate disruptive business solutions which enable the enterprise and emerging demographics to develop and deploy their applications and services in a secure, controlled, profitable, and ubiquitous environment.
by Alexis Krikos.
S.M.in System Design and Management
APA, Harvard, Vancouver, ISO, and other styles
5

Phalke, Vidyadhar 1968. "Strategies for managing business disruption due to grid computing." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/16998.

Full text
Abstract:
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management of Technology Program, 2003.
Includes bibliographical references (leaves 44-45).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
In the technology centric businesses disruptive technologies displace incumbents time and again, sometimes to the extent that incumbents go bankrupt. In this thesis we would address the issue of what strategies are essential to prepare for and to manage disruptions for the affected businesses and industries. Specifically we will look at grid computing that is poised to disrupt (1) certain Enterprise IT departments, and (2) the software industry in the high-performance and web services space. In this thesis, we will present an analysis for addressing this disruption on a segment by segment basis across the distributed computing and application software value chain.
by Vidyadhar Phalke.
S.M.M.O.T.
APA, Harvard, Vancouver, ISO, and other styles
6

Dahalin, Zulkhairi. "Factors affecting end-user computing sophistication in small business." Thesis, Aston University, 2000. http://publications.aston.ac.uk/10607/.

Full text
Abstract:
This thesis describes research on End-User Computing (EUC) in small business in an environment where no Information System (IS) support and expertise are available. The research aims to identify the factors that contribute to EUC Sophistication and understand the extent small firms are capable of developing their own applications. The intention is to assist small firms to adopt EUC, encourage better utilisation of their IT resources and gain the benefits associated with computerisation. The factors examined are derived inductively from previous studies where a model is developed to map these factors with the degree of sophistication associated with IT and EUC. This study attempts to combine the predictive power of quantitative research through surveys with the explanatory power of qualitative research through action-oriented case study. Following critical examination of the literature, a survey of IT Adoption and EUC was conducted. Instruments were then developed to measure EUC and IT Sophistication indexes based on sophistication constructs adapted from previous studies using data from the survey. This is followed by an in-depth action case study involving two small firms to investigate the EUC phenomenon in its real life context. The accumulated findings from these mixed research strategies are used to form the final model of EUC Sophistication in small business. Results of the study suggest both EUC Sophistication and the Presence of EUC in small business are affected by Management Support and Behaviour towards EUC. Additionally EUC Sophistication is also affected by the presence of an EUC Champion. Results are also consistent with respect to the independence between IT Sophistication and EUC Sophistication. The main research contributions include an accumulated knowledge of EUC in small business, the Model of EUC Sophistication, an instrument to measure EUC Sophistication Index for small firms, and a contribution to research methods in IS.
APA, Harvard, Vancouver, ISO, and other styles
7

Reece, Steven Andrew. "Neural networks in business condition monitoring." Thesis, Southampton Solent University, 1997. http://ssudl.solent.ac.uk/1265/.

Full text
Abstract:
The research uses neural nets as a tool in the investigation of busienss failure prediction and business performance monitoring. The novelty lies in the introduction of models including qualitative factors as well as financial ratios. In addition, an analysis of data gathered from a new survey is offered. To achieve its objectives the research begins by exploring the AI options and then reviews current neural net technology with a view to identifying appropriate technology for the implementation of a classifier for the two areas of failure prediction and performance monitoring. After consideration of the strengths and weaknesses of the options, a multi-layer perceptron, back propagation net is adopted as being unsuitable for this application. In order to verify the validity of the bespoke neural net software it was necessary to employ a two stage strategy. The first step was to confirm that the net, as implemented, retained the expected property of being able to solve problems that were not linearly separable. This was achieved by demonstrating its ability to solve the straightforward XOR problem. To be confident of the net performance it was deemed necessary to replicate the experiments of previous research which used only purely financial inputs to the net. The results confirmed the validity of the new network implementation. Using the intital results as a control, experiments were undertaken to ascertain the effect of reducing the training sample size and to identify minimum sample sizes commensurate with maintaining the effectiveness. The work then further contributes to this research by using traditional stastical methods to provide an empirically derived equation for calculating the minimum number of training patterns required for corporate failure prediction in the context of the experimental sets of variables. The resulting failure prediction model was then used to test for symptoms of bankruptcy in firms currently trading. The thesis then leads on to describing a technique developed in this study for pre-processing qualitative questionnaires, prior to input into a neural model as well as providing a method for predicting values not supplied in incomplete survey responses. A contribution is also made to the area of company performance analysis by using neural techniques and discriminant analysis to show that relationships do exist between certain company variables and business performance, as well as highlighting which of these variables are the most important if an appropriate corporate condition monitoring strategy is to be developed. Lastly, the corporate performance neural network model is enhanced by facilitating the categorisation of a firm into one of several performance bands.
APA, Harvard, Vancouver, ISO, and other styles
8

Craft, D. H. "Resource management in a distributed computing system." Thesis, University of Cambridge, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.254104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ball, Raymond T. Jr. "Wireless cloud computing on Guided Missile Destroyers: a business case analysis." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34622.

Full text
Abstract:
Approved for public release; distribution is unlimited
This is a Business Case Analysis of the cost and benefits of implementing a Wireless Cloud Computing Network (WCCN) onboard Guided Missile Destroyers (DDGs) utilizing tablet computers. It compares the life cycle costs of WCCNs utilizing tablet computers over a mixed network of thin clients and desktop computers. Currently, the Consolidated Afloat Networks and Enterprise Services (CANES) program will install both thin clients and desktops on board new and old DDGs to implement the unclassified portion of its network. The main cost benefits of tablets will be realized through energy savings and an increase in productivity. The net present value of tablets is expected to be considerably better than the current CANES configuration with the initial investment required for tablets breaking-even in five years if each sailor saves 22 seconds a day by having a tablet. Alternatively, the tablet configuration also breaks even in less than 6 years just considering operational costs alone. Sensitivity analysis on the cost of deferent types of tablet devices and the range of different productivity gains shows very limited downside from investing in tablets compared to considerable upside (depending on the productivity gains achieved in practice).
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Vivek Kumar. "Essays on Cloud Computing Analytics." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7943.

Full text
Abstract:
This dissertation research focuses on two key aspects of cloud computing research – pricing and security using data-driven techniques such as deep learning and econometrics. The first dissertation essay (Chapter 1) examines the adoption of spot market in cloud computing and builds IT investment estimation models for organizations adopting cloud spot market. The second dissertation essay (Chapter 2 and 3) studies proactive threat detection and prediction in cloud computing. The final dissertation essay (Chapter 4) develops a secured cloud files system which protects organizations using cloud computing in accidental data leaks.
APA, Harvard, Vancouver, ISO, and other styles
11

El-Najjar, Lin, and Filip Ilic. "Business intelligence för beslutsstöd inom telekommunikationsbolag : Nyttjandet av Business intelligence för att effektivisera affärsprocesser." Thesis, Södertörns högskola, Medieteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-44602.

Full text
Abstract:
The value of data is growing to an increasing extent. The increased amount of available data has enabled business intelligence to take great strides in development. Organizations use data in order to enhance parts or entire operations within the organization. Business intelligence supports organizations in the management of data and mainly to create decision support. However, business intelligence is a broad topic which can be affected by factors such as Big Data or Cloud computing and can be applied in different ways. Previous studies shows that only a few organizations have succeeded in increasing profitability after implementation of business intelligence. This study therefore aims to create a deeper understanding of how business intelligence is used within a telecommunications company to create decision support connected to enhancing business processes. The choice of industry and organization in this study is based on the fact that the industry is one of the most data-intensive industries. The thesis relates to previous research and theories. The previous research is used in order to understand the challenges as well as the benefits and future potential of the subject. The theories are used to understand various key factors such as information systems or the combination of business intelligence and Business Process Management.  The result of the essay is created from semi-structured interviews with respondents who work within a telecommunications company and contribute to confirming the theory and answering the questions.
Värdet av data växer i allt större utsträckning. Den ökade mängden tillgänglig data har möjliggjort för Business intelligence att ta stora kliv i utvecklingen. Organisationer nyttjar data i syfte att effektivisera delar av eller hela verksamheter. Business intelligence stödjer organisationer i hanteringen av data och för att skapa beslutsstöd. Business intelligence är dock ett brett ämne vilket kan påverkas av faktorer såsom Big Data eller Cloud computing (molntjänster) och kan tillämpas på olika sätt. Tidigare studier visar att endast ett fåtal organisationer har lyckats öka lönsamheten efter implementeringen av business intelligence. Denna studie syftar till att skapa en djupare förståelse kring hur business intelligence används inom ett telekommunikationsbolag för att skapa beslutsstöd kopplat till effektivisering av affärsprocesser. Valet av bransch och organisation baseras på att branschen är en av de mest dataintensiva branscherna. Uppsatsen förhåller sig till tidigare forskning och teorier. Den tidigare forskningen används i syfte att förstå utmaningar samt fördelar och framtida potential för ämnet. Teorierna används för att förstå olika nyckelfaktorer såsom informationssystem eller kombinationen av business intelligence och Business Process Management. Resultatet i uppsatsen är skapat från semistrukturerade intervjuer med personer vilka arbetar inom ett telekommunikationsbolag och bidrar med att bekräfta teorin samt besvara frågeställningen.
APA, Harvard, Vancouver, ISO, and other styles
12

Lowhorn, Greg L., and Anthony Pittarese. "Business Literacy for the Computer Science Professional." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etsu-works/3011.

Full text
Abstract:
Excerpt: Business literacy is becoming more popular among business practitioners in multiple fields, including accounting, finance, human resources, training and development, leadership, health care, and other disciplines. However, little attention has been paid to business literacy for the computing professional in the literature.
APA, Harvard, Vancouver, ISO, and other styles
13

Sampathkumaran, Partha B. [Verfasser], and Martin [Akademischer Betreuer] Wirsing. "Computing the cost of business processes / Partha B. Sampathkumaran. Betreuer: Martin Wirsing." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2013. http://d-nb.info/103707632X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Reyes, Eumir P. (Eumir Paulo Reyes Morales). "A systems thinking approach to business intelligence solutions based on cloud computing." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59267.

