This document discusses challenges related to adopting Software as a Service (SaaS) business applications. It reviews literature that has identified key challenges such as data security, customization, and scalability. The document provides background on cloud computing models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also discusses characteristics of the SaaS cloud computing model and the business value it provides.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
What are the advantages of adopting public cloudNicole Khoo
Public cloud computing brought a fundamental change from the conventional norms of an organizational data center to a parameterized open environment to use by adversaries.
Best cloud computing training institute in noidataramandal
TECHAVERA is offering best In Class, Corporate and Online cloud computing Training in Noida. TECHAVERA Delivers best cloud Live Project visit us - http://www.techaveranoida.in/best-cloud-computing-training-in-noida.php
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Cloud computing is the hottest topic in IT. It is virtually impossible to read a trade publication or
attend an IT conference and not be overwhelmed by discussions of the advantages and benefits
of cloud computing. In spite of all of the interest, there is still considerable confusion and
disagreement within the IT industry about the definition of cloud computing. The Cloud
Computing Journal, for example, published an article that included 21 definitions of cloud
computing. 1
Though there is confusion about the definition, the goal of cloud computing is quite clear – to
achieve an order of magnitude improvement in the cost-effective, elastic provisioning and
delivery of IT services.
What are the advantages of adopting public cloudNicole Khoo
Public cloud computing brought a fundamental change from the conventional norms of an organizational data center to a parameterized open environment to use by adversaries.
Best cloud computing training institute in noidataramandal
TECHAVERA is offering best In Class, Corporate and Online cloud computing Training in Noida. TECHAVERA Delivers best cloud Live Project visit us - http://www.techaveranoida.in/best-cloud-computing-training-in-noida.php
Recently, organizations have shown more interest in cloud computing because of the many advantages they provide (cost savings, storage capacity, scalability, and speed of loading). Enterprise resource planning (ERP) systems are one of the most important systems that have been upgraded to cloud computing. In this thesis, we focus on cloud ERP interoperability, which is an important challenge in cloud ERP. Interoperability is the ability of different components to work in independent clouds with no or minimum user effort. More than 20% of the risk rate of cloud adoption is caused by interoperability. Thus, we propose web services as a solution for cloud ERP interoperability. The proposed solution increases interoperability between different cloud service providers and between cloud ERP systems with other applications in a company.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this paper, the SMB Group examines different cloud computing models and the types of requirements that each can best address, and discusses what midmarket businesses should look for in a cloud solutions provider.
Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for coming world. It is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is an emerging computing technology that uses the Internet and central remote servers to maintain data and applications. Cloud computing allows consumers and business to use applications without installation and access their personal files at any computer with Internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Recently, organizations have shown more interest in cloud computing because of the many advantages they provide (cost savings, storage capacity, scalability, and speed of loading). Enterprise resource planning (ERP) systems are one of the most important systems that have been upgraded to cloud computing. In this thesis, we focus on cloud ERP interoperability, which is an important challenge in cloud ERP. Interoperability is the ability of different components to work in independent clouds with no or minimum user effort. More than 20% of the risk rate of cloud adoption is caused by interoperability. Thus, we propose web services as a solution for cloud ERP interoperability. The proposed solution increases interoperability between different cloud service providers and between cloud ERP systems with other applications in a company.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this paper, the SMB Group examines different cloud computing models and the types of requirements that each can best address, and discusses what midmarket businesses should look for in a cloud solutions provider.
Cloud computing technology has been a new buzzword in the IT industry and expecting a new horizon for coming world. It is a style of computing which is having dynamically scalable virtualized resources provided as a service over the Internet.
SDN creates a tailored or customized network experience which enables greater level of speed, flexibility, agility and scale in the data center. Read here from Netmagic Solutions.
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is an emerging computing technology that uses the Internet and central remote servers to maintain data and applications. Cloud computing allows consumers and business to use applications without installation and access their personal files at any computer with Internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS
provides software application as Web based delivery to server many customers. This sharing of
infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs,
minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is
generally developed with standardized software functionalities to serve as many customers as
possible.However many customers ask to change the standardized provided functions according to their
specific business needs, and this can be achieve through the configuration and customization provided by
the SaaS vendor.Allowing many customers to change software configurations without impacting others
customers and with preserving security and efficiency of the provided services, becomes a big challenge to
SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures
allow multiple customers to be consolidated into the same operational system without changing anything in
the vendor source code. In this paper, we will present how the configuration can be done on an ERP web
application in a Multi-Tenancy SaaS environment.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
Direct-sequence code-division multiple access (DS-CDMA) is
currently the subject of much research as it is a promising
multiple access capability for third and fourth generations
mobile communication systems. The synchronous DS-CDMA
system is well known for eliminating the effects of multiple
access interference (MAI) which limits the capacity and
degrades the BER performance of the system. In this paper,
we investigate the bit error rate (BER) performance of a
synchronous DS-CDMA system over a wideband mobile
radio channel. The BER performance is affected by the
difference in path length ΔL and the number of arriving
signals N. Furthermore, the effect of these parameters is
examined on the synchronous DS-CDMA system for different
users’ number as well as different processing gain Gp. In this
environment and under the above conditions the performances
of the BPSK (Binary Phase Shift Keying) and the QPSK
(Quadrature Phase Shift Keying) modulations are compared.
