Search results

1 – 10 of 685
Article
Publication date: 1 March 2001

John M. Carroll, Mary Beth Rosson, Philip L. Isenhour, Christina Van Metre, Wendy A. Schafer and Craig H. Ganoe

MOOsburg is a community‐oriented multi‐user domain. It was created to enrich the Blacksburg Electronic Village by providing real‐time, situated, interaction, and a place‐based…

Abstract

MOOsburg is a community‐oriented multi‐user domain. It was created to enrich the Blacksburg Electronic Village by providing real‐time, situated, interaction, and a place‐based information model for community information. We are experimenting with an implementation fundamentally different from classic multi‐user domains object‐oriented (MOOs), supporting distributed system development and management, and a direct manipulation approach to navigation. To guide the development of MOOsburg, we are focusing on a set of community‐oriented applications, including a virtual science fair.

Details

Internet Research, vol. 11 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 April 1985

Peter Leggate and Hilary Dyer

The first article in the series (The Electronic Library, 3, 3, July, 1985 pp. 200–209) introduced the reader to microcomputer terminology and to the main components—hardware and…

Abstract

The first article in the series (The Electronic Library, 3, 3, July, 1985 pp. 200–209) introduced the reader to microcomputer terminology and to the main components—hardware and software—of a microcomputer system. This second article is largely devoted to more detailed description of the main hardware components: processors, internal memory, buses, external memory, printers and communications hardware. The importance of ergonomic factors in vdu and keyboard design is stressed. Multi‐user and network configurations are compared. Finally, the discussion of the role of the operating system, introduced in the first article, is extended.

Details

The Electronic Library, vol. 3 no. 4
Type: Research Article
ISSN: 0264-0473

Book part
Publication date: 4 December 2020

Abdelkebir Sahid, Yassine Maleh and Mustapha Belaissaoui

Since 2007, the cloud computing term had been introduced to the information technology (IT) dictionary. The theme is attracting growing interest from both the IT world and the…

Abstract

Since 2007, the cloud computing term had been introduced to the information technology (IT) dictionary. The theme is attracting growing interest from both the IT world and the business players, who need to enhance information systems agility, reduced costs, or even less dependence on internal IT teams when they are judged too slow. However, the fact that cloud computing, as presented by providers, increases the agility, is unclear. Business Managers; IT professional, and academics are querying about relationship between cloud computing and IT agility. This chapter aims to answer two major concerns: Factors that influence cloud computing adoption in medium and large organizations, and the cloud computing role to improve the agility of information systems. This chapter argues that cloud computing impacts Information System (IS) performance by organizational capabilities (agility). One of the primary motivations of this chapter is the lack of fieldwork when considering how cloud computing improves the information systems’ agility.

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Article
Publication date: 17 September 2021

Sukumar Rajendran, Sandeep Kumar Mathivanan, Prabhu Jayagopal, Kumar Purushothaman Janaki, Benjula Anbu Malar Manickam Bernard, Suganya Pandy and Manivannan Sorakaya Somanathan

Artificial Intelligence (AI) has surpassed expectations in opening up different possibilities for machines from different walks of life. Cloud service providers are pushing. Edge…

Abstract

Purpose

Artificial Intelligence (AI) has surpassed expectations in opening up different possibilities for machines from different walks of life. Cloud service providers are pushing. Edge computing reduces latency, improving availability and saving bandwidth.

Design/methodology/approach

The exponential growth in tensor processing unit (TPU) and graphics processing unit (GPU) combined with different types of sensors has enabled the pairing of medical technology with deep learning in providing the best patient care. A significant role of pushing and pulling data from the cloud, big data comes into play as velocity, veracity and volume of data with IoT assisting doctors in predicting the abnormalities and providing customized treatment based on the patient electronic health record (EHR).

Findings

The primary focus of edge computing is decentralizing and bringing intelligent IoT devices to provide real-time computing at the point of presence (PoP). The impact of the PoP in healthcare gains importance as wearable devices and mobile apps are entrusted with real-time monitoring and diagnosis of patients. The impact edge computing of the PoP in healthcare gains significance as wearable devices and mobile apps are entrusted with real-time monitoring and diagnosis of patients.

Originality/value

The utility value of sensors data improves through the Laplacian mechanism of preserved PII response to each query from the ODL. The scalability is at 50% with respect to the sensitivity and preservation of the PII values in the local ODL.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 October 1998

M.E. Thomson and R. von Solms

This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for…

8607

Abstract

This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for education in the workplace through an information security awareness program. Techniques borrowed from the field of social psychology, which have been largely ignored in current awareness programs, are highlighted in order to show how they could be utilized to improve the effectiveness of the awareness program.

Details

Information Management & Computer Security, vol. 6 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 1987

Alex Shekhel and Eva Freeman

A parallel‐processor computer contains multiple CPUs that share such system resources as memory and disk storage. A parallel‐processor computer is expanded not by adding another…

Abstract

A parallel‐processor computer contains multiple CPUs that share such system resources as memory and disk storage. A parallel‐processor computer is expanded not by adding another computer, but by plugging another CPU into the computer. This technology offers expandability, compact size, high performance, high reliability, and moderate cost. The Sequent Balance Parallel‐Processor Computer is described in some detail. A fully configured Balance 21000 can execute 21 MIPS (million instructions per second). It implements the UNIX operating system, which has been widely adopted. As a result, many software packages for word processing and other applications are available from third‐party vendors. Performance tests conducted by CLSI, Inc. indicate that twenty concurrent users on a parallel‐processor system can perform CPU‐intense functions up to seven times faster than on a single‐processor system.

