E-Government Public Cloud Model (EGPCM)

2018 ◽  
Vol 31 (1) ◽  
pp. 244
Author(s):  
Nada M. Al-Hakkak ◽  
Ban Salman Shukur ◽  
Atheel Sabih Shaker

   The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a  new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related to public cloud computing.

2019 ◽  
Vol 9 (13) ◽  
pp. 2746 ◽  
Author(s):  
Jiong Shi ◽  
Liping Jin ◽  
Jun Li

Internet of Things (IoT) has become one of the key factors that enables, drives and accelerates the digital transformation all over the world. The vision of the IoT is not only the immediate access to the data but also the ability to turning data into intelligence. As such, there is a growing number of public cloud computing providers offering IoT related services, including data processing, data analyzing and data visualization. However, with tens of billions of microcontroller-powered devices getting involved in the era of IoT, the concerns for overall security, privacy and cost are rising constantly and exponentially. Furthermore, these issues cannot be solved by public cloud computing providers since they mainly focus on the software and services rather than on the end devices. In this article, an integrated solution including Azure Sphere devices and Azure cloud services is proposed to provide a comprehensive and efficient way to ensure security that starts in the device and extends to the cloud with limited budgets. Moreover, the implementation details including hardware components, software design and Azure cloud integration are presented to demonstrate the feasibility and efficiency of the proposed solution.


Author(s):  
Péter Racskó

Napjaink informatikai világának talán legkeresettebb hívó szava a cloud computing, vagy magyar fordításban, a számítási felhő. A fordítás forrása az EU-s (Digitális Menetrend magyar változata, 2010) A számítási felhő üzleti modelljének részletes leírását adja (Bőgel, 2009). Bőgel György ismerteti az új, közműszerű informatikai szolgáltatás kialakulását és gazdasági előnyeit, nagy jövőt jósolva a számítási felhőnek az üzleti modellek versenyében. A szerző – a számítási felhő üzleti előnyei mellett – nagyobb hangsúlyt fektet dolgozatában a gyors elterjedést gátló tényezőkre, és arra, hogy mit jelentenek az előnyök és a hátrányok egy üzleti, informatikai vagy megfelelőségi vezető számára. Nem csökkentve a cloud modell gazdasági jelentőségét, fontosnak tartja, hogy a problémákról és a kockázatokról is szóljon. Kiemeli, hogy a kockázatokban – különösen a biztonsági és adatvédelmi kockázatokban – lényeges különbségek vannak az Európai Gazdasági Térség és a világ többi része, pl. az Amerikai Egyesült Államok között. A cikkben rámutat ezekre a különbségekre, és az olvasó magyarázatot kap arra is, hogy miért várható a számítási felhő lassabb terjedése Európában, mint a világ más részein. Bemutatja az EU erőfeszítéseit is a számítási felhő európai terjedésének elősegítésére, tekintettel a modell versenyképességet növelő hatására. / === / One of the most popular concept of the recent web searches is cloud computing. Several authors present detailed description of the new service model and it's business benefits and cite the optimistic prognoses of the cloud experts regarding the competition of information system service models. The author analyses the operational benefits of the cloud application and give a detailed description of the inhibitors of the fast expansion of the service modell. He also analyses the pros and cons of the cloud for a business manager, an information and a compliance officer. When understanding the advantages of the cloud, it is equally important to review the problems and risks associated with the model. The paper gives a list of the expected cloud-specific risks. It also explains the differences in security and data protection approach between the European Economic Area and the rest of the world, including the USA. The explains why slower expansion of the cloud modell is expected in Europe than in the rest of the world. The efforts of the EU Committee in helping to spread the cloud model is also presented, as the EU's officers consider the model as an important element of competitiveness.


