Academic literature on the topic 'Cloud security challenges'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud security challenges.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud security challenges"

1

Bhanuprakash, Madupati. "Kubernetes for Multi-Cloud and Hybrid Cloud: Orchestration, Scaling, and Security Challenges." Journal of Scientific and Engineering Research 10, no. 6 (2023): 290–97. https://doi.org/10.5281/zenodo.14050147.

Full text
Abstract:
Kubernetes enables organizations to manage applications globally, from multi-cloud to hybrid clouds. This paper presents challenges and solutions for workload orchestration, scaling, and security in such infrastructures. Running workloads across different cloud providers enables one to escape vendor lock-in and improve service availability. However, it leads to more complexity in terms of management and security. This paper will analyze the tendency of Kubernetes to orchestrate across multiple clouds in which it operates in a Multi-Cloud environment. It covers important solutions for scaling &
APA, Harvard, Vancouver, ISO, and other styles
2

Shukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Daoming, Qiang Chen, and Lun Wang. "Cloud Security: Challenges and Solutions." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 42–47. https://doi.org/10.5281/zenodo.12789566.

Full text
Abstract:
As cloud computing continues to grow and become integral to business operations, securing cloud environments has emerged as a critical concern. This paper explores the multifaceted challenges of cloud security and proposes solutions to mitigate these risks. We discuss the inherent vulnerabilities of cloud infrastructure, the complexities of data protection, and the difficulties in maintaining compliance and governance. Specifically, we address issues such as data breaches, insider threats, and the lack of visibility and control in cloud environments. Through comprehensive analysis and experime
APA, Harvard, Vancouver, ISO, and other styles
4

Alrehaili, Nada, and Agadee Mutaha. "Cloud Computing Security Challenges." IARJSET 7, no. 8 (2020): 120–23. http://dx.doi.org/10.17148/iarjset.2020.7817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Srikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.

Full text
Abstract:
Cloud computing has revolutionized the way businesses operate, offering a paradigm shift from on-premise infrastructure to a virtualized, on-demand environment. However, security and privacy concerns remain a significant hurdle for some businesses considering cloud adoption. This white paper delves into the key challenges associated with cloud security and privacy, empowering businesses of all sizes to make informed decisions and navigate the potential risks involved. We begin by exploring the concept of data security threats in the cloud environment. Data breaches are a major concern, as clou
APA, Harvard, Vancouver, ISO, and other styles
6

Somanathan, Sureshkumar. "Securing the Cloud: Project Management Approaches to Cloud Security in Multi-Cloud Environments." International Journal of Applied Engineering & Technology 5, no. 2 (2023): 548–56. https://doi.org/10.5281/zenodo.14947914.

Full text
Abstract:
An initiative of this magnitude is required in order to achieve transparency and the security awareness in cloudbasedsystems. Because of the complexity of the application components, it is especially challenging in multicloudconfigurations, where the components of the application are distributed over multiple clouds. Whencompanies implement multi-cloud strategies in order to take advantage of the benefits offered by a large numberof cloud-based service providers, they are confronted with significant security challenges that are caused by thedispersed and complex structure of these systems. Mul
APA, Harvard, Vancouver, ISO, and other styles
7

Sabreena Nawaz. "Cloud Computing Services and Security Challenges: A Review." Lahore Garrison University Research Journal of Computer Science and Information Technology 7, no. 02 (2023): 17–28. http://dx.doi.org/10.54692/lgurjcsit.2023.0702459.

Full text
Abstract:
An architecture of computing that provides services over the internet on the demand and desires of users that pay for the accessible resources that are shared is refer as the cloud computing. These resources are shared over the cloud and users do not have to acquire them physically. Some of the shared resources are: software, hardware, networks, services, applications and servers. Almost every industry from hospitals to education is moving towards the cloud for storage of data because of managing the effective cost and time of organizing the resources physically on their space. Storage of data
APA, Harvard, Vancouver, ISO, and other styles
8

Emad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.