Full text
Abstract:
Thesis (S.M. in System Design and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 73-74).
Business intelligence is the set of tools, processes, practices and people that are used to take advantage of information to support decision making in the organizations. Cloud computing is a new paradigm for offering computing resources that work on demand, are scalable and are charged by the time they are used. Organizations can save large amounts of money and effort using this approach. This document identifies the main challenges companies encounter while working on business intelligence applications in the cloud, such as security, availability, performance, integration, regulatory issues, and constraints on network bandwidth. All these challenges are addressed with a systems thinking approach, and several solutions are offered that can be applied according to the organization's needs. An evaluations of the main vendors of cloud computing technology is presented, so that business intelligence developers identify the available tools and companies they can depend on to migrate or build applications in the cloud. It is demonstrated how business intelligence applications can increase their availability with a cloud computing approach, by decreasing the mean time to recovery (handled by the cloud service provider) and increasing the mean time to failure (achieved by the introduction of more redundancy on the hardware). Innovative mechanisms are discussed in order to improve cloud applications, such as private, public and hybrid clouds, column-oriented databases, in-memory databases and the Data Warehouse 2.0 architecture. Finally, it is shown how the project management for a business intelligence application can be facilitated with a cloud computing approach. Design structure matrices are dramatically simplified by avoiding unnecessary iterations while sizing, validating, and testing hardware and software resources.
by Eumir P. Reyes.
S.M.in System Design and Management
APA, Harvard, Vancouver, ISO, and other styles
15

Hachicha, Belghith Emna. "Supporting cloud resource allocation in configurable business process models." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLL007/document.

Full text
Abstract:
Les organisations adoptent de plus en plus les Systèmes (PAIS) pour gérer leurs processus métiers basés sur les services en utilisant les modèles de processus appelés «modèles de processus métiers». Motivés par l’adaptation aux exigences commerciales et par la réduction des coûts de maintenance, les organisations externalisent leurs processus dans le Cloud Computing. Selon l'Institut NIST, Cloud Computing est un modèle qui permet aux fournisseurs de partager leurs ressources et aux utilisateurs d’y accéder de manière pratique et à la demande. Dans un tel environnement multi-tenant, l'utilisation de modèles de processus configurables permet aux fournisseurs de processus Cloud de fournir un processus personnalisable qui peut être configuré par différents tenants en fonction de leurs besoins.Un processus métier peut être spécifié par plusieurs perspectives tel que la perspective de flux de contrôle, la perspective des ressources, etc. Plusieurs approches ont été proposées au niveau des premières perspectives, notamment le flux de contrôle. Cependant, la perspective ressource, qui est d'une importance égale, était négligée et pas explicitement définie. D’un côté, la gestion de la perspective ressource spécifiquement l’allocation des ressources Cloud est un thème d’actualité qui implique plusieurs recherches. La modélisation et la configuration des ressources sont une tâche sensible nécessitant un travail intensif. Malgré l’existence de différentes approches, elles traitent principalement les ressources humaines plutôt que des ressources Cloud. D’un autre côté, malgré le fait que le concept des modèles de processus configurables est très complémentaire au Cloud, la manière dont comment les ressources sont configurées et intégrées est à peine manipulée. Les approches proposées travaillant sur l’extension de la configuration de ressources, ne couvrent pas les propriétés Cloud notamment l’élasticité et le partage.Pour répondre à ces lacunes, nous proposons une approche pour supporter la modélisation et la configuration de l’allocation des ressources Cloud dans les modèles de processus configurables. Nous visons à (1) définir une description unifiée et formelle pour la perspective ressource, (2) assurer une allocation de ressource correcte, sans conflits et optimisée, (3) Aider les fournisseurs de processus à concevoir leur allocation de ressources configurable de manière fine afin d'éviter des résultats complexes et importants, et (4) Optimiser la sélection des ressources Cloud par rapport aux exigences liées aux propriétés Cloud (élasticité et partage) et propriétés QoS.Pour ce faire, nous proposons d'abord un cadre sémantique pour une description de ressources sémantiquement enrichies dans les processus métiers visant à formaliser les ressources Cloud consommées à l'aide d'une base de connaissances partagée. Ensuite, nous nous basons sur les processus métiers sociales pour fournir des stratégies afin d'assurer une allocation de ressources contrôlée sans conflits en termes de ressources. Par la suite, nous proposons une nouvelle approche qui étend les modèles de processus configurables pour permettre une allocation de ressources Cloud configurable. Notre objectif est de déplacer l'allocation de ressources Cloud du côté des tenants vers le côté du fournisseur de processus Cloud pour une gestion centralisée des ressources. Après, nous proposons des approches génétiques qui visent à choisir une configuration optimale des ressources d'une manière efficace sur le plan énergétique en améliorant les propriétés QoS.Afin de montrer l'efficacité de nos propositions, nous avons développé concrètement (1) une série de preuves de concepts, en tant que partie de validation, pour aider à concevoir des modèles de processus et remplir une base de connaissances de modèles de processus hétérogènes avec des ressources Cloud et (2) ont effectué des expériences sur des modèles de processus réels à partir de grands ensembles de données
Organizations are recently more and more adopting Process-Aware Information Systems (PAIS) for managing their service-based processes using process models referred to as business process models. Motivated by adapting to the rapid changing business requirements and reducing maintenance costs, organizations are outsourcing their processes in an important infrastructure which is Cloud Computing. According to the NIST Institute, Cloud Computing is a model that enables providers sharing their computing resources (e.g., networks, applications, and storage) and users accessing them in convenient and on-demand way with a minimal management effort. In such a multi-tenant environment, using configurable process models allows a Cloud process provider to deliver a customizable process that can be configured by different tenants according to their needs.A business process could be specified from various perspectives such as the control-flow perspective, the organizational perspective, the resource perspective, etc. Several approaches have been correctly proposed at the level of the first perspectives, in particular the control-flow, i.e., the temporal ordering of the process activities. Nevertheless, the resource perspective, which is of equal importance, has been neglected and poorly operated. The management of the resource perspective especially the Cloud resource allocation in business processes is a current interesting topic that increasingly involves many researches in both academics and industry. The design and configuration of resources are undoubtedly sensitive and labor-intensive task. On the one hand, the resource perspective in process models is not explicitly defined. Although many proposals exist in the literature, they all targeted human resources rather than Cloud resources. On the other hand, despite of the fact that the concept of configurable process models is highly complementary to Cloud Computing, the way in how resources can be configured and integrated is hardly handled. The few proposals, which have been suggested on extending configuration to resources, do not cover required Cloud properties such as elasticity or multi-tenancy.To address these limitations, we propose an approach for supporting the design and configuration of Cloud resource Allocation in configurable business process models. We target to (1) define a unified and formal description for the resource perspective, (2) ensure a correct, free-of-conflict and optimized use of Cloud resource consumption, (3) assist process providers to design their configurable resource allocation in a fine-grained way to avoid complex and large results, and (4) optimize the selection of Cloud resources with respect to the requirements related to Cloud properties (elasticity and shareability) and QoS properties.To do so, we first suggest a semantic framework for a semantically-enriched resource description in business processes aiming at formalizing the consumed Cloud resources using a shared knowledge base. Then, we build upon social business processes to provide strategies in order to ensure a controlled resource allocation without conflicts in terms of resources. Next, we propose a novel approach that extends configurable process models to permit a configurable Cloud resource allocation. Our purpose is to shift the Cloud resource allocation from the tenant side to the Cloud process provider side for a centralized resource management. Afterwards, we propose genetic-based approaches that aim at selecting optimal resource configuration in an energy efficient manner and to improve non-functional properties.In order to show the effectiveness of our proposals, we concretely developed (i) a set of proof of concepts, as a validation part, to assist the design of process models and populate a knowledge base of heterogeneous process models with Cloud resources, and (ii) performed experiments on real process models from large datasets
APA, Harvard, Vancouver, ISO, and other styles
16

Gibbs, S. F. "An examination of near-graduates' computer self-efficacy in light of business employers' expectations." Diss., Lincoln University, 2009. http://hdl.handle.net/10182/1448.

Full text
Abstract:
The use of computers has become part of every day life. The high prevalence of computer use may lead employers to assume university graduates will have good computing skills. Such assumptions may be the reason that employers use broad terms to advertise the computing tasks required for graduate-level positions. This thesis investigates how well the expectations of employers match the perceptions of near-graduates about their computer skills. Four graduate-level positions were identified from advertisements placed in order to recruit graduates. The employers who placed these advertisements were surveyed by interview and questionnaire. Twenty-one students about to graduate from a university commerce programme were also interviewed and surveyed. It was found that the wording of the advertisements did not satisfactorily portray the requirements and intentions of the employers. It was also found that skills the near-graduates perceived they possessed frequently did not meet the expectations of employers. Results also show that the near-graduates did not fully understand which computing skills would be expected in the workplace. This study highlights implications for three groups: employers, graduates and educators.
APA, Harvard, Vancouver, ISO, and other styles
17

Chiza, Albin Boris Lugerero. "Adoption of cloud computing services amongst the micro-enterprise sector in Cape Town." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2862.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2018.
Micro-enterprises play a vital role towards the South Africa’s economic growth by contributing towards job creation. Despite the importance of the role of micro-enterprises, micro-enterprises face several challenges such as lack of finance, lack of skilled workers and lack of technological resources. Previous studies indicate that Information Technology has a distinct role in assisting micro-enterprises overcome several challenges. It is further evidenced in the extant literature that cloud computing, provides a low cost entry for enterprises to support several facets of their business operations. In the current era cloud computing requires a constant as well as fast internet connection and the South African government has various interventions to address the infrastructure divide. However, we have a scant understanding of the adoption challenges amongst micro-enterprises to adopt cloud solutions, which to date feature more prominently amongst larger organisations. This research investigated the factors that influence cloud computing adoption in the micro-enterprise sector in Cape Town. This is a city that promotes the contribution of micro-enterprises to their economic activity, and was such an ideal location to investigate cloud computing adoption amongst the micro-enterprise sector. This research provides a rich understanding of the factors that influence micro-enterprises in Cape Town to adopt cloud computing services and proposes guidelines to encourage micro-enterprises in Cape Town to use cloud services to improve their productivity. The researcher uses the UTAUT model as a framework and a qualitative research methodology to investigate the research question. Data for this research study was collected via face to face interviews with semi-structured questions of ten micro-enterprises and an IT expert. The findings showed that the factors influencing the adoption of cloud computing services are performance expectancy, effort expectancy, social influence, facilitating conditions, lack of training, cost efficiency and reduction of working hours.
APA, Harvard, Vancouver, ISO, and other styles
18

Macias, Lloret Mario. "Business-driven resource allocation and management for data centres in cloud computing markets." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/144562.