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 138-148
Author(s):  
H. Abdul Hamid Arribathi ◽  
Dedeh Supriyanti ◽  
Lusyani Sunarya

Information technology is increasingly developing and has a positive impact on the world of education. The implementation of student counseling with a Knowledge Management System is one of the contributions of information technology in the world of education. Many benefits provided by the Student Counseling Knowledge Management System, in managing the knowledge needed by the counselor section to document student consultations. The development and implementation of a KMS counseling system costs more to employ professional staff to maintain and improve; KMS student counseling application; For this reason, it is necessary to design a Cloud Computing-based Student Counseling Knowledge Management System. The research method carried out in the first stage is to collect data and information about Knowledge Management and Student Counseling, and how to use it to create a Knowledge Management System Application, Student Counseling Based on cloud computing. Furthermore, conducting a literature study and literature review, system design is in the form of data architecture compounding, process design, network design, and user interface design. The design results of this system can facilitate educational institutions in conducting online cloud computing-based student counseling


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


2018 ◽  
Vol 31 (5-6) ◽  
pp. 227-233
Author(s):  
Weitao Wang ◽  
◽  
Baoshan Wang ◽  
Xiufen Zheng ◽  

Author(s):  
Lindsay G. Oades ◽  
Aaron Jarden ◽  
Hanchao Hou ◽  
Corina Ozturk ◽  
Paige Williams ◽  
...  

Wellbeing science is the scientific investigation of wellbeing, its’ antecedents and consequences. Alongside growth of wellbeing science is significant interest in wellbeing interventions at individual, organizational and population levels, including measurement of national accounts of wellbeing. In this concept paper, we propose the capability model of wellbeing literacy as a new model for wellbeing science and practice. Wellbeing literacy is defined as a capability to comprehend and compose wellbeing language, across contexts, with the intention of using such language to maintain or improve the wellbeing of oneself, others or the world. Wellbeing literacy is underpinned by a capability model (i.e., what someone is able to be and do), and is based on constructivist (i.e., language shapes reality) and contextualist (i.e., words have different meanings in different contexts) epistemologies. The proposed capability model of wellbeing literacy adds to wellbeing science by providing a tangible way to assess mechanisms learned from wellbeing interventions. Moreover, it provides a framework for practitioners to understand and plan wellbeing communications. Workplaces and families as examples are discussed as relevant contexts for application of wellbeing literacy, and future directions for wellbeing literacy research are outlined.


2021 ◽  
Vol 73 (2) ◽  
pp. 209-224
Author(s):  
Maxwell Uphaus

Abstract Where beaches and harbors have frequently been taken to signify openness and intermingling, a different coastal setting, the cliffs of Dover, overtly bespeaks opposition and closure. Demarcating the British coast at its closest point to continental Europe, the cliffs often stand for Britain’s supposedly elemental insularity. However, the chalk composing the cliffs makes them, in their own way, as malleable and permeable as a beach. I argue that poems by Matthew Arnold, W. H. Auden, and Daljit Nagra contest the cliffs’ association with an exclusive Britishness by focusing on their material composition. In these poems, the cliffs’ chalk—formed by fossilized marine microorganisms at a time when what would become Britain was at the bottom of a prehistoric sea—attests to Britain’s geohistorical contingency. Arnold, Auden, and Nagra use this chalk geology to develop a new model of British identity as contingent, permeable, and linked with the wider world. In these poems, that is, Dover’s cliffs collapse oppositions rather than enforcing them: they blur the lines between Britain and the world, past and present, organic and inorganic, human history and geological history. The literature of the Dover cliffs thus highlights the revisionary potential of this distinctive kind of littoral space.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2011 ◽  
Vol 55-57 ◽  
pp. 1053-1057
Author(s):  
Gui De Zheng ◽  
Ming Chen

The next generation of scientific experiments and studies are being carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for such collaborations as it aids communities in sharing resource to achieve common objective. This paper defines the problem of scheduling distributed data-intensive application on to Gird resource and presents a formal resource and application model for the problem.


Sign in / Sign up

Export Citation Format

Share Document