Full text
Abstract:
<strong>Abstract:</strong> Multitenant architecture is the foundational model for cloud computing model in public cloud providers, in addition to on-premise enterprise level software stack. However, this model can poses security risks to organizations, which requires good security architecture design , and understanding. &nbsp;In addition, it will require cybersecurity expertise in cloud native architecture, and the on-going challenge to ensure &quot;ISOLATION&quot; among co-hosted resources to maintain cybersecurity posture and data protection. <strong>Keywords:</strong> Cloud, Cloud Security
APA, Harvard, Vancouver, ISO, and other styles
9

Firdaus, Wigananda, and Anjik Sukmaaji. "Exploring Opportunities and Challenges in Multi-Cloud and Hybrid Cloud Implementation." Information Technology International Journal 2, no. 2 (2024): 64–69. https://doi.org/10.33005/itij.v2i2.30.

Full text
Abstract:
This study reviews the opportunities and challenges of implementing Multi-Cloud and Hybrid Cloud models that focus on security and data management. Multi-Cloud implementation offers flexibility, but also brings challenges related to security and privacy. Data security in multi-cloud can be improved by implementing encryption such as Homomorphic Encryption and Hybrid Crypto which combines DES and RSA algorithms. The Hybrid Cloud model allows integration between public and private clouds. where the implementation of Zero Trus can improve the security of the cloud network. The results of this Lit
APA, Harvard, Vancouver, ISO, and other styles
10

Nanuru Yagamurthy, Deepak, and Rajesh Azmeera. "Security Challenges and Solutions in Cloud Computing." International Journal of Science and Research (IJSR) 7, no. 8 (2018): 1690–93. http://dx.doi.org/10.21275/sr24517174709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cloud security challenges"

1

Bulusu, Santosh, and Kalyan Sudia. "A Study on Cloud Computing Security Challenges." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2820.

Full text
Abstract:
Context: Scientific computing in the 21st century has evolved from fixed to distributed work environment. The current trend of Cloud Computing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations&apos; annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of CC. Among these include security aspects. Objectives: This thesis aims to identify security challenges for adapting cloud computing and their solutions f
APA, Harvard, Vancouver, ISO, and other styles
2

Inam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.

Full text
Abstract:
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero &amp; Llorente, 2012). A distinctive cloud is affected by different security issues such as Temporary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011). The pur
APA, Harvard, Vancouver, ISO, and other styles
3

Maddineni, Venkata Sravan Kumar, and Shivashanker Ragi. "Security Techniques for protecting data in Cloud Computing." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3430.

Full text
Abstract:
Context: From the past few years, there has been a rapid progress in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a necessity for protecting the data of various users using centralized resources. Some major challenges that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. Aims and Objectives: The main aim of this research is to understand the security threats and identify the appropriate security techniques used to mitigate them in Cloud Computing. The main objectives o
APA, Harvard, Vancouver, ISO, and other styles
4

Tran, Minh-Dung. "Privacy Challenges in Online Targeted Advertising." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM053/document.

Full text
Abstract:
L'auteur n'a pas fourni de résumé en français<br>In modern online advertising, advertisers tend to track Internet users' activities and use these tracking data to personalize ads. Even though this practice - known as extit{targeted advertising} - brings economic benefits to advertising companies, it raises serious concerns about potential abuses of users' sensitive data. While such privacy violations, if performed by trackers, are subject to be regulated by laws and audited by privacy watchdogs, the consequences of data leakage from these trackers to other entities are much more difficult to d
APA, Harvard, Vancouver, ISO, and other styles
5

Großkopf, Heiko. "Challenges of Service Interchange in a cross cloud SOA Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-42979.