Full text
Abstract:
Cloud Computing markets arise as an efficient way to allocate resources for the execution of tasks and services within a set of geographically dispersed providers from different organisations. Client applications and service providers meet in a market and negotiate for the sales of services by means of the signature of a Service Level Agreement that contains the Quality of Service terms that the Cloud provider has to guarantee by managing properly its resources. Current implementations of Cloud markets suffer from a lack of information flow between the negotiating agents, which sell the resources, and the resource managers that allocate the resources to fulfil the agreed Quality of Service. This thesis establishes an intermediate layer between the market agents and the resource managers. In consequence, agents can perform accurate negotiations by considering the status of the resources in their negotiation models, and providers can manage their resources considering both the performance and the business objectives. This thesis defines a set of policies for the negotiation and enforcement of Service Level Agreements. Such policies deal with different Business-Level Objectives: maximisation of the revenue, classification of clients, trust and reputation maximisation, and risk minimisation. This thesis demonstrates the effectiveness of such policies by means of fine-grained simulations. A pricing model may be influenced by many parameters. The weight of such parameters within the final model is not always known, or it can change as the market environment evolves. This thesis models and evaluates how the providers can self-adapt to changing environments by means of genetic algorithms. Providers that rapidly adapt to changes in the environment achieve higher revenues than providers that do not. Policies are usually conceived for the short term: they model the behaviour of the system by considering the current status and the expected immediate after their application. This thesis defines and evaluates a trust and reputation system that enforces providers to consider the impact of their decisions in the long term. The trust and reputation system expels providers and clients with dishonest behaviour, and providers that consider the impact of their reputation in their actions improve on the achievement of their Business-Level Objectives. Finally, this thesis studies the risk as the effects of the uncertainty over the expected outcomes of cloud providers. The particularities of cloud appliances as a set of interconnected resources are studied, as well as how the risk is propagated through the linked nodes. Incorporating risk models helps providers differentiate Service Level Agreements according to their risk, take preventive actions in the focus of the risk, and pricing accordingly. Applying risk management raises the fulfilment rate of the Service-Level Agreements and increases the profit of the provider
APA, Harvard, Vancouver, ISO, and other styles
19

Tatnall, Arthur, and mikewood@deakin edu au. "A curriculum history of business computing in Victorian Tertiary Institutions from 1960-1985." Deakin University, 1993. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051201.145413.

Full text
Abstract:
Fifty years ago there were no stored-program electronic computers in the world. Even thirty years ago a computer was something that few organisations could afford, and few people could use. Suddenly, in the 1960s and 70s, everything changed and computers began to become accessible. Today* the need for education in Business Computing is generally acknowledged, with each of Victoria's seven universities offering courses of this type. What happened to promote the extremely rapid adoption of such courses is the subject of this thesis. I will argue that although Computer Science began in Australia's universities of the 1950s, courses in Business Computing commenced in the 1960s due to the requirement of the Commonwealth Government for computing professionals to fulfil its growing administrative needs. The Commonwealth developed Programmer-in-Training courses were later devolved to the new Colleges of Advanced Education. The movement of several key figures from the Commonwealth Public Service to take up positions in Victorian CAEs was significant, and the courses they subsequently developed became the model for many future courses in Business Computing. The reluctance of the universities to become involved in what they saw as little more than vocational training, opened the way for the CAEs to develop this curriculum area.
APA, Harvard, Vancouver, ISO, and other styles
20

O'Neal, Matthew R., and Joshua S. Dixon. "Defense Strategic and Business case analyses for commercial products in secure mobile computing." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10773.

Full text
Abstract:
MBA Professional Report
The Defense (DoD) lags behind commercial entities in terms of adopting mobile computing technologies. Commercial smartphones offer scalable solutions to meet requirements ranging from business functions to tactical operations; however, these solutions require considerations beyond those applicable to the commercial sector. This research identifies whether potential solutions may contribute to three objectives: 1) reduce the DoD's currently high device and service costs; 2) increase the DoD's smartphone functionality; 3) maintain or increase the level of security functionality available in commercial devices for DoD. A strategic analysis of the commercial mobile communications industry highlights the business drivers and motivations of industry participants. This information is used to identify the DoD's strategic options, which, in turn, serve as the basis of business cases for adopting future smartphone capabilities. Business case analyses compare proposed cost models with the cost models for current smartphone implementations. Results indicate growing strategic opportunities for the DoD to acquire more economical commercial handsets and more flexible network services. The business cases may potentially save billions of dollars over seven years-i.e., the estimated life cycle of cellular network equipment. Risk assessments demonstrate the strong potential for the proposed solutions to maintain handset functionality, security features, and network coverage.
APA, Harvard, Vancouver, ISO, and other styles
21

Brady, Tim. "Software make or buy decisions in the first forty years of business computing." Thesis, University of Sussex, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sinha, Prasanta S. M. Massachusetts Institute of Technology. "Non-linear revenue creating business platform for IT service companies using cloud computing." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/73420.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 63).
The Indian Information Technology (IT) & Business process outsourcing (BPO) companies are going through an inflection point. They have been growing revenue by over 20% on a yearly basis for the last decade. This revenue growth has been fueled by a proportionate increase in employee headcount. Their ability to maintain the growth rate is in question, partly due to the difficultly in increasing the headcount and partly due to competition from multinational IT Service companies growing their business in India. In order to continue to grow, the Indian IT companies need to change their business model and look for nonlinear revenue growth, which is independent of the resource deployed or effort spent. Cloud computing provides a new strategic option for growth for the Indian IT-BPO companies. This thesis looks into Business Service Platform based on cloud computing and how the IT companies can leverage it to generate nonlinear revenue. It also explores ways to implement the business platform, along with risks and challenges involved. The IT companies would need to change their current sales and marketing process, along with talent recruitment guidelines and training content in order to successfully roll out the platforms, on which its future growth is dependent.
by Prasanta Sinha.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
23

Leon, Franck. "La construction des Business Models des fournisseurs de services d'infrastructure Cloud Computing (IaaS)." Thesis, Nice, 2015. http://www.theses.fr/2015NICE0006/document.

Full text
Abstract:
L’émergence du Cloud Computing change le paysage des infrastructures qui soutiennent les systèmes informatiques. L’originalité du Cloud Computing réside avant tout dans l’offre d’un nouveau mode de consommation proposé aux clients: les ressources informatiques en tant que service à la demande. Les fournisseurs de "hardware" et de "software" qui ont historiquement fondé leurs revenus sur la vente de produits matériels et de licences logiciels ont fait face à un changement de leurs modèles de revenus, et donc à considérer de nouveau Business Models. Ce travail révèle que les fournisseurs de services d’infrastructure Cloud Computing se définissent comme étant des opérateurs Cloud. Ils ont un rôle d’agrégateur de service et proposent des services d’infrastructures fonctionnelles, disponible à la demande et accessible à distance. Ces fournisseurs construisent un écosystème de partenaires-fournisseurs et un écosystème de partenaires-produits pour accroitre la valeur ajoutée globale. La garantie de niveau de service (SLA) devient l’objet de la transaction entre le fournisseur et le client. Ce dernier se décharge de toutes les problématiques techniques, et les transfère au fournisseur lors de la signature du contrat. Lors de la fixation des prix, une hypothèse de taux d’usage est prise en compte et sera à la base des calculs des coûts. Nous proposons alors trois leviers d’actions aux fournisseurs d’infrastructure Cloud Computing pour accroître leur part de valeur ajoutée : (1) la baisse des coûts par l’innovation technologique, (2) la capacité d’attirer et de garder les clients pour avoir un taux d’usage élevé, et (3) le développement d’un écosystème de services
The emergence of cloud computing is changing the landscape of the infrastructure supporting IT systems. The originality of cloud computing lies primarily in the offer of a new consumption mode available to consumers: IT resources as a service provided on demand. IT providers that have based their income from products sales (hardware and software licenses) faced a change in their revenue models, and thus have to consider new business models. This research reveals that IaaS provider is defined as cloud operators. They are service aggregator and offer functional infrastructure available on demand available over the network. IaaS providers are building a supplier-partners and product-partners ecosystems to increase the overall value. When consumers sign contract, they declaim all technical issues by transferring them to providers. Service Level Agreement (SLA) becomes the object of transaction between providers and consumers. For the pricing process, rate of use is the basis of cost assessment. We suggest three leverage to IaaS providers in order to increase their share of value added: (1) lower costs through technological innovation, (2) ability to attract and retain customers to have high rate of use, and (3) development of services ecosystem
APA, Harvard, Vancouver, ISO, and other styles
24

Lukášová, Pavlína. "Cloud Computing jako nástroj BCM." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-75556.

Full text
Abstract:
This thesis deals with possible interconnections between two concepts playing a big role in contemporary business and IT world. These concepts are Business Continuity Management and Cloud Computing. In the scope of this thesis there are certain areas identified where both concepts are complement, where Cloud Computing brings new opportunities for Business Continuity Management and where could possible problems arise during particular implementation. From the BCM perspective the impact lies on IT services, from the Cloud Computing perspective the thesis deals especially with security aspects. The thesis is also aimed at the characteristics of higher education and basic differences from commercial sphere. Based on defined differences and identified interconnections between BCM and Cloud Computing, the thesis argues for usage of suitable Cloud Computing solution for higher education regarding Business Continuity improvement. The multi-criterion comparison of several Infrastructure-as-a-Service solutions stems from this analysis focusing on technical, financial, and Business Continuity aspects. The result from this comparison together with conclusions from previous chapters serve as an input for subsequent practical proposal of Cloud Computing solution and its verification against Business Continuity improvement in specific conditions on University of Economics in Prague. The proposal is also represented by strategic map.
APA, Harvard, Vancouver, ISO, and other styles
25

Celaya, Tracy A. "Cloud-Based Computing and human resource management performance| A Delphi study." Thesis, University of Phoenix, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10004286.

