Cloud Computing: um novo paradigma na computação e armazenamento de dados

Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;

Accepted: Dec. 8, 2017;

Published: Feb. 24, 2018

Authors

João Emílio Almeida,Professor Adjunto no ISTEC

Media

PDF

To cite this article

João Emílio Almeida, Cloud Computing: um novo paradigma na computação e armazenamento de dados

DOI:10.31112/kriativ-tech-2018-01-19

Abstract

Cloud Computing has changed the paradigm of traditional computing, freeing end users and companies from having their own computing resources. Instead, users have access to seemingly unlimited resources, with great availability and reliability, in a transparent and ubiquitous way, using thin clients through the internet. In this article, the NIST Cloud Computing definition is presented, describing its characteristics, services and implementation models. Some considerations are made regarding traditional computing and the advantages of Cloud Computing, which was made possible with the development of technologies such as Grid Computing and Virtualization. Economies of scale, transparent engineering and user focus are the key features of Cloud Computing success.

Keywords

Cloud Computing, Grid Computing, Virtualization.

References

Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., et al. & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM53(4), 50-58.

Boss, G., Malladi, P., Quan, D., Legregni, L., & Hall, H. (2007). Cloud computing. IBM white paper321, 224-231.

Brandao, P. (2017). Cloud Data Security.

Brandão, P. R. S. (2018). O centro de informação através do computador virtual.

Brian, O., Brunschwiler, T., Dill, H., Christ, Kaiserswerth, M et al.. (2012). Cloud Computing. White Paper SATW.

Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.

Pereira, M. A. L. (2013). Conceção de arquiteturas para Cloud Computing: casos de demonstração da utilização do modelo de referência do NIST (Doctoral dissertation).


Cybersecurity: a importância das passwords

Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;

Accepted: Dec. 8, 2017;

Published: Feb. 24, 2018

Authors

Pedro Ramos Brandão,Professor Coordenador do ISTEC

Media

PDF

To cite this article

Pedro Ramos Brandão, Cybersecurity: a importância das passwords

DOI:10.31112/kriativ-tech-2018-01-18

Abstract

The problem of simplifying passwords. The dangers of repeating the same password on multiple systems. Analysis of the main methods used by hackers to gain access to personal information. Solutions for password security. Secure Passwords

Keywords

Cybersecurity, passwords, hackers, security.

References

Diogenes, Yuri (2028). Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics. Packt.

Stallings, William (2018). Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley.

Maymi, Fernando (2018). CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA.

Hubbard, Douglas (2018). How to Measure Anything in Cybersecurity Risk. Wiley.

Kohnke, Anne (2018). Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework. CRC Press.

Behan, Maria (2018). Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts. Peerlyst.

Brooks, Charles (2018). Cybersecurity Essentials. Sybex.

Arnold, Rob (2017). Cybersecurity. Threat Sketch, LLC.

Kohnke, Anne (2016). The Complete Guide to Cybersecurity Risks and Controls. CRC Press.

Guiora, Amos (2017). Cybersecurity: Geopolitics, Law, and Policy. Routledge.


Um estudo sobre o sistema operativo iOS da Apple

Kriativ-tech
Volume 1, Issue 7, April 2018, Pages: xxx
Received: Nov. 28, 2017;

Accepted: Dec. 8, 2017;

Published: Feb. 24, 2018

Authors

Isabel Alvarez,Professora Coordenadora no ISTEC

Media

PDF

To cite this article

Isabel Alvarez, Um estudo sobre o sistema operativo iOS da Apple

DOI:10.31112/kriativ-tech-2018-01-20

Abstract

The emergence of the smartphone as a highly complex technology was accompanied by mobile operating systems (OS), large developer communities, content providers and complex networks, forming together digital infrastructures. These smartphones have become powerful devices being basically miniature versions of personal computers. Multiple factors have had a significant effect on the evolution of these platforms including graphical user interfaces, development platforms, business models and value extraction principles. However, the growing popularity and sophistication of smartphones has also heightened concern about the privacy of users using these devices.

