Analysis and Design of Cloud Publishing Platform and its Social Network

نویسندگان

  • Xiuhong Chen
  • Rong Peng
  • Han Lai
  • Keqing He
چکیده

SaaS (Software as a Service) has been attracted significant attentions from both industry and academia. Owing to serving multiple clients in the Long Tail, many notable SaaS applications have accomplished big successes in many traditional domains, such as CRM (Customer Relationship Management) and HRM (Human Resource Management). To promote the effect and efficiency of the traditional publishing industry, a solution of CPP (Cloud Publishing Platform) based on SaaS is proposed. Compared to the traditional e-publishing systems used by the publishers, it has the following distinguished features: 1) it is developed and operated by independent SaaS provider who not only provides valuable publishing services to enterprise tenants, such as periodical presses, but also provides significant services to individual tenants, such as scholars and researchers; 2) any individual tenant is not just a dedicator to a specific publisher, but a dedicator to all enterprise tenants, and his academic reputation can be accumulated by all the activities carried out in the platform; 3) a publishing cycle will be established based on CPP and benefit all the stakeholders. At the end, five key points of developing and operating a successful SaaS application are concluded, which can be used as a guideline to general SaaS application development.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA

Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...

متن کامل

An efficient method for cloud detection based on the feature-level fusion of Landsat-8 OLI spectral bands in deep convolutional neural network

Cloud segmentation is a critical pre-processing step for any multi-spectral satellite image application. In particular, disaster-related applications e.g., flood monitoring or rapid damage mapping, which are highly time and data-critical, require methods that produce accurate cloud masks in a short time while being able to adapt to large variations in the target domain (induced by atmospheric c...

متن کامل

Analysis of Media Consumption Behavior of Sports Fans with a Network Approach

Fans like to talk about their favorite team and players with others. Professional team fans use social media to learn more about teams, connect with other fans, follow teams and players, and build a fan community. Social media by creating a network of users has become a platform for researchers to study fan behavior. Given that members of the fan community interact with each other, their opinio...

متن کامل

Cloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming

The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hos...

متن کامل

An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling

In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014