Full text
Abstract:

The purpose of this qualitative study with a modified Delphi research design was to understand the reasons human resource (HR) leaders are slow to implement Cloud-based technologies and potentially identify how Cloud-Based Computing influences human resource management (HRM) and HR effectiveness, and potentially the overall performance of the organization. Business executives and HR leaders acknowledge the effect of technology on business processes and strategies, and the leader's influence on technology implementation and adoption. Cloud-Based Computing is fast becoming the standard for conducting HR processes and HR leaders must be prepared to implement the change effectively. Study findings revealed characteristics demonstrated by HR leaders successfully implementing cloud technology, best practices for successful implementation, factors championing and challenging Cloud-Based Computing adoption, and effects on HRM and organizational performance as a result of using Cloud-Based Computing. The outcomes of this study may provide the foundation of a model for implementing Cloud-Based Computing, a leadership model including characteristics of technology early adopters in HR, and identify factors impeding adoption and may assist HR leaders in creating effective change management strategies for adopting and implementing Cloud-Based Computing. Findings and recommendation from this study will enable HR professionals and leaders to make informed decisions on the adoption of Cloud-Based Computing and improve the effectiveness, efficiency, and strategic capability of HR.

APA, Harvard, Vancouver, ISO, and other styles
26

Hadded, Leila. "Optimization of autonomic resources for the management of service-based business processes in the Cloud." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL006/document.

Full text
Abstract:
Le Cloud Computing est un nouveau paradigme qui fournit des ressources informatiques sous forme de services à la demande via internet fondé sur le modèle de facturation pay-per-use. Il est de plus en plus utilisé pour le déploiement et l’exécution des processus métier en général et des processus métier à base de services (SBPs) en particulier. Les environnements cloud sont généralement très dynamiques. À cet effet, il devient indispensable de s’appuyer sur des agents intelligents appelés gestionnaires autonomiques (AMs), qui permettent de rendre les SBPs capables de se gérer de façon autonome afin de faire face aux changements dynamiques induits parle cloud. Cependant, les solutions existantes sont limitées à l’utilisation soit d’un AM centralisé, soit d’un AM par service pour gérer un SBP. Il est évident que la deuxième solution représente un gaspillage d’AMs et peut conduire à la prise de décisions de gestion contradictoires, tandis que la première solution peut conduire à des goulots d’étranglement au niveau de la gestion du SBP. Par conséquent, il est essentiel de trouver le nombre optimal d’AMs qui seront utilisés pour gérer un SBP afin de minimiser leur nombre tout en évitant les goulots d’étranglement. De plus, en raison de l’hétérogénéité des ressources cloud et de la diversité de la qualité de service (QoS) requise par les SBPs, l’allocation des ressources cloud pour ces AMs peut entraîner des coûts de calcul et de communication élevés et/ou une QoS inférieure à celle exigée. Pour cela, il est également essentiel de trouver l’allocation optimale des ressources cloud pour les AMs qui seront utilisés pour gérer un SBP afin de minimiser les coûts tout en maintenant les exigences de QoS. Dans ce travail, nous proposons un modèle d’optimisation déterministe pour chacun de ces deux problèmes. En outre, en raison du temps nécessaire pour résoudre ces problèmes qui croît de manière exponentielle avec la taille du problème, nous proposons des algorithmes quasi-optimaux qui permettent d’obtenir de bonnes solutions dans un temps raisonnable
Cloud Computing is a new paradigm that provides computing resources as a service over the internet in a pay-per-use model. It is increasingly used for hosting and executing business processes in general and service-based business processes (SBPs) in particular. Cloud environments are usually highly dynamic. Hence, executing these SBPs requires autonomic management to cope with the changes of cloud environments implies the usage of a number of controlling devices, referred to as Autonomic Managers (AMs). However, existing solutions are limited to use either a centralized AM or an AM per service for managing a whole SBP. It is obvious that the latter solution is resource consuming and may lead to conflicting management decisions, while the former one may lead to management bottlenecks. An important problem in this context, deals with finding the optimal number of AMs for the management of an SBP, minimizing costs in terms of number of AMs while at the same time avoiding management bottlenecks and ensuring good management performance. Moreover, due to the heterogeneity of cloud resources and the diversity of the required quality of service (QoS) of SBPs, the allocation of cloud resources to these AMs may result in high computing costs and an increase in the communication overheads and/or lower QoS. It is also crucial to find an optimal allocation of cloud resources to the AMs, minimizing costs while at the same time maintaining the QoS requirements. To address these challenges, in this work, we propose a deterministic optimization model for each problem. Furthermore, due to the amount of time needed to solve these problems that grows exponentially with the size of the problem, we propose near-optimal algorithms that provide good solutions in reasonable time
APA, Harvard, Vancouver, ISO, and other styles
27

Sangupamba, Mwilu Odette. "De la business intelligence interne vers la business intelligence dans le cloud : modèles et apports méthodologiques." Thesis, Paris, CNAM, 2018. http://www.theses.fr/2018CNAM1168/document.

Full text
Abstract:
La BI et le cloud computing sont deux grands sujets de recherche en informatique et en système d’information en particulier. Une recherche combinant ces deux concepts est d'un intérêt double : D’une part, dans les entreprises, la BI devient de plus en plus une partie importante du système d'information qui nécessite des investissements en termes de performances de calcul et des volumes de données. D’autre part, le cloud computing offre de nouvelles opportunités pour gérer les données à des fins d’analyse.Etant donné les possibilités de cloud, la question de la migration de l'ensemble du système d’information y compris la BI est d'un grand intérêt. En particulier, les chercheurs doivent fournir aux professionnels des modèles et des méthodes qui puissent les aider à migrer vers le cloud.Que faire pour que la BI puisse fournir aux managers un service de mise à disposition de données d’analyse au travers du cloud ? La question de recherche est : Comment aider les organisations à migrer leur BI vers le cloud ?Dans cette thèse, nous répondons à cette question en utilisant l'approche science de conception (design science). Nous mettons en place une aide à la décision de la migration de la BI vers le cloud qui s'appuie sur les taxonomies. Nous proposons un modèle de guidage opérationnel qui est instancié par une taxonomie de la BI dans le cloud et dont découlent les règles pour la migration de la BI vers le cloud
BI and cloud computing are two major areas of computer science research and in particular in information system. A research combining these two concepts has a double interest : On the one hand, in business, the BI becomes increasingly an important part of the information system which requires investment in terms of computing performance and data volumes. On the other hand, cloud computing offers new opportunities to manage data for analysis.Given the possibilities of cloud, migration question of the information system including BI is of great interest. In particular, researchers must provide models and methods to help professional in BI migration to the cloud.The research question is : how to migrate BI to the cloud?In this thesis, we address this issue using design science research approach. We implement a decision-making help for BI migration to the cloud based on taxonomies. We provide an operational guidance model that is instantiated by a BI taxonomy in the cloud and from that rules for BI migration to the cloud are arised
APA, Harvard, Vancouver, ISO, and other styles
28

Powelson, Steven E. "An Examination of Small Businesses' Propensity to Adopt Cloud-Computing Innovation." ScholarWorks, 2011. https://scholarworks.waldenu.edu/dissertations/990.

Full text
Abstract:
The problem researched was small business leaders' early and limited adoption of cloud computing. Business leaders that do not use cloud computing may forfeit the benefits of its lower capital costs and ubiquitous accessibility. Anchored in a diffusion of innovation theory, the purpose of this quantitative cross-sectional survey study was to examine if there is a relationship between small business leaders' view of cloud-computing attributes of compatibility, complexity, observability, relative advantage, results demonstrable, trialability, and voluntariness and intent to use cloud computing. The central research question involved understanding the extent to which each cloud-computing attribute relate to small business leaders' intent to use cloud computing. A sample of 3,897 small business leaders were selected from a commerce authority e-mail list yielding 151 completed surveys that were analyzed using regression. Significant correlations were found for the relationships between the independent variables of compatibility, complexity, observability, relative advantage, and results demonstrable and the dependent variable intent to use cloud computing. However, no significant correlation was found between the independent variable voluntariness and intent to use. The findings might provide new insights relating to cloud-computing deployment and commercialization strategies for small business leaders. Implications for positive social change include the need to prepare for new skills for workers affected by cloud computing adoption and cloud-computing ecosystem's reduced environmental consequences and policies.
APA, Harvard, Vancouver, ISO, and other styles
29

van, Ketwich Willem. "IT Governance of Cloud Computing| Performance Measures using an IT Outsourcing Perspective." Thesis, University of Melbourne (Australia), 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527429.

Full text
Abstract:

With the advent of cloud computing and the success of the cloud computing industry, organisations are beginning to adopt this service model and technology at an increasing rate. As the rate and level of use increases, organisations are faced with how best to govern these investments and obtain maximum benefit from the services offered by providers. This includes measuring the performance of these services, the corresponding organisational performance and the associated business value generated. In investigating these areas, this study compares cloud computing and IT outsourcing. It is found that while cloud measures relate, to a great extent, to the operational level of an organisation, IT outsourcing measures are concerned more with the strategic level. This highlights that cloud computing lacks strategic measures and that measures from IT outsourcing may be adopted to fill this gap.

APA, Harvard, Vancouver, ISO, and other styles
30

Osei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.

Full text
Abstract:

The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.

APA, Harvard, Vancouver, ISO, and other styles
31

Náhlovský, Tomáš. "Business Intelligence v prostředí Cloudu." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-203999.