Keywords

mobile operating systems, smartphones, iOS, mobile applications, data security.

References

[1] Y. Yoo, "Computing in Everyday Life: A Call for Research on Experiential Computing," MIS Quarterly, vol. 34, pp. 213-231, 2010.

[2] D. Tilson, K. Lyytinen, and C. Sørensen, "Digital Infrastructures: The Missing IS Research Agenda," Information Systems Research, vol. 21, pp. 748-759, December 2010.

[3] M. Needham and N. Rich, "Psion the Organiser," Accountancy, vol. 100, pp. 137-138, 1987.

[4] J. E. Vascellaro and A. Sharma, "Google's Android Has Phone Debut via T-Mobile," Wall Street Journal - Eastern Edition, vol. 252, p. B3, 2008.

[5] Gartner, "Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond," 2010.

[6] K. Lyytinen and Y. Yoo, "Research Commentary: The Next Wave of Nomadic Computing," Information Systems Research, vol. 13, pp. 377-388, 2002.

[7] D. Tilson, C. Sorensen and K. Lyytinen, “Change and Control Paradoxes in Mobile Infrastructure Innovation – The Android and iOS Mobile Operating Systems Cases”, 45th Hawaii International Conference on System Sciences, 2012

[8] O. Hanseth and K. Lyytinen, "Design theory for dynamic complexity in information infrastructures: the case of building internet," Journal of Information Technology vol. 25, pp. 1-19, 2010.

[9] Y. Yoo, O. Henfridsson, and K. Lyytinen, "The New Organizing Logic of Digital Innovation: An Agenda for Information Systems Research," Information Systems Research, vol. 21, pp. 724-735, 2010.

[10] A. Tiwana, B. Konsynsky, and A. A. Bush, "Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics," Information Systems Research, vol. 21, pp. 675-687, 2010.

[11] Manuel Egele, Cristopher Kruegel, EnginKirda and Giovanni Vigna, “PiOS: Detecting Privacy Leaks in iOS Applications”, NDSS Symposium 2011

[12] iPhone Developer Program License Agreement. http://www.eff.org/files/20100302 iphone dev agr.pdf.

[13] Gartner Newsroom. Competitive Landscape: Mobile Devices, Worldwide, 2Q10. http://www.gartner.com/ it/page.jsp?id=1421013, 2010.

[14] A. Ghazawneh and O. Henfridsson, "Governing ThirdParty Development Through Plaform Boundary Resources," in ICIS, 2010, p. Paper 48.

[15] T. P. Hughes, Networks of power: electrification in Western society, 1880-1930. Baltimore, Maryland: John Hopkins University Press, 1983.

[16] D. Tilson, "The interrelationships between technical standards and industry structures: Actor-network based case studies of the mobile wireless and television industries in the US and the UK ": Ph.D Thesis, Case Western Reserve University, 2008.

[17] P. N. Edwards, S. J. Jackson, G. C. Bowker, and C. P. Knobel, "Understanding Infrastructure: Dynamics, Tensions, and Design," 2007, p. Report of a Workshop on "History & Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures".

[18] Tobias Dehling, Fangjian Gao, Stefan Schneider and Ali Sunayev, “Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android”, JMIR mHealth and uHealth, 2015

[19] http://www.apple.com/pr/library/2007/01/09Apple-Reinvents-thePhone-with-iPhone.html [Accessed: 13 November 2013]

[20] Wired. Apple Approves, Pulls Flashlight App with Hidden Tethering Mode. http: //www.wired.com/gadgetlab/2010/07/ apple-approves-pulls-flashlight% 2dapp-with-hidden-tethering-mode/.

[21] https://developer.apple.com/ [Accessed: 13 November 2013]

[22] J. Conway and A. Hillegass, iPhone Programming: The Big Nerd Ranch Guide (Big Nerd Ranch Guides), Addison-Wesley, 2010.