Full text
Abstract:
This Master’s Thesis examines and documents challenges related to the flexible interchange of web services within a cross-cloud Service Oriented Computing scenario (SOC).Starting with a theoretical approach, hypotheses are defined and processed to create testing scenarios for a practical examination. Both examinations are used to identify possible challenges. Next, encountered challenges are described, discussed and classified. Lastly, solution approaches to identified challenges are presented. The solution approaches concern related topics, such as service standardization, semantic methods, h
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Hiba. "What Are the Security Challenges Concerning Maintenance Data in the Railway Industry." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75741.

Full text
Abstract:
Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. Many research brought innovations that offer enormous benefits for rail travel. The current research focuses on the railway industries, as they want to reap the benefits of IT concept such as Cloud Computing, Information Security, and Internet of Things (IoT). Railway industries are generating a large volume of dat
APA, Harvard, Vancouver, ISO, and other styles
7

Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and toke
APA, Harvard, Vancouver, ISO, and other styles
8

Alkhwaldi, A. F. A., Mumtaz A. Kamala, and Rami S. R. Qahwaji. "Analysis of cloud-based e-government services acceptance in Jordan: challenges and barriers." 2018. http://hdl.handle.net/10454/16589.

Full text
Abstract:
Yes<br>There is increasing evidence that the Cloud Computing services have become a strategic direction for governments' IT work by the dawn of the third-millennium. The inevitability of this computing technology has been recognized not only in the developed countries like the UK, USA and Japan, but also in the developing countries like the Middle East region and Malaysia, who have launched migrations towards Cloud platforms for more flexible, open, and collaborative public services. In Jordan, the cloud-based e-government project has been deemed as one of the high priority areas for the gover
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cloud security challenges"

1

Kumar, T. Ananth, T. S. Arun Samuel, R. Dinesh Jackson Samuel, and M. Niranjanamurthy. Privacy and Security Challenges in Cloud Computing. CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hari, Kokula Krishna, ed. Security Issues and Challenges in Cloud Computing: ICIEMS 2014. Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vacca, John R. Cloud Computing Security: Foundations and Challenges. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cloud security challenges"

1

Martin, John Paul, Vipin Singh, K. Chandrasekaran, and A. Kandasamy. "Explicating Fog Computing Key Research Challenges and Solutions." In Cloud Security. CRC Press, 2021. http://dx.doi.org/10.1201/9780367821555-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jahankhani, Hamid, and Amin Hosseinian-Far. "Challenges of Cloud Forensics." In Enterprise Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54380-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oppitz, Marcus, and Peter Tomsu. "Security and Privacy Challenges." In Inventing the Cloud Century. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61161-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dave, Dhaivat, Nayana Meruliya, Tirth D. Gajjar, Grishma T. Ghoda, Disha H. Parekh, and R. Sridaran. "Cloud Security Issues and Challenges." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6620-7_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schoo, Peter, Volker Fusenig, Victor Souza, et al. "Challenges for Cloud Networking Security." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21444-8_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kebande, Victor R., Richard A. Ikuesan, and Nickson M. Karie. "Review of Blockchain Forensics Challenges." In Blockchain Security in Cloud Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70501-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, Shuyan. "Towards the Cloud Computing from Services to Securities and Challenges." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00009-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Hyokyung, and Euiin Choi. "Challenges and Security in Cloud Computing." In Communication and Networking. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17604-3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saini, Taksheel, and Sapna Sinha. "Cloud Computing Security Issues and Challenges." In Integration of Cloud Computing with Emerging Technologies. CRC Press, 2023. http://dx.doi.org/10.1201/9781003341437-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kanwal, Iqra, Hina Shafi, Shahzad Memon, and Mahmood Hussain Shah. "Cloud Computing Security Challenges: A Review." In Cybersecurity, Privacy and Freedom Protection in the Connected World. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68534-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud security challenges"