Full text
Abstract:
This master thesis deals with Business Intelligence in Cloud computing environment and comparing some of available solutions, that are currently offered on the market. The theoretical part focuses on definition of Business Intelligence and Cloud computing terms and combination thereof, including a description of the components, functionalities and technologies that use. The theoretical part describes, among other, the current trends from the world of Business Intelligence. The practical part is then focused on comparing traditional approach to Business Intelligence solutions and solutions in the Cloud. It describes the components of the cloud and migration process from traditional solution to the Cloud. The practical part includes an analysis of the current market for Business Intelligence, selection of three providers based on analysis and a description of their solutions and evaluation of these tools. The basic objectives and benefits of this master thesis include a general definition of the concepts of BI and analysis of available solutions, including comparisons.
APA, Harvard, Vancouver, ISO, and other styles
32

Adam, Otmar. "Soft Business Process Management : Darstellung, Überwachung und Verbesserung von Geschäftsprozessen mit Methoden des Soft Computing /." Berlin : Logos, 2009. http://d-nb.info/999025317/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Arsanjani, Ali. "Grammar-oriented object design : towards dynamically reconfigurable business and software architecture for on-demand computing." Thesis, De Montfort University, 2003. http://hdl.handle.net/2086/13250.

Full text
Abstract:
Grammar-oriented Object Design was shown to be a potent combination of extending methods, incorporating DSLs from a given business domain (BDSLs) and Variation-oriented Design in order to provide a seamless transition from business models to component-based software architectures. GOOD starts by extending current object modeling techniques to include the discovery and explicit modeling of higher levels of reuse, starting from subsystems, defining their manners using a domain-specific business language, i.e., using use-case gramars, that describe the rules governing the creation, dynamic configuration and collaboration of large-grained, business-process-scale, adaptive software components with pluggable behavior, through the application of architectural patterns and representation of component manners in the BDSL. 1his presents immense potential for applications in the domains of grid services, services on demand and a utility-based model of computing where a business need initiates the convergence of application components based on/from the manners of services they provide and require.
APA, Harvard, Vancouver, ISO, and other styles
34

Martin, Ian. "Centring the computer in the business of banking : Barclays Bank and technological change, 1954-1974." Thesis, University of Manchester, 2010. https://www.research.manchester.ac.uk/portal/en/theses/centring-the-computer-in-the-business-of-banking-barclays-bank-and-technological-change-19541974(0a462d05-9094-4c0d-9171-079db2c25492).html.

Full text
Abstract:
The introduction of large-scale computing technology into British high street banking in the 1960s was a solution to shortages of space and staff. Computers required a first-time dislocation of customer accounting from its confines in the branch, where it had been dealt with by paper-based and mechanised systems, to a new space: the bank computer centre. The implications of this shift have, up until now, not been explored. While historians of business and technology have stressed the continuities between computerisation, punched-card machines, and centralised work, the demands of the computer on decentralised business activities have received little attention. This thesis addresses that shortcoming.The main vehicle for my analysis is a case study of Barclays Bank. I begin in 1954, when the bank took its initial steps towards branch computerisation, and end twenty years later, when the last of its branches was connected to the system. Blending oral testimonies with visual and written sources, I follow activities inside and outside the computer centre to consider the relationship between computers, business, space and work as the material and discursive aspects of computing technology are connected to existing banking practice.I contend that while computers did not appear to achieve the quantitative changes in staffing and space that the banks initially desired, there were qualitative effects that reveal different dimensions to technological change. I demonstrate how the computer centre was constructed as an iconic symbol of modernity to project a new organisational identity for the banks; how technology’s materiality changed the look of banking and signalled the approach of “Americanisation”; how the computer could provide opportunities both for learning and for expensive failure; and how the computer centre was a place that reconfigured temporal, occupational and organisational structures to become a nexus of new careers for bank workers turned computer specialists. The result is an analysis of computing use that moves beyond simple causal connections between computers, space and work to highlight the reciprocal and changing nature of their relationships.
APA, Harvard, Vancouver, ISO, and other styles
35

Bohling, Timothy R. "Predicting Purchase Timing, Brand Choice and Purchase Amount of Firm Adoption of Radically Innovative Information Technology: A Business to Business Empirical Analysis." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/bus_admin_diss/3.

Full text
Abstract:
Knowing what to sell, when to sell, and to whom to sell is essential buyer behavior insight to allocate scarce marketing resources efficiently and effectively. Applying the theory of relationship marketing (Morgan and Hunt 1994), this study seeks to investigate the link between commitment and trust and firm adoption of radically innovative information technology (IT). The construct of radical innovation is operationalized through the use of cloud computing. A review of the vast scholarly literature on radical innovation diffusion and adoption, and modeling techniques used to analyze buyer behavior is followed by empirical estimation of each of the radical innovation adoption questions of purchase timing, brand choice, and purchase amount. Then, the inefficiencies in the independent model process are highlighted, suggesting the need for an integrated model. Next, an integrated model is developed to link the purchase timing, brand choice, and purchase amount decisions. The essay concludes with insight for marketing practitioners on the strength of the factors of commitment and trust on adoption of radical innovation, an improved methodology for the business-to-business marketing literature, and potential further research paths.
APA, Harvard, Vancouver, ISO, and other styles
36

Taymouri, Farbod. "Light methods for conformance checking of business processes." Doctoral thesis, Universitat Politècnica de Catalunya, 2018. http://hdl.handle.net/10803/664708.

Full text
Abstract:
Conformance Checking is a new research discipline devoted to identify deviations between business process models and their real executions. Identifying deviations boils down to the notion of alignment conceptually. An alignment quantifies to what degree a process model can imitate what happened in its observed behavior, i.e., an event log. Accordingly, an optimal alignment is the best combination by which the process model can imitate the corresponding observed behavior. The state of the art technique for alignment computation has exponential time and space complexity, hindering its applicability for medium and large instances. The main aim of this thesis is to propose light and efficient methods for alignment computation. By finding a suitable trade-off between computation time, memory consumption and optimality, a familly of techniques is proposed such that depending on the input assumptions and required guarantees, a user can select the right technique for her particular problem. Generally speaking, the methods presented in this thesis can be categorized as: - Classical approaches: These techniques exploit Integer Linear Programming (ILP), as well as structural theory of Petri nets, to formulate alignment computation as an optimization of a set of linear equations. A modification to this strategy which trades-off between complexity and quality is to integrate it with state of the art approach. - Heuristic approaches: These techniques take advantages of heuristic functions to explore the search space of alignments, to find the optimal one(s). This can be done by obtaining an initial solution, and iteratively improving it until saturation or reaching a certain criterion. Another contribution is by adopting a Genetic Algorithm with well specific designed operators, by which exploration of the corresponding search space can be speed up toward the best solution(s). - Model reduction: An alternative way to boost the effectiveness of alignment computation is by reducing model and observed behavior without loosing alignment information. This structure reduction not only boosts the alignment computation, but also provides a big picture of detected deviations. Above that, a divide-and-conquer strategy will be provided for the ILP approach, such that it breaks the original problem into a set of smaller independent problems that can be solved independently. Experiments witness the merit of proposed approaches with respect to state of the art technique in different perspectives, such as resource consumption, execution time, quality and accuracy of the solutions found. All methods have been implemented as a stand-alone tool box called ALI.
Conformance checking és una nova disciplina dedicada a identificar desviacions entre els models de processos de negoci i les seves execucions reals. Identificar les desviacions porta directament al concepte d'alineament. Un alineament quantifica el grau en que un model de procés pot imitar el que va passar en el seu comportament observat, és a dir, un registre d'esdeveniments. En conseqüència, una alineament òptim és la millor combinació per la qual el model de procés pot imitar el comportament observat. La tècnica de referència per a la computació d'alineaments té una complexitat exponencial, el que dificulta la seva aplicabilitat per a casos mitjans o grans. L'objectiu principal d'aquesta tesi és proposar mètodes eficients per a la computació d'alineaments. En trobar un punt raonable entre el temps d'execució, el consum de memòria i la optimalitat, es proposa una família de tècniques de manera que, segons els supòsits d'entrada i les garanties requerides, un usuari pot seleccionar la tècnica adequada per al seu problema. En termes generals, els mètodes presentats en aquesta tesi es poden classificar com: Enfocaments clàssics: aquestes tècniques utilitzen la Programació Lineal Entera (anglès, ILP), així com la teoria estructural de les xarxes Petri, per realitzar la computació d'alineaments com una optimització d'un conjunt d'equacions lineals. Una modificació d'aquesta estratègia, que pondera la complexitat i la qualitat, és la d'integrar-la amb l'enfocament de referència. Aproximacions heurístiques: aquestes tècniques aprofiten funcions heurístiques per explorar l'espai de cerca d'alineaments, per trobar les solucions properes a l'òptim. Això es pot fer obtenint una solució inicial, que es millorarà iterativament fins a la saturació, o bé assolint un criteri determinat de convergència. Una altra contribució és l'adopció d'un algoritme evolutiu amb operadors específics, que permeten guiar l'exploració de l'espai de cerca corresponent cap a les millors solucions. Reducció de models: una forma alternativa de potenciar l'efectivitat de la computació d'alineaments és reduint el comportament modelat i observat sense perdre la informació d'alineaments. Aquesta reducció d'estructura no només alleugereix el problema, sinó que també proporciona una visió abstracta de les desviacions detectades. Addicionalment, es proposa una estratègia de divideix i vèncer per a l'enfocament de l'ILP, que trenca el problema original en un conjunt de problemes independents més petits que es poden resoldre de forma independent. Els experiments realitzats per cada tècnica demostren la capacitat dels algorismes proposats, en diferents perspectives, com ara el consum de recursos, el temps d'execució, la qualitat i la precisió de les solucions trobades. Tots els mètodes s'han implementat en el software open-source ALI.
APA, Harvard, Vancouver, ISO, and other styles
37

Boubaker, Souha. "Formal verification of business process configuration in the Cloud." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL002/document.

