What will the media enterprise infrastructure look like in 2036? Current trends of IT/IP/cloud provide some guidance for the structure of future systems. This paper takes a deep look at the evolution ...of the system's components and architecture and examines some possible scenarios for infrastructure choices. Considered will be extrapolated trends for transport, networking, storage, compute, and cloud futures, and a discussion of exponential technology growth and its impact on media creation, production, and distribution.
This paper explores the deployment of complex image processing applications in a public cloud to make massive processing jobs practical for post-production budgets and timescales. It uses an ...illustrative example of an iterative motion-compensated super-resolution pixel reconstruction technique deployed in a cloud platform that can process what was an 8-week job on local hardware in a few hours using a public cloud. However, the technique is not without its pitfalls. Even large public cloud data centers have practical limits that cannot be ignored. Real-world examples range from 35-mm restoration for digital 3D re-release to the latest Hollywood 120 frames/sec, 4K, 3D high-dynamic-range content. Large-scale resources can be leveraged for otherwise impractical techniques, opening the door to a new breed of high-end media processing tools and making them accessible to post-production facilities.
Zusammenfassung
Ob Berufsgeheimnisträger sich beim IT-Outsourcing nach § 203 StGB strafbar machen, wird bereits seit Jahren diskutiert, beispielsweise im Zusammenhang mit der Nutzung des externen ...Anwaltssekretariats oder der professionellen Aktenarchivierung, und gilt immer noch als ungelöstes Problem. Bei der Nutzung von Cloud Computing stellen sich teilweise parallel gelagerte, teilweise weitergehende Fragen. Im Folgenden wird insbesondere untersucht,
ob Berufsgeheimnisträgern bereits de lege lata der Weg offen steht, Geheimnisse „in die Wolke“ zu verlagern, ohne hierbei ein Strafbarkeitsrisiko einzugehen, ob der am 25.5.2016 in Kraft getretenen EU-Datenschutz-Grundverordnung in diesem Kontext Bedeutung zukommt und welche Lösungsmöglichkeiten de lege ferenda zu begrüßen wären
.
1
•Unique set of selection factors are used to rank Cloud service providers(CSP).•Multi Criteria Decision Model is implemented to rank using Extent Analysis of FAHP.•An Optimized Flavor is recommended ...for Virtual Machine(VM) provisioning in hybrid cloud.•A budget optimized algorithm called BOPVM for VM provisioning is proposed based on CSP ranking.•Dynamic cost deviation factors and budget constraints are considered among cloud vendors.
Among various deployment models, Hybrid cloud is the preferred model allowing customers to maximize cost savings and performance by leveraging advantage of quick provisioning capabilities of public cloud. However, due to vast diversity of cloud services, today’s struggle for the customers is to evaluate and discover the best fit Cloud Service Provider (CSP) for an efficient Virtual Machine (VM) provisioning in various hybrid cloud contracts of multi cloud environment. Currently there is no framework that allows customers to evaluate CSPs based on application workload, application environment and employ an budget optimized VM provisioning with dynamically varying factors while adhering to Service Level Agreement (SLA). Hence, the proposed VM Provisioning framework is a Multi Criteria Decision-Making (MCDM) model with an objective to provision the VMs from the well suited CSP in hybrid cloud. The framework initially derives weights for each decision-making input criteria considered as Quality of Service (QoS) Service Measurement Index (SMI) attributes using extent analysis method of Fuzzy Analytical processing (FHP). It ranks the CSP by aggregating weights of decision makers among the alternatives. The framework then proposes a budget optimized algorithm called BOPVM to provision VMs in the hybrid cloud based on the order of assigned rank to CSPs. The framework is evaluated and implemented on real time workload among the CSPs – Amazon, Azure and Openstack. The evaluation results shows significant provisioning cost savings of 50% with reduced provisioning time by 65% when compared with existing algorithms.
The cloud computing model - especially the public cloud - is unsuited to many business applications and is likely to remain so for many years due to fundamental limitations in architecture and ...design. Enterprises that move their IT to the cloud are likely to encounter challenges such as security, interoperability, and limits on their ability to tailor their ERP to their business processes. The cloud can be a revolutionary technology, especially for small startups, but the benefits wane for larger enterprises with more complex IT needs. Utility computing still cannot match the "plug-and-play" simplicity of electricity. On the other hand, private clouds offer the benefits like scale and virtualization with fewer drawbacks.
To choose the most appropriate cloud-computing model for your organization, you must analyze your IT infrastructure, usage, and needs. To help with this, this article describes cloud computing's ...current status.
Cloud computing technology (CCT) is a revolutionary new way of leveraging the power of the Internet to provide software and infrastructure solutions to businesses around the world. 2017 is predicted ...to be a major breakout year for this technology, with many organizations small and large making a shift to this platform. Employing this technology empowers communication between companies and has the potential to generate significant financial and operational benefits for small businesses. The key objective of this article is to propose a conceptual model for successful implementation of CCT in small businesses. This article also examines some of the potential benefits of CCT as applied to small businesses and explores implementation challenges that can be expected. Furthermore, this study reviews key attributes of successful CCT and illustrates some of the routes that might be taken to implement this technology in small businesses. Finally, this article examines the specific application of CCT to small businesses, highlights developing technologies and trends, investigates the deployment of CCT in different types of small businesses, and provides a case example of success.
Running applications on a cloud environment without checking and meeting their allocation and performance requirements may lead to unexpected application slowdown and infrastructure ...under-utilization. In addition, competition for same shared resources may cause performance degradation when applications with similar resource usage profiles are scheduled concurrently. This paper presents an affinity-based model for scheduling virtual machines that host and run scientific applications on a private cloud environment. The main contributions of the proposed model are: i) an approach that exploits the concept of affinity relations among competitive applications; ii) a set of experiments using consolidated HPC benchmarks and their analysis to assess the performance of two concurrent applications; and iii) a novel scheduling algorithm based on an affinity relation among competitive applications.
•An affinity aware scheduler, focused on system throughput, is introduced.•Based on co-allocated job interactions, it selects the host with better throughput.•To study affinity, a comprehensive experiment with selected benchmark was performed.•Simulations proved the advantages proposed by the affinity aware scheduler.•Based on the simulations, an affinity FIFO scheduler is also proposed and evaluated.
The article shows the results of the preparatory steps taken to create the artificial intelligence used in the automatic recognition of defects in ship thin-walled structures. The above steps are ...used to create a university private cloud and a computer system maintaining a dataset of vibration signal samples. In the article, a prototype of the private cloud was designed and developed, a model of the vibration sample was prepared, and a microservice was designed aimed at sharing the obtained data. The article demonstrates the results of the completed development.