Climate Change is not a foreseeable future anymore but a glooming present to which laws must react, rather than just prevent it from happening. The current legal framework in the European Union still reflects a preventive and precautionary approach towards the environment and specifically the challenges of Climate Change. This article argues that this preventive approach, based on a strong interpretation of the precautionary principle, hinders the research and development of technologies that can be used to mitigate the current and future effects of Climate Change. Using the case study of cloud seeding, the present paper demonstrates how geoengineering technologies can be seen as cost-effective measures to prevent environmental degradation from Climate Change and how the lack of scientific certainty regarding these technologies should not be a reason to not regulate them.
A large opportunity exists for Australian organisations to use new and powerful technologies (Artificial intelligence [AI] and Cloud technologies) to transform their businesses to keep pace with or ahead of the leading edge of competitiveness. This book showcases inspirational Australian case studies in order to inspire Australian (and non-Australian) organisations to undertake the challenge. This book synthesises the key learnings and contrasts those with the conventional wisdom on this topic. The book also defines what AI- and Cloud-based business transformations are and what they can do for businesses. Furthermore, it explains why it is imperative that businesses should address the business opportunities of these technological advancements, without going into the technical details any more than the literacy' that is necessary for business leaders. Finally, it also includes international best practice case studies beyond the usual suspects. This book provides guidance and motivation for business executives, managers and students interested in innovating and transforming their businesses through the use ofthe two critical new technologies.
In: Vojnotehnički glasnik: naučni časopis Ministerstva Odbrane Republike Srbije = Military technical courier : scientific periodical of the Ministry of Defence of the Republic of Serbia = Voenno-techničeskij vestnik : naučnyj žurnal Ministerstva Oborony Respubliki Serbija, Band 70, Heft 3, S. 734-755
Introduction/purpose: The paper analyzes the impact of malicious codes in the cloud. Malicious code is an unauthorized piece of code that violates the integrity of an application and infrastructure to cause certain effects, such as security breaches, spread of infections, and data infiltration from the computer with the help of malicious software - this is a simple form of data theft which can lead to disastrous consequences in all segments of society, especially when it comes to national security. To overcome this challenge, it is necessary to detect holes in the safety of cloud environments and repair them before the attackers use these vulnerabilities to bypass the integrated cloud infrastructure. Methods: Structural analysis, functional analysis, comparative analysis, synthesis. Results: There are many factors for collecting, comparing, and delivering intelligence data on cloud threats. Cloud applications are increasingly being targeted because their use to store and share data with mobile application hosting has been increased exponentially, enabling industrial automation and business information monitoring and procurement. In addition, billions of devices on the Internet use the cloud infrastructure as a background for processing and transmitting large data sets. Malicious code is easily distributed due to the ease of sharing documents and files via the cloud. Conclusion: As cloud technologies are taking a central place in the world of digital transformation, the threat to the cloud environment is expected to grow exponentially. This means that organizations need to ensure that the cyber security position of the cloud infrastructure they possess is robust and mature enough to combat all relevant security threats in order to minimize business risks. Understanding the nature of practical security controls and how they are assessed enables organizations to build a practical approach to security and privacy in the cloud.
In the digital economy, a new type of business activity, digital entrepreneurship, has developed rapidly and required breakthrough technologies such as blockchain, big data, cloud technologies, and more. There is a need for a comprehensive resource that provides all-encompassing insight into the essence, special aspects, models, and international best practices of e-business based on various digital technologies in various high-tech markets. Digital Technologies for Entrepreneurship in Industry 4.0 provides theoretical frameworks and recent results of research in this sphere.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Verfassungs- und europarechtliche Einordnung des Grundrechts auf Datenschutz im Zusammenspiel mit anderen Grundrechten ähnlicher Zielrichtung -- Europäisches Datenschutzrecht und nationale IT-arbeitsrechtliche Anforderungen im praktischen Zusammenspiel -- Datenschutzrechtliche Bewertung neuer Technologien für den IT-gestützten Arbeitsplatz -- Exkurs zu konkreten Datenschutzrisiken durch staatliche Aufklärungsprogramme vor dem Hintergrund des gesteigerten Einsatzes von Cloud-Technologien.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. We focus on the possible security concerns of a cloud user (e.g. an organization, government department, etc.) to lease cloud services such as resources in the form of Virtual Machines (VM) from a public Infrastructure-as-a-Service (IaaS) provider. There are many security critical areas in the cloud systems, such as data confidentiality, resource integrity, service compliance, security audits etc. In this thesis, we focus on the security aspects which result in the trust deficit among the cloud stakeholders and hence hinder a security sensitive user to benefit from the opportunities offered by the cloud computing. Based upon our findings from the security requirements analysis,we propose solutions that enable user trust in the public IaaS clouds. Our solutions mainly deal with the secure life cycle management of the user VM which include mechanisms for VM launch and migration. The VM launch and migration solutions ensure that the user VM is always protected in the cloud by only allowing it to run on the user trusted platforms. This is done by using trusted computing techniques that allow the users to remotely attest and hence rate the cloud platforms trusted or untrusted. We also provide a prototype implementation to prove the implementation feasibility of the proposed trust enabling principles used in the VM launch and migration solutions.