Full text
Abstract:
Motivé par le besoin de la « Conception par Réutilisation », les modèles de processus configurables ont été proposés pour représenter de manière générique des modèles de processus similaires. Ils doivent être configurés en fonction des besoins d’une organisation en sélectionnant des options. Comme les modèles de processus configurables peuvent être larges et complexes, leur configuration sans assistance est sans doute une tâche difficile, longue et source d'erreurs.De plus, les organisations adoptent de plus en plus des environnements Cloud pour déployer et exécuter leurs processus afin de bénéficier de ressources dynamiques à la demande. Néanmoins, en l'absence d'une description explicite et formelle de la perspective de ressources dans les processus métier existants, la correction de la gestion des ressources du Cloud ne peut pas être vérifiée.Dans cette thèse, nous visons à (i) fournir de l’assistance et de l’aide à la configuration aux analystes avec des options correctes, et (ii) améliorer le support de la spécification et de la vérification des ressources Cloud dans les processus métier. Pour ce faire, nous proposons une approche formelle pour aider à la configuration étape par étape en considérant des contraintes structurelles et métier. Nous proposons ensuite une approche comportementale pour la vérification de la configuration tout en réduisant le problème bien connu de l'explosion d'espace d'état. Ce travail permet d'extraire les options de configuration sans blocage d’un seul coup. Enfin, nous proposons une spécification formelle pour le comportement d'allocation des ressources Cloud dans les modèles de processus métier. Cette spécification est utilisée pour valider et vérifier la cohérence de l'allocation des ressources Cloud en fonction des besoins des utilisateurs et des capacités des ressources
Motivated by the need for the “Design by Reuse”, Configurable process models are proposed to represent in a generic manner similar process models. They need to be configured according to an organization needs by selecting design options. As the configurable process models may be large and complex, their configuration with no assistance is undoubtedly a difficult, time-consuming and error-prone task.Moreover, organizations are increasingly adopting cloud environments for deploying and executing their processes to benefit from dynamically scalable resources on demand. Nevertheless, due to the lack of an explicit and formal description of the resource perspective in the existing business processes, the correctness of Cloud resources management cannot be verified.In this thesis, we target to (i) provide guidance and assistance to the analysts in process model configuration with correct options, and to (ii) improve the support of Cloud resource specification and verification in business processes. To do so, we propose a formal approach for assisting the configuration step-by-step with respect to structural and business domain constraints. We thereafter propose a behavioral approach for configuration verification while reducing the well-known state space explosion problem. This work allows to extract configuration choices that satisfy the deadlock-freeness property at one time. Finally, we propose a formal specification for Cloud resource allocation behavior in business process models. This specification is used to formally validate and check the consistency of the Cloud resource allocation in process models according to user requirements and resource capabilities
APA, Harvard, Vancouver, ISO, and other styles
38

Kokkinos, Andreas Filippos, and D'Cruze Ricky Stanley. "Cloud Computing: a new approach for Hallstahammar’s IT companies." Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-11859.

Full text
Abstract:
Thesis Purpose Examine the possibility of small IT companies being benefited from a Cloud Computing transition. Through one case study of a software development company and interviews from five Hallstahmmar’s IT companies, we showed how Cloud Computing can enable organizations to decrease IT investments and related costs. Besides we critically analyzed some drawbacks of this latest concept.   Methodology Primary and secondary data has been collected based on a qualitative method and a structured approach. The collected material of the secondary data was mainly based on latest journals. The interviewing parts have been recorded and summarized.   Theoretical Perspective We have used theories of various aspects of business related to Cloud Computing; e.g. innovation and Cloud Computing, business model and Cloud Computing in order to acquire a complete knowledge base for analyzing our empirical data.   Empirical Foundation A case study of TotalAssist, interview data of LifeCenter AB and interviews of four IT companies of Hallstahammar, are our empirical foundation of the reserach.   Conclusion IT companies of Hallstahammar may adopt the Cloud Computing paradigm. Besides, yet this new concept has its risks. Security remains a concern among many CIO’s. In addition, we recommend means that a company can pursue while implementing a Cloud Computing transition.
APA, Harvard, Vancouver, ISO, and other styles
39

Alarcon, Jean-Luc Bruno. "Emerging Capabilities and Firm Performance in the Cloud Computing Environment." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/493895.

Full text
Abstract:
Business Administration/Interdisciplinary
D.B.A.
New capabilities required to succeed in the new Cloud environment represent a radical change for software companies, which have to transition from selling on-the-premises software products to providing subscription-based cloud services (aka Software-as-a-Service or SaaS). While emerging SaaS vendors have led the exponential growth of the market, the traditional software industry has been disrupted. The purpose of this dissertation is to analyze which capabilities are driving the performance of software firms in today’s cloud-computing environment by drawing upon the resource-based view (RBV) of the firm. What is the optimum spending across the primary firm capabilities (e.g., service delivery, R&D, marketing and sales) to maximize financial performance? This dissertation focuses on publicly-traded SaaS companies using publicly-available information from financial databases, corporate investor relations materials, and industry research. It is comprised of two essays. The first essay is a quantitative study based on secondary data. The second essay includes an extensive literature review, an analysis of in-depth interviews of practitioners, and mini case studies. Together, the essays contribute to RBV theory and provide useful insights to help assess the quality of execution of SaaS growth strategies and improve financial planning and performance in the software industry for the cloud computing environment. Although the results come from firms in the SaaS industry, the findings from this study could cautiously generalize to firms in other emerging technology industries. The dissertation concludes with a detailed agenda for future research.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
40

Giallorenzo, Saverio. "Workflow Patterns for Service Oriented Computing in JOLIE." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3870/.

Full text
Abstract:
Il presente lavoro di tesi ha come punto focale la descrizione, la verifica e la dimostrazione della realizzabilità dei Workflow Patterns di Gestione del Flusso(Control-Flow) e Risorse (Resource) definiti da parte della Workflow Pattern Initiative (WPI)in JOLIE, un innovativo linguaggio di programmazione orientato ai servizi nato nell'ambito del Service Oriented Computing. Il Service Oriented Computing (SOC) è un nuovo modo di pensare la programmazione di applicazioni distribuite, i cui concetti fondamentali sono i servizi e la composizione. L’approccio SOC definisce la possibilità di costruire un’applicazione in funzione dei servizi che ne realizzano il comportamento tramite una loro composizione, definita secondo un particolare flusso di lavoro. Allo scopo di fornire la necessaria conoscenza per capire la teoria, le meccaniche e i costrutti di JOLIE utilizzati per la realizzazione dei pattern, il seguente lavoro di tesi è stato diviso in quattro parti, corrispondenti ad altrettanti capitoli. Nel primo capitolo viene riportata una descrizione generale del SOC e della Business Process Automation (BPA), che costituisce l’ambiente in cui il SOC è inserito. Per questo viene fatta una disamina della storia informatica sui sistemi distribuiti, fino ad arrivare ai sistemi odierni, presentando in seguito il contesto del BPA e delle innovazioni derivanti dalle sue macro-componenti, di cui il SOC fa parte. Continuando la descrizione dell’approccio Service Oriented, ne vengono presentati i requisiti (pre-condizioni) e si cerca di dare una definizione precisa del termine “servizio”, fino all'enunciazione dei principi SOC declinati nell’ottica delle Service Oriented Architectures, presentando in ultimo i metodi di composizione dei servizi, tramite orchestrazione e coreografia. L’ultima sezione del capitolo prende in considerazione il SOC in un’ottica prettamente industriale e ne evidenzia i punti strategici. Il secondo capitolo è incentrato sulla descrizione di JOLIE, gli aspetti fondamentali dell’approccio orientato ai servizi, che ne caratterizzano profondamente la definizione concettuale (SOCK), e la teoria della composizione dei servizi. Il capitolo non si pone come una descrizione esaustiva di tutte le funzionalità del linguaggio, ma considera soprattutto i concetti teorici, le strutture di dati, gli operatori e i costrutti di JOLIE utilizzati per la dimostrazione della realizzabilità dei Workflow Pattern del capitolo successivo. Il terzo capitolo, più lungo e centrale rispetto agli altri, riguarda la realizzazione dei workflow pattern in JOLIE. All'inizio del capitolo viene fornita una descrizione delle caratteristiche del WPI e dei Workflow Pattern in generale. In seguito, nelle due macro-sezioni relative ai Control-Flow e Resource pattern vengono esposte alcune nozioni riguardanti le metodologie di definizione dei pattern (e.g. la teoria sulla definizione delle Colored Petri Nets) e le convezioni adottate dal WPI, per passare in seguito al vero e proprio lavoro (sperimentale) di tesi riguardo la descrizione dei pattern, l’analisi sulla loro realizzabilità in JOLIE, insieme ad un codice di esempio che esemplifica quanto affermato dall'analisi. Come sommario delle conclusioni raggiunte sui pattern, alla fine di ognuna delle due sezioni definite in precedenza, è presente una scheda di valutazione che, con lo stesso metodo utilizzato e definito dalla WPI, permette di avere una rappresentazione generale della realizzabilità dei pattern in JOLIE. Il quarto capitolo riguarda gli esiti tratti dal lavoro di tesi, riportando un confronto tra le realizzazioni dei pattern in JOLIE e le valutazioni del WPI rispetto agli altri linguaggi da loro considerati e valutati. Sulla base di quanto ottenuto nel terzo capitolo vengono definite le conclusioni del lavoro portato avanti sui pattern e viene delineato un’eventuale scenario riguardante il proseguimento dell’opera concernente la validazione ed il completamento della studio. In ultimo vengono tratte alcune conclusioni sia riguardo JOLIE, nel contesto evolutivo del linguaggio e soprattutto del progetto open-source che è alla sua base, sia sul SOC, considerato nell’ambito del BPA e del suo attuale ambito di sviluppo dinamico.
APA, Harvard, Vancouver, ISO, and other styles
41

Murga, Javier, Gianpierre Zapata, Heyul Chavez, Carlos Raymundo, Luis Rivera, Francisco Domínguez, Javier M. Moguerza, and José María Álvarez. "A sentiment analysis software framework for the support of business information architecture in the tourist sector." Springer Science and Business Media Deutschland GmbH, 2020. http://hdl.handle.net/10757/656348.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
In recent years, the increased use of digital tools within the Peruvian tourism industry has created a corresponding increase in revenues. However, both factors have caused increased competition in the sector that in turn puts pressure on small and medium enterprises’ (SME) revenues and profitability. This study aims to apply neural network based sentiment analysis on social networks to generate a new information search channel that provides a global understanding of user trends and preferences in the tourism sector. A working data-analysis framework will be developed and integrated with tools from the cloud to allow a visual assessment of high probability outcomes based on historical data, to help SMEs estimate the number of tourists arriving and places they want to visit, so that they can generate desirable travel packages in advance, reduce logistics costs, increase sales, and ultimately improve both quality and precision of customer service.
APA, Harvard, Vancouver, ISO, and other styles
42

Goettelmann, Elio. "Risk-aware Business Process Modelling and Trusted Deployment in the Cloud." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0144/document.

