Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  public cloud
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
PL
W artykule omówiona została koncepcja budowy aplikacji szkoleniowej z zakresu szkolenia lotniczego z wykorzystaniem środowiska chmury publicznej.
EN
The article discusses the concept of building a training application for aviation training. The authors pointed out the increasing use of the public cloud environment, presented the division and types of public cloud services. Authors presented the construction of training applications using Microsoft Azure public cloud.
2
Content available remote Analysis of the user's influence on reliability of public cloud services
EN
Universal access to cloud computing services means that users expect services to be provided in a reliable and secure manner. The availability of newer and more efficient end devices raises the question of whether the mobile device used affects an access reliability. In the article the authors taking into account the type of mobile device (laptop, tablet and smartphone) and the access method (WiFi and LTE) heck what effect the end device on the reliability of access has.
PL
Powszechny dostęp do usług cloud computing sprawia, że użytkownicy oczekują aby usługi były świadczone w sposób niezawodny i bezpieczny. Dostępność coraz to nowszych i wydajniejszych urządzeń końcowych nasuwa pytanie czy to z jakiego urządzenia mobilnego korzystamy ma wpływ na niezawodność dostępu. W artykule autorzy sprawdzają biorąc pod uwagę rodzaj urządzenia mobilnego (laptop, tablet i smartfon) oraz metodę dostępu (WiFi i LTE) jaki wpływ na niezawodność dostępu ma urządzenie końcowe.
EN
Cloud Computing, a type of interpersonal computing offers services on demand. There arise numerous vulnerabilities and threats that jeopardize the authentication of the cloud services. Security services remain prevalent despite of standard policies offered by service providers, especially on public cloud. An encryption service is one of the conventional way to protect the plain data, by converting it into inarticulate form. This paper brings an interesting application service that provides security as a service to the users. This innovative service works based on a symmetric key encryption scheme. Encryption keys in the cryptographic process reveal the quality of encryption. Multiple keys are involved in this proposed encryption process, among them, one interesting key generation is from hybridization of improved cipher block chaining encryption operation and another from nature inspired genetic algorithm. Motivation for designing this hybrid algorithm is to minimize the execution time and storage space capacity. The experimental analysis is performed for multimedia files, including plain text, images. Performance of the proposed encryption algorithm is analyzed using various metrics that reveals the quality and strength of the algorithm in spite of various attacks. Evaluation reports state that this application service relics potential for authenticating multimedia files with better satisfaction while out-sourced as application in cloud computing environment.
EN
In the paper analysis of available, free Cloud Storage services for company/enterprise applications is presented. The choice of the most appropriate cloud service will be associated with such features as its compatibility in relation to the terms of use, data security, performance and stability. Performed analysis focuses on solutions which the license does not prohibit the use of their free version of the service for commercial purposes, in the company. An important factor, partly influencing for the choice, will also be intuitiveness, additional functionality and ease of use offered by client applications.
5
Content available Cloud computing - the Benefits and risks
EN
More and more frequently companies decide to get rid of certain functions of their structures by using outside firms to provide components and services. Outsourcing, very popular in recent years, has the purpose of reducing spendings in departments of a company. However, it this goal achieved? Often, such cost reduction is connected with the dependence of the customer on the supplier - which can, in the long run, globally contribute to raising costs. Will such delegation of certain responsibilities not cause a significant danger of losing its independence and a gradual increase in spendings in such a way that, in a broader perspective, they will be much higher than the costs before outsourcing? What will happen when a company dependent on its supplier or provider wants to pass another or a different company a particular job? Furthermore, if the company management decided to dispense with the services offered by a third party - would we be able to import the data that we receive into any other system? The compilation is an attempt at familiarizing the reader with the meaning of Cloud computing, as well as the concepts directly related to it. An attempt has been made to systemise the knowledge of the subject and present the main premises and hazards that are associated with the implementation of solution.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.