Details

Library Hi Tech, vol. 5 no. 2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 17 September 2020

Mahfooz Alam, Mahak, Raza Abbas Haidri and Dileep Kumar Yadav

Cloud users can access services at anytime from anywhere in the world. On average, Google now processes more than 40,000 searches every second, which is approximately 3.5 billion…

Abstract

Purpose

Cloud users can access services at anytime from anywhere in the world. On average, Google now processes more than 40,000 searches every second, which is approximately 3.5 billion searches per day. The diverse and vast amounts of data are generated with the development of next-generation information technologies such as cryptocurrency, internet of things and big data. To execute such applications, it is needed to design an efficient scheduling algorithm that considers the quality of service parameters like utilization, makespan and response time. Therefore, this paper aims to propose a novel Efficient Static Task Allocation (ESTA) algorithm, which optimizes average utilization.

Design/methodology/approach

Cloud computing provides resources such as virtual machine, network, storage, etc. over the internet. Cloud computing follows the pay-per-use billing model. To achieve efficient task allocation, scheduling algorithm problems should be interacted and tackled through efficient task distribution on the resources. The methodology of ESTA algorithm is based on minimum completion time approach. ESTA intelligently maps the batch of independent tasks (cloudlets) on heterogeneous virtual machines and optimizes their utilization in infrastructure as a service cloud computing.

Findings

To evaluate the performance of ESTA, the simulation study is compared with Min-Min, load balancing strategy with migration cost, Longest job in the fastest resource-shortest job in the fastest resource, sufferage, minimum completion time (MCT), minimum execution time and opportunistic load balancing on account of makespan, utilization and response time.

Originality/value

The simulation result reveals that the ESTA algorithm consistently superior performs under varying of batch independent of cloudlets and the number of virtual machines’ test conditions.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 May 1992

Eiichi Ono, Hisao Ichijo and Noboru Aisaka

Presents a basic idea about a flexible robotic hand for handling fabric pieces in garment manufacture, which is multi‐functional and useful for picking a fabric piece up…

Abstract

Presents a basic idea about a flexible robotic hand for handling fabric pieces in garment manufacture, which is multi‐functional and useful for picking a fabric piece up correctly, transferring and setting it without slipping to any three‐dimensional point. The robotic hand employs a strain gauge sensor and is capable of sensing touch, of measuring the thickness of fabric and its tension. Robotic hands have more applications in computer integrated manufacturing.

Details

International Journal of Clothing Science and Technology, vol. 4 no. 5
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 1 August 2002

Nory Jones and Thomas Kochtanek

Web‐based technologies are rapidly becoming an integral part of the business fabric, interwoven into most departments and functional areas. However, the consequences of adopting…

1192

Abstract

Web‐based technologies are rapidly becoming an integral part of the business fabric, interwoven into most departments and functional areas. However, the consequences of adopting these innovations, such as anticipated versus unanticipated and desirable versus undesirable consequences, warrant further exploration. This paper describes the experience of a contract service business after adopting a Web‐based collaborative technology to share information throughout the firm. User perceptions and attitudes towards this technology and its impact on time, control, and organisational change were explored via qualitative interviews. The results suggest that there were a number of consequences relating to these dimensions. We reflect on these consequences and offer suggestions based on the generalisability of the results. Further studies are identified that extend the exploration into the impact of Web‐based collaboration.

Details

Online Information Review, vol. 26 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Book part
Publication date: 8 July 2021

Allan Third and John Domingue

The Internet, the Web and social media have radically transformed a number of core pillars of our social fabric. The way billions of citizens work, interact and socialise is…

Abstract

The Internet, the Web and social media have radically transformed a number of core pillars of our social fabric. The way billions of citizens work, interact and socialise is underpinned by our global network infrastructure. Unfortunately, we have also seen a number of negative effects from this transformation. As has been widely publicised, undesirable impacts include the spread of disinformation and fake news; attacks on democratic elections and the ‘weaponisation’ of personal data. This article describes some of the technological approaches that are being taken to address some of the above issues. At the core of these technologies are notions around decentralisation. With blockchains it is possible that citizens can create their own ‘self-sovereign’ identity – the digital equivalent of writing one's name onto a piece of paper – and acquiring verification through blockchain-based techniques. An approach to alleviating the ‘weaponisation’ of personal and sensitive data is to give citizens their own data store. Initiatives such as Sir Tim Berners-Lee's Solid allow users to store, manage and control their own data according to any personal preferences or constraints. We believe that a combination of personal data stores and blockchains will lead to a new type of resilient communication and collaboration mechanism, whereby personal rights and empowerment are enhanced and transparency at the community level is integral.

Details

Media, Technology and Education in a Post-Truth Society
Type: Book
ISBN: 978-1-80043-907-8

Keywords

1 – 10 of 685