The promising simulation results showed the possibility of
applying this system to the wideband mobile radio channel.
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
With microblogging platforms such as Twitter generating
huge amounts of textual data every day, the possibilities of
knowledge discovery through Twitter data becomes
increasingly relevant. Similar to the public voting mechanism
on websites such as the Internet Movie Database (IMDb) that
aggregates movies ratings, Twitter content contains
reflections of public opinion about movies. This study aims to
explore the use of Twitter content as textual data for
predicting the movie rating. In this study, we extract number
of tweets and compiled to predict the rating scores of newly
released movies. Predictions were done with the algorithms,
exploring the tweet polarity. In addition, this study explores
the use of several different kinds of tweet classification
Algorithm and movie rating algorithm. Results show that
movie rating developed by our application is compared to
IMDB and Rotten Tomatoes.
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
The design of robust controller for any non linear process is a
challenging task because of the presence of various types of
uncertainties. In this paper, various design methods of robust
PID controller for the level control of conical tank are
discussed. Uncertainties are of different types, among that
structured uncertainty of 30% is introduced to the nominal
plant for analysing the robustness. As a first step, the control
of level is done by using conventional integer order controller
for both nominal and uncertain system. Then, the control is
done by means of Fractional Order Proportional Integral
Derivative (FOPID) controller for achieving robustness. With
the help of time series parameters, a comparison is made
between conventional PID and FOPID with respect to the
simulated output using MATLAB and also analyzed the
robustness.
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
It is an important task of working women to handle two
important tasks. Balancing these two roles at home and
work is very challenging task and causes stress at different
levels. Different dimension of working women’s life
involves in evolving the stress in working women’s life.
These stresses cause the imbalance at the front of and
handling family responsibility. In the current scenario,
doctors face many stressors that are peculiar to the medical
profession and doctors are required to have more
competencies than before in diagnosis ongoing
management of medical conditions. This means increased
responsibilities which may contribute to stress. Stress
experienced at work can have adverse outcomes for the
well-being of individual employees and organization as
whole. My study is focusing on identifying the factors
causing stress among female doctors working for public
and private hospitals and their stress levels associations
with respect to sector. A sample of 300 female doctors
from urban area participated in this study. Out of this, 150
each are from public and private hospitals respectively. A
self-made standardized tool was administered based on five
point scale. Results indicates that the values were found to
be 0.000 in all the cases except, psychosomatic problems
(0.004) which is lesser than (0.05) p-value resulting into
rejection of null hypotheses , consequently revealing an
association between sector of female doctors and stress due
to workload, working condition, physical exertion,
emotional exhaustion, job security, organizational support,
work family conflict, family adjustment, task demands,
psychosomatic problems, patient’s expectation and working
hours.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
In recent years controllable FACTS devices are increasingly
integrated into the transmission system. FACTS devices that
provide series control such as Controllable Series Compensator
(CSC) has significant effect on the voltage stability of Electric
Power system. In this work impact of line resistance on the
performance of CSC in a single-load infinitive-bus (SLIB)
model is investigated. The proposed framework is applied to
SLIB model and obtained results demonstrates that line
resistance has considerable effect on voltage stability limits and
performance of CSC.
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
Recently, handful amount of S-boxes, using the various
methods such as affine transformations, gray coding,
optimization, chaotic systems, etc, have been suggested. It is
prudent to use cryptographically strong S-boxes for the design
of powerful ciphers. In this paper, we sampled some widely
used 8×8 S-boxes which are recently synthesized and security
analysis and evaluation is executed to uncover the best
candidate(s). The performance analysis is exercised against
the crucial measures like nonlinearity, linear approximation
probability, algebraic immunity, algebraic complexity,
differential uniformity. These parameters are custom selected
because their scores decide the security strength against
cryptographic assaults like linear cryptanalysis, algebraic
attacks, and differential cryptanalysis. The anticipated
analysis in this work facilitates the cryptographers, designers,
researchers to choose suitable candidate decided over many
parameters and can be engaged in modern block encryption
systems that solely rely on 8×8 S-box. Moreover, the analysis
assists in articulating efficient S-boxes and to evaluate the
attacks resistivity of their S-boxes.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
Mobile Ad Hoc Networks (MANETs) are wireless networks,
where there is no requirement for any infrastructure support to
transfer data packets between mobile nodes. These nodes
communicate in a multi-hop mode; each mobile node acts
both as a host and router. The main job of Quality of Service
(QoS)[1][2] routing in MANETs is to search and establish
routes among different mobile nodes for satisfying QoS
requirements of wireless sensor networks as PDR, Average
end-to-end delay, Average Throughput. The QoS routing
protocols efficient for commercial, real-time and multimedia
applications are in demand for day to day activities[2].