1

Asassfeh, Mahmoud Rajallah, Esraa Abu Elsoud, Sultan Mohammed Albilasi, et al. "Cloud Security: Analyzing Threats and Challenges." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zakiyyah, Rika, Daniel Permana, Devan Valenecio, Andry Chowanda, Yohan Muliono, and Zahra Nabila Izdihar. "Security Challenges and Issues in Cloud Computing." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kiran, Masina Sai, Balajee R M, Koripella Veera Venkata Satya Sai, M. V. V. Satya Kishore, and Srithar S. "Cloud Transformation and the Key Concerns for Cloud Security and Challenges." In 2024 Second International Conference on Inventive Computing and Informatics (ICICI). IEEE, 2024. http://dx.doi.org/10.1109/icici62254.2024.00076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Anshul, Gagan Tiwari, and Aadarsh Malviya. "Emerging Security Challenges in Advanced Cloud Computing Environment." In 2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing (AKGEC). IEEE, 2024. https://doi.org/10.1109/akgec62572.2024.10869168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Charu, Sandeep Mathur, and Alok Singh Sengar. "Evaluating Current Cloud Security Challenges and IAAS Optimization." In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2024. https://doi.org/10.1109/ic3i61595.2024.10828722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harshavardhan, H., Sanjana Madi, Shivaleela Kalasad, Sameeksha Shetty, and Vaibhavi Malemath. "Ensuring Data Security in the Cloud: Emerging Security Challenges and Solutions." In 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI). IEEE, 2025. https://doi.org/10.1109/icmsci62561.2025.10894030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Naik, Arjun Sudhanva. "Securing Banking Applications in the Cloud: Challenges and Strategies for Enhanced Security." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10826766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Suprina, Shuchi Sharma, and Ankita Sharma. "Security Algorithms in Cloud Computing: Challenges and Key Discussions." In 2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing (AKGEC). IEEE, 2024. https://doi.org/10.1109/akgec62572.2024.10868757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rawal, Bharat S. "A Quantum Safe Approach for Security Challenges at the Edge of Cloud in 5G and Beyond." In 2024 IEEE Cloud Summit. IEEE, 2024. http://dx.doi.org/10.1109/cloud-summit61220.2024.00038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kulkarni, Gurudatt, Nikita Chavan, Ruchira Chandorkar, Rani Waghmare, and Rajnikant Palwe. "Cloud security challenges." In 2012 7th Telecommunications, Systems, Services, and Applications (TSSA). IEEE, 2012. http://dx.doi.org/10.1109/tssa.2012.6366028.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud security challenges"

1

Hendrick, Stephen, Adrienn Lawson, and Jeffrey Sica. 2024 Cloud Native Security Report: How Organizations Are Addressing Security for Cloud Native Application Development. The Linux Foundation, 2024. https://doi.org/10.70828/mrce5096.

Full text
Abstract:
The growing ubiquity in cloud native technologies also means the growing criticality of cloud security. CNCF commissioned LF Research to run a survey in their community, asking developers and IT leaders to evaluate how their organizations are addressing cloud native security. Analysis of the survey found a general belief that applications are more secure than they were two years ago, but there are significant challenges and concerns, such as keeping up with emerging threats, the complexity of the software, vulnerability scanning. The findings show where progress needs to be made, and where the
APA, Harvard, Vancouver, ISO, and other styles
2

Akyol, Bora A. Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1052949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.

Full text
Abstract:
Abstract: The rapid adoption of artificial intelligence (AI) in cloud and edge computing environments has transformed industries by enabling large-scale automation, real-time analytics, and intelligent decision-making. However, the increasing reliance on AI-powered infrastructures introduces significant cybersecurity challenges, including adversarial attacks, data privacy risks, and vulnerabilities in AI model supply chains. This research explores advanced cybersecurity frameworks tailored to protect AI-driven cloud and edge computing environments. It investigates AI-specific security threats,
APA, Harvard, Vancouver, ISO, and other styles
4

Sinha, Amisha. Challenges And Best Practices for Integrating Security Orchestration, Automation, And Response (SOAR) Platforms With Cloud Infrastructure. Iowa State University, 2024. https://doi.org/10.31274/cc-20250502-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hendrick, Stephen, and Ranny Haiby. The 2025 Open Source Networking Study: The Role and Value of Open Source in the Networking Industry’s Software Stack. The Linux Foundation, 2025. https://doi.org/10.70828/vihf5211.