Full text
Abstract:
L’essor du Cloud Computing, permettant de partager les coûts et les ressources au travers de la virtualisation, présage une interconnexion dynamique et flexible entre entreprises et fournisseurs. Cependant, cette mise en commun de ressources, données et savoir-faire implique de nouvelles exigences en termes de sécurité. En effet, le manque de confiance dans les structures du Cloud est souvent vu comme un frein au développement de tels services. L’objectif de cette thèse est d’étudier les concepts d’orchestration de services, de confiance et de gestion des risques dans le contexte du Cloud. La contribution principale est un framework permettant de déployer des processus métiers dans un environnement Cloud, en limitant les risques de sécurité liés à ce contexte. La contribution peut être séparée en trois partie distinctes qui prennent la forme d'une méthode, d'un modèle et d'un framework. La méthode catégorise des techniques pour transformer un processus métier existant en un modèle sensibilisé (ou averti) qui prend en compte les risques de sécurité spécifiques aux environnements Cloud. Le modèle formalise les relations et les responsabilités entre les différents acteurs du Cloud. Ce qui permet d'identifier les différentes informations requises pour évaluer et quantifier les risques de sécurité des environnements Cloud. Le framework est une approche complète de décomposition de processus en fragments qui peuvent être automatiquement déployés sur plusieurs Clouds. Ce framework intègre également un algorithme de sélection qui combine les information de sécurité avec d'autres critère de qualité de service pour générer des configuration optimisées. Finalement, les travaux sont implémentés pour démontrer la validité de l'approche. Le framework est implémenté dans un outil. Le modèle d'évaluation des risques de sécurité Cloud est également appliqué dans un contexte de contrôle d'accès. La dernière partie présente les résultats de l'implémentation de nos travaux sur un cas d'utilisation réel
Nowadays service ecosystems rely on dynamic software service chains that span over multiple organisations and providers. They provide an agile support for business applications, governments of end-users. This trend is reinforced by the Cloud based economy that allows sharing of costs and resources. However, the lack of trust in such cloud environments, that involve higher security requirements, is often seen as a braking force to the development of such services. The objective of this thesis is to study the concepts of service orchestration and trust in the context of the Cloud. It proposes an approach which supports a trust model in order to allow the orchestration of trusted business process components on the cloud. The contribution is threefold and consists in a method, a model and a framework. The method categorizes techniques to transform an existing business process into a risk-aware process model that takes into account security risks related to cloud environments. The model formalizes the relations and the responsibilities between the different actors of the cloud. This allows to identify the different information required to assess and quantify security risks in cloud environments. The framework is a comprehensive approach that decomposes a business process into fragments that can automatically be deployed on multiple clouds. The framework also integrates a selection algorithm that combines security information with other quality of service criteria to generate an optimized configuration. Finally, the work is implemented in order to validate the approach. The framework is implemented in a tool. The security assessment model is also applied over an access control model. The last part presents the results of the implementation of our work on a real world use case
APA, Harvard, Vancouver, ISO, and other styles
43

Gustafsson, Anders, Mattias Wramsmyr, and Mikaela Claesson. "Mobile Financial Services : Opportunities in Electronic Banking from Wireless Computing Technology." Thesis, Jönköping University, Jönköping International Business School, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-221.

Full text
Abstract:

Bankindustrin är ett typiskt exempel på en industri som har tjänat otroligt mycket på information- och kommunikationsteknologiapplikationer. Dessa applikationer tar formen av Internet-baserad banktjänst, som inkluderar transaktioner av värdepapper, kontouppgifter, presentation av räkningar och betalningar samt transfereringar mellan konton och individer.

Mobila banktjänster är den naturliga förlängningen av dessa typer av tjänster. Med utvecklingen av digitala trådlösa teknologier, som mobiltelefonen, är mobil Internettillgänglighet nu förverkligad.

Denna uppsats undersöker den förändrande miljön i finansindustrin som uppkommit till följd av informationteknologier, och vidare de strategiska affärsmässiga överväganden som måste göras inom detta område.

En kvalitativ fallstudie ansågs vara den mest givande metoden att använda i vår forskning. Genom att undersöka marknade, genom att skicka ut en väl strukturerad enkät till tre av de största svenska bankerna (Nordea, SEB och Handelsbanken), med relevanta intervjufrågor angående deras involvering i mobila banktjänster, kunde deras potential avgöras. Intervjuerna utfördes sedan via telefon.

Vi drar slutsatsen att för att bli konkurrenskraftig i dagens värld av avancerade teknologier, är det avgörande att finansiella instutitioner positionerar sig genom att använda sig av sådana applikationer. Banker har de nödvändiga kapitaltillgångarna som krävs för att göra betydande investeringar i teknologisk infrastruktur. Om de inte hade anpassat sig till teknologier som bankomater, kreditkort, telefoner och Internet, skulle de lätt ha kunnat exkluderas från marknaden. Det är troligt att mobila banktjänster kommer att ha samma inverkan.


The banking industry is a typical example of an industry that has benefited tremendously from applications of information and communication technologies. These applications take their form in Internet-based banking, including transactions for equities trading, account enquiry, bill presentment and payments as well as transfers between accounts and people.

Mobile banking is the natural extension of these kinds of services. With the development of digital wireless technologies, such as the mobile phone, mobile Internet access is now enabled.

This thesis examines the changing landscape of the financial industry due to information technologies and the strategic considerations of mobile banking from a business perspective.

For us a single case study with a qualitative approach has been seen as the most rewarding method to apply in our research. By investigating the market, through sending out a well-structured survey to three of the major Swedish banks (Nordea, SEB and Handelsbanken), with relevant interview questions on their involvement in m-banking, their potential could be distinguished. The interviews were then conducted over the phone.

We conclude that in order to achieve a competitive edge in today’s world of advanced technologies, it is crucial that financial institutions position themselves in deploying these applications. Banks have the necessary capital assets in order to make significant invest-ments in technology infrastructure. Without having adapted themselves to technologies such as ATMs, credit cards, phones and the Internet, they would easily have been excluded from the market. It is likely that mobile banking will have the same impact.

APA, Harvard, Vancouver, ISO, and other styles
44

Černý, Richard. "Srovnání cloud BI řešení a faktory ovlivňující jejich nasazení." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-191925.

Full text
Abstract:
The combination of Cloud Computing and Business Intelligence (BI) gives many advantages, however the classic deployment model is still in many cases preferred. Both models differ in many aspects and are suitable for various organizations. The thesis looks at these aspects and analyzes the differences that cloud computing brings to the Business Intelligence. Aims of the thesis are to compare both models according the architectural, security, user and financial aspects, influencing of the cloud computing on the implementation of BI and presenting some practical examples of BI solution. To achieve the aims the author uses a literature review, electronic sources and own analysis. Based on the identified impact of the cloud factor the author extends the reference model Management of Business Informatics (MBI).
APA, Harvard, Vancouver, ISO, and other styles
45

Dowds, Eleanor Jane, and Fatme El-Saghir. "Utilising waste heat from Edge-computing Micro Data Centres : Financial and Environmental synergies, Opportunities, and Business Models." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298245.

Full text
Abstract:
In recent times, there has been an explosion in the need for high-density computing and data processing. As a result the Internet and Communication Technology (ICT) demand on global energy resources has tripled in the last five years. Edge computing - bringing computing power close to the user, is set to be the cornerstone of future communication and information transport, satisfying the demand for instant response times and zero latency needed for applications such as 5G, self-driving vehicles, face recognition, and much more. The Micro Data Centre (micro DC) is key hardware in the shift to edge computing. Being self-contained, with in-rack liquid cooling systems, these micro data centres can be placed anywhere they are needed the most - often in areas not thought of as locations for datacentres, such as offices and housing blocks. This presents an opportunity to make the ICT industry greener and contribute to lowering total global energy demand, while fulfilling both the need for data processing and heating requirements. If a solution can be found to capture and utilise waste heat from the growing number of micro data centres, it would have a massive impact on overall energy consumption. This project will explore this potential synergy through investigating two different ways of utilising waste heat. The first being supplying waste heat to the District Heating network (Case 1), and the second using the micro DC as a ’data furnace’ supplying heat to the near vicinity (Case 2 and 3). Two scenarios of differing costs and incomes will be exploredin each case, and a sensitivity analysis will be performed to determine how sensitive each scenario is to changing internal and external factors. Results achieved were extremely promising. Capturing waste heat from micro data centres, and both supplying the local district heating network as well as providing the central heating of the near vicinity, is proving to be both economically and physically viable. The three different business models (’Cases’) created not only show good financial promise, but they demonstrate a way of creating value in a greener way of computing and heat supply. The amount of waste heat able to be captured is sufficient to heat many apartments in residential blocks and office buildings, and the temperatures achieved have proven to be sufficient to meet the heating requirements of these facilities, meaning no extra energy is required for the priming of waste heat. It is the hope that the investigations and analyses performed in this thesis will further the discussion around the utilisation of waste heat from lower energy sources, such as micro DCs, so that one day, potential can become reality.
På senare har tid har det skett en explosion i behovet av databehandling och databehandling med hög densitet. Som ett resultat har Internet- och kommunikationstekniksektorns (ICT) efterfråga på globala energiresurser tredubblats under de senaste fem åren. Edgecomputing för datorkraften närmre användaren och är hörnstenen i framtida kommunikation och informationsflöde. Omedelbar svarstid och noll latens som behövs för applikationersom 5G, självkörande fordon, ansiktsigenkänning och mycket mer tillfredställs av att datorkraften förs närme användaren. Micro Data Center är nycklen i övergången till edge computing. Eftersom att MicroData Center är fristående med inbyggda kylsystem kan de placeras där de behövs mest -ofta i områden som inte betraktas som platser för datacenter som exemeplvis kontor och bostadshus. Detta möjliggör för ICT-branschen att bli grönare och bidra till att sänka det totala globala energibehovet, samtidigt som behovet av databehandling kan tillgodoses. Om enlösning kan hittas för att fånga upp och använda spillvärme som genereras från växande antalet Micro Data Center, skulle det ha en enorm inverkan på den totala energiförbrukningen. Detta projekt kommer att undersöka potentiella synergier genom att undersöka två olikasätt att utnyttja spillvärme. Den första är att leverera spillvärme till fjärrvärmenätet (Case 1), och det andra att använda Micro Data Center som en "Data Furnace" som levererar värme till närområdet (Case 2 och 3). Två scenarier med olika kostnader och intäkter kommer att undersökas i varje Case och en känslighetsanalys kommer att utföras för att avgöra hur känsligt varje scenario är för ändrade interna och externa faktorer. Resultaten som uppnåtts är extremt lovande. Att fånga upp spillvärme från Micro Data Center och leverera till antingen det lokala fjärrvärmenätet eller nyttja spillvärmen lokalt har visat sig vara både ekonomiskt och fysiskt genomförbart. De tre olika affärsmodellerna (’Cases’) som skapats visar inte bara positivt ekonomiskt utfall, utan också ett sätt att skapa värde genom att på ett grönare sätt processa och lagra data och samtidigt värma städer. Mängden spillvärme som kan fångas upp är tillräcklig för att värma upp många lägenheter i bostadshus och kontorsbyggnader. Temperaturen på spillvärmen har visat sig vara tillräcklig för att uppfylla uppvärmningskraven i dessa anläggningar, vilket innebär att ingen extra energi krävs för att höja temperturen av spillvärme. Förhoppningen är att de undersökningar och analyser som utförs i denna rapport kommer att främja diskussionen kring utnyttjande av spillvärme från lägre energikällor, såsom Micro Data Center.
APA, Harvard, Vancouver, ISO, and other styles
46

