The emergence of Web3 technologies promises to revolutionize the Internet and redefine our interactions with digital assets and applications.This essay explores the pivotal role of 5G infrastructure in bolstering the ...The emergence of Web3 technologies promises to revolutionize the Internet and redefine our interactions with digital assets and applications.This essay explores the pivotal role of 5G infrastructure in bolstering the growth and potential of Web3.By focusing on several crucial aspects—network speed,edge computing,network capacity,security and power consumption—we shed light on how 5G technology offers a robust and transformative foundation for the decentralized future of the Internet.Prior to delving into the specifics,we undertake a technical review of the historical progression and development of Internet and telecommunication technologies.展开更多
Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvemen...Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.展开更多
This paper introduces the plan of a research project,in which a prototype system of the CIM-OSA-Integrating Infrastructure,HIT-IIS,will be implemented.Based on the analysis of requirements and environments,the archite...This paper introduces the plan of a research project,in which a prototype system of the CIM-OSA-Integrating Infrastructure,HIT-IIS,will be implemented.Based on the analysis of requirements and environments,the architecture and the plan of HIT-IIS are proposed.展开更多
The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process service...The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process services and the front-end services of HIT-IIS art given. It is focused on the structure, organization and workflow of the services ard environment.展开更多
The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks...The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks continue to plague the Internet. We discuss risks that affect web applications and explain how network-centric and host-centric techniques, as much as they are crucial in an enterprise, lack necessary depth to comprehensively analyze overall application security. The nature of web applications to span a number of servers introduces a new dimension of security requirement that calls for a holistic approach to protect the information asset regardless of its physical or logical separation of modules and tiers. We therefore classify security mechanisms as either infrastructure-centric or application-centric based on what asset is being secured. We then describe requirements for such application-centric security mechanisms.展开更多
基金supported by the ZTE Industry-University-Institute Fund Project under Grant No.IA20221202011.
文摘The emergence of Web3 technologies promises to revolutionize the Internet and redefine our interactions with digital assets and applications.This essay explores the pivotal role of 5G infrastructure in bolstering the growth and potential of Web3.By focusing on several crucial aspects—network speed,edge computing,network capacity,security and power consumption—we shed light on how 5G technology offers a robust and transformative foundation for the decentralized future of the Internet.Prior to delving into the specifics,we undertake a technical review of the historical progression and development of Internet and telecommunication technologies.
文摘Increasing competition in service businesses (eg: Information Technology, Healthcare, Education, Logistics, Distribution, Hospitality Financial and other services) is compelling corporates to adopt business improvement philosophies and methodologies for addressing customer demands for better quality service and organizational demands for improving the profit margins through cost reduction. Many companies around the world have already implemented Information Technology Infrastructure Library (ITIL) as a way to manage and control their Information Technology (IT) Departments more effectively. These companies are now willing to improve their ITIL processes in order to become even more efficient. Lean Six Sigma is a methodology that has been suggested as a means to resolve these problems, reducing costs and improving quality. Its application in the IT Services area is becoming increasingly popular among researchers and academicians and can be used to conduct these improvements. Despite the application of lean six sigma approaches to different contexts in the service sector, the application of Lean Six Sigma approaches in service delivery specific to Information Technology Service Management (ITSM) remains largely untested. The purpose of this paper is to implement Integrated Lean Six Sigma for Software application support services and evaluate the benefits of continual service improvement over ITIL.
文摘This paper introduces the plan of a research project,in which a prototype system of the CIM-OSA-Integrating Infrastructure,HIT-IIS,will be implemented.Based on the analysis of requirements and environments,the architecture and the plan of HIT-IIS are proposed.
文摘The controlling and processing service and supporting environment for the enterprise business processes in HIT-IIS, a prototype of the CIM-OSA-IIS, are introduced.The detailed design about the business process services and the front-end services of HIT-IIS art given. It is focused on the structure, organization and workflow of the services ard environment.
文摘The World Wide Web has been an environment with many security threats and lots of reported cases of security breaches. Various tools and techniques have been applied in trying to curb this problem, however new attacks continue to plague the Internet. We discuss risks that affect web applications and explain how network-centric and host-centric techniques, as much as they are crucial in an enterprise, lack necessary depth to comprehensively analyze overall application security. The nature of web applications to span a number of servers introduces a new dimension of security requirement that calls for a holistic approach to protect the information asset regardless of its physical or logical separation of modules and tiers. We therefore classify security mechanisms as either infrastructure-centric or application-centric based on what asset is being secured. We then describe requirements for such application-centric security mechanisms.