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
License Plate Recognition (LPR) system for vehicles is an innovative and a very challenging area for research due to the innumerous plate formats and the nonuniform outdoor illumination conditions during which images are acquired. Thus, most approaches developed, work under certain restrictions such as fixed illumination, stationary background and limited speed. Algorithms developed for LPR systems are generally composed of three significant stages: 1] localization of the license plate from an entire scene image; 2] segmentation of the characters on the plate; 3] recognition of each of the segmented characters. A simple approach for preprocessing of the images, localization and extraction phase has been described in this paper. Numerous procedures have been developed for LPR systems and are assessed in this paper taking into consideration issues like processing time, computational power and recognition rate wherever available.
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
Levenberg-Marquardt back-propagation training method has some limitations associated with over fitting and local optimum problems. Here, we proposed a new algorithm to increase the convergence speed of Backpropagation learning to design the airfoil. The aerodynamic force coefficients corresponding to series of airfoil are stored in a database along with the airfoil coordinates. A feedforward neural network is created with aerodynamic coefficient as input to produce the airfoil coordinates as output. In the proposed algorithm, for output layer, we used the cost function having linear & nonlinear error terms then for the hidden layer, we used steepest descent cost function. Results indicate that this mixed approach greatly enhances the training of artificial neural network and may accurately predict airfoil profile.
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
Wireless Sensor Network has several issues and challenges due to limited battery backup, limited computation capability, and limited computation capability. These issues and challenges must be taken care while designing the algorithms to increase the Network lifetime of WSN. Routing, the act of moving information across an internet world from a source to a destination is one of the vital issue associated with Wireless Sensor Network. The Ant Colony Optimization (ACO) algorithm is a probabilistic technique for solving computational problems that can be used to find optimal paths through graphs. The short route will be increasingly enhanced therefore become more attractive. The foraging behavior and optimal route finding capability of ants can be the inspiration for ACO based algorithm in WSN. The nature of ants is to wander randomly in search of food from their nest. While moving, ants lay down a pheromone trail on the ground. This chemical pheromone has the ability to evaporate with the time. Ants have the ability to smell pheromone. When selecting their path, they tend to select, probably the paths that has strong pheromone concentrations. As soon as an ant finds a food source, carries some of it back to the nest. While returning, the quantity of chemical pheromone that an ant lay down on the ground may depend on the quantity and quality of the food. The pheromone trails will lead other ants towards the food source. The path which has the strongest pheromone concentration is followed by the ant which is the shortest paths between their nest and food source. This paper surveys the ACO based routing in various Networking domains like Wireless Sensor Networks and Mobile Ad Hoc Networks.
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Today, the Wireless Sensor Network is increasingly gaining popularity and importance. It is the more interesting and stimulating area of research. Now, the WSN is applied in object tracking and environmental monitoring applications. This paper presents the self-optimized model of multipath routing algorithm for WSN which considers definite parameters like delay, throughput level and loss and generates the outcomes that maximizes data throughput rate and minimizes delay and loss. This algorithm is based on ANT optimization technique that will bring out an optimal and organized route for WSN and is also to avoid congestion in WSN, the algorithm incorporate multipath capability..
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
One of the parent´s main concerns nowadays it to know their children´s whereabouts. Some applications exist to address this issue and most of them rely on internet connection which makes the solution expensive. In this paper we present a low cost solution, based on SMS, and with the ability to remotely configure the child monitoring process. We also present the architecture and the full flowchart of the child application whenever a SMS is received. This case study uses Android and the more recent location API – the Fused Location Provider. For obvious reasons, the security issue has been a concern, which resulted in a configuration module in the child application to specify authorized senders
Leader Election Approach: A Comparison and SurveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity.
