Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Constantin Adam"'
Publikováno v:
Southeastern Naturalist, 2019 Jan 01. 18(2), 224-239.
Externí odkaz:
https://www.jstor.org/stable/48688823
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
CLOUD
IT compliance is an area of increasing attention and capital spend in enterprise IT environments. Enforcing compliance is a complex process, which involves following regulatory requirements coming from many, often overlapping sources, and mapping tho
Autor:
Constantin Adam, Maja Vukovic, Robert Filepp, Nikos Anerousis, Milton H. Hernandez, Guan Qun Zhang
Publikováno v:
SERVICES
IT compliance is an area of increasing attention and capital spend in enterprise IT environments. We present "Continuous Compliance", a framework that allows a managed IT services provider to automate the overall process of keeping IT assets conforma
Publikováno v:
Service-Oriented Computing – ICSOC 2017 Workshops ISBN: 9783319917634
ICSOC Workshops
ICSOC Workshops
In this paper, we argue that deploying applications inside minimal runtime environments, which only contain the files necessary and sufficient for the application to run, can cut down the operating costs, specifically the costs for ensuring the appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f7f26b59c4c753128103e4971a87ba4
https://doi.org/10.1007/978-3-319-91764-1_35
https://doi.org/10.1007/978-3-319-91764-1_35
Autor:
John J. Rofrano, Brian Peterson, Robert Filepp, Jin Xiao, Nikos Anerousis, Anup K. Kalia, Muhammed Fatih Bulut, Constantin Adam, Maja Vukovic
Publikováno v:
Service-Oriented Computing ISBN: 9783319690346
ICSOC
ICSOC
We present a framework for automating change and service request management, a process that has remained almost entirely human-centric, despite the fact that it involves complex workflows, takes a significant amount of time, and is prone to errors. W
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::abea46437b6b05c243d9b34fbe9eff56
https://doi.org/10.1007/978-3-319-69035-3_31
https://doi.org/10.1007/978-3-319-69035-3_31
Autor:
G. Wright, Yu Deng, Stanislaw Wozniak, Gargi B. Dasgupta, Pietro Iannucci, Constantin Adam, Amitkumar M. Paradkar, Jin Xiao, Daniela Rosu, H. R. Motahari Nezhad, Nicholas C. M. Fuller, Dorothea Wiesmann, Taiga Nakamura, Karin Murthy, Fan Jing Meng, Shu Tao, Larisa Shwartz, Dennis A. Perpetua, Ruchi Mahindru, Jinho Hwang, Naga A. Ayachitula, Giovanni Lanfranchi, Anup K. Kalia, David Lanyi, Birgit Pfitzmann, Muhammed Fatih Bulut, Milton H. Hernandez, Kristof Kloeckner, Hagen Völzer, A. Mahamuni, Sai Zeng, Su Zhuo, Nikolaos Anerousis, M. Surendra, Sandeep Gopisetty, Heiko Ludwig, Maja Vukovic, Yixin Diao
Publikováno v:
IBM Journal of Research and Development. 62:8:1-8:11
In this paper, we present IBM's cognitive strategy for service delivery transformation to a services integration approach for IT service management. This transformation is fueled by three fundamental technological paradigms: cognitive, cloud, and dat
Autor:
Constantin Adam, Rolf Stadler
Publikováno v:
IEEE Transactions on Network and Service Management. 3:1-12
We present a decentralized design that dynamically allocates resources to multiple services inside a global server cluster. The design supports QoS objectives (maximum response time and maximum loss rate) for each service. A system administrator can
Autor:
Shang Guo, Constantin Adam, Rajeev Puri, Sai Zeng, Yaoping Ruan, Cashchakanithara Venugopal, Frederick Y. Wu
Publikováno v:
NOMS
Endpoint management, including patching, health checking, configuration etc., is a key function for data center and cloud management. Managing multiple nodes through automation tools or scripts significantly increases efficiency. However, the risks o
Publikováno v:
NOMS
In this paper, we investigate the benefits of adding autonomic capabilities inside the operating system. We have developed and implemented a solution that focuses on three use cases (continuous file permission compliance, dynamic disk cleanup, and ac