Full text
Abstract:
LF Networking and LF Research collaborated to investigate trends and priorities in open source networking. The research team fielded a survey in early 2025 to those who are familiar with telecommunications, cloud, and enterprise networks, asking about open source use, opportunities, and challenges in the sector. Survey findings show that open source software (OSS) is considered critical to the future of networking, with 92% of organizations prioritizing it for agility, innovation, and vendor independence. Cloud native adoption, AI integration, and demand for modular blueprints are rising, whil
APA, Harvard, Vancouver, ISO, and other styles
6

Razdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, 2021. http://dx.doi.org/10.4271/epr2021009.

Full text
Abstract:
As automobiles morph from stand-alone mechanical objects to highly connected, autonomous systems with increasing amounts of electronic components. To manage these complex systems, some semblance of in-car decision-making is also being built and networked to a cloud architecture. This cloud can also enable even deeper capabilities within the broader automotive ecosystem. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important to
APA, Harvard, Vancouver, ISO, and other styles
7

Leathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.

Full text
Abstract:
As smart sensors and the Internet of Things (IoT) exponentially expand, there is an increased need for effective processing solutions for sensor node data located in the operational arena where it can be leveraged for immediate decision support. Current developments reveal that edge computing, where processing and storage are performed close to data generation locations, can meet this need (Ahmed and Ahmed 2016). Edge computing imparts greater flexibility than that experienced in cloud computing architectures (Khan et al. 2019). Despite these benefits, the literature highlights open security i
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Samir. Redefining Space Commerce: The Move Toward Servitization. SAE International, 2024. http://dx.doi.org/10.4271/epr2024002.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;“New Space" is reshaping the economic landscape of the space industry and has far-reaching implications for technological innovation, business models, and market dynamics. This change, aligned with the digitalization in the world economy, has given rise to innovations in the downstream space segment. This “servitization” of the space industry, essentially, has led to the transition from selling products like satellites or spacecraft, to selling the services these products provide. This also connects to applications of va
APA, Harvard, Vancouver, ISO, and other styles
9

Sus, Monika, Cornelius Adebah, and Angel Saz-Carranza. 10 Recommendations to Make the European Union a Stronger Global Actor. EsadeGeo. Center for Global Economy and Geopolitics, 2024. https://doi.org/10.56269/202406/ms.

Full text
Abstract:
Following the European Parliament elections in June, a new EU leadership will take the helm to navigate the Union through an array of significant challenges. The EU faces an unprecedented combination of external threats: Russia’s full-scale invasion of Ukraine and the growing influences of Russia and China in the EU’s neighbourhood; the repercussions of the Israel-Gaza war; the Union’s economic, energy, and military dependencies and exposure to climate change; the rise of right-wing authoritarianism across many countries in Europe and its neighbourhood; and the uncertainty of the United States
APA, Harvard, Vancouver, ISO, and other styles
10

Riter, Karmann, Anthony Clint Clayton, Kelley Rountree, and Prakash Doraiswamy. Solar Station for an Off-the-Grid Air Quality Sensor System. RTI Press, 2023. http://dx.doi.org/10.3768/rtipress.2023.mr.0051.2306.

Full text
Abstract:
Air quality monitoring is a rapidly growing area of citizen science, or community science (CS), thanks to the availability of low-cost sensors. Contributing to a crowdsourced data platform (e.g., http:// purpleair .com/ map) is usually easy in urban areas, where there is access to uninterrupted electricity and wireless internet (Wi-Fi). However, there are sometimes security restrictions on Wi-Fi or a lack of exterior power outlets. Also, rural regions, particularly in low- and middle-income countries, often lack electricity and Wi-Fi continuity. RTI International has designed and distributed a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!