Leader election approach a comparison and surveyEditor Jacotech
In distributed system, the coordinator is needed to manage the use of the resources in the shared environment. Many algorithms have been proposed for the same. They have various positive and negative parts. Here we will discuss those issues which ensure the efficiency of the algorithm for election leader. Here a comparison will be provided to show the advantages and disadvantages of different election algorithms. The comparison would be based on the number of messages passing and the order of time complexity
Modeling of solar array and analyze the current transientEditor Jacotech
Spacecraft bus voltage is regulated by power
conditioning unit using switching shunt voltage regulator having
solar array cells as the primary source of power. This source
switches between the bus loads and the shunt switch for fine
control of spacecraft bus voltage. The effect of solar array cell
capacitance [5][6] along with inductance and resistance of the
interface wires between solar cells and power conditioning
unit[1], generates damped sinusoidal currents superimposed on
the short circuit current of solar cell when shunted through
switch. The peak current stress on the shunt switch is to be
considered in the selection of shunt switch in power conditioning
unit. The analysis of current transients of shunt switch in PCU
considering actual spacecraft interface wire length by
illumination of solar panel (combination of series and parallel
solar cells) is difficult with hardware simulation. Software
simulation by modeling solar cell is carried out for a single string
(one parallel) in Pspice [6]. Since in spacecrafts number of
parallels and interface cable length are variable parameters the
analysis of current transients of shunt switch is carried out by
modeling solar array with the help of solar cell model[6] for the
actual spacecraft condition.
Traffic Detection System is an Android application that aims at determining the behavior of traffic in a particular location. It calculates the speed of the vehicle and the level of congestion or the amount of traffic is determined on the basis of the values of sensors. If any such obstruct found, then the driver is provided an option to send messages regarding high traffic to his/her friends. After a distinct number of repeated low speed and breaks, the location of the vehicle (latitude and longitude) send to a pre-specified contact (selected in case of traffic congestion) through an SMS. This application uses the features of the Global positioning system. The Latitude, as well as the longitude of the location where traffic jams are formed, is sent to the friends of the user. The Goggle map of the location also sends to the friends. It uses the SMS Manager a functionality of Android. The friends receiving the messages will thereby avoid taking the congested route and hence the level of traffic on the congested road will decrease, and the friends will reach the destination in comparatively less time.
Performance analysis of aodv with the constraints of
Cloud computing a services business application challenges
1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
6
Cloud Computing: Software as a Services Business Application Challenges By
Rakhi Singh, Surabhi Pandey Galgotias College of Engineering & Technology Greater Noida. Army Institute of Management & Technology (AIMT), Greater Noida.
Rakhi2k11@gmail.com , surabhipandey1@yahoo.co.in
ABSTRACT Information technology is still evolving and changing rapidly. At present almost everyone in this world can get connected to the Internet. Organizations are striving for attaining their full potential by rapidly realizing innovative business models while simultaneously lowering the IT barriers for driving in innovations and changes. This has resulted into the invention of a new delivery model of IT Services, which is now popularly known as SaaS or Software as Service - a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet. The concept is simple and attractive: Use the ERP Software Service and Pay the Subscription Fee. SaaS is one of the services of Cloud Computing, which is based on a "one-to-many" model whereby an IT application is shared across multiple clients/users. It fundamentally uses Cloud Computing Platform for delivering IT enabled Services. There are certain technical challenges involved in the adoption of SaaS technology and some of the challenges are Data security, Customization and Scalability and this research paper is to find out the challenges involved in SaaS business application by both secondary as well as primary data analysis The main aim of this research effort was to examine the challenging factors for the adoption of ERP/Business Application on Software as a Service Delivery Model and for that very purpose 6 factors are identified based on literature review and tested with collected primary data . Keywords Cloud ERP, SME, SaaS, PaaS, IaaS Cloud Computing, ERP, IS, Multitenant, HRM, SCM, CRM, MRP
1. INTRODUCTION
Cloud Computing refers to the general acuity of allowing people to access technology-enabled services using the internet. Its vigorously scalable and often virtualized resources are delivered as a service over the Internet which also provides a superior facility to the user, and is characterized by new, internet-driven economics. Users need not have knowledge of, or expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing can considerably reduce IT costs and complexities while improving workload optimization and service delivery. Cloud computing infrastructure for application development is enabling to build robust, enterprise- class applications in a fraction of the time and at a much lower cost.
Enterprises, particularly big organizations are interested in Cloud computing because it comes with several potential benefits. The Pay-As-You-Use consumption model can be applied more conveniently even to the business applications e.g. in ERP (SaaS – Software as a Service). This transfers the traditional Capital Expenditure (CapEx) model to an Operational Expenditure (OpEx) model. SaaS basically uses Cloud Computing Platform for delivering IT enabled Services. Today organizations are turning to the cloud business systems in increasing numbers and basically there are many reasons for the same. Few of them as listed below.
• Organizations do not want to buy the servers and hire the IT resources.
• Becoming more complex, and challenging to manage.
• Organizations have complex ERP/Business systems need something easier and more economical.
• Top management doesn’t want to spend it on an ERP system.
The vast majority of SaaS solutions are based on a multi-tenant architecture. In this model, a single version of the application, with a single configuration (hardware, network, operating system), is used for all customers ("tenants"). To support scalability, the application is installed on multiple machines which technically termed as horizontal scaling. While an exception rather than the norm, some SaaS solutions do not use multi-tenancy, but use other mechanisms—such as virtualization—to cost-effectively manage the large number of customers in place of multi-tenancy. An ERP/IT Business Applications solution seeks to integrate and streamline business processes and their associated information and various work flows. Modules in an ERP/Business Solution typically includes: Manufacturing, Supply Chain, Financials, Customer Relationship Management, Human Resource/ Payroll and Inventory Management. The top ERP vendors are SAP, Oracle Corporation, Microsoft Corp, Infor ERP (formerly Baan), Sage Group, Ramco Systems etc. In conventional model, ERP/IT Application solution is being implemented and installed in the Customer’s premises. In this case, all the necessary hardware / software/user license need to be purchased by the customer.
Implementation of conventional ERP system involves lots of planning, huge capital investments and is a time consuming process. In addition to these, regular up gradation costs, other investments, maintenance costs can be quite troublesome for the customers. On the other hand, SaaS ERP is devoid of any technological concern and saves the huge initial investment of both time and money. The customer can use the SaaS ERP only
2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
7
for his business purpose and leave the technical and maintenance related worries rests to the vendor. The vendor gains by serving a number of customers at a time.
There are certain technical challenges involved in the adoption of SaaS technology and some of the challenges are Data security, Customization and Scalability. SaaS applications provide customers centralized, network-based access to data with less overhead and the customers trusting the SaaS vendor to keep every information/data safe and away from prying eyes. Therefore, data is of utmost importance aspect both for the customers and providers of SaaS Solutions.
1.1 Cloud Computing Deployment Models
There are following deployment models for cloud based IT Solutions. Private cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers, from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Public cloud: The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Hybrid cloud: The cloud infrastructure is a configuration of two or more distinct cloud infrastructures (private, community, or public) that retain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). Figure1: Cloud Computing Deployment Model
1.1.1 Cloud Computing Service Models
Three significant cloud computing service models as detailed below. Software as a Service (SaaS):The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer- created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. Infrastructure as a Service (IaaS):The capability provided to the consumer is for provision processing, storage, networks, and other fundamental computing resources, where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
1.2 Important Characteristics of SaaS Cloud
Computing
• Agility improves with users’ ability to re-provision technological infrastructure resources.
• Application Programming Interface (API) accessibility to software that enables machines to interact with cloud software in the same manner the user interface facilitates interaction between humans and computers.
• Cost is claimed to be reduced and in a public cloud delivery model capital expenditure is converted to operational expenditure. This is purported to lower barriers to enter, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer IT skills are required for implementation (in-house).
• Device and location independence facilitate users to access systems using a web browser irrespective of their location (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third- party) and accessed via the Internet, users can connect from anywhere.
3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
8
• Virtualization technology allows servers and storage devices to be shared for increased and optimum utilization. Applications can be easily migrated from one physical server to another.
• Multi-tenancy enables sharing of resources and costs across a large pool of users thus allowing for:
o Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)
o Peak-load capacity increases (users need not engineer for highest possible load-levels)
o Utilisation and efficiency improvements for systems that are often only 10–20% utilised.
• Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
• Scalability and Elasticity via dynamic (“on- demand”) provisioning of resources on a fine-grained, self-service basis near real-time, without users having to engineer for peak loads.
• Performance is monitored and consistent and loosely coupled architectures are constructed using web services as the system interface.
• Security could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users.
• Maintenance of cloud computing applications is easier, because they do not need to be installed on each user’s computer and can be accessed from different places.
Business Value of Cloud Computing services [SaaS]
Cloud-based systems immediately open options for access to new and cost-effective ways to address company goals and objectives. For example:
• Being able to get services up and running quickly;
• Lower upfront deployment costs;
• Ease of access;
• Pay for software solutions you need, when you need them;
• Access to automatically updated software and security
2. BACKGROUND AND HISTORY
The term "cloud" has been actually borrowed from telephony services. The telecommunications companies, who until the 1990s primarily offered dedicated point-to-point data circuits, began offering Virtual Private Network (VPN) services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they deemed it workable if they were able to utilize their overall network bandwidth more effectively. The Cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider from that of the user. Cloud Computing extends this boundary to cover servers as well as the network infrastructure. The underlying concept of Cloud Computing dates back to 1960s, when John McCarthy opined that "Computation may someday be organized as a public utility". Almost all the modern day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government and community forms were thoroughly explored by Douglas Parkhill [1966] Salesforce.com is one of the pioneers of the software as a service model of distributing business software, in which access to business software is purchased on a subscription basis and hosted offsite was established by Marc Russell Benioff in [1999] who is a Chairman and CEO of Salesforce.com, the leading enterprise Cloud Computing Company. They also provided the concepts of "on demand" and SaaS is an abbreviation for “Software as a Service “The key for SaaS is that it is customizable by customers requiring limited technical support. Business users have enthusiastically welcomed the resulting flexibility and speed. Amazon played a key role in the development of Cloud Computing by modernizing their data centers after the dot-com bubble, which, like most computer networks, were utilizing as little as 10% of their capacity at any one time just to leave room for occasional spikes. Having found that the new cloud architecture resulted in significant internal efficiency improvements whereby small l, fast-moving "two-pizza teams" could add new features faster and easier, Amazon started providing access to their systems through Amazon Web Service (AWS) on a utility computing basis in 2006. In 2007, Google, IBM, and a number of universities embarked on a large scale cloud computing research project. In early 2008, Eucalyptus became the first open source AWS API compatible platform for deploying private clouds. By mid-2008, Gartner saw an opportunity for Cloud Computing "to shape the relationship among consumers of IT services, i.e. between those who use IT services and those who sell them", and observed that organizations are switching from company-owned hardware and software assets to per-use service-based models" so that the "projected shift to Cloud Computing will result in dramatic growth in IT products in some areas and significant reductions in other areas."
3. LITERATURE REVIEW
Many researchers have their different opinion on the challenging factors, which become obstacle in the adoption of this technology.
Benlian.A, Hess.T, Buxmann. P [2009], “Drivers of SaaS- Adoption”: Analysis revealed that patterns on the decision on
4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
9
SaaS-adoption differ across application types. Social influence, attitude toward SaaS-adoption, adoption uncertainty, and strategic value turned out to be the strongest and most consistent drivers across all application types. Furthermore, we found that firm size does not matter in SaaS-adoption, since large enterprises and small- and medium-sized companies had similar adoption rates.
According to Armbrust et al, [2009] “A Berkeley View of Cloud Computing” identified 10 Obstacles and Opportunities for Adoption and Growth of Cloud Computing. According to the market research company IDC prediction [2010] web cast IDC IT Cloud Services.
Survey: Top Benefits and Challenges are Security, Availability and Performance Still Lead Challenges; Cost and Lock-In Worries Rise Figure2: IDC Report (2010) on Rating of Cloud computing challenges/ issues. Dawei.sun et al [2011], studied on Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments, main aim of researcher was to highlight the major Security, privacy and trust issues in current existing cloud computing environments and help users recognize the tangible and intangible threats associated with their uses. We cover two main aspects of security, privacy and trust issues, which include:
(a) Surveying the most relevant privacy, security and trust issues that pose threats in current existing cloud computing environments, and
(b) Analyzing the way that may be addressed to eliminate these potential security, privacy and trust threats, and providing a high secure, trustworthy, and dependent
(c) Cloud computing environment.