Lopez, Inga Milton Elvis, and Huaranga Ricardo Martín Guerrero. "Modelo de business intelligence y analytics soportado por la tecnologia cloud computing para pymes del sector retail." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2017. http://hdl.handle.net/10757/622650.

Full text
Abstract:
El principal reto de las PYMES peruanas es la obtención de información para la toma de decisiones. En este contexto, el uso de tecnologías tradicionales de análisis de datos como Business Intelligence y Analytics resultan poco accesibles para las empresas, debido a limitantes económicas y de capital humano. El objetivo principal del proyecto es implementar un modelo tecnológico que combine Business Intelligence y Analytics con Cloud Computing, para permitir a las PYMES retail integrar y procesar sus datos para tomar decisiones informadas y oportunas en materia de planificación y gestión de inventarios. Todo con un bajo costo de implementación y despliegue. Para el desarrollo del proyecto se realiza una investigación previa sobre las tecnologías Business Intelligence, Analytics y Cloud Computing, donde se estudian las aplicaciones de cada una y casos de éxito de PYMES retail a nivel mundial. Luego, se diseña el modelo tecnológico orientado a las necesidades de las PYMES retail peruanas, acompañado de un plan de implementación del modelo basado en metodologías de Business Intelligence y Cloud Computing y un análisis de proveedores de servicios cloud que mejor se adecuan a este tipo de empresas. El modelo es validado mediante su implementación en una PYME retail peruana. Para ello, se realiza un análisis de negocio e infraestructura tecnológica y se identifican los principales requerimientos de información. Con ello, se consigue integrar la información aislada de múltiples tiendas, reducir el tiempo de demora de consolidación de datos en un 94% y una reducción de costos del 20%. Finalmente, se propone un plan de continuidad que permite escalar las funcionalidades del modelo, orientado a las tendencias tecnológicas del sector retail.
The main challenge for Peruvian SMEs is obtaining information for decision making. In this context, the use of data analysis technologies such as Business Intelligence and Analytics are not very accessible to companies, due to economic and human capital limitations. The main objective of the project is the implementation of a technological model that combines Business Intelligence and Analytics with Cloud Computing, to allow retail SMEs to integrate and process their data to make informed and timely decisions regarding inventory planning and management, with a low cost of implementation and deployment. For the development of the project, a preliminary investigation is carried out about Business Intelligence, Analytics and Cloud Computing technologies, where the applications of each one is studied and success cases of retail SMEs worldwide. Then, the technological model oriented to the necesities of Peruvian retail SMEs is designed, accompanied by a plan to implement the model based on Business Intelligence and Cloud Computing methodologies and an analysis of cloud service providers that best suit to this type of Business. The model is validated through its implementation in a Peruvian retail SME. To accomplish it, a business and technological infrastructure analysis is carried out and the key information requirements are identified. All this data allows to integrate the isolated information of multiple stores, reducing the data consolidation delay time by 94% and reducing costs by 20%. Finally, we propose a continuity plan that allows scaling the functionalities of the model, oriented to the technological trends of the retail sector.
APA, Harvard, Vancouver, ISO, and other styles
47

Ben, Jrad Aicha. "Description and evaluation of elasticity strategies for business processes in the Cloud." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL012/document.

Full text
Abstract:
Le principe d'élasticité est d'assurer que juste les ressources nécessaires sont provisionnées pour préserver le bon fonctionnement des services Cloud. La propriété d'élasticité permet d'éviter la sous-utilisation et la sur-utilisation des ressources. La propriété d'élasticité a attiré beaucoup d'attention ces dernières années comme une tâche pivot qui permet d'assurer un bon compromis entre les QdS désirées et les coûts opérationnels des AbSs. Toutefois, le contrôle d'élasticité des AbSs et la définition des stratégies d'élasticité non-triviales sont encore des tâches difficiles à réaliser. Une stratégie d'élasticité est utilisée pour gérer l'élasticité en décidant des trois éléments essentiels: 'quand', 'où' et 'comment' utiliser les mécanismes d'élasticité (par exemple, les opérations de duplication/consolidation de services) qui permettent d'assurer les objectifs de QdS avec une consommation optimisée des ressources. La complexité de définition de stratégies d'élasticité augmente avec les métriques de QdS considérées. La difficulté de cette tâche est de plus accentuée avec l'absence d'un langage unifiée pour exprimer ces stratégies. Notre travail de thèse vise à remédier aux limites des approches existantes pour la gestion des stratégies d'élasticité. Il consiste à développer un langage pour décrire différents types des stratégies d'élasticité d'une façon unifiée. Nous définissons un modèle formel qui cadre l'ensemble de métriques à considérer, définit les opérations d'élasticité à appliquer et spécifie les lois d'émission de requêtes. Ce modèle servira aussi pour appliquer et valider les stratégies spécifiées. Nous travaillons en plus sur l'alignement des contrats de qualités de services (Service Level Agreement) avec les stratégies d'élasticité
Elasticity is the ability of a system to be adjustable to workload change by allocating and releasing as many resources as needed while ensuring the agreed QoS. It has played a pivotal role in many research works for ensuring QoS. Therefore, Elasticity management is witnessing a lot of attention from IT community as a pivotal issue for finding the right tradeoffs between QoS levels and operational costs by working on developing novel methods and mechanisms. However, controlling business process elasticity and defining non-trivial elasticity strategies are challenging issues. Elasticity strategies are policies that are used to manage elasticity by deciding when, where and how to use elasticity mechanisms (e.g, adding or removing resources). Many strategies can be defined to ensure applications elasticity. The abundance of possible strategies requires their evaluation and validation in order to guarantee their effectiveness before using them in real Cloud environments. Our thesis work aims to overcome the limitations of the existing approaches for elasticity strategies management. It consists in developing a configurable Domain-Specific language to describe different types of elasticity strategies in a unified way. We define a formal model that captures a set of QoS metrics and defines elasticity operations. This model will also be used to define and verify elasticity strategies. We will also work on the alignment of Service Level Agreements with the elasticity strategies
APA, Harvard, Vancouver, ISO, and other styles
48

Faruqui, Saif Ahmed. "Utility computing: Certification model, costing model, and related architecture development." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2756.

Full text
Abstract:
The purpose of the thesis was to propose one set of solutions to some of the challenges that are delaying the adoption of utility computing on a wider scale. These components enable effective deployment of utility computing, efficient look-up, and comparison of service offerings of different utility computing resource centers connected to the utility computing network.
APA, Harvard, Vancouver, ISO, and other styles
49

Maor, Amit. "Using a Data Warehouse as Part of a General Business Process Data Analysis System." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1383.

Full text
Abstract:
Data analytics queries often involve aggregating over massive amounts of data, in order to detect trends in the data, make predictions about future data, and make business decisions as a result. As such, it is important that a database management system (DBMS) handling data analytics queries perform well when those queries involve massive amounts of data. A data warehouse is a DBMS which is designed specifically to handle data analytics queries. This thesis describes the data warehouse Amazon Redshift, and how it was used to design a data analysis system for Laserfiche. Laserfiche is a software company that provides each of their clients a system to store and process business process data. Through the 2015-16 Harvey Mudd College Clinic project, the Clinic team built a data analysis system that provides Laserfiche clients with near real-time reports containing analyses of their business process data. This thesis discusses the advantages of Redshift’s data model and physical storage layout, as well as Redshift’s features directly benefit of the data analysis system.
APA, Harvard, Vancouver, ISO, and other styles
50

Wong, Peter Yung Ho. "Formalisations and applications of business process modelling notation." Thesis, University of Oxford, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.555361.

Full text
Abstract:
Business Process Modelling Notation (BPMN) is a standardised diagram notation for modelling interactive workflow processes graphically at the design stage. The primary objective of this thesis is to provide a framework for precise specifications and formal verifications of workflow processes modelled as BPMN diagrams. We provide two behavioural semantics for BPMN in the process algebra Communicating Sequential Processes (CSP). We apply existing CSP refinement orderings to both the refinement of business process diagrams and the verification of behavioural compatibility of business process collaborations. The first semantic model is an untimed model, focusing on the control flow and communication of business processes. The second semantic model extends the first one to capture the timing aspect of behaviour. We also consider the applications of the semantic models. The secondary objective of this thesis is to apply BPMN and the semantic models to reason about long running empirical studies (e.g. laboratory experiments, clinical trials). We introduce a declarative workflow model Empiricol for recording trials and experiments precisely, and define bidirectional transformation functions between BPMN and Empiricol. Using the transformation functions, we make graphical specification, simulation, automation and verification of trials and experiments possible. We provide two case studies on the applications of BPMN’s formalisations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography