Cloud Computing: um novo paradigma na computação e armazenamento de dados
Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;
Accepted: Dec. 8, 2017;
Published: Feb. 24, 2018
Authors
João Emílio Almeida,Professor Adjunto no ISTEC
Media
To cite this article
João Emílio Almeida, Cloud Computing: um novo paradigma na computação e armazenamento de dados
DOI:10.31112/kriativ-tech-2018-01-19
Abstract
Cloud Computing has changed the paradigm of traditional computing, freeing end users and companies from having their own computing resources. Instead, users have access to seemingly unlimited resources, with great availability and reliability, in a transparent and ubiquitous way, using thin clients through the internet. In this article, the NIST Cloud Computing definition is presented, describing its characteristics, services and implementation models. Some considerations are made regarding traditional computing and the advantages of Cloud Computing, which was made possible with the development of technologies such as Grid Computing and Virtualization. Economies of scale, transparent engineering and user focus are the key features of Cloud Computing success.
Keywords
Cloud Computing, Grid Computing, Virtualization.
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58. |
Boss, G., Malladi, P., Quan, D., Legregni, L., & Hall, H. (2007). Cloud computing. IBM white paper, 321, 224-231.
Brandao, P. (2017). Cloud Data Security.
Brandão, P. R. S. (2018). O centro de informação através do computador virtual.
Brian, O., Brunschwiler, T., Dill, H., Christ, Kaiserswerth, M et al.. (2012). Cloud Computing. White Paper SATW.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.
Pereira, M. A. L. (2013). Conceção de arquiteturas para Cloud Computing: casos de demonstração da utilização do modelo de referência do NIST (Doctoral dissertation).
Cybersecurity: a importância das passwords
Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;
Accepted: Dec. 8, 2017;
Published: Feb. 24, 2018
Authors
Pedro Ramos Brandão,Professor Coordenador do ISTEC
Media
To cite this article
Pedro Ramos Brandão, Cybersecurity: a importância das passwords
DOI:10.31112/kriativ-tech-2018-01-18
Abstract
The problem of simplifying passwords. The dangers of repeating the same password on multiple systems. Analysis of the main methods used by hackers to gain access to personal information. Solutions for password security. Secure Passwords
Keywords
Cybersecurity, passwords, hackers, security.
References
Diogenes, Yuri (2028). Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics. Packt.
Stallings, William (2018). Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley.
Maymi, Fernando (2018). CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA.
Hubbard, Douglas (2018). How to Measure Anything in Cybersecurity Risk. Wiley.
Kohnke, Anne (2018). Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework. CRC Press.
Behan, Maria (2018). Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts. Peerlyst.
Brooks, Charles (2018). Cybersecurity Essentials. Sybex.
Arnold, Rob (2017). Cybersecurity. Threat Sketch, LLC.
Kohnke, Anne (2016). The Complete Guide to Cybersecurity Risks and Controls. CRC Press.
Guiora, Amos (2017). Cybersecurity: Geopolitics, Law, and Policy. Routledge.
Um estudo sobre o sistema operativo iOS da Apple
Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;
Accepted: Dec. 8, 2017;
Published: Feb. 24, 2018
Authors
Isabel Alvarez,Professora Coordenadora no ISTEC
Media
To cite this article
Isabel Alvarez, Um estudo sobre o sistema operativo iOS da Apple
DOI:10.31112/kriativ-tech-2018-01-20
Abstract
The emergence of the smartphone as a highly complex technology was accompanied by mobile operating systems (OS), large developer communities, content providers and complex networks, forming together digital infrastructures. These smartphones have become powerful devices being basically miniature versions of personal computers. Multiple factors have had a significant effect on the evolution of these platforms including graphical user interfaces, development platforms, business models and value extraction principles. However, the growing popularity and sophistication of smartphones has also heightened concern about the privacy of users using these devices.
Keywords
mobile operating systems, smartphones, iOS, mobile applications, data security.
References
[1] Y. Yoo, "Computing in Everyday Life: A Call for Research on Experiential Computing," MIS Quarterly, vol. 34, pp. 213-231, 2010.
[2] D. Tilson, K. Lyytinen, and C. Sørensen, "Digital Infrastructures: The Missing IS Research Agenda," Information Systems Research, vol. 21, pp. 748-759, December 2010.
[3] M. Needham and N. Rich, "Psion the Organiser," Accountancy, vol. 100, pp. 137-138, 1987.
[4] J. E. Vascellaro and A. Sharma, "Google's Android Has Phone Debut via T-Mobile," Wall Street Journal - Eastern Edition, vol. 252, p. B3, 2008.
[5] Gartner, "Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond," 2010.
[6] K. Lyytinen and Y. Yoo, "Research Commentary: The Next Wave of Nomadic Computing," Information Systems Research, vol. 13, pp. 377-388, 2002.
[7] D. Tilson, C. Sorensen and K. Lyytinen, “Change and Control Paradoxes in Mobile Infrastructure Innovation – The Android and iOS Mobile Operating Systems Cases”, 45th Hawaii International Conference on System Sciences, 2012
[8] O. Hanseth and K. Lyytinen, "Design theory for dynamic complexity in information infrastructures: the case of building internet," Journal of Information Technology vol. 25, pp. 1-19, 2010.
[9] Y. Yoo, O. Henfridsson, and K. Lyytinen, "The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research," Information Systems Research, vol. 21, pp. 724-735, 2010.
[10] A. Tiwana, B. Konsynsky, and A. A. Bush, "Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics," Information Systems Research, vol. 21, pp. 675-687, 2010.
[11] Manuel Egele, Cristopher Kruegel, EnginKirda and Giovanni Vigna, “PiOS: Detecting Privacy Leaks in iOS Applications”, NDSS Symposium 2011
[12] iPhone Developer Program License Agreement. http://www.eff.org/files/20100302 iphone dev agr.pdf.
[13] Gartner Newsroom. Competitive Landscape: Mobile Devices, Worldwide, 2Q10. http://www.gartner.com/ it/page.jsp?id=1421013, 2010.
[14] A. Ghazawneh and O. Henfridsson, "Governing ThirdParty Development Through Plaform Boundary Resources," in ICIS, 2010, p. Paper 48.
[15] T. P. Hughes, Networks of power: electrification in Western society, 1880-1930. Baltimore, Maryland: John Hopkins University Press, 1983.
[16] D. Tilson, "The interrelationships between technical standards and industry structures: Actor-network based case studies of the mobile wireless and television industries in the US and the UK ": Ph.D Thesis, Case Western Reserve University, 2008.
[17] P. N. Edwards, S. J. Jackson, G. C. Bowker, and C. P. Knobel, "Understanding Infrastructure: Dynamics, Tensions, and Design," 2007, p. Report of a Workshop on "History & Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures".
[18] Tobias Dehling, Fangjian Gao, Stefan Schneider and Ali Sunayev, “Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android”, JMIR mHealth and uHealth, 2015
[19] http://www.apple.com/pr/library/2007/01/09Apple-Reinvents-thePhone-with-iPhone.html [Accessed: 13 November 2013]
[20] Wired. Apple Approves, Pulls Flashlight App with Hidden Tethering Mode. http: //www.wired.com/gadgetlab/2010/07/ apple-approves-pulls-flashlight% 2dapp-with-hidden-tethering-mode/.
[21] https://developer.apple.com/ [Accessed: 13 November 2013]
[22] J. Conway and A. Hillegass, iPhone Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides), Addison-Wesley, 2010.