Janssen.Marijn and Joha. Anton [2011], "CHALLENGES FOR ADOPTING CLOUD-BASED SOFTWARE AS A SERVICE (SAAS) IN THE PUBLIC SECTOR”. It was found that SaaS could provide many benefits which are related to the outsourcing of the local control, installation and development of software which could result in potential cost-savings and better cost control. There are also many challenges that need to be addressed including ensuring the quality, privacy, security and business continuity which require the implementation of organizational changes and governance mechanisms for public sector organizations are adopting SaaS. Hailu & Alemayehu [2012], “FACTORS INFLUENCING CLOUD-COMPUTING TECHNOLOGY ADOPTION IN DEVELOPING COUNTRIES” The purpose for studying this topic is to examine factors that influence IT leaders in the developing countries in the selection and adoption of cloud- computing technology.. The study will evaluate developing countries IT investment decision makers’ attitudes and perceptions of the need, reliability, cost effectiveness, and security effectiveness of cloud computing. C. Rong et al [2012], discussed about cloud computing benefits and security challenges in the current cloud computing model, including both the conventional security challenges that can be applied to cloud computing and a number of new challenges that are inherently connected to the new cloud paradigm. The current security issues of cloud computing emphasized three areas of particular interest, namely SLAs, trusted data sharing, and accountability. According to Vozmediano et.al [2013 ] , Cloud computing will play a major role in the future of Internet Services, enabling on- demand provisioning of applications, platforms, and computing infrastructures. However, the cloud community must address several technology challenges to turn this vision into reality. Specific issues relate to deploying future infrastructure-as-a- service clouds and include efficiently managing such clouds to deliver scalable and elastic service platforms on demand, developing cloud aggregation architectures and technologies that let cloud providers collaborate and interoperate, and improving cloud infrastructures' security, reliability, and energy efficiency. According to P Gupta et al [2013], found that “Five factors influencing the cloud usage by the business community”, Business requirements of various large enterprises are ease of use and convenience is the biggest favorable factor followed by security and privacy and then comes the cost reduction
4. RESEARCH METHODOLOGY
Purpose of the study The key purpose for studying this topic is to analyse and investigate the current prospects and challenges involved in acceptability of Business applications on SaaS delivery model. This study focuses on critical comparative cost-benefit analysis of the SaaS based Business/ERP solution with traditional IT/ERP solutions and identifies the challenges faced by the IT Companies (Service Provider) as well as user organizations. This includes identification of the major factors which are restraining & affecting the decision of user organization for adoption/implementation of cloud computing based IT solutions in their organizations. Further the study will also evaluate various other known issues pertaining to SaaS applications i.e. technical architecture, customization, data Security, contracting/SLA, performance, availability, pricing and integration with other systems etc. Extensive literature review of cloud computing was done to find out the challenging factor of SaaS adoption of cloud computing
5. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
10
4.1 Research Objectives
The research objectives are to identify and analyse various technical/business issues that have become obstacles in the adoption of ERP/Business Solution on SaaS Model by various organizations especially in India and influence decision making at the same time.
4.2 Research Design
The research design for this study is descriptive. The major purpose of descriptive research is description of the state of affairs as it exists at present. Descriptive research includes surveys and fact-finding enquiries of different kinds. The methods of data collection depend upon the sources of data collection including primary source of data and secondary source of data. For this study, primary data collected through structured close ended questionnaire collected through direct interview and some through email, telephonic interview. To collect secondary data, websites and external sources have been utilized.
Sample Technique: - This study used stratified random sampling techniques as data have been collected from the heterogeneous group. The targeted sample size was 110, but actual data collected from 100 companies that include 50 user companies using SaaS business application, 40 Non – User companies and 10 SaaS solution Service provider IT Companies. One respondent from one company, hence survey executed at company level where staff members of each company responded about adoption of SaaS business application in their organization.
4.3 Data Analysis
Statistical analysis was performed on the data/response collected from around 100 companies that included data/response from the user, non-user companies and Solution Providers of SaaS IT solutions. Tools used for data & statistical analysis: Microsoft Excel 2010.
1. Challenging factors for the Adaptability of SaaS solution (Covering all types of enterprises i.e. User , Non-User and Solution Provider)
2. Interpretation :- Contract and pricing scored similar percentage of 18% ,Integration comes next with 17% . However, ‘availability and customization’and Security scored 16% and 15% respectively.
3. Challenging Factors of SaaS Adaptability w.r.t. to User companies of SaaS solutions
6. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
11
Interpretation :- Integration ,Contract andPricing all 3 important factors scored 18%. However, availability,security and customization scored 16% , 15% and 15% respectively.
4. Challenging Factors of SaaS Adaptability specific to Non User Companies Interpretation:- Contract, Pricing and Customization scored 19%, 18% and 18% respectively. However, integration,availability andsecurity scored 16% , 15% and 14% respectively.
5. FINDINGS
Following are some of the important factors which are limiting the adoption of SaaS as a business solution.
• Data security factors.
• Customization factor
• Data availability factors
• Integration factors
• Contract factors
• Pricing factors
Quantitative analysis was performed on data collected from 100 companies that includes both user and non – user companies and Challenging factors percentage is different for both the user and non-users companies .
• Challenging factors for the Adaptability of SaaS solution (Covering all types of enterprises i.e. User , Non-User and Solution Provider- Contract and pricing
scored similar percentage of 18% ,Integration comes next with 17% . However, ‘availability and customization’with 16%and Security scored 15% respectively.
• Challenging Factors of SaaS Adaptability w.r.t. to User companies of SaaS solutions- Integration ,Contract andPricing all 3 important factors scored 18%. However, availability,security and customization scored 16% , 15% and 15% respectively.
• Challenging Factors of SaaS Adaptability specific to Non User Companies- Contract, Pricing and Customization scored 19%, 18% and 18% respectively. However, integration,availability andsecurity scored 16% , 15% and 14% respectively.