Advanced digitalization together with the rise of cloud technologies is a key enabler for a fundamental paradigm shift known as Industry 4.0 which pro-poses the integration of the new generation of ICT solutions for the monitoring, adaptation, simulation and optimization of factories. With the democratization of sensors, assembly systems can now be sensorized and the data generated by these devices can be exploited, for instance, to monitor their utilization, operations and maintenance. However, analyzing the vast amount of generated data is resource demanding both in terms of computing power and network bandwidth, especially when dealing with real-time changes to product, process and resource domains. This paper presents a novel cloud-based analytics framework for the management and analysis of assembly systems. It brings together standard open source technologies and the exploitation of cloud computing which as a whole can be adapted to and deployed on different cloud providers, thereby reducing infra-structure costs, minimizing deployment difficulty and providing on-demand ac-cess to virtually infinite computing power, storage and network resources.
Intro -- Preface -- Contents -- Editors and Contributors -- About the Editors -- Contributors -- Part I Digital Platforms and Cloud Technologies in the Context of Neo-industrial Transformation of Economic and Legal Systems -- 1 Digital Platforms and Cloud Technologies in Post-capitalist Discourse: A Doctrinal and Legal Perspective -- 1.1 Introduction -- 1.2 Methods and Materials -- 1.3 Results -- 1.3.1 Development of Digital Platforms and Artificial Intelligence Systems: Social and Legal Aspect -- 1.3.2 Specific Trajectories of Digital Platforms Under the Impact of the Global Pandemic -- 1.3.3 Medium- and Long-Term Changes Related to the Introduction of Digital Platforms and Artificial Intelligence Systems: A Socio-political Aspect -- 1.4 Conclusion -- References -- 2 Utilizing Artificial Intelligence in Legal Practice -- 2.1 Introduction -- 2.2 Materials -- 2.3 Methodology -- 2.4 Results -- 2.4.1 On Legal Tech -- 2.4.2 Categories of AI Application in Legal Practice -- 2.4.3 Predict Courts' Decisions -- 2.4.4 Predictive Coding -- 2.5 Conclusion -- References -- 3 Augmented Reality and Civil Law Regulation of Business Relations -- 3.1 Introduction -- 3.2 Materials -- 3.3 Methods -- 3.4 Results -- 3.4.1 Reality and Existence: Definitions and Terminology -- 3.4.2 On the Spheres of Commercial Use of Augmented Reality Technology -- 3.4.3 The Results of Creative Activity, Obtained with the Use of Augmented Reality Technologies -- 3.5 Conclusion -- References -- 4 A Typology of Risks and Threats Associated with the Digital Transformation of Economic and Legal Systems -- 4.1 Introduction -- 4.2 Methods and Materials -- 4.3 Results -- 4.3.1 New "Drivers of History" -- 4.3.2 Artificial Intelligence, New Technological Formate of Transformation of Socio-economic and Political-Legal Relations: Main Risks.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
In: Joshua Ratna Kishore Petla, "Cloud Computing Technologies Transforming Public Sector Remote Work Standards Post Covid-19", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.11, Issue 4, pp.b944-b952, April 2023, Available at :https://www.ijcrt.org/papers/IJCRT2304
With the changing technology, humanity has reached Industry 4.0 starting from the steam engine. With these developments, human resources in the organisations need to store and process data. A new application that enables digital human resources to easily access its data is cloud computing. The aim of this article is analyse how cloud technologies affect human resources management in Turkey. A descriptive method was used in this paper to explain the concept of digitalism in the discussed area and analyse the relationship between cloud system and digital human resources management. Data was drawn from the scientific and professional literature documents on this subject. Many organisations do not have enough knowledge about cloud computing in Turkey. There are also concerns about cloud systems security and economic equilibrium of companies. It is predicted that companies that adopt this technology will have a more efficient and comfortable human resources process and become more prosperous. Organisations should work for the development of human resources management system by digitising it. Organisations whose number of employees is increasing day by day, face problems, but they can handle this situation through the careful implementation of cloud computing. Cloud systems provide organisations with benefits such as storage capacity and easy access to data anytime and anywhere.
In: kma: das Gesundheitswirtschaftsmagazin, Band 17, Heft 4, S. 38-38
ISSN: 2197-621X
Das Technologieprogramm des Bundesministeriums für Wirtschaft und Technologie (BMWi) unterstützt die Entwickelung sicherer Cloud-Services auch für das Gesundheitswesen.