• According to literature review Security and availability are most concerned issues but according to primary Data analysis Security and availability is got less
8. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804)
Volume No.2 Issue No. 4, August 2014
(ETACICT-2014)
13
[22] P. T. Kale, S. S. Banwait, and S. C. Laroiya. Enterprise Resource Planning Implementation in Indian SMEs: Issues and Challenges.
[23] IBM Global Technology Services, Thought Leadership White Paper, Strategies for assessing cloud security. November 2010.
[24] John F. Gantz, Stephen Minton, Anna Toncheva. Microsoft. white paper Cloud Computing’s Role In Job Creation. March 2012
[25] MAKKAR G.D. AND MEENAKSHI BIST, Shri Guru Ram Rai Institute of Technology & Sciences, Department of Computer Science Dehradun – 248 001,Corresponding Author: Email– 1gdmakkar@redifmail.com,Meena_sanjk@rediffmail.com, EAAS - ERP AS A SERVICE, Journal of Information and Operations Management ISSN: 0976– 7754 & E-ISSN: 0976–7762 , Volume 3, Issue 1, 2012, pp-141-145
[26] URL Referred : http://thecloudtutorial.com/
[27] URL Referred: http:/www.salesforce.com/ cloudcomputing
[28] URLReferred: http://www.computerweekly.com /Articles/2011/04/08/246254/White-paper-SaaS-amp- SOA-in-Retail-Banking.htm
[29] Gartner Says Worldwide IT Spending On Pace to Surpass $3.4 Trillion in 2008, Gartner, 2008-08-18. Retrieved 2009-09-11.
[30] Surabhi Pandey, Future Prospects & Current Challenges of Enterprise Application (ERP) on Software as Services (SaaS) Using Cloud Computing.
[31] URL Referred: http://www.smb-software.com/what- are-the-challenges-faced-by-erp-system/
[32] URL Referred: http://EzineArticles.com/5576230
[33] URL Referred : http://www.ramcoblog.com/7- common-challenges-faced-in-erp-implementation
[34] URL Referred : http://blog.sageerpsolutions.com /consider-the-differences-between-cloud-and- traditional-erp-systems/
[35] URL Referred: http://www.quora.com/What-are- Cloud-Benefits-for-Startups-and-SMEs
[36] URL Referred: http://softwarestrategiesblog.com //2012/01/02/ how- cloud- computing- and- erp – mobility-are reordering-gartners-hype-cycle-for-erp/
[37] URL Referred: http://www.gartner.com/it/page.jsp? id =1739214
[38] www.erpsoftwareblog.com
[39] URL Referred: http://ecommercecenter.net /management/top-five-erp-software-vendors.html
[40] Carraro, Gianpaolo [21 June 2008]. "I can't believe we are still talking about whether SaaS multi-tenancy.” Giancarlo’s blog. Microsoft Corporation
[41] Erl, T. [2005] Service-Oriented Architecture, Upper Saddle River, NJ: Prentice Hall.
[42] Creese, Guy [18 May 2010]. "SaaS vs. Software: The Release Cycle for SaaS Is Usually (Not Always) Faster". Gartner blog. Gartner, Inc.
[43] Microsoft [2007] Software as a Service, available at Http://www.microsoft.com/serviceproviders/saas/default.mspx
[44] URL Referred: http://thecloudtutorial.com/
[45] URL Referred http://www.salesforce.com/ cloudcomputing
[46] URL Referred: http://www.computerweekly.com /Articles/2011/04/08/246254/White-paper-SaaS-amp- SOA-in-Retail-Banking.htm
[47] URL Referred: http://msdnmicrosoft.com/en- us/library/aa479086.aspx#mlttntda_paf
[48] Peter Mell Timothy Grance The NIST Definition of Cloud Computing.
[49] http://www.erpsoftware-news.com /2012/03/microsoft- dynamics-erp-on-premise-vs-on-demand-vs-hosted- pricing-.html
[50] http://www.erpsoftwareblog.com /2012/01/erp-in-the- cloud-vs-on-premise-cost-comparison/
[51] http://sumanchaudhuri.wordpress.com /2008/06/02/problems-with-multi-tenancy/
[52] F.Chong, G.Carraro, and R. Wolter, "Multi-Tenant Data Architecture," Microsoft Corporation,2006
[53] F. Chong and G. Carraro, "Architecture Strategies for “Catching the Long Tail," Microsoft Corporation, 2006
[54] http://www.chinacloud.cn /upload/201002/10021300131703.pdf
[55] http://www.erpsoftware-news.com /2012/03/microsoft- dynamics-erp-on-premise-vs-on-demand-vs-hosted- pricing-.html
[56] http://www.erpsoftwareblog.com /2012/01/erp-in-the- cloud-vs-on-